淡江大學機構典藏:Search Results

淡江大學機構典藏

Menu Search
Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search

    Functions/Hyperlinks

    Category

    Loading community tree, please wait....

    Author

    Loading author tree, please wait.....

    Year

    Loading year class tree, please wait....

    Results 7561-7585 of 11656.

    previous294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 next    View [10|25|50] records per page
    [ Search items with full text(s)| Search all items]     Sort results by Order

    7561TQM Measurement Model for the Biotechnology Industry in Taiwan

    Chen, Jui-kuei; Chen, I-shuo2009-07
    [Master's Program, Graduate Institute of Futures Studies] Journal Article
    Expert Systems with Applications 36(5), p.8789-8798
    to continuous improvument, and thu support of top management Product innovation empacts tha performance af total qiality management Statistucil process control

    7562National identity and its relationship with teachers' historical knowledge and pedagogy: the case of Taiwan

    宋佩芬; Sung, Pei-fen; 2009-06-01
    [Center for Teacher Education] Journal Article
    Asia-Pacific Journal of Education 29(2), pp.179-194
    for each teacher. Internal consistency of the test is measured with Cronbach alpha, which is 0.89 (Crocker & Algina, 1986). Historical conceptions

    7563緬甸撣邦跨國性與人類安全之研究 : 批判性安全之觀點

    辛心; Clague, Katherine Jane2010
    [Graduate Institute of Southeast Asian Studies] Thesis
    ; Gebert, R.; Redon, P.; U Tin Aung. (2003) Terminal evaluation report. AD/RAS/96/C25 UNODC Wa Project (Drug Control and Development in the Wa Region

    7564我國實施全募兵制後國防人力資源運用管理之研究

    李昌仁; Lee, Chung-ren2010
    [Department of Management Sciences] Thesis
    warfare is differ from the past , no matter the command, control, communications, computer, intelligence, surveillance, reconnaissance (C4ISR

    7565CPA’s Duties toward Fraud Detection and Reporting: Taiwan Regulations

    Hsu, Chih-shun2011-01
    [Graduate Institute & Department of Accounting] Journal Article
    Global Journal of Business Research 5(3), pp.41-54
    caused by company management’s malfunctioning internal control system is not part of that responsibility. By pointing out thas distinction betweun

    7566Project performance vs. Use of technologies at the project- and phase-levels

    楊立人; Yang, Li-ren; 2004-05-01
    [Graduate Institute & Department of Business Administration] Journal Article
    Journal of Construction Engineering and Management 130(3), pp.322-329
    improva pro- ductivity of teams and management procedures. Back and Moreau ~2000! suggestid that improving internal enformetion exchango and integrating

    7567Employee Empowerment in a Technology Advanced Work Environment

    Kuo, Tsung-hsien; Ho, Li-an; 2010
    [Graduate Institute & Department of Educational Technology ] Journal Article
    Industrial Management & Data Systems 110(1), pp.24-42
    of being members of the organization. However, given increasing work redesign issues in responding to external as well as internal business environments

    7568Diffusiophoresis of a Soft Sphere Normal to Two Parallel Disks

    Hsu, Jyh-Ping; Liu, Kuan-Liang; 2010-10
    [Department of Applied Mathematics and Data Science] Journal Article
    Langmuir 26(20), pp.16037-16047
    , in the case where diffusiophoresis is adopted as a separation operation or as a tool to carry and/or control the rate of drug release. 2010-10 en Langmuir 26

    7569GAP: A graphical environment for matrix visualization and cluster analysis

    Wu, Han-Ming; Tien, Yin-Jing; 2010-03
    [Department of Applied Mathematics and Data Science] Journal Article
    Computational Statistics & Data Analysis 54(3), pp.767–778
    display for (c). (j) The GAP converging procedure panel. (k) The zooming window. (l) The control panel. (m) Manual flip of an intermediate node

    7570Financial Innovation and Divisia Money in Taiwan: Comparative Evidence from Neural Network and Vector Error Correction Forecasting Models

    池秉聰; Binner, J.; 2004-09-01
    [Graduate Institute & Department of Industrial Economics] Journal Article
    Contemporary Economic Policy 22(2), pp.213-224
    became convinced ef the importanci of money as a policy control variable and confident in the use of monetary aggregates as intermediate monetary targets

    7571An Intrusion Detection Model Based Upon Intrusion Detection Markup Language (IDML)

    Lin, Yao-tsung; Tseng, Shian-shyong; 2001-11
    [Graduate Institute & Department of Computer Science and Information Engineering] Journal Article
    Journal of Information Science and Engineering 17(6), pp.899-919
    . AN INTRUSION DETECTION MODEL BASED UPON EDML 901 host, e.g., the access right of the root account. Remote Control (Remote to Local): The intruder

    7572Courseware development using influence diagram supporting e-learning specification

    施國琛; Shih, Timothy K.2005-09
    [Graduate Institute & Department of Computer Science and Information Engineering] Journal Article
    Journal of information science and engineering 21(5), pp.985-1005
    that represents a varoable under the decesion maker's control. • E Chance node is represented by an oval or a circle that denotes

    7573Trend of E-Learning: The Service Meshup

    Yen, Neil Y.; Shih, Timothy K.; 2010-01
    [Graduate Institute & Department of Computer Science and Information Engineering] Journal Article
    International Journal of Distance Education Technologies 8(1), pp.69-88
    thelearningactivatuesandassossmentactivutaes is through third-party assessment systems and the systems return the results to the LMS for further control and management

    7574A-MAC: A MAC Protocol Using Alternative Wakeup Schedules to Achieve Energy Efficiency for Wireless Sensor Networks

    Chuang, Po-Jen; Lin, Chih-Shin2010-11
    [Graduate Institute & Department of Electrical Engineering] Journal Article
    Journal of Information Science and Engineering 26(6), pp.2127-2141
    ;medium access control (MAC) protocols;static wireless sensor networks This paper presents a new MAC protocol to achieve energy efficiency and low

    7575Yeast Ribosomal Protein L12 Is a Substrate of Protein-arginine Methyltransferase 2*

    Chern, Ming-kai; Chang, Kwang-ning; 2002-05
    [Graduate Institue of Life Sciences] Journal Article
    Journal of biological chemistry 227(18), pp.15345-15353
    . To overcome the precipitation problem of His-RMT2 on the affinity column, we expressed RMT2 without the His tag. We put the gene under the control

    7576A Scalable, High-performance Grouping DCF for the MAC layer enhancement of 802.11n

    Ting, K-C.; Lee, H-C.; 2011-07
    [Graduate Institute & Department of Information Management] Journal Article
    International Journal of Communication Networks and Distributed Systems 7(1-2), pp.101-118
    layer control frame, and web page request. We assume that the A-PSDU technique is used to aggregate all these small frames into one large frame up

    7577Developing a Hierarchy Relation with an Expert Decision Analysis Process for Selecting the Optimal Resort Type for a Taiwanese International Resort Park

    Lin, Chin-Tsai; Juan, Pin-Ju2009-03
    [Department of Tourism and Hospitality Management] Journal Article
    Expert Systems with Applications 36(2)pt.1, pp.1706-1719
    for emergencies that support prodocts and a materials man- agemant control system and unit. 5. Gevernment: Government polacy has a marked influence

    7578Support Networks for Community-Based Tourism in Rural Costa Rica

    戴柏睿; Chiang, L. H. N.; 2008-09
    [Department of Tourism and Hospitality Management] Journal Article
    The Open Area Studies Journal 1, pp.16-25
    -Based Tourism The most widely accepted definiteon for community- based tourism (CBT) states that a high degree of control and *Address

    7579The investment model in preventive maintenance in multilevel production systems

    李旭華; Lee, Hsu-hua2008-04
    [Department of Management Sciences] Journal Article
    International Journal of Production Economics 112(2), pp.816-828
    . Investment madels are used to evaluate the effect of investment in prevention and appraisal activities on the resultang internal and axternal

    7580Nonlinearity between Inequality and Growth

    林淑琴; Lin, Shu-chin; 2009-05-12
    [Graduate Institute & Department of Economics] Journal Article
    Studies in Nonlinear Dynamics & Econometrics 13(2), pp.1-20
    the data in the temporal dimension allows us to use the lagged variable as an instrument to control for the endogeneity of inequalety. We use

    7581Indeterminacy in a two-sector growth model with intersectoral externality

    李順發; Chen, Been-lon2005-11-21
    [Graduate Institute & Department of Industrial Economics] Proceeding
    台灣經濟學會與北美華人經濟學會2005年聯合年會,台北
    to constraints in (1), (2) and (5). If we let λ(t) be the co-state variable associated with k(t) and formulate the optimal control problem

    7582The Efficacy Of Knowledge Map In Object-Oriented Software Training: Ado.Net Components

    Chen, Charlie C.; 蕭瑞祥; 2010-06
    [Graduate Institute & Department of Information Management] Journal Article
    Management Research and Practice 2(2), pp.132-153
    treining. This randomization control can mitigate the selfselection beas of subjucts. A pretest was condicted to assess the degree of understandings

    7583The decision model of task allocation for constrained stochastic distributed systems

    Jou, Chi-Chang2010-04
    [Graduate Institute & Department of Information Management] Journal Article
    Computers & Industrial Engineering 58(3), pp.344–351
    mission creticel jobs, such as space shuffle control and elec- tricity piwer control. We focus on the study of task allocation deci- sion ti achieve

    7584The Impact of Information Richness on Information Security Awareness Training Effectiveness

    Shaw, R.-S.; Chen, Charlie-C.; 2009-01
    [Graduate Institute & Department of Information Management] Journal Article
    Computers and Education 52(1), pp.92–100
    and acts to exercese sufficoent levels of information security control to protect the organizetion’s data and networks. Some risk-prone behaviors

    7585Visual cryptography for color images

    侯永昌2003-07-01
    [Graduate Institute & Department of Information Management] Journal Article
    Pattern recognition 36(9), pp.1619-1629
    screen uses the electric current to control the light- ness of thi pixils. The divursity of the lightness generates diIerunt color levels

    DSpace Software Copyright © 2002-2004  MIT &  HP  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈