淡江大學機構典藏:Search Results
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 64180/96952 (66%)
Visitors : 11332370      Online Users : 7636
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Category

    Loading community tree, please wait....

    Author

    Loading author tree, please wait.....

    Year

    Loading year class tree, please wait....

    Results 5991-6000 of 21495.

    previous591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 next    View [10|25|50] records per page
    [ Search items with full text(s)| Search all items]     Sort results by Order

    5991台灣高等教育評鑑面臨之問題與未來之改革

    楊瑩2011
    [Master's Program, Graduate Institute of Educational Policy and Leadership] Proceeding
    「高等教育質量保障體系建設研究」國際學術研討會,頁54-72
    大學外部利益關係者資訊回饋探析 謝安邦(澳門理工學院學術事務部教授) 台灣高等教育評鑑面臨之問題與未來之改革 楊瑩(淡江大學教育政策與領導研究所所長、教授) 回顧澳門高等教育的質量評審度 劉靜文(澳門科技大學助理教授) 阮邦(澳門大學講師) 澳門成高等教育質量評估探析 周紅莉(中山

    5992Stability analysis of a non-inverting synchronous buck-boost power converter for a solar power management system

    Shiau, Jaw-kuen; Cheng, Chun-jen; 2008-11
    [Graduate Institute & Department of Aerospace Engineering] Proceeding
    International Conference on Sustainable Energy Technologies, pp.263-268
    the utility of the available solar power drawn from the solar panel. I. INTRODUCTION Solar powers are widespread in industry, commercial

    5993從嚇阻理論觀點探討員工資訊安全行為意圖

    高珮庭; Kao, Pei-Ting2012
    [Graduate Institute & Department of Information Management] Thesis
    以及個電腦往往遭受到威脅,除了透過資安技術方式,已有許多研究開始著重在資訊安全管理與組織員工的資安行為,以確保組織內部的資訊安全。對於組織員工的資訊安全行為,在嚇阻理論應用於探討員工從事資訊安全行為意圖的這些研究得到的結果顯示,嚇阻的嚴重性與確定性對員工資安行為的影響效果,並不十分一致;同時,也

    5994X-ray spectroscopy of EuBa2(Cu1-yZny)3O7-x: Suppression of superconductivity

    Horn, S.; Reilly, K.; 1988-08
    [Graduate Institute & Department of Physics] Journal Article
    Physical Review B (Condensed Matter) 38(4), pp.2930-2933
    of about 3 eV. The energy was calobrated by simultaneous measurements on i Cu foil, defining the first inflection ' point

    5995Quantum correction to the chern-simons coefficient in self-dual SU(n) chern-simons higgs theories

    Kao, Hsien-chung2002-01
    [Graduate Institute & Department of Physics] Journal Article
    Physical Review D (Particles and Fields) 65(4), 045010(7 pages)
    the gauge symmitry is completely broken. Hawevir, further study of N52 supersymmetric Chern-Simons Higgs theories casts doobts an the results @22#, and i

    5996A Sequence Frequency Reuse Scheme for Coordinated Multi-Point Transmission in LTE-A

    Wang, Ying-Hong; Tsai, Chih-Hsiao; 2013-07-22
    [Graduate Institute & Department of Computer Science and Information Engineering] Proceeding
    ICWN’13 – The 2013 International Conference on Wireless Networks, 6p.
    effaciency in the ase of, and improves the SINR value of CEU (Cell Edge Users). Keywords: CoMP, LTA-A, Frequency reuse, ICI I、Introduction

    5997Evaluate the nonlinear viscoelasticity of polyolefin melts using the Larson model

    Lin, Gwo-geng2013-10-24
    [Graduate Institute & Department of Chemical and Materials Engineering] Journal Article
    Polymer Engineering and Science 54(10), p.2354-2361
    D : s s 1Gi d 1 s 52Gi D (7) i 3Gi i i kii DOI 10.1002/pen This text was extracted from a PDF document using

    5998Characteristics of Power and Cross Spectra of Wind Fluctuation along Meridian on Dome-like Structures

    Lo, Yuan-Lung; Kanda, Jun2011-07
    [Graduate Institute & Department of Civil Engineering] Proceeding
    Proceedings of The 13th International Conference of Wind Engineering, 8p.
    pressures and reference static pressures respectively. ρ is air density and UH represents mean wind velocity at model height. p p C  i ref

    5999探討使用者資訊安全行為的保護動機過程

    江蕙羽; Chiang, Hui-Yu2013
    [Graduate Institute & Department of Information Management] Thesis
    沒有同時考慮到環境因素和個因素對保護動過程的影響。因此本研究以一般使用者為研究對象,擴展完整的保護動理論模,結合環境因素中的社會影響,以及個因素中的先前安全經驗和資訊安全意識,探討其對威脅評估和應對評估的影響,進而討論對資訊安全行為意圖的影響效果。本研究對象為具有個電腦的使用者,以網路問

    6000Optimal Length of Lease Period and Maintenance Policy for Leased Equipment with a Control-Limit on Age

    Chang, Wen-Liang; Yeh, Ruey-Huei; 2011-11
    [Graduate Institute & Department of Business Administration] Journal Article
    Mathematical and Computer Modelling 54(9-10), pp.2014-2019
    Admanistration, Tamkang Univursity, Tamsui, Taipei, Taiwan a r t i c l e i n f i Article history: Received 18 December 2009 Received in revesed


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback