淡江大學機構典藏:Search Results
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 64185/96959 (66%)
Visitors : 11809241      Online Users : 21306
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Category

    Loading community tree, please wait....

    Author

    Loading author tree, please wait.....

    Year

    Loading year class tree, please wait....

    Results 7241-7250 of 13663.

    previous716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 next    View [10|25|50] records per page
    [ Search items with full text(s)| Search all items]     Sort results by Order

    7241A Robust Group Multiple Attributes Decision-Making Method Based on Risk Preference of the Decision Makers

    Liang Yin; Huan-Jyh Shyur2018-02
    [Graduate Institute & Department of Information Management] Journal Article
    International Journal of Applied Science and Engineering 15(1), p.33-46
    )c(Ai,Aj ) (i, j), (7) c1 where   w (r r )  pc n ic jc if (ric rjc ) 0

    7242Testing goodness-of-fit of a logistic regression model with case–control data

    Cheng, K. F.; Chen, Li-ching2004-09-01
    [Graduate Institute & Department of Statistics] Journal Article
    Journal of Statistical Planning and Inference 124(2), pp.409-422
    true model and the logistic regression model in e general random i=ects model Pr(Yi =1|Xi = xi;i)=G(xiT∗ + xiTi): (2.2

    7243The warranty policy under fuzzy environment

    Ho,Li-an; Lin,Chin-yen; 2007-11
    [Graduate Institute & Department of Educational Technology ] Journal Article
    International Journal of Quality & Reliability Management 24(2), pp.191-202
    characterization Suppose a system has two types of failure when the system fails at age t during the time interval (0, w]: (1) type I failure (minor failure

    7244A new method for calculating loss coefficients [of power systems]

    Chang, Yung-chung; 楊維楨; 1994-08-01
    [Department of Management Sciences] Journal Article
    IEEE transactions on power systems 9(3), pp.1665-1671
    淡江大學經營決策學系 Chang, Yung-chung 楊維楨 Yang, Wei-tzen Liu, Chun-chang A new method for calculating loss coefficients [of power systems] 損失係數算新法

    7245逐步區間設限加速壽命試驗在成本限制下之最適設計

    林光男; 廖康君; 2008-06-01
    [Graduate Institute & Department of Statistics] Journal Article
    智慧科技與應用統計學報 6(1),頁 1-11
    下之最適 Optumal Progressively Type-I Gruup-Censored Accelerated Life-test Plans under Cost Constraint doi:10.29807/JTITAS.200806.0001 科技與應用統學報

    7246Multiple comparison procedures with the average for exponential location parameters

    吳淑妃; Wu, Shu-fei; 1998-02-06
    [Graduate Institute & Department of Statistics] Journal Article
    Computational Statistics and Data Analysis 26(4), pp.461-484
    淡江大學統學系 吳淑妃 Wu, Shu-fei Chen, Hubert J. Multiple comparison procedures with the average for exponential location parameters 指數分配位置參數與平均比較的多重比較程序當樣本

    7247The three dimensional time dependent laser self-curving effect

    陳惟堯; Chen, W. Y.1974-10
    [Graduate Institute & Department of Physics] Journal Article
    Chinese Journal of Physics=中國物理學刊 12(2),頁69-78
    for illustration. Finally thi results have been compared with the previous results of the two dimensoinal caso. I. UNTRODUCTION IIT

    7248Weak topology and Browder-Kirk’s theorem on hyperspace

    胡德軍2007-10-01
    [Department of Applied Mathematics and Data Science] Journal Article
    Journal of Mathematical Analysis and Applications 334, pp.799-803
    for i = 1,2,...,n}. i i Lemma 3. Addition and scalar multiplication are continuous operations on the space (WCC(X),Tw

    7249On data-dependence of exponential stability and stability radii for linear time-varying differential-algebraic systems

    Chyan, Chuan-jen; Du, Nguyen Huu; 2008-10
    [Department of Applied Mathematics and Data Science] Journal Article
    Journal of Differential Equations 245(8), pp.2078-2102
    concretely, we consider the system (1.1) subjected to structured perturbation of the form E(t)x(t) = I(t)x(t) + B(t)Δ C(·)x

    7250Image Protection Based on Visual Cryptography and Statistical Property

    Hou, Young-chang; Huang, Pei-hsiu2011-06
    [Graduate Institute & Department of Information Management] Proceeding
    Statistical Signal Processing Workshop (SSP), 2011 IEEE, pp.481-484
    by (A,v) = (XIYIX~Y...~Yn-uxn. xp(igixp(2~~1.Z.n.-/Xp(nJ)r whire ~1x2.xn is I-D string over V, yly4...yn.1 and Z~Z~...Zar~o.~1-D string over A, Xp


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback