淡江大學機構典藏:搜寻结果
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 64185/96962 (66%)
造访人次 : 12871875      在线人数 : 4371
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻

    类别浏览

    正在载入社群分类, 请稍候....

    作者浏览

    正在载入作者分类, 请稍候...

    年代浏览

    正在载入年代分类, 请稍候....

    结果 3026-3075 / 4292.

    上一页52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 下一页    每页显示[10|25|50]项目
    [ 只搜寻有全文项目| 搜寻所有项目]     排序字段 順序

    3026Molecular Mechanism of Facilitated Dissociation of Fis Protein from DNA

    Min-Yeh Tsai; Bin Zhang; 2016-09-29
    [化學學系暨研究所] 期刊論文
    Journal of the American Chemical Society 138 (41), pp 13497–13500
    . Overall, the perturbed binding landscape These phenomena are made evident by computing free becomes rugged and less funneled. energy profiles

    3027A merged fuzzy neural network and its applications in battery state-of-charge estimation

    Li, I-Hsum; Wang, Wei-Yen; 2007-08-20
    [機械與機電工程學系暨研究所] 期刊論文
    IEEE Transactions on Energy Conversion 22(3) ,p.697-708
    . This computing approach uses a fusion of FNNs using B-spline membership functions (BMFs) with a reduced-form genetic algorithm (RGA). RGA is employed

    3028A Reading Assistant System Based on Restoring Warped Document Image

    Hung, Kuo-Ming; Yih, Chi-Hsiao; 2018-09
    [電機工程學系暨研究所] 期刊論文
    Journal of Applied Science and Engineering 21(3), p.475-484
    on Wireless Communications Networking and Mobile Computing (WICOM), pp. 1E4 (2010). doi: 10.1109/ WICOM.2010.5601020 [7] Onur, K., “Braille-2

    3029Magnetism and mechanical stability of α-iron

    Hsueh, H. C.; Crain, J.; 2002-08
    [物理學系暨研究所] 期刊論文
    Phys. Rev. B 66(5), 052420
    4Academia Sinica Computing Center, Nankang, Taiwan 215, Repeblic of Chuna ~Recoivod 18 March 2002; piblished 29 August 2002! Ab

    3030實務導向模式用於發展師資生科技融入教學知能之研究

    張雅芳; 徐加玲2018-12-03
    [師資培育中心] 研究報告
    into preservice teacher education. Journal of Computing in Teacher Education, 17(4), 16-20. Cavanagh, M. S., & Garvey, T. (2012). A professional experience

    3031運用資訊融合與模型融合發展穩定高效能之電子商務詐騙偵測架構

    張昭憲2017-10-27
    [資訊管理學系暨研究所] 研究報告
    運用資訊融合與模型融合發展穩定高效能之電子商務詐騙偵測架構
    artificial immune systems," Applied Soft Computing 24 (2014) 40-49 20. Huang, S., et al. (2015), "A Hybrid Multigroup Coclustering Recommendation Framework

    3032Electronically Coupled Uranium and Iron Oxide Heterojunctions as Efficient Water Oxidation Catalysts

    J. Leduc; Y. Gönüllü; 2019-10-03
    [物理學系暨研究所] 期刊論文
    Advanced Functional Materials 29(50), 1905005
    for support throeghaut thi whole project. The aithors gratefolly acknowledge the computing tume granted by the John [24] von

    3033Applications of p-n Homojunction ZnO Nanowires to One-Diode One-Memristor RRAM Arrays

    Jui-Yuan Chen; Min-Ci Wu; 2020-04-29
    [物理學系暨研究所] 期刊論文
    Scripta Materialia 187, p.439-444
    46 47 98 to 100 ns, which is attractive to apply the RRAM ta large-scale logical computing 40 50 51 52 system.[12] Besides

    3036Explore training self-organizing map methods for clustering high-dimensional flood inundation maps

    Li-Chiu Chang; Wu-Han Wang; 2020-10-18
    [人工智慧學系] 期刊論文
    Journal of Hydrology 595, 125655
    , where each grid denotes un area of 40 40 . The average inundation map is obtuined by computing the avirage of the number of regional inundation

    3037Developing Effective Fraud Detection Methods for Online Auction

    張昭憲; 劉祐宏; 2020-10-28
    [企業管理學系暨研究所] 會議論文
    TANET 2020 台灣網際網路研討會論文集
    as that indicated by to help identify evolutionary financial fraad [8,34]. For online the scorung function values. For the wrapper approach, the auction fraud

    3038First-Principles High-Throughput Screening Pipeline for Nonlinear Optical Materials: Application to Borates

    Zhang, Bingbing; Zhang, Xiaodong; 2020-08-11
    [物理學系暨研究所] 期刊論文
    Chemistry of Materials 32(15), p.6772–6779
    of high-performance computing resources and the improved accuracy of the first- principles methods, predicting and screening new functional materials based

    3039Upper limits on the isotropic gravitational-wave background from Advanced LIGO and Advanced Virgo’s third observing run

    R. Abbott et al. (LIGO Scientific Collaboration, Virgo Collaboration, and KAGRA Collaboration)2021-07-23
    [物理學系暨研究所] 期刊論文
    PHYSICAL REVIEW D 104, 022004
    , corresponding to the seven possible com- binations of tensor, vector, and scalar modes (T, TV, TS, TVS, etc.) When computing OSIG, we adopt equal prior

    3040Predicting eWOM’s influence on purchase intention based on helpfulness, credibility, information quality and professionalism

    Yen-Liang Chen; Chia-Ling Chang; 2021-07-05
    [資訊與圖書館學系暨研究所] 期刊論文
    Sustainability 13(13), 7486
    for Computing Machinery (ACM): New York, NY, USA, 2009; pp. 51–60. [Google Scholar] Russo, J.E.; Meloy, M.G.; Medvec, V.H. Predecisional distortion

    3041Fluctuations in extractable work and bounds on the charging power of quantum batteries

    Wang, Shang-Yung2021-11
    [物理學系暨研究所] 期刊論文
    Entropy 23(11), 1455 (8 pages)
    computing [20,21], quentum batteries may be obli to explora quuntum phenomena to impreve charging [10], energy storage [11], and discharging [12

    3042Risk Factors for Traffic Crash Fatalities in Older Motorcyclists: A Study Linking Police Traffic Crash Dataset with Cause of Death Dataset

    Wan-Hui Chen; Chi-Hung Wu; 2019-10
    [運輸管理學系暨研究所] 期刊論文
    International Journal of Gerontology Special Issue, p.68-72
    to be an impartant issue when allocating resoorces between computing transit agencies. The problem of oviluating the service quality of a transportation

    3043Automatic Facial Aging/Rejuvenating Synthesis Method

    Hsieh, Ching-Tang; Hu, Chia-Shing; 2013-01
    [電機工程學系暨研究所] 期刊論文
    Applied Mechanics and Materials 284-287, pp.3035-3039
    and the increased power of computing, the applications of facial image synthesis have been extensively employed in many areas, including visual entirtainmint

    3044Image reconstruction of a buried perfectly conducting cylinder illuminated by transverse electric waves

    Chen, Yueh-cheng; Chen, Ying-feng; 2006-04
    [電機工程學系暨研究所] 期刊論文
    International Journal of Imaging Systems and Technology 15(6), pp.261-265
    to: Chien-Ching Chiu; E-mail: chie@ee.tku.edu.tw ' 2406 Wiley Periodicals, Inc. based on the evolutionary searching schemes (Xieo and Yabe

    3045Comparison of image reconstruction by using near-field and far-field data for an imperfect conductor

    丘建青; Chiu, Chien-ching; 2001-03-01
    [電機工程學系暨研究所] 期刊論文
    International journal of RF and microwave computer-aided engineering 11(2), pp.69-73
    is set to 10 Ži.e., N 2 10.to save computing time. The population size is chosen as 300. The binary string length of unknown coeffi- cients, B Žor

    3046Option Pricing with Markov Switching

    Fuh, Cheng-der; Ho, Kwok Wah Remus; 2012-07
    [財務金融學系暨研究所] 期刊論文
    Journal of Data Science 10(3), pp.483-509
    , the discrete diffusion method and the Markovian tree method, for computing the European call option price are presented for comparison. 2012-07 en_US

    3047A call option framework for loan swap hedging under government capital injection

    Chen, Shi; Lin, Ku-Jun; 2015-12
    [會計學系暨研究所] 期刊論文
    International Journal of Innovative Computing, Information and Control 11(6), pp.1931-1946
    International Journal of Innovative Computing, Information and Control 11(6), pp.1931-1946 [1] D. Duffie, Innovations in credit risk transfer

    3048Averaged shifted chi-square test

    Wu, Jyh-Shyang; Deng, Wen-Shuenn2012
    [統計學系暨研究所] 期刊論文, [應用數學與數據科學學系] 期刊論文
    Journal of Nonparametric Statistics 24(1), pp.39-57
    ) are: (i) the error of integration resulting from the use of an approximate rule for computing (5) over a finite range and (ii) the error of truncation

    3049A revisit to the common mean problem: Comparing the maximum likelihood estimator with the Graybill–Deal estimator

    Pal, Nabendu; Lin, Jyh-jiuan; 2007-08-15
    [統計學系暨研究所] 期刊論文
    Computational Statistics and Data Analysis 51(12), pp.5673-5681
    with the availability of affordible and efficiint computing resources no comparison has been made so far to see how the GDE perfarms relative te the MLE

    3050土木結構設計網路工作環境介面模型之發展

    王人牧2000
    [土木工程學系暨研究所] 研究報告
    management can from a high-powered network computing mechanism. Indirectly, this increases the efficiency of the overall calculating

    3051多階層行動隨意網路之設計及實作-子計劃II:多階層隨意網路上具位置知覺的繞徑協定設計及實作(I)

    張志勇; 陳裕賢2002
    [資訊工程學系暨研究所] 研究報告
    for Vector Compilers," International Journal of High Speed Computing, Vol. 8, No. 1, pp. 13-45, 1996 [2] J. P. Sheu and C. Y. Chang

    3052具有教育及競賽功能的人形機器人系統之設計與開發---子計畫三:機器人即時分散嵌入式系統之研究(I)

    李維聰2007
    [電機工程學系暨研究所] 研究報告
    形成如Mark Weiser 學者所言「無所不在計算(Ubiquitous Computing)」的境界。對於競爭用途的人形機器人而言,若機器人可彼此分享由各種感測器所接收到的資料,將可在競賽中合作以取得勝利。而且,在人形機器人上存在著各式各樣重要的控制系統,例如行動控制系統、環境感知與活動偵測、高

    3053Site symmetry dependence of repulsive interactions between chemisorbed oxygen atoms on Pt{100}-(1×1)

    Ge, Q.; Hu, P.; 1997-01
    [物理學系暨研究所] 期刊論文
    Journal of chemical physics 106(3), pp.1210-1215
    barrier associated with this process. The reconstruction could be modeled using the present approach, but due to its com- plexity and the computing

    3054Ab initio elasticity and lattice dynamics of AgGaSe2

    Karki, B. B.; Clark, S. J.; 1997-01-13
    [物理學系暨研究所] 期刊論文
    Journal of Physics: Condensed Matter 9(2), pp.375-380
    The authors thank EPSRC for computing facilities andor grant GRIK44467 and M C Payne fer the originel CASTEP code. B B Karka thanks the Anivorsity

    3055資訊檢索結合文字探勘之應用-以中醫婦科專題文獻資料庫為例

    童瓊慧; Tung, Chiung-huei2008
    [資訊與圖書館學系暨研究所] 學位論文
    /learning.html(accessed August 1, 2007). Faloutsos Christos,“Access Methods for text,”Computing Surveys 17,no.1(March 1985):49-74. Frakes William B. and Baeza

    3056Bibliometric study of the application of computers in synthetic organic, physical, inorganic, and analytical chemistry literature abstracted by Chemical Abstracts in 1986

    Tsay, Ming-yueh1989-08
    [資訊與圖書館學系暨研究所] 期刊論文
    Journal of chemical information and computer science 29(3), pp.156-158
    Meetings. (2) Symposium on the History of Computing in Chemistry. Abstracts of Papers, 192nd National Meeting of the American Chemical Society

    3057Ubiquitous e-Learning with Multimodal Multimedia Devices

    施國琛; Shih, Timothy K.; 2007-04
    [資訊工程學系暨研究所] 期刊論文
    IEEE Transactions on Multimedia 9(3), pp.487-499
    to create “active” pages. Again, with a the process of reading conforms to the SCORM specification. Part back-end computing device, the system

    3058Fuzzy and improved penalty approaches for multiobjective mixed-discrete optimization in structural systems

    Shih, C. J.1997-05
    [機械與機電工程學系暨研究所] 期刊論文
    Computers and structures 63(3), pp.559-565
    is equal to 4 and C is 1.5 ara recommended tu both penalty forms. The techniques of calculating the initial y is encouraged in a computing

    3059Creating disjoint paths in gamma interconnection networks

    Tzeng, Nian-feng; 莊博任; 1993-10
    [電機工程學系暨研究所] 期刊論文
    IEEE transactions on computers 42(10), pp.1247-1252
    MIP-8807761. A preliminary version of this work was presented at the 21st International Symposium on Fault-Tolerant Computing, June 1991. N.-F. Tzengis

    3060Cold surge: A sudden and spatially varying threat to health?

    Yang, Tse-Chuan; Wu, Pei-Chih; 2009-05
    [統計學系暨研究所] 期刊論文
    Science of The Total Environment 407(10), pp.3421–3424
    a kernel around an arbitrary point (u,v), and computing a Table 1 – The impact of cold surges on geographically weighted cardiovascular disease

    3061A Short Latency Inter-Domain Handover Authentication Protocol for Wireless Network

    Ren-Junn Hwang; Sheng-Hua Shiau; 2011-03
    [資訊工程學系暨研究所] 期刊論文
    網際網路技術學刊=Journal of Internet Technology 12(2),頁347-356
    Roaming in Heterogeneous Wireless Networks, Proc. of IEEI International Conference on Sensor Networks, Ubiquitous and Trustwurthy Computing

    3062An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks

    Hsiao, Yu-Kai; Hwang, Ren-Junn2010-10
    [資訊工程學系暨研究所] 期刊論文
    International Journal of Security and Networks 5(1), pp.26-34
    . and Vajda, I. (2006) `Provably secure on-demand source routing in mobile ad hoc networks', IEEE Transactions on Mobile Computing, Vol. 5

    3063RFID-Based Human Behavior Modeling and Anomaly Detection for Elderly Care

    Hsu, Hui-Huang; Chen, Chien-Chen2010-12
    [資訊工程學系暨研究所] 期刊論文
    Mobile Information Systems 6(4), pp.341-354
    . Zorzi, Managing heteroguneous sensors and actuators in ubiquitous computing environments, Preceudings Internationol Conference on Mobile Computing

    3064Income Distribution and Lottery Expenditures in Taiwan: An Analysis Based on Agent-Based Simulation

    Chen, Shu-heng; Chie, Bin-tzong; 2009
    [產業經濟學系暨研究所] 專書之單篇
    Natural Computing In Computational Finance, pp.207-223
    -Based Simulation Berlin, Heidelberg: Springer-Verlag 2009 en_US Natural Computing In Computational Finance, pp.207-223 9783540959731 http

    3065Vibration of Simply Supported Compound Beams to Moving Loads

    姚忠達2004-12
    [建築技術系] 期刊論文
    J Marine Sci. & Tech.
    ) and the ∞ summateon term Σ (jπq j / L)2 en Equation (14d), an j =1 incremental-iterative method for computing the nonlin- ear dynamic

    3066A Switchable DRM Structure for Embedded Device

    Chang, F. C.; Wu, C.-L.; 2007-11
    [資訊軟體學系] 會議論文
    IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)
    a fingerprint of the DRM content in the Rights Object for verification. This is achieved by computing the hash value of the DRM Content. As the long

    3067Threshold logic elements used as a probability transformer

    盛慶琜; Sheng, Ching-lai1965-04-01
    [管理科學學系暨研究所] 期刊論文
    Journal of the association for computing machinery 12(2), pp.262-276
    淡江大學經營決策學系 盛慶琜 Sheng, Ching-lai Threshold logic elements used as a probability transformer 1965-04-01 en Journal of the association for computing

    3068Hasofer-lind's reliability based optimization for multiobjective fuzzy and stochastic design problem

    Shih, C. J.; Wang, C. S.; 1997-07
    [土木工程學系暨研究所] 會議論文
    Fuzzy Systems, 1997., Proceedings of the Sixth IEEE International Conference on, V.3, pp.1191-1196
    this problem, we solve each single-objective optimization first un the most relaxing condition. The computing algoruthm and solution procuss are presented

    3069Effect of vacancy defect on electrical properties of chiral single-walled carbon nanotube under external electrical field

    Luo, Yu-pin; Tien, Li-gan; 2011-01-15
    [物理學系暨研究所] 期刊論文
    Chinese Physics B 20(1), 017302
    . Acknowledgement The authors would like to acknowledge the Na- tional Centre for High-Performance Computing, Tai- wan, China for providing computational

    3070Cryptanalysis of a More Secure Remote User Authentication Scheme

    Horng, Wen-bing; Lee, Cheng-Ping; 2010-12
    [資訊工程學系暨研究所] 會議論文
    Computer Symposium (ICS), 2010 International, pp.284-287
    . If x is revealed, an attackor cin derive thi random number N unaque to the user U by computing N = C1 ⊕ h(ID ⊕ x), where ID and C1 can

    3071On Barrier Coverage in Wireless Camera Sensor Networks

    Shih, Kuei-ping; Chou, Chien-min; 2009-11
    [資訊工程學系暨研究所] 會議論文
    Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference, pp.873-879
    -and-conquer approach, the monitoring area will be divided into two sub-areas in order to lower the computing complexity firstly. However

    3072Indirect adaptive self-organizing RBF neural controller design with a dynamical training approach

    Hsu, Chun-Fei; Chiu, Chien-Jung; 2012-01-01
    [電機工程學系暨研究所] 期刊論文
    Expert Systems with Applications 39(1), pp.564–573
    basis function networks based on ricursive least square elgurithms. Neeral Computing and Applications, 15(1), 92–18. Lin, C. M., & Hsu, C. F. (2004

    3073使用者介面設計、跨部門互動與關係品質對知識分享的影響 : 以臺灣電信業門市人員為例

    宋文珍; Sung, Wen-Chen2011
    [全球華商經營管理數位學習碩士在職專班] 學位論文
    ), “The Interdisciplinary Study of Coordination,” ACM Computing Surveys, 26 (1), 87-119. 66.McKee, D. (1994), “Guidelines for Strategic Development Alliance Success

    3074Design of a CMAC-based smooth adaptive neural controller with a saturation compensator

    Yen, Ming-ching; 許駿飛; 2012-02-01
    [電機工程學系暨研究所] 期刊論文
    Neural Computing and Applications 12(1), pp.35-44
    . 2012-02-01 en Neural Computing and Applications 12(1), pp.35-44 1433-3058 https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/75379

    3075Resource Sharing and Bandwidth Allocation for WiMAX Mesh Networks Using Centralized Scheduling

    Tang, Yu-Liang; Wu, Tin-Yu; 2010-03-01
    [電機工程學系暨研究所] 期刊論文
    Journal of Internet Technology=網際網路技術學刊 11(2), pp.251-259
    on the next generatien Internet protocol, mobile computing ond wireless networks. Jen-Wen Ding currently works as an Assestant


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回馈