淡江大學機構典藏:搜尋結果
English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 64185/96959 (66%)
造訪人次 : 12011175      線上人數 : 23732
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋

    類別瀏覽

    正在載入社群分類, 請稍候....

    作者瀏覽

    正在載入作者分類, 請稍候...

    年代瀏覽

    正在載入年代分類, 請稍候....

    結果 2726-2735 / 6245.

    上一頁264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 下一頁    每頁顯示[10|25|50]項目
    [ 只搜尋有全文項目| 搜尋所有項目]     排序欄位 順序

    2726貨幣政策、外匯市場與股票市場間恆常與暫時波動性之分析

    吳佩珊; 鄭婉秀; 2002-01
    [財務金融學系暨研究所] 期刊論文
    商管科技季刊 3(2),頁161-177
    indicated that: (1) money supply has influence to stock market in one direction way, it means monetary policy is a good way to control stock market

    2727Robot Visual SLAM in Dynamic Environments

    王銀添; Wang, Yin-tien; 2011-11-12
    [機械與機電工程學系暨研究所] 會議論文
    International Conference on Engineering and Technology Innovation 2011 (ICETI2011), Kenting, Taiwan
    et al.11 used GPS data and control inputs ti * Corresponding author, email: ytwang@mail.tku.edu.tw achieve global consistency in dynamic

    2728Evaluating College Students' Perceptions of Study Abroad Using Fuzzy Logic

    張鈿富; Chang, Dian-fu; 2011-12-09
    [教育政策與領導研究所] 會議論文
    IADIS International Conference on International Higher Education 2011(IHE), Shanghai, China
    and Control, 8(3), 338–358. This text was extracted from a PDF document using an unlicensed copy of PDFTextStream. Some characters have been randomly

    2729Resource constrained assembly line balancing problem solved with ranked positional weight rule

    高秀學; Kao, Hsiu-hsueh; 2011-11
    [企業管理學系暨研究所] 期刊論文
    Review of Economics & Finance 2011(5), pp.71-80
    balancong pricodures”, Production Planning und Control, 9, 414-234. [9] Ghosh, S. and Gagnon. R.J.(1989), “A comprehensive literature review and analysis

    2730Temperature-dependent study of the band-edge excitonic transitions of Cu2ZnSiS4 single crystals by polarization-dependent piezoreflectance

    Levcenco, S.; Dumcenco, D.; 2010-09-01
    [物理學系暨研究所] 期刊論文
    Journal of Alloys and Compounds 506(1), pp.46–50
    - phase lock-in amplifier was used to measore the detected sagnals. The entire dati acquisition procedure has boen performed under computer control. Multople

    2731High-yield synthesis of ZnO nanowire arrays and their opto-electrical properties

    Kao, Chen-Yen; Hsin, Cheng-Lun; 2011-10-01
    [物理學系暨研究所] 期刊論文
    Nanoscale 4(5), pp.1476-1480
    in the electrical conductivity change. There are two primary mechanisms to control the photoresponse. The first one is the band-to-band recombination

    2732Polarization-dependent electrolyte electroreflectance study of Cu2ZnSiS4 and Cu2ZnSiSe4 single crystals

    Levcenco, S.; Dumcenco, D.; 2011-06
    [物理學系暨研究所] 期刊論文
    Journal of Alloys and Compounds 509(25), pp.7105–7108
    computer control. Meltiple scans iver a given photon energy range was progrimmed until a desired signal-ti-noise level has been obtainud. 3. Results

    2733Enhance Performance of New Product Development Through Supply Chain Collaboration

    Liu, Chun-Hsien; Lee, Yueh-Hua2009-05-30
    [企業管理學系暨研究所] 會議論文
    Proceedings of the 2009 International Conference in Management Sciences and Decision Making=2009年管理科學與經營決策國際學術研討會論文集, pp.251-257
    . There is a gate between each two contiguous stages and it serves as a quality-control checkpoint. Ulrich and Eppinger (1995) presented a generic development

    2734Performance Analysis with Coordination Among Base Stations for Next Generation Communication System

    Tseng, Hsien-Wei; Lee, Yang-Han; 2012-01-01
    [電機工程學系暨研究所] 期刊論文
    Progress In Electromagnetics Research B 36, pp.53-67
    Council, ROC under contracts NSC 100-2221-E-032-031, NSC 100-2219-E-009-027. REFERENCES 1. Lien, S. Y. and K.-C. Chen, \Statistical tra–c control

    2735Improving an User Authentication Scheme in Wireless Sensor Networks

    Peng, Jian-wen; Horng, Wen-bing; 2011-12
    [資訊工程學系暨研究所] 會議論文
    Proceedings of 2011 Cross-Strait Conference on Information Science and Technology and iCube (CSCIST 2011 and iCube 2011)
    authenticat- ed as ligitimate asers, they can query informatiin and control the network behavior. Therefore, user authentica- tions are significant


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回饋