陳增源
,
2005 [航空太空工程學系暨研究所] 研究報告 =0.583 is not as large as that at Z/W=0, Figs. 5(b) and 5(d) show that the
recirculation regions are smaller than those shown in Figs. 5(a) and 5(c
黃德彥; Hwang, Der-yan; Mebel, Alexander M.
,
2002-01-24 [化學學系暨研究所] 期刊論文 Journal of physical chemistry A 106(3), pp.520-528 calculatiuns; the active space os (10,6)
for Ni, (16,10) for NiO, and (6,4) for O. b From rof 25. c From rif 26.
d From ruf 40. the NiO + H2 reaction ara
Shih, Kuei-ping; 石貴平; Sheu, Jang-ping; Chang, Chih-yung
,
2000-09-01 [資訊工程學系暨研究所] 期刊論文 The Journal of Supercomputing 17(2), pp.205-227 block to tho next active
bluck. As a resolt, for this example, Act 0, 2, 2, 3,
3 and Jump 0, 0, 0, 0, 1 , whichhave bean shown in
Fig. 4 c and d
覃素莉; 洪啟舜; 劉俊業
,
2005 [體育事務處] 研究報告 relationship
In Fig. 5, there exist six objects A, B, C, D, E and F.
A to E are players and F is the basketball stand
which plays a role as benchmark
Hsu, Chun-Fei
,
2014-01-10 [電機工程學系暨研究所] 期刊論文 Neurocomputing 123, p.197–206 are shown Figs. 6 and 7(c), and the numbers of hidden
neurons are shown in Figs. 6 and 7(d). Though a favorable tracking
response can be obtained
Hsieh, C. H.; Chang, C.N.; Lee, S. B.; Kao, H.-C. I.; Chin, C. H.
,
2003-02 [化學學系暨研究所] 期刊論文 Physica C: Superconductivity and its Applications 384(3), pp.314-320 -ray absorptiun spectra of
YBu2Cu3Oy [8] and wo denote them as A, B, C,
and D. The peaks of A and D belong to the apicel
oxygen and the peaks of B
劉靜怡
,
1999 [大眾傳播學系暨研究所] 研究報告 , Massachusetts.: MIT Press, 1998. S. Josphe Nye, Zelikow Philip D. Jr., and King C. David, eds. Why People Don't
Trust Government. Cambridge, Massachusetts
楊振德; Yang, Chen-te
,
2007 [產業經濟學系暨研究所] 學位論文 data into continuous data. 2007 中文部分:
羅淇(2003)「補習與教育成就」,碩士論文,淡江大學產業經濟研究所。
英文部分:
1. Angrist J. D. and Krueger A. B. (1991),”Does compulsory school
黃婷偉; Hung, Ting-wai
,
2009 [會計學系暨研究所] 學位論文 ., B. D. Libert, and S. M. Samek. 2000. A Business Model for The New Economy. The Journal of Business Strategy 21 (4): 29-35.
Chauvin, K. C. and M
廖欣音; Liao, Hsin-yin
,
2009 [資訊管理學系暨研究所] 學位論文 , pp.1016–1020.
[5] Ateniese, G., Blundo, C., Santis, A. De, and Stinson, D. R., “Extended capabilities for visual cryptography,” Theoretical Computer
粘智超; Nien, Chi-chiao
,
2005 [資訊管理學系暨研究所] 學位論文 . Chang, S. K., Shi, Q. Y., and Yan, C. W., “Iconic Indexing by 2D- String,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 1987, Vol
張力尹; Chang, Li-yin
,
2008 [資訊工程學系暨研究所] 學位論文 Networking and Computing (MOBIHOC), 2006, pp. 214-225.
[8] K.-P. Shih, Y.-D. Chen, and C.-C. Chang, "Adaptive range-based power control for collision
李鳳郎; Lee, Feng-lang
,
2009 [電機工程學系暨研究所] 學位論文 and stability of fluorescent lamps,” in proc. of IEEE APEC’97, 1997, pp. 1050-1056.
[2]. C. G. Kim, K. C. Lee, and B. H. Cho, “Modeling of CCFL using
陳炯燁; Chen, Jyong-ye
,
2010 [資訊工程學系暨研究所] 學位論文 Cryptosystems and Signature Schemes,” Advance in Croptology-Crypto’84, LNCS 196, New-York: Springer-Verlag, 1985, pp. 47-53.
[5] J. K. Liu, V. K. Wei, and D
張佳銘; Chang, Chia-Ming
,
2011 [資訊工程學系暨研究所] 學位論文 better performance. 2011 [1]N. Chirdchoo, W. S. Soh, and K. C. Chua, “Aloha-based MAC Protocols with Collision Avoidance for Underwater Acoustic