蘇木春; Su, Mu-chun; Huang, Hi; Lin, Chia-hsien; Huang, Chen-lee; Lin, Chi-da
,
1998-05-04 [電機工程學系暨研究所] 會議論文 Neural Networks Proceedings, 1998. IEEE World Congress on Computational Intelligence. The 1998 IEEE International Joint Conference on (Volume:3 ), pp.2116-2121 recognition and hand gesture recognition have been proposed. Most of them involve time alignment which requires substantial computation and considerable
DeClaris, Nicholas; 蘇木春; Su, Mu-chun
,
1993-10-17 [電機工程學系暨研究所] 會議論文 Systems, Man and Cybernetics, 1993. 'Systems Engineering in the Service of Humans', Conference Proceedings., International Conference on (Volume:2 ), pp.645-650 an expert system is time
施增廉
,
2008 [化學學系暨研究所] 研究報告 to ambient temperature and stirred for 8 h. At the end of which time, the mixture was filtrated
through celite and washed with EtOAc. The organic solvent
Wang, Ying-Hong; Hsu, Chih-Peng; Kuo, Chien-Shan
,
2009-12-01 [資訊工程學系暨研究所] 期刊論文 淡江理工學刊=Tamkang Journal of Science and Engineering 12(4),頁481-487 time. This paper proposes a MAP selection mechanism that takes the mobile node's particular characteristics which include the mobility velocity
Wang, Shih-wen; Chang, Dian-fu
,
2011-10-08 [教育政策與領導研究所] 會議論文 The International Symposium on Innovative Management, Information & Production 2011 method, but the traditional Delphi method has shortcomings of being time-consuming in a number of round-trips of the questionnaire, increased research
Chen, Yi-wen; Chen, Sheng-chih
,
2011-08 [資訊傳播學系暨研究所] 會議論文 2011 Proceedings of PICMET '11: Technology Management In The Energy-Smart World (PICMET), pp.300-305 for Taiwanese economic
development, had been held for the eighth time in 2008. This
event has invited various experts from many sectors of
government
惠霖; Huang, J.Y.; Lu, H.C.
,
2005-02 [資訊創新與科技學系] 期刊論文 D.K. Baik(ed): Systems Modeling and Simulation: Theory and Applications, Lecture Notes in Computer Science 3398, pp.578-588 , File name of this primi-
tive
Delete a primitive Object ID
Animated object Object ID , Time slice
This text was extracted from
Horng, Wen-bing; Lee, Cheng-ping
,
2008-11 [資訊工程學系暨研究所] 會議論文 Proceedings of the 8th International Conference on Intelligent System Design and Applications, pp.297-302 , Lamport [9] proposed a one-time password
remote authentication scheme using one-way hash
functions. However, Lamport's scheme has several
王銀添; Wang, Yin-tien; Chi, Chen-tung; Hung, Shiun-kai
,
2011-11-12 [機械與機電工程學系暨研究所] 會議論文 International Conference on Engineering and Technology Innovation 2011 (ICETI2011), Kenting, Taiwan
in the environmant. The state sequence of the SLAM system at time
stap k can be expressed os xk = f (xk−1,uk−1,wk−1) (1)
where xk
Peng, Jian-wen; Horng, Wen-bing; Lee, Cheng-ping
,
2011-12 [資訊工程學系暨研究所] 會議論文 Proceedings of 2011 Cross-Strait Conference on Information Science and Technology and iCube (CSCIST 2011 and iCube 2011) the login request message {DID, C, T} to the GW-node.
2.3. Authentication phase After receiving A's login requast message at time T1,
the GW-node