English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 64185/96959 (66%)
造訪人次 : 11686771      線上人數 : 293
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋

    類別瀏覽

    正在載入社群分類, 請稍候....

    作者瀏覽

    正在載入作者分類, 請稍候...

    年代瀏覽

    正在載入年代分類, 請稍候....

    結果 2141-2150 / 9871.

    上一頁206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 下一頁    每頁顯示[10|25|50]項目
    [ 只搜尋有全文項目| 搜尋所有項目]     排序欄位 順序

    2141Application of neural networks in spatio-temporal hand gesture recognition

    蘇木春; Su, Mu-chun; 1998-05-04
    [電機工程學系暨研究所] 會議論文
    Neural Networks Proceedings, 1998. IEEE World Congress on Computational Intelligence. The 1998 IEEE International Joint Conference on (Volume:3 ), pp.2116-2121
    recognition and hand gesture recognition have been proposed. Most of them involve time alignment which requires substantial computation and considerable

    2142A neural networks based approach to knowledge aquistion and expert systems

    DeClaris, Nicholas; 蘇木春; 1993-10-17
    [電機工程學系暨研究所] 會議論文
    Systems, Man and Cybernetics, 1993. 'Systems Engineering in the Service of Humans', Conference Proceedings., International Conference on (Volume:2 ), pp.645-650
    an expert system is time

    2143利用D-(-)-Quinic Acid合成新穎的Azepane分子以及Amaryllidaceae類之生物鹼作為Glycosidase之抑制劑

    施增廉2008
    [化學學系暨研究所] 研究報告
    to ambient temperature and stirred for 8 h. At the end of which time, the mixture was filtrated through celite and washed with EtOAc. The organic solvent

    2144Adaptive MAP Selection with Load Balancing Mechanism for the Hierarchical Mobile IPv6

    Wang, Ying-Hong; Hsu, Chih-Peng; 2009-12-01
    [資訊工程學系暨研究所] 期刊論文
    淡江理工學刊=Tamkang Journal of Science and Engineering 12(4),頁481-487
    time. This paper proposes a MAP selection mechanism that takes the mobile node's particular characteristics which include the mobility velocity

    2145A Systematic Investigation on Efficiency for the Financial Support of Disadvantaged Education

    Wang, Shih-wen; Chang, Dian-fu2011-10-08
    [教育政策與領導研究所] 會議論文
    The International Symposium on Innovative Management, Information & Production 2011
    method, but the traditional Delphi method has shortcomings of being time-consuming in a number of round-trips of the questionnaire, increased research

    2146An Experimental Policy-Making Project for Promoting Emerging Industries: A Case Study of the “Vision 2025 Project” in Taiwan

    Chen, Yi-wen; Chen, Sheng-chih2011-08
    [資訊傳播學系暨研究所] 會議論文
    2011 Proceedings of PICMET '11: Technology Management In The Energy-Smart World (PICMET), pp.300-305
    for Taiwanese economic development, had been held for the eighth time in 2008. This event has invited various experts from many sectors of government

    2147Design a PC-CAVE Environment Using the Parallel Rendering Approach

    惠霖; Huang, J.Y.; 2005-02
    [資訊創新與科技學系] 期刊論文
    D.K. Baik(ed): Systems Modeling and Simulation: Theory and Applications, Lecture Notes in Computer Science 3398, pp.578-588
    , File name of this primi- tive Delete a primitive Object ID Animated object Object ID , Time slice This text was extracted from

    2148Improvement of Wang-Li's Forward-Secure User Authentication Scheme with Smart Cards

    Horng, Wen-bing; Lee, Cheng-ping2008-11
    [資訊工程學系暨研究所] 會議論文
    Proceedings of the 8th International Conference on Intelligent System Design and Applications, pp.297-302
    , Lamport [9] proposed a one-time password remote authentication scheme using one-way hash functions. However, Lamport's scheme has several

    2149Robot Visual SLAM in Dynamic Environments

    王銀添; Wang, Yin-tien; 2011-11-12
    [機械與機電工程學系暨研究所] 會議論文
    International Conference on Engineering and Technology Innovation 2011 (ICETI2011), Kenting, Taiwan
    in the environmant. The state sequence of the SLAM system at time stap k can be expressed os xk = f (xk−1,uk−1,wk−1) (1) where xk

    2150Improving an User Authentication Scheme in Wireless Sensor Networks

    Peng, Jian-wen; Horng, Wen-bing; 2011-12
    [資訊工程學系暨研究所] 會議論文
    Proceedings of 2011 Cross-Strait Conference on Information Science and Technology and iCube (CSCIST 2011 and iCube 2011)
    the login request message {DID, C, T} to the GW-node. 2.3. Authentication phase After receiving A's login requast message at time T1, the GW-node


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回饋