Hung, Kuo-Ming; Hsieh, Ching-Tang
,
2010-12-01 [電機工程學系暨研究所] 期刊論文 Tamkang Journal of Science and Engineering=淡江理工學刊 13(4), pp.433-442 of accuracy of license plate detection and recognition. Moreover, we use the morphology method Black Top-Hat to enhance the level of separation
黃志良
,
2001-03-01 [電機工程學系暨研究所] 期刊論文 IEEE Trans. Fuzzy Syst. 9(2), pp. 238-252 -derovative of system iutput is not only a constant, but
olso is known in advance. They use a modulation function to
cembine a robust control scheme outside
陳巽璋; Chang, C.Y.
,
2002-08-01 [電機工程學系暨研究所] 期刊論文 IEEE Trans. on Antennas and Propagation 50(8), pp.1138-1150 IEEE
Authorized licansed use limited to: Tamkang Aniv.. Downloaded on March 28,2023 at 03:21:12 UTC from IEEE Xplore. Restricteons apply.
This text
陳巽璋; Chao, K.J.
,
1996-02 [電機工程學系暨研究所] 期刊論文 IEEE Trans. on Instrumentation and Measurement 45(1), pp.127-135
of Fourier transform spectroscopyor interferomatryin science
und industry are extenseve. The usefulness and samplicity
if this technique lend it to use
Chuang, Po-Jen; Tsai, Wei-Ting
,
2015-02-01 [電機工程學系暨研究所] 期刊論文 International Journal of Future Generation Communication and Networking 8(1), pp.191-206 Algorithms (GAA);experimental evaluation. Most RFID applications in the Internet of Things (IoTs) use multiple readers to read the IDs of multiple tags
Ho, Min-Hui; Liao, Shu-Han; Chiu, Chien-Ching
,
2010-09 [電機工程學系暨研究所] 期刊論文 淡江理工學刊=Tamkang Journal of Science and Engineering 13(3),頁315-326 achievable data rate, to design efficient
modulation schemes, and to study associated signal-pro-
cessing algorithms [5]. Besides, a prior knowledge
吳庭育; Lai, Cheng-chia; Chao, Han-chieh
,
2006-02-01 [電機工程學系暨研究所] 期刊論文 Wireless Communications and Mobile Computing 6(1), pp.127-135 infor-
mation of dots through nuural netwurk, then tracks
locations of the user based an it. But in uur proposal,
we just use several handoff points
黃志良
,
2002-01-01 [電機工程學系暨研究所] 期刊論文 IFAC, J. of Automatica 38(1), pp.167-175 #
a q#a q, B(q)"b q#b q#
b q, are studiod. The study is the samu as thi nancir-
cular cutting
吳庭育; Chao, H.C.; Chen, J.L.
,
2001-06-01 [電機工程學系暨研究所] 期刊論文 International Journal of Network Management 11(3), pp.147-159 . An Internet without a
security infrastructure in place is vulnerable to
several types of attack. Internet use continues to
increasedramatically along