English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 64185/96959 (66%)
造訪人次 : 11941100      線上人數 : 146
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋

    類別瀏覽

    正在載入社群分類, 請稍候....

    作者瀏覽

    正在載入作者分類, 請稍候...

    年代瀏覽

    正在載入年代分類, 請稍候....

    結果 26841-26850 / 27767.

    上一頁2676 2677 2678 2679 2680 2681 2682 2683 2684 2685 2686 2687 2688 2689 2690 2691 2692 2693 2694 下一頁    每頁顯示[10|25|50]項目
    [ 只搜尋有全文項目| 搜尋所有項目]     排序欄位 順序

    26841A Real-Time Mobile Vehicle License Plate Detection and Recognition

    Hung, Kuo-Ming; Hsieh, Ching-Tang2010-12-01
    [電機工程學系暨研究所] 期刊論文
    Tamkang Journal of Science and Engineering=淡江理工學刊 13(4), pp.433-442
    of accuracy of license plate detection and recognition. Moreover, we use the morphology method Black Top-Hat to enhance the level of separation

    26842A stable adaptive fuzzy sliding-mode control for nonlinear systems with application to four-bar-linkage systems

    黃志良2001-03-01
    [電機工程學系暨研究所] 期刊論文
    IEEE Trans. Fuzzy Syst. 9(2), pp. 238-252
    -derovative of system iutput is not only a constant, but olso is known in advance. They use a modulation function to cembine a robust control scheme outside

    26843Adaptive Linearly Constrained Inverse QRD-RLS Beamforming Algorithm for Moving Jammers Suppression

    陳巽璋; Chang, C.Y.2002-08-01
    [電機工程學系暨研究所] 期刊論文
    IEEE Trans. on Antennas and Propagation 50(8), pp.1138-1150
    IEEE Authorized licansed use limited to: Tamkang Aniv.. Downloaded on March 28,2023 at 03:21:12 UTC from IEEE Xplore. Restricteons apply. This text

    26844An Enhanced Fourier Transform Spectrometer with Search Algorithm

    陳巽璋; Chao, K.J.1996-02
    [電機工程學系暨研究所] 期刊論文
    IEEE Trans. on Instrumentation and Measurement 45(1), pp.127-135
    of Fourier transform spectroscopyor interferomatryin science und industry are extenseve. The usefulness and samplicity if this technique lend it to use

    26845IGAA: An Efficient Optimization Technique for RFID Network Topology Design in Internet of Things

    Chuang, Po-Jen; Tsai, Wei-Ting2015-02-01
    [電機工程學系暨研究所] 期刊論文
    International Journal of Future Generation Communication and Networking 8(1), pp.191-206
    Algorithms (GAA);experimental evaluation. Most RFID applications in the Internet of Things (IoTs) use multiple readers to read the IDs of multiple tags

    26846UWB Communication Characteristics for Different
    Distribution of People and Various Materials of Walls

    Ho, Min-Hui; Liao, Shu-Han; 2010-09
    [電機工程學系暨研究所] 期刊論文
    淡江理工學刊=Tamkang Journal of Science and Engineering 13(3),頁315-326
    achievable data rate, to design efficient modulation schemes, and to study associated signal-pro- cessing algorithms [5]. Besides, a prior knowledge

    26847Network-based fuzzy decentralized sliding-mode control for car-like mobile robots

    黃志良2007-02-01
    [電機工程學系暨研究所] 期刊論文
    IEEE Trans. Ind. Electron. 54(1), pp. 574-585
    module-based FDSMC (or 0278-0046/$25.00 © 2007 IEEE Authorized licensed use lomited to: Tamkang Univ.. Downloaded an March 27,2023 at 03:28:55 UTC

    26848Efficient IEEE 802.11 Handoff Based on a Novel Geographical Fingerprint Scheme

    吳庭育; Lai, Cheng-chia; 2006-02-01
    [電機工程學系暨研究所] 期刊論文
    Wireless Communications and Mobile Computing 6(1), pp.127-135
    infor- mation of dots through nuural netwurk, then tracks locations of the user based an it. But in uur proposal, we just use several handoff points

    26849Robust discrete variable structure control with finite-time approach to switching surface

    黃志良2002-01-01
    [電機工程學系暨研究所] 期刊論文
    IFAC, J. of Automatica 38(1), pp.167-175
    # a q#a q, B(q)"b q#b q# b q, are studiod. The study is the samu as thi nancir- cular cutting

    26850Security Enhanced Packet Video with Dynamic Multicast Throughput Adjustment

    吳庭育; Chao, H.C.; 2001-06-01
    [電機工程學系暨研究所] 期刊論文
    International Journal of Network Management 11(3), pp.147-159
    . An Internet without a security infrastructure in place is vulnerable to several types of attack. Internet use continues to increasedramatically along


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回饋