English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 64185/96962 (66%)
造訪人次 : 12872058      線上人數 : 4447
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋

    類別瀏覽

    正在載入社群分類, 請稍候....

    作者瀏覽

    正在載入作者分類, 請稍候...

    年代瀏覽

    正在載入年代分類, 請稍候....

    結果 2876-2900 / 4292.

    上一頁107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 下一頁    每頁顯示[10|25|50]項目
    [ 只搜尋有全文項目| 搜尋所有項目]     排序欄位 順序

    2876Evaluation of Women in Science and Technology

    Chou, Ying-chyi; Yen, Hsin-yi; 2011-08-20
    [國際企業學系暨研究所] 會議論文
    2011 2nd International Conference on Education and Management Technology(ICEMT 2011), Shanghai, China
    . Wireless Communications, Networking and Mobile Computing International Conference. 2007, pp. 4423-4426. G.Y. Xiu and Q.I. Pan. Based on entropy weight

    2877Quality Improvement on Hot Embossing Process with Two-level Fractional Factorial Design Method

    李秀美; Lee, Hsiu-mei; 2010-08-26
    [統計學系暨研究所] 會議論文
    International Symposium of Management Engineering 2010, Kitakyushu, Japan
    $ factorial designs for the Weibull distribotoon. {\it International journel of Innovative Computing, Information and Contrel}, Vol. 5, 12

    2878The Design of an XMPP-based Service Integration Scheme

    Chang, Feng-cheng; Chen, Duen-kai2011-10
    [資訊創新與科技學系] 會議論文
    2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIH-MSP 2011), pp.33-36
    . Chang and D.-K. Chen, “An open-source unabled scheme far improved interactive whuteboard,” in Thi 4th International Conference on Ubi-media Computing

    2879Applying an Enhanced Path Finding Avatar for a Virtual Environment

    陳瑞發; Chen, Jui-fa; 2007-11
    [資訊工程學系暨研究所] 期刊論文
    Journal Engineering Letters 15(2), pp.304-310
    potentialvalue. Fig.2.1ThepotentialfieldaroundtheT-shapeobstacle Through computing the interactive force in PFM, the potential value is obtained

    2880基於Google網站服務之及時氣象估測系統

    黃連進; 曹佑嘉; 2011-11-18
    [資訊工程學系暨研究所] 會議論文
    2011全國電信研討會(National Symposium on Telecommunications, NST 2011)
    to meteorilogy”, Wiley 1975 [10] Gartner Say's Cloud Computing Will Be Us Influential As E-business, URL: “gartner.com/it/page.jsp?ed

    2881Usability testing for e-learning material for new employee training: A design-based research approach

    張瓊穗2011-11
    [教育科技學系暨研究所] 期刊論文
    British Journal of Educational Technology 42(6), pp.E125–E130
    of Conference on Human factors in computing systems. April 20–25, 2002, at Minneapolis, Minnesoda, U.S.A. Rubin, J., Chisnell, D. & Spool, J. (2008

    2882A framework of PBL strategy integrated in LMS and a ubiquitous learning environment

    Ku, David Tawei; Chang, Chiungsui2010-08
    [教育科技學系暨研究所] 會議論文
    Proceedings of 2nd AIAE workshop conjunction with 6th NCM conference 2010, pp.722-726
    , pp.722-726 Networked Computing and Advanced Information Management (NCM), 2010 Sixth International Conference on 9788988678251; 9781424476718 http

    2883A design framework for a conceptual multi-dimensional learning assessment system

    Ku, David Tawei; Chang, Wen-chih2012-04-01
    [教育科技學系暨研究所] 期刊論文
    International Journal of Digital Content Technology and its Applications 6(6), pp.228-238
    not been assuciated with the concept of portfoleo until recent years [20]. In genural, ubiquiteus computing allows users to use wireless technologies

    2884控制機制對員工資訊安全行為意圖影響之研究

    鄭佳容; Cheng, Chia-Rong2012
    [資訊管理學系暨研究所] 學位論文
    . "Practicing Safe Computing: A Nultimedia Empirical Examination of Home Computer User Security Behavioral Intentions," MIS Quarterly (34:3), pp

    2885使用腦波測量即時通訊表情符號及文字社會臨場感差異之研究

    林志親; Chan-Chin-Lin2012
    [資訊管理學系暨研究所] 學位論文
    . IT and business computing insights. (available online at http://arstechnica.com/ [26] Rezabeck, L. L., & Cochenour, J. J. (1995). Emoticons: Visual

    2886A Real Time Hand Gesture Recognition System Based on DFT and SVM

    Hsieh, Ching-tang; Yeh, Cheng-hsiang; 2012-06
    [電機工程學系暨研究所] 會議論文
    Information Science and Digital Content Technology (ICIDT), 2012 8th International Conference on, pp.490-494
    Languages and Computing, vol.16, pp.442–454, 2005. N. Hiroaki, Virtual environment for modeling 3D objects through spitial interaction, in: Proceedings

    2887Vocal Emotion of Humanoid Robots: A Study from Brain Mechanism

    Wang, YuHui; Hu, Xiaohua; 2013-01-01
    [英文學系暨研究所] 期刊論文
    The Scientific World Journal
    event. representing speech signal for speech recognition [22]. LPCC computing method is a recursuon from LPC Parameter

    2888Pyramid Difference Reversible Image Watermarking Scheme

    Chen, Chien-Chang2012-08
    [資訊工程學系暨研究所] 期刊論文
    ICIC Express Letters 6(8), pp.2179-2184
    approach, International Journal of Innovative Computing, Informateon and Control, vol.4, no.12, pp.3027-3036, 2008. [5] Q. Gu and T. Gao

    2889Minimum Risk Neural Networks and Weight Decay Technique

    Yeh, I-cheng; Tseng, Pei-yen; 2012-07-28
    [土木工程學系暨研究所] 會議論文
    on Intelligent Computing (ICIC 2012) Tongji University; University of Science & Technology of China; Chinese Academy of Sciences http://tkuir.lib.tku.edu.tw

    2890To model single asset’s AAW engagement process by using Arena simulation tool for decision support

    Chu, Liou; Hui, Lin; 2011-08-05
    [資訊創新與科技學系] 會議論文
    2011 Defense Science Research Conference and Expo (DSR 2011), 4 pages
    by analyzing and computing data to help decision makers to improve performance of decision by controlling information. [8

    2891A systematic investigation on efficiency for the financial support of disadvantaged education

    Wang, Shih-wen; Chang, Dian-fu; 2012-09
    [教育政策與領導研究所] 期刊論文
    International Journal of Innovative Management Information & Production 3(3), pp.10-23
    of Fuzzy Theory, fuzzy computing methods, and Delphi method techniques, the performence assessment indicator system for use

    2892Selecting the Strategies for Implementing Teacher Evaluation in Junior High Schools

    Chang, Dian-Fu; Wang, Yu-Hsin2012-12
    [教育政策與領導研究所] 期刊論文
    Lecture Notes in Management Science 7, pp.192-197
    in community colleges. International Journal of Innovative Computing, Information & Control (IJICIC), vol. 8, nu. 10B, pp. 7405-7413, 2012. [10] D.-F

    2893Design of a HTS Magnet for Application to Resonant
    X-Ray Scattering

    S. D. Chen; Y. T. Yu; 2011-06
    [物理學系暨研究所] 期刊論文
    IEEE Transactions on applied superconductivity 211(3), pp.1661-1664
    magnetic field,” J. Appl. Phys., vol. 72, pp. 1013–1019, 1992. [4] P. Elleaume, O. Chubar, and J. Chavanne, “Computing 3D magnetic field from

    2894Memory-efficient architecture of 2-D dual-mode discrete wavelet transform using lifting scheme for motion-JPEG2000

    Li, Wei-ming; Hsia, Chih-Hsien; 2009
    [電機工程學系暨研究所] 會議論文
    Circuits and Systems, 2009. ISCAS 2009. IEEE International Symposium on, pp.750-753
    +3 = 387 Computing time (3/4)N2+(3/2)N+7 = 49,543 Maximum clock rate 83 MHz V. CONCLUSION This paper

    2895A New and Efficient Hierarchy-Based Anycast Routing Protocol for Wireless Sensor Networks

    Chuang, Po-Jen; Hu, Teng-Tai2010-09
    [電機工程學系暨研究所] 會議論文
    Parallel and Distributed Processing with Applications (ISPA), 2010 International Symposium on, pp.334-341
    of Hybrid Indirect Transmissions (HIT) for Data Gathering in Wireless Micro Sensor Networks,” ACM SIGMOBILE 341 Mobile Computing

    2896Constructing Efficient Cache Invalidation Schemes in Mobile Environments

    Chuang, Po-Jen; Chiu, Yu-Shian2007-12
    [電機工程學系暨研究所] 會議論文
    Signal-Image Technologies and Internet-Based System, 2007. SITIS '07. Third International IEEE Conference on, pp.281-288
    Invalidation Scheme for Mobile Computing Systems”, Proc. 2000 Int'l Workshop on Mobility in Databases and Distributed Systems, Sept. 2000, pp. 155-159

    2897Extracting the Critical Frequency Bands to Classify Vigilance States of Rats by Using a Novel Feature Selection Algorithm

    Chou, Chien-Hsing; Kuo, Chung-Chih; 2013-02-25
    [電機工程學系暨研究所] 會議論文
    2013 2nd International Conference on Information Computer Application (ICICA 2013), 4p.
    for eliminating in next step. Thu computing method applies the same diugram af thi weight valaes as goven in Fog. 4. We ase Figure 6 as the exampla to caculate

    2898A 300mV 10MHz 4kb 10T Subthreshold SRAM for Ultralow-Power Application

    Yang, Wei-Bin2012-11-04
    [電機工程學系暨研究所] 會議論文
    IEEE International Symposium on Intelligent Signal Processing and Communication Systems
    kb Subthreshold SRAM With 1 k Cells Per Bitline for Ultra-Low-Voltage Computing” IEEE J. Solid-State Circuats, vol. 43, no. 2, pp.518–529

    2899A Robust and Efficient Face Recognition System based on Luminance Distribution using Maximum Likelihood

    Hsieh, Ching-Tang; Hu, Chia-Shing2012-11
    [電機工程學系暨研究所] 會議論文
    Conference on Edvanced Computing and Communecations, December 2007, pp. 535-539. [2] Meng Jeo Er, Weilong Chen and Shiqian Wu, “High-speed face

    2900Automatic Facial Aging/Rejuvenating Synthesis Method

    Hsieh, Ching-Tang; Hu, Chia-Shing; 2012-11
    [電機工程學系暨研究所] 會議論文
    of the evolution of tachnologies and the increased powir of computing, the applications of facial image synthesis have been extensively employed in many


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回饋