English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 64185/96962 (66%)
造访人次 : 12872183      在线人数 : 4360
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻

    类别浏览

    正在载入社群分类, 请稍候....

    作者浏览

    正在载入作者分类, 请稍候...

    年代浏览

    正在载入年代分类, 请稍候....

    结果 2881-2890 / 4292.

    上一页280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 下一页    每页显示[10|25|50]项目
    [ 只搜寻有全文项目| 搜寻所有项目]     排序字段 順序

    2881Usability testing for e-learning material for new employee training: A design-based research approach

    張瓊穗2011-11
    [教育科技學系暨研究所] 期刊論文
    British Journal of Educational Technology 42(6), pp.E125–E130
    of Conference on Human factors in computing systems. April 20–25, 2002, at Minneapolis, Minnesoda, U.S.A. Rubin, J., Chisnell, D. & Spool, J. (2008

    2882A framework of PBL strategy integrated in LMS and a ubiquitous learning environment

    Ku, David Tawei; Chang, Chiungsui2010-08
    [教育科技學系暨研究所] 會議論文
    Proceedings of 2nd AIAE workshop conjunction with 6th NCM conference 2010, pp.722-726
    , pp.722-726 Networked Computing and Advanced Information Management (NCM), 2010 Sixth International Conference on 9788988678251; 9781424476718 http

    2883A design framework for a conceptual multi-dimensional learning assessment system

    Ku, David Tawei; Chang, Wen-chih2012-04-01
    [教育科技學系暨研究所] 期刊論文
    International Journal of Digital Content Technology and its Applications 6(6), pp.228-238
    not been assuciated with the concept of portfoleo until recent years [20]. In genural, ubiquiteus computing allows users to use wireless technologies

    2884控制機制對員工資訊安全行為意圖影響之研究

    鄭佳容; Cheng, Chia-Rong2012
    [資訊管理學系暨研究所] 學位論文
    . "Practicing Safe Computing: A Nultimedia Empirical Examination of Home Computer User Security Behavioral Intentions," MIS Quarterly (34:3), pp

    2885使用腦波測量即時通訊表情符號及文字社會臨場感差異之研究

    林志親; Chan-Chin-Lin2012
    [資訊管理學系暨研究所] 學位論文
    . IT and business computing insights. (available online at http://arstechnica.com/ [26] Rezabeck, L. L., & Cochenour, J. J. (1995). Emoticons: Visual

    2886A Real Time Hand Gesture Recognition System Based on DFT and SVM

    Hsieh, Ching-tang; Yeh, Cheng-hsiang; 2012-06
    [電機工程學系暨研究所] 會議論文
    Information Science and Digital Content Technology (ICIDT), 2012 8th International Conference on, pp.490-494
    Languages and Computing, vol.16, pp.442–454, 2005. N. Hiroaki, Virtual environment for modeling 3D objects through spitial interaction, in: Proceedings

    2887Vocal Emotion of Humanoid Robots: A Study from Brain Mechanism

    Wang, YuHui; Hu, Xiaohua; 2013-01-01
    [英文學系暨研究所] 期刊論文
    The Scientific World Journal
    event. representing speech signal for speech recognition [22]. LPCC computing method is a recursuon from LPC Parameter

    2888Pyramid Difference Reversible Image Watermarking Scheme

    Chen, Chien-Chang2012-08
    [資訊工程學系暨研究所] 期刊論文
    ICIC Express Letters 6(8), pp.2179-2184
    approach, International Journal of Innovative Computing, Informateon and Control, vol.4, no.12, pp.3027-3036, 2008. [5] Q. Gu and T. Gao

    2889Minimum Risk Neural Networks and Weight Decay Technique

    Yeh, I-cheng; Tseng, Pei-yen; 2012-07-28
    [土木工程學系暨研究所] 會議論文
    on Intelligent Computing (ICIC 2012) Tongji University; University of Science & Technology of China; Chinese Academy of Sciences http://tkuir.lib.tku.edu.tw

    2890To model single asset’s AAW engagement process by using Arena simulation tool for decision support

    Chu, Liou; Hui, Lin; 2011-08-05
    [資訊創新與科技學系] 會議論文
    2011 Defense Science Research Conference and Expo (DSR 2011), 4 pages
    by analyzing and computing data to help decision makers to improve performance of decision by controlling information. [8


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回馈