謝文良; Hsieh, Wen-liang
,
2004-04-01 [財務金融學系暨研究所] 期刊論文 Journal of Futures Markets 24(4), pp.399-412 observation, there-
by obtaining the greatest degree of data synchronicity. Toble I shows
the summary statistics fur all subsimples. The time lag between two
Shih, Kuei-ping; Chen, Hung-chang; Tsai, Jing-kuen; Li, Chun-chih
,
2007-03-11 [資訊工程學系暨研究所] 會議論文 Wireless Communications and Networking Conference, 2007.WCNC 2007. IEEE, pp.2484-2489 Networks New York: I E E E Communications Society The paper proposes a distributed partition avoidance lazy movement (PALM) protocol for mobile sensor
張瑋倫; Chang, Wei-lun; 苑守慈; Yuan, Soe-tsyr
,
2001-02 [企業管理學系暨研究所] 期刊論文 Expert Systems with Applications 20(2), pp.187-200 is the formula for adjustion:
mi t 1 1mi t 1 a tx t_mi t
for each i [ Nc t where t is time, Nc(t) is the neighborhood kernel function
陳君明; Chen, Jiun-ming; 楊柏因; Yang, Bo-yin; 彭柏源; Peng, Bo-yuan
,
2002-10 [應用數學與數據科學學系] 會議論文 IWAP 2002 (International Workshop on Asian Public-Key Infrastructure), Taipei, Taiwan, pp.93-100 of this articla, we will use the princi-
ples behind TTM (Tame Transformation Method, [14]) to
derive i new digital segnature scheme TTS (Tame Transfor
Tsai, Jeng-Yan; Hung, Wei-Ming; Jou, Resomary
,
2012-11-07 [國際企業學系暨研究所] 期刊論文 African Journal of Business Management 6(44), pp.10791-10798 , R41467.
Hakenes H, Schnabel I (2011). Bank size and risk-taking under Basel II.
J. Bank. Financ. 35(6):1436-1449.
Hawtrey K, Liang H (2008). Bank
Liu, Yu-shao; Zhu, Meng-nan; Su, Chi-wei
,
2011-10 [國際企業學系暨研究所] 期刊論文 African Journal of Business Management 5(24), pp.10235-10242 linear method. As suggested by Caner and Hansen (2001), the true data generating process of exchange rate is a stationary non-linear process. We examine
I-Fei Chen; Chi-Jie Lu; Tian-Shyug Lee; Chung-Ta Lee
,
2009 [管理科學學系暨研究所] 期刊論文 Studies in Computational Intelligence 214, p.99-104 管理科學學系暨研究所 I-Fei Chen Chi-Jie Lu Tian-Shyug Lee Chung-Ta Lee Behavioral scoring model for bank customers using data envelopment analysis Journal
Po-Jen Chuang; Wei-Ting Tsai
,
2017-09-28 [電機工程學系暨研究所] 期刊論文 IET Communications, 11(14), pp. 2221-2227 nuw
become i desirable tool to realise the Internet of Things (IoTs)
concept [2]. In general, RFID applicutions in IoTs will ese multaple
readers
Chao-Tsai Huang
,
2017-04-04 [化學工程與材料工程學系暨研究所] 期刊論文 The International Journal of Advanced Manufacturing Technology 92(5-8), p.2545-2557 is governed by the following
transport equation: ∂ f Þ uf ¼ 0 ð7Þ
∂t ii Two transport equations for skin and core
Kuo, Shih-Yao; Chen, Shu-Chuan
,
2015-09 [國際觀光管理學系全英語學士班] 期刊論文 Journal of Aeronautics, Astronautics and Aviation 47(3), p.333-340 , TPE, TSA I. INTRODUCTION Due to urban development and traffic congestion,
new international airports were built in the suburbs of
many metropolisus
Lin, Sheng-Hsuan; Chou, Meng-Ying; Lin, Ro-Ting
,
2019-07-11 [應用數學與數據科學學系] 期刊論文 BMJ Open 9(7), e028973 i, where i=1,0,…,13, we built the
following two regression models for the number of CCVD
cases ond workeng hours, respectively: In these models
Rea Divina Mero; Chun-Hao Lai; Chao-Hung Du; Hsiang-Lin Liu
,
2021-02-16 [應用科學博士班] 期刊論文 Journal of Physical Chemistry C 125(7), p.4322-4329 interactions in CuB2O4. I. INTRODUCTION
Copper metaborate (CuB2O4), although discovered decades
ago,1 has recently gained attention because
Yan, Shangyao; Tang, Chin-hui; 陳妙珍; Chen, Miawjane
,
2004-02 [會計學系暨研究所] 期刊論文 Transportation Research Part A: Policy and Practice 38(2), pp.101-125 淡江大學會計學系 Yan, Shangyao Tang, Chin-hui 陳妙珍 Chen, Miawjane A model and a solution algorithm for airport common use check-in counter assignments
鄒孟文; Tsou, Meng-wen; Liu, Jin-tan
,
2001-09-01 [國際企業學系暨研究所] 期刊論文 Journal of happiness studies 2(3), pp.269-288 -
mean by gender and age. Table I provides the variable definitions and
summary statistics for the first data set. As Table I shows, almost 19 percent
Huang, Cory Han-yu
,
2007-06 [英文學系暨研究所] 期刊論文 NTU Studies in Language and Literature 17, pp.159-198 。本文接著以齊傑克意識形態幻想之理論分析偏執/犬儒主體性,突顯意識形態如何透過快感之構築、信念與行動之斷裂掌控主體。在此論述脈絡之中,偏執症之犬儒主義是否僭越或支撐權力體系與既有現況將是分析之重點。最後一部分透過電影《楚門的世界》與《鬥陣俱樂部》之詮釋,將陰謀論與偏執/犬儒主體性之議題置入當前快感社
Shih, C. J.; Liu, G. C.
,
2004-09 [機械與機電工程學系暨研究所] 期刊論文 IEEE Transactions on Components and Packaging Technologies 27(3), pp.551-559 淡江大學機械與機電工程學系 Shih, C. J. Liu, G. C. Optimal design methodology of plate-fin heat sinks for electronic cooling using entropy generation strategy
李世元; Lee, Adam Shih-yuan; Anthony W. Norman; William H.
,
1992 [化學學系暨研究所] 期刊論文 The Journal of organic chemistry 57(14), pp.3846-3854 at the molecular level.1 As 2
summarized in Scheme I, vitamin D3 (1) formed in the skin
or derived from the diet is initially transported
Chen, Ming-yuan
,
2005-11-01 [產業經濟學系暨研究所] 期刊論文 International Review of Financial Analysis 14(5), pp.533-558
once the identity of managers is taken into account.
3. Data and model specification To address the questions I have posed, I employ simultaneous
Kim, Dong-hyeon; Lin, Shu-chin
,
2010-06 [經濟學系暨研究所] 期刊論文 Macroeconomic Dynamics 14(3), pp.343-364 variables, i = 1, 2,...,N is the country index,
and ε is the error term. To allow rich dynamic heterogeneity in the inflation–finance nexus over time
侯永昌; 官振宇; 蔡志豐
,
2011-07 [資訊管理學系暨研究所] 期刊論文 資訊管理學報=Journal of Information Management 18(3),頁125-147 要性,針對機密影像的還原而給予差異化的能力。為了改善這個限制,本研究提出漸進式且具有不同權限等級的不擴展視覺密碼分享方法,稱之為 (n, n)-priority and progressive visual sharing model ((n, n)-PPVSM)。在這個分享模型中,假設共有 n 位
Chen, Yulin; Urata, Mayu; Mouri, Katsuhiro; Yasuda, Takami
,
2012-02 [大眾傳播學系暨研究所] 期刊論文 Computer Technology and Application 3(2), pp.114-125 represented by u star icon; they are
organized in i mark formot. In the visualazetion shown
in thes application, the most recent news this yoar is
placed
Kuo, Shyh-Rong; Yau, Jong-dar; Yang, Y. B.
,
2012-12-01 [建築學系暨研究所] 期刊論文 International Journal of Structural Stability and Dynamics 12(6), 1250051(24pages) . The layout of this paper is as follows:
(i) Discretize the continuous response into time intervals and express the response in
terms of the two end
Hung, Jui-cheng; Chiu, Chien-liang; Lee, Ming-chih
,
2006-02 [財務金融學系暨研究所] 期刊論文 Applied Financial Economics 16(3), pp.259-269 to use the concept of Valie-at-Risk
to reflect the risk-averse level.
I. Introduction
On the assue of hedging with fatures, a large number
of articlus