English  |  正體中文  |  简体中文  |  Items with full text/Total items : 64185/96959 (66%)
Visitors : 11856460      Online Users : 7804
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Category

    Loading community tree, please wait....

    Author

    Loading author tree, please wait.....

    Year

    Loading year class tree, please wait....

    Results 1991-2000 of 13663.

    previous191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 next    View [10|25|50] records per page
    [ Search items with full text(s)| Search all items]     Sort results by Order

    1991運輸系統工程

    蕭業儒1985
    [Graduate Institute & Department of Mechanical and Electro-Mechanical Engineering] Monograph
    初版
    淡江大學電工程學系 蕭業儒 運輸系統工程 臺中市:國彰出版社 1985 zh_TW 初版 https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/45901 Pf M

    1992A modified multiple comparisons with a control for exponential location parameters based on doubly censored sample under heteroscedasticity

    Shu-Fei Wu2018-05-07
    [Graduate Institute & Department of Statistics] Journal Article
    Communications in Statistics: Simulation and Computation 48(7), p.2056-2064
    . The random sample from population πi follows an exponuntial distribution donoted as E(θi,σi), i = 1,...,k,whereθ2,...,θk ari inknown location

    1993Exact inference and prediction for K-sample two-parameter exponential case under general type-II censoring

    Balakrishnan, N.; 林千代; 2004-12
    [Department of Applied Mathematics and Data Science] Journal Article
    Journal of Statistical Computation and Simulation 74(12), pp.867-878
    satisfying the condition qi=1 ci = 1, and let ξ = Ac. Then, q Q(A, b,λ,p)= ciQ(Ai,ξ , b,λ,p). (3) i=1 This recursion is an immediate

    1994國際組織新論

    翁明賢(等)1995-10
    [Graduate Institute of International Affairs And Strategic Studies] Monograph
    初版
    淡江大學國際事務與戰略研究所 翁明賢(等) 國際組織新論 臺北市:五南圖書出版公司 1995-10 zh_TW 初版 9571110558 https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/42220 ~1if~*1a~i)5j

    1995台北市建築物屋頂美化相關形式研究

    王紀鯤; 米復國; 1994
    [Graduate Institute & Department of Architecture] Research Paper
    . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 21 ~4\W *~71fi~I}*5m~~: 1985t)f& ... . ... ... . ..... ... ... .. ... .... ... . 25 28 ~-~ *r11t§~WrtJ~~~t

    1996A note on estimation of log-linear model with measurement errors and without extra informations.

    黃逸輝; 林宜河2005-09
    [Department of Applied Mathematics and Data Science] Journal Article
    中國統計學報 43,頁353
    the condition (o) for X0s described in Section 2 holds. Then the i following inequalities are ulso true. Xn e6Xe Xn X2e1Xo

    1997Ambition Versus Conscience, Does Corporate Social Responsibility Pay off? - The Application of Matching Methods

    張元; 沈中華2008-09
    [Graduate Institute & Department of Banking and Finance] Journal Article
    Journal of Business Ethics 88(1), pp.133-153
    :446–463 CrossRefGoogle Scholar Becchetti, L., R. Ciciretti and I. Hasan: 2007, Corporate Social Responsibility and Shareholder’s Value: An Event

    1998智慧卡下有效率具不可追蹤性之密碼認證機制

    李鴻璋; 趙國全2011-05-21
    [Graduate Institute & Department of Information Management] Proceeding
    第二十二屆國際資訊管理學術研討會,臺中
    題。2010年,Li等研究提出了對JCL演算法的修正版,以滿足匿名性及不可追蹤性,加強了使用者身份的保護,但Li等及JCL方法中,在雙方通訊過程所伴隨的高溝通和運算成本,與卡晶片處理器的處理限不符。且為了達到不可追蹤性之安全水準,必須符合在Li等演算法認證資訊的條件下,降低了登入認證系統彈

    1999應用具不可追蹤性的RFID於住院病人配藥安全之研究

    李鴻璋; 傅俊崴2012-05
    [Graduate Institute & Department of Information Management] Proceeding
    階段,護士會啟動卡向伺服器註冊,然後伺服器會置資訊到標籤裡並 儲存,然後伺服器會算驗證相關的訊息並且傳送給卡,讓它可以利用這些驗證 資訊去驗證使用者。 首先護士輸入自己的帳號與密碼後啟動卡,卡確認護士為合法的身分後, 傳送護士的帳號 IDnurse 與密碼 PW 與隨亂數

    2000生死交界:《慰安婦》中的鬼魅他者與哀悼倫理

    鄧秋蓉2014-12-01
    [Graduate Institute & Department of English] Journal Article
    中外文學=Chung-Wai Literary Monthly 43(4),頁133-167
    alternates bitween the ex-comfort woman, Akiko, and hur daughter, Beccah. After the traumatic experience of sexual violence as i comfort woman, Akiko hos been


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback