Zobrazeno 1 - 6
of 6
pro vyhledávání: '"张荣庭"'
Autor:
CHANG, JUNG-TING, 張榮庭
107
Traditional art is inherited from historic culture. It is the source of cultural innovation. The use of automated article classification and intelligent inquery systems will help to re-innovate these important resources to facilitate the dev
Traditional art is inherited from historic culture. It is the source of cultural innovation. The use of automated article classification and intelligent inquery systems will help to re-innovate these important resources to facilitate the dev
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/yq5qq9
Publikováno v:
Journal of Computer Engineering & Applications; 11/15/2020, Vol. 56 Issue 22, p230-235, 6p
Autor:
Rong-Ting Jhang, 張榮庭
104
A complete Chinese TrueType font covers thousands of Chinese characters and symbols, most of them are much more complex than the English alphabets. To build a Chinese TrueType font not only needs professional font enginees, but also needs a
A complete Chinese TrueType font covers thousands of Chinese characters and symbols, most of them are much more complex than the English alphabets. To build a Chinese TrueType font not only needs professional font enginees, but also needs a
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/9873ps
Autor:
Chang Jung-Ting, 張榮庭
100
GaAs epitaxy, as nucleation layer, is grown on Ge substrate using ALE technique (Atomic Layer Epitaxy). According our study, triangle defects are formed on the surface of (In)GaAs/Ge due to lower decomposition rate of TMGa at low growth temp
GaAs epitaxy, as nucleation layer, is grown on Ge substrate using ALE technique (Atomic Layer Epitaxy). According our study, triangle defects are formed on the surface of (In)GaAs/Ge due to lower decomposition rate of TMGa at low growth temp
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/19240612958150924137
Autor:
Jung-Ting Chang, 張榮庭
94
Information systems (IS) threats to business exacerbate with the development of information technology. A lack of robust security means that organizations expose themselves to considerable threats. This work examines the relationship between
Information systems (IS) threats to business exacerbate with the development of information technology. A lack of robust security means that organizations expose themselves to considerable threats. This work examines the relationship between
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/55052036702675092034