Zobrazeno 1 - 10
of 11
pro vyhledávání: '"林裕彬"'
Autor:
Yu-bin Lin, 林裕彬
99
Home medical equipment becomes increasingly popular as VLSI fabrication technology advances. However, there are two important factors for realizing a miniaturized biochip: low noise [1] and low power. Firstly, physiological signals are very s
Home medical equipment becomes increasingly popular as VLSI fabrication technology advances. However, there are two important factors for realizing a miniaturized biochip: low noise [1] and low power. Firstly, physiological signals are very s
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/51028191006256563651
Autor:
Yu-Bin Lin, 林裕彬
98
The Silicon on Insulator (SOI) is one of the most developmental material in the process of semiconductor now, which can effectively solve the problem in the process of nanometer scale, like leakage effect, latch up. Smart-Cut? is a common te
The Silicon on Insulator (SOI) is one of the most developmental material in the process of semiconductor now, which can effectively solve the problem in the process of nanometer scale, like leakage effect, latch up. Smart-Cut? is a common te
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/49797402268205899200
Autor:
Lin, Yu Pin, 林裕彬
97
This paper investigates the explanation factors on the return of component share of ETF50 and ETF100 in Taiwan. In this paper, we adapt and compare the Fama and French three factor model and the five factor model. The three-factor model is es
This paper investigates the explanation factors on the return of component share of ETF50 and ETF100 in Taiwan. In this paper, we adapt and compare the Fama and French three factor model and the five factor model. The three-factor model is es
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/27289465883239811232
Autor:
林裕彬
93
The Discrete MultiTone system has been successfully applied to Digital Subscriber Lines (DSL) system. For DSL applications, the channels length are generally very long and a Time Domain Equalizer (TEQ) is usually used to shorten the effective
The Discrete MultiTone system has been successfully applied to Digital Subscriber Lines (DSL) system. For DSL applications, the channels length are generally very long and a Time Domain Equalizer (TEQ) is usually used to shorten the effective
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/38740057966344390382
Autor:
Lin Yu-pin, 林裕彬
90
In the wave of globalization, democratization, deregularization, and diversification have deemed popular values embedded in public policy making. The blossoming of privatization has hinged on the financial burden borne by government and press
In the wave of globalization, democratization, deregularization, and diversification have deemed popular values embedded in public policy making. The blossoming of privatization has hinged on the financial burden borne by government and press
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/16335976435448525105
Autor:
Lin, Yu Pin, 林裕彬
97
This paper investigates the explanation factors on the return of component share of ETF50 and ETF100 in Taiwan. In this paper, we adapt and compare the Fama and French three factor model and the five factor model. The three-factor model is es
This paper investigates the explanation factors on the return of component share of ETF50 and ETF100 in Taiwan. In this paper, we adapt and compare the Fama and French three factor model and the five factor model. The three-factor model is es
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/83985163765089645807
Autor:
林裕斌, Lin, Yu-Pin
本文利用國內投資人參與民國八十五年一月至八十九年四月間77家IPO競價拍賣的投標資料為樣本,來探討投資人過度自信以及自我歸因偏誤的情形。實證結果發現:過度自信假說於對個人投資
Externí odkaz:
http://thesis.lib.nccu.edu.tw/cgi-bin/cdrfb3/gsweb.cgi?o=dstdcdr&i=sid=%22G0923570021%22.
Autor:
LIN, YU-PIN, 林裕斌
107
With the widespread use of smartphones, the number of mobile application is increasing and many malware applications such as user’s private information is stolen or leaking have been proposed. Furthermore, the hacker can manipulate these s
With the widespread use of smartphones, the number of mobile application is increasing and many malware applications such as user’s private information is stolen or leaking have been proposed. Furthermore, the hacker can manipulate these s
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/45qgq5