Zobrazeno 1 - 10
of 14
pro vyhledávání: '"邓 全"'
Publikováno v:
Cyber Security & Data Governance; 2024, Vol. 43 Issue 4, p24-27, 4p
Publikováno v:
Detergent & Cosmetics; 2024, Vol. 47 Issue 1, p29-32, 4p
Publikováno v:
Computer Engineering & Science / Jisuanji Gongcheng yu Kexue; Aug2023, Vol. 45 Issue 8, p1347-1353, 7p
Publikováno v:
Tianjin Medical Journal. Dec2016, Vol. 44 Issue 12, p1480-1483. 4p.
Publikováno v:
China Surfactant Detergent & Cosmetics (1001-1803); Apr2022, Vol. 52 Issue 4, p425-430, 6p
Publikováno v:
Chinese Journal of Contemporary Pediatrics; Apr2021, Vol. 23 Issue 4, p420-424, 5p
Publikováno v:
Journal of Engineering for Thermal Energy & Power / Reneng Dongli Gongcheng; jan2020, Vol. 35 Issue 1, p106-111, 6p
Autor:
Teng, Chuan-Pin, 鄧全斌
103
The Close-Open Mixed Vehicle Routing Problem (COMVRP) is a variant of the conventional Vehicle Routing Problem (VRP). Consider the case when the private car of company is insufficient. In order to meet the demand of customer, the company can
The Close-Open Mixed Vehicle Routing Problem (COMVRP) is a variant of the conventional Vehicle Routing Problem (VRP). Consider the case when the private car of company is insufficient. In order to meet the demand of customer, the company can
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/52078168528778481418
Publikováno v:
Food Research & Development; 2018, Vol. 39 Issue 20, p215-218, 4p
Autor:
Chuan-Liang Teng, 鄧全良
92
In this thesis, we first analyze the execution behavior of computer viruses, then we design a State Transition Diagram to model the behavior of virus, including the intercepting actions, the relationship of running sequences, the malicious
In this thesis, we first analyze the execution behavior of computer viruses, then we design a State Transition Diagram to model the behavior of virus, including the intercepting actions, the relationship of running sequences, the malicious
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/gpbhgv