Zobrazeno 1 - 10
of 39
pro vyhledávání: '"Chen-Chi Shing"'
Publikováno v:
Journal of Systemics, Cybernetics and Informatics, Vol 5, Iss 5, Pp 81-86 (2007)
The field of information security includes diverse contents such as network security and computer forensics which are highly technical-oriented topics. In addition, information forensic requires the background of criminology. The information security
Externí odkaz:
https://doaj.org/article/67e20fcaad974354a65f7fb0aaa4a4a8
Publikováno v:
Journal of Systemics, Cybernetics and Informatics, Vol 5, Iss 5, Pp 53-58 (2007)
In order to keep the price down, a purchaser sends out the request for quotation to a group of suppliers in a supply chain network. The purchaser will then choose a supplier with the best combination of price and quality. A potential supplier will tr
Externí odkaz:
https://doaj.org/article/fe45a7dc958542a8a920cfb40074f7e3
Autor:
Lee Hur Shing, Chen-Chi Shing, Marn-Ling Shing, Tzu-Chieh Lu, Meng Chu Chiang, Lee Pin Shing, Che Wei Yang
Publikováno v:
International Journal of Electronics and Electrical Engineering. :346-350
Autor:
Chandler Mitchell, Chen-Chi Shing
Publikováno v:
ICNC-FSKD
Many modern devices use login methods different from the standard username and password or PIN number systems. Biometrics are being used to identify and authorize specific users while combating cyber criminals. Methods like voice recognition, fingerp
Publikováno v:
Proceedings of the 2018 3rd International Conference on Electrical, Automation and Mechanical Engineering (EAME 2018).
Publikováno v:
International Journal of Electronic Commerce Studies. 6:233-242
The most commonly used data integrity models today are Bibba, Wilson-Clark and Chinese models. These models are designed for both data integrity protection and confidentiality. Many optimization problems are related to linear programming. In practice
Publikováno v:
DEStech Transactions on Computer Science and Engineering.
The Internet of Things (IoT) is a relatively recent technological and economic trend that involves using computers, microcontrollers, and RFID to collect and analyze data, as well as perform tasks and services. An IoT device represents a real-world e
Autor:
Chen, Chi-shing1
Publikováno v:
Review of Policy Research. Jan2012, Vol. 29 Issue 1, p119-130. 12p.
A Quality Outcome Assessment of Learning Discrete Mathematics Course The Case of University Students
Publikováno v:
INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY. 2:9-23
Teaching a mathematics foundation course such as Discrete Mathematics for an information technology curriculum is always a challenge. The challenge may be identifying students mathematical backgrounds early and then using different teaching technique
Publikováno v:
FSKD
Despite current advancements in today's technologies, radio frequencies are still unprotected and continues to be an achilles heel of technology. A simple telephonic radio frequency (RF) can be intercepted with the use of a baby monitor. Many don't s