Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Chin-Fa Lin"'
Autor:
Chin-Fa Lin, 林進發
102
This study aimed to investigate the 2002 Taiwan''s accession to WTO, Followed the collapse of tobacco monopoly system, Winery and internationally renowned private traders on the Taiwan market, all hold to high expectations. After a dec
This study aimed to investigate the 2002 Taiwan''s accession to WTO, Followed the collapse of tobacco monopoly system, Winery and internationally renowned private traders on the Taiwan market, all hold to high expectations. After a dec
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/3b55am
Autor:
Chin-Fa Lin, 林進發
99
With the fast growing of high-tech industry and economics in recent years, the vehicle population has increased dramatically, and the problem of safety driving draws the attention of both researchers and manufacturers. Traffic accident has be
With the fast growing of high-tech industry and economics in recent years, the vehicle population has increased dramatically, and the problem of safety driving draws the attention of both researchers and manufacturers. Traffic accident has be
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/04137620706912588162
Autor:
Chin-Fa Lin, 林欽發
99
Nationals require high quality of service more relative improvement for the stores, under Taiwan’s rapid economic development, the rising of national standard of living and consumer awareness in general. It is the key points for enterprises
Nationals require high quality of service more relative improvement for the stores, under Taiwan’s rapid economic development, the rising of national standard of living and consumer awareness in general. It is the key points for enterprises
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/83651278980107982834
Publikováno v:
Applied Soft Computing. 11:2348-2355
Underwater wireless sensor networks have attracted significant attention recently from both academia and industry to explore natural undersea resources and gathering of scientific data in aqueous environments. The nature of an underwater sensor netwo
Autor:
Ching-Yu Li, Chin-Fa Lin, Tz-Hau Huang, Yu-Wu Wang, Chenn-Jung Huang, Jia-Jian Liao, Heng-Ming Chen, Po Chiang Chen
Publikováno v:
Applied Soft Computing
In the past, the utilization of the limb prosthesis has improved the daily life of amputees or patients with movement disorders. However, a leg-amputee has to take a series of training after wearing a limb prosthesis, and the training results determi
Autor:
Hung-Yen Shen, You-Jia Chen, Chenn-Jung Huang, Kai-Wen Hu, Yu-To Chen, I-Fan Chen, Heng-Ming Chen, Dian-Xiu Yang, Chin-Fa Lin, Yu-Wu Wang
Publikováno v:
Cluster Computing. 14:91-99
Underwater wireless sensor networks (UWSNs) is a novel networking paradigm to explore aqueous environments. The characteristics of mobile UWSNs, such as low communication bandwidth, large propagation delay, floating node mobility, and high error prob
Autor:
Chenn-Jung Huang, You-Jia Chen, Ching-Yu Li, Chin-Fa Lin, Yi-Ju Yang, Yu-Wei Lee, Heng-Ming Chen, Po-An Hsu, Jia-Jian Liao, Yih-Jhe Lien
Publikováno v:
IEEE Conference Anthology.
The proposed identification system for mixed anuran vocalizations is to provide the public to easily consult online. The raw mixed anuran vocalization samples are first filtered by noise removal, high frequency compensation, and discrete wavelet tran
Autor:
Chin-Fa Lin, Ying-Chen Chen, Heng-Ming Chen, Sheng-Chieh Tseng, Chenn-Jung Huang, Chih-Tai Guan, Yu-Wu Wang
Publikováno v:
2011 IEEE International Conference on Information and Automation.
With advanced network technologies in recent years, people may connect with different types of networks anytime, anywhere. Since wireless network resource distribution is an important issue, we propose a user mobility prediction algorithm, which cons
Autor:
Hen-Ming Chen, Yu-Wu Wang, Chenn-Jung Huang, Jia-Jian Liao, Chin-Fa Lin, Ching-Yu Li, Po-Yen Tsai
Publikováno v:
2010 IEEE International Conference on Industrial Engineering and Engineering Management.
In the past, the utilization of the limb prosthesis has improved the daily life of amputees or patients with movement disorders. However, a leg-amputee has to take a series of training after wearing a limb prosthesis, and the training results determi
Publikováno v:
2010 First International Conference on Networking and Distributed Computing.
Intrusion detection system (IDS) is a security layer that is used to discover ongoing intrusive attacks and anomaly activities in information systems and is usually working in a dynamically changing environment. Although increasing IDSs are developed