Zobrazeno 1 - 10
of 35
pro vyhledávání: '"Yu-Chan Lin"'
Autor:
Yu-Chan Lin, 林佑展
103
There are more firms want to across e-commerce field and even to cross the borders of countries. The frequency of online shopping from other country’s website has increased, and the order fulfillment process become complicated. Because of
There are more firms want to across e-commerce field and even to cross the borders of countries. The frequency of online shopping from other country’s website has increased, and the order fulfillment process become complicated. Because of
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/39414074094872984698
Autor:
Yu-Chan Lin, 林育嬋
102
In recent years, the campus architectural plans and designs of high and elementary schools have been tending towards open and humanistic styles. However, often due to personnel change, the relevant management know-how for campus architecture
In recent years, the campus architectural plans and designs of high and elementary schools have been tending towards open and humanistic styles. However, often due to personnel change, the relevant management know-how for campus architecture
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/75b889
Autor:
Yu-chan Lin, 林育嬋
102
This thesis is talking about copyright which focus on adapted right. Getting the permit to adapted right will impact derivative work. It’s based on copyright’s history, then compare with criterion to copyright in every nation. Also talki
This thesis is talking about copyright which focus on adapted right. Getting the permit to adapted right will impact derivative work. It’s based on copyright’s history, then compare with criterion to copyright in every nation. Also talki
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/22309838631600420629
Autor:
Yu-chan Lin, 林郁展
100
Rootkit is most often used by attacker to hide their behavior, the Rootkit detection mechanisms mostly focus on static characteristics or the integrity of the system, but the attacker can confuse the system eigenvalues through various ways,
Rootkit is most often used by attacker to hide their behavior, the Rootkit detection mechanisms mostly focus on static characteristics or the integrity of the system, but the attacker can confuse the system eigenvalues through various ways,
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/28572747271333705716
Autor:
Yu-chan Lin, 林佑展
99
This study used computational fluid dynamics simulation software, a simple easy to use ceiling fans simulation process. And the simulation results and experimental error is acceptable. This study used 52-inch fan and fan blades to increase th
This study used computational fluid dynamics simulation software, a simple easy to use ceiling fans simulation process. And the simulation results and experimental error is acceptable. This study used 52-inch fan and fan blades to increase th
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/02119765405481710860
Autor:
Yu-Chan Lin, 林裕展
97
In this thesis, under an optical PRBS NRZ data injection at 10 Gbit/s, the 10-GHz mode-locking and pulsed RZ clock extracted from a semiconductor optical amplifier inside the fiber ring is demonstrated. Meantime, through the diagnosis of gain
In this thesis, under an optical PRBS NRZ data injection at 10 Gbit/s, the 10-GHz mode-locking and pulsed RZ clock extracted from a semiconductor optical amplifier inside the fiber ring is demonstrated. Meantime, through the diagnosis of gain
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/58715674827472631766
Autor:
Yu-Chan Lin, 林玉嬋
96
Recently, resulting from deregulation of the financial industry, there has been a shift in the profitability of banks from traditional banking activities to fee-based activities. Non-interest incomes have become one of the most stable revenue
Recently, resulting from deregulation of the financial industry, there has been a shift in the profitability of banks from traditional banking activities to fee-based activities. Non-interest incomes have become one of the most stable revenue
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/42628179842412273227
Publikováno v:
Optics letters. 47(11)
An ultra-broadband wavelength-swept laser (WSL) was generated using glass-clad Ti:sapphire crystal fiber as the gain media. Due to the low signal propagation loss of the crystal fiber, the swept laser has a tuning bandwidth of 250 nm (i.e., 683 nm to
Publikováno v:
Optica Advanced Photonics Congress 2022.
Glass-clad Ti:sapphire-core fibers have been used in cellular-resolution optical coherence tomography and greater than 240-nm swept laser sources in the near-infrared wavelength range. The development of Ti:sapphire-core fibers toward single-mode tra
Publikováno v:
2020 Opto-Electronics and Communications Conference (OECC).
A 160-nm-bandwidth swept laser with 100-kHz repetition was demonstrated using a glass-clad Ti:sapphire crystal fiber as the gain medium and an electro-optical crystal, KTN, as the fast beam scanner on diffraction grating for wavelength sweeping.