金型技術 (Ⅳ-301 ~ Ⅳ-307)

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Sectional Anatomy Quiz IV

In this series we present a quiz about identification of salient and important anatomical landmarks present at a given level on the computed tomography (CT) image. The representative image is followed by further images showing examples of various commonly encountered pathologies that can be seen at this level in clinical practice. Readers are expected to identify highlighted structures in all t...

متن کامل

Ion Exchange Column Performance Model for Separation of Zr(IV) and Hf(IV) in Elution Process

A mathematical model of sorption of Zirconium and Hafnium cations mixture and elution of these ions from a cation exchange resin bed is developed. Sulfuric acid is selected as the eluent for selective separation of Zr and Hf in a packed bed of Dowex cation exchange resin. The column model is a dispersed plug flow model,and assumed to consist of randomly packed synthetic and spherical resin ...

متن کامل

應用錯誤型態分析於英語發音輔助學習 (English pronunciation assisted learning using error type analysis) [In Chinese]

摘要 語言教學方法主要是由以互動理論 (interactionist theories) 為基礎的溝通式教學法 (communicative language teaching) 所主導。因此,如果要針對學生個別的問題進行糾正,需要甚 多的時間,很難採用雙向互動的教學方法。要解決這樣的問題,電腦輔助語言學習系統 (Computer Assisted Language Learning System, CALL) 是個可行的方案。利用語音辨識 (Automatic Speech Recognition, ASR) 技術的電腦輔助發音訓練系統 (Computer Assisted Pronunciation Training, CAPT) 不但可以提供一個沒有壓力的環境,讓學生反覆的練習,同時也能針對學生個別的發音 問題,提供回饋與糾正的功能。本論文應用語音辨識、錯誤型態分析、及三維唇型...

متن کامل

IF: An Intrusion Forecast Module based on an Intrusion Detection and Traceabck System

現今之入侵偵測系統(Intrusion Detection System, IDS)多著重於更有效率的偵測方 法,如 Behavior-based之 IDS,以偵測異常之網路行為主軸取代以特徵為基礎 (signature-based )之入侵偵測技術,或以其他如 protocol anomaly及 traffic anomaly detection等較準確之異常偵測為基準之技術。亦有人提議以人工智慧技術(Artificial intelligent techniques)[1]透過類神經網路模型(Neural Network Model)使入侵偵測系統能 自我學習,並自我成長,而不須如傳統之 signature-based IDS以人工方式新增入侵特徵 之 Patten,最終目的是希望能自動發掘出新的未知型態入侵攻擊。而業界產品則著重在 發展入侵預防系統 (Intrusion Det...

متن کامل

(Microsoft Word - ICCE_LTE_PSM_v5 - \303\326\301\276\303\342\306\307\272\273)

We propose a modified power-saving mechanism (PSM) that reversely applies the state transition of legacy LTE PSM by considering the attributes of network propagation delay. We analyze the PSM with respect to the energy consumption and the buffering delay, and characterize them as a simple energydelay tradeoff (EDT) curve according to the operational parameters. The resulting EDT curves clearly ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Seikei-Kakou

سال: 2005

ISSN: 0915-4027,1883-7417

DOI: 10.4325/seikeikakou.17.510_1