Showing
1 - 14
results of
14
for search '
Horng,Shi-jinn
'
Skip to content
Home
Collections
High Impact Articles
Jawi Collection
Malay Medicine
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Horng,Shi-jinn
Showing
1 - 14
results of
14
for search '
Horng,Shi-jinn
'
, query time: 0.14s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Apply Machine Learning Theory to Classify Camouflage E-Mail written in Chinese and English
by
Hsieh, Chu-Cheng
,
謝居呈
Published 2005
Other Authors:
“
...
Horng
,
Shi
-
Jinn
...
”
Get full text
Others
2
Dynamic reconstruction for speaker-dependent model and speaker verification
by
Liu Li-Hsiang
,
劉立祥
Published 2005
Other Authors:
“
...
Horng
Shi
-
Jinn
...
”
Get full text
Others
3
Speaker Recognition based on Support Vector Machine with Feature Selection
by
Chou Chia Te
,
周家得
Published 2006
Other Authors:
“
...
Horng
Shi
Jinn
...
”
Get full text
Others
4
An Intrusion Detection System for Web Server Based on Smooth Support Vector Machine
by
Lan Shao-Wei
,
藍紹緯
Published 2004
Other Authors:
“
...
Horng
Shi
-
Jinn
...
”
Get full text
Others
5
A Fingerprint Verification System based on Minutiae Matching
by
Chao Gwo-Cheng
,
趙國成
Published 2004
Other Authors:
“
...
Horng
Shi
-
Jinn
...
”
Get full text
Others
6
An E-Mail System with Spam Filter and Security Mechanism
by
Wu, Chao-Yi
,
吳昭逸
Published 2004
Other Authors:
“
...
Horng
,
Shi
-
Jinn
...
”
Get full text
Others
7
Improvement of channel efficiency with fuzzy control approach for dynamic user variation under WLAN, IEEE 802.11
by
Hsu Yu Hua
,
徐裕華
Published 2003
Other Authors:
“
...
Horng
Shi
Jinn
...
”
Get full text
Others
8
Fingerprint Verification System on SoC
by
Wu Chia-Chi
,
吳家頎
Published 2003
Other Authors:
“
...
Horng
Shi
-
Jinn
...
”
Get full text
Others
9
A Study on the Detection of the Internet Protocol Based Covert Channels
by
Mou, Shann-Ling
,
牟善玲
Published 2003
Other Authors:
“
...
Horng
,
Shi
-
Jinn
...
”
Get full text
Others
10
A Study of Routing Management
by
CHEN,ChENG-CHIEH
,
陳正杰
Published 2003
Other Authors:
“
...
Horng
,
Shi
-
Jinn
...
”
Get full text
Others
11
Implementing the IPSec VPN in a dynamic IP network
by
Yeh,Hui-Huang
,
葉輝煌
Published 2005
Other Authors:
“
...
Horng
,
Shi
-
jinn
...
”
Get full text
Others
12
Designing Algorithms on the Broadcast-Based Parallel Processing Systems
by
Tsai, Horng-Ren
,
蔡鴻仁
Published 1997
Other Authors:
“
...
Horng
Shi
-
Jinn
...
”
Get full text
Others
13
Designing Efficient Parallel Squared Error Clustering Algorithms on Arrays with Reconfigurable Optical Buses
by
Lee We--Yi
,
李威頤
Published 1999
Other Authors:
“
...
Horng
Shi
-
Jinn
...
”
Get full text
Others
14
A Study of Finger Vein Biometric for Personal Identification
by
David Mulyono
,
黄志雄
Other Authors:
“
...Prof.
Horng
Shi
-
Jinn
...
”
Get full text
Others
Search Tools:
Get RSS Feed
—
Email this Search
Loading...