Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Methods for Combination Optimization of Flight Routes and Flight Altitude Considering Restrictions in Free Route Airspace

    In order to reduce the cost of aircraft flights and air pollution emissions when flying through Free Route Airspace (FRA), methods have been developed to jointly optimize flight paths and flight altitudes. Fir...

    Na Wang, Zhiqiang Wei, Luhuan Wei, Yi Hui in 2023 Asia-Pacific International Symposium … (2024)

  2. No Access

    Chapter and Conference Paper

    Forecast of Future Natural Gas Market Demand in China and Analysis of the Situation of Gas Storage Capacity Construction

    In the context of dual carbon, with the adjustment of global energy structure and the development of clean energy, natural gas will become a substitute for traditional energy and an important component of sust...

    Huan Wei, De-wen Zheng, **-fang Wang in Proceedings of the International Field Exp… (2024)

  3. No Access

    Chapter and Conference Paper

    Research on the Construction Scale of China’s Natural Gas Underground Gas Storage Under the New Situation

    In order to accelerate the construction of gas storage facilities, enhance the natural gas reserve capacity, and effectively ensure the safe and stable supply of natural gas and national energy security. Based...

    Huan Wei, Cheng-hao Wang, Bin Li in Proceedings of the International Field Exp… (2023)

  4. No Access

    Chapter and Conference Paper

    The Key Challenges and Technical Countermeasures of Underground Gas Storage in Oil Fields

    Accelerating the improvement of natural gas storage capacity and the planning of gas storage in advance are important means to improve the natural gas industry chain and ensure the safety of natural gas supply...

    **-fang Wang, Tong-wen Jiang, Bin Lin in Proceedings of the International Field Exp… (2023)

  5. No Access

    Chapter and Conference Paper

    Field-Oriented Control Strategy Verification Based on Power Hardware in Loop Simulation Technology

    The Paper presents verification of induction motor control and its characteristics using indirect field-oriented control (IFOC) through a Typhoon Hardware-in-loop (HIL) simulation package with HIL604 configura...

    Menglong Xu, Abdul Hadi Hanan, Zhichuan Wei in The Proceedings of the 5th International C… (2023)

  6. No Access

    Chapter and Conference Paper

    Comparing Handwriting Fluency in English Language Teaching Using Computer Vision Techniques

    Educational materials play a vital role in effectively conveying information to learners, with the readability and legibility of written text serving as crucial factors. This study investigates the influence o...

    Chuan-Wei Syu, Shao-Yu Chang, Chi-Cheng Chang in Innovative Technologies and Learning (2023)

  7. No Access

    Chapter

    Controlling Transaction Risk in E-commerce

    Increasing the sense of security of consumers puts forward higher requirements for risk control of e-commerce transactions. This chapter classifies the risk of e-commerce transaction from many angles. Accordin...

    Ronggang Zhang, Lijuan Fang, ** He in The Whole Process of E-commerce Security M… (2023)

  8. No Access

    Chapter

    Controlling Risk of E-commerce Personnel

    A company's greatest asset is its people. The risk of e-commerce personnel exists in the whole process of e-commerce, at all levels and in all links, which is a kind of universal risk. In reality, the preventi...

    Ronggang Zhang, Lijuan Fang, ** He in The Whole Process of E-commerce Security M… (2023)

  9. No Access

    Chapter

    Introduction

    Social system must be in a dynamic balance between security and development, so it is of great significance to carry out effective security management for the rapid development of e-commerce. This chapter defi...

    Ronggang Zhang, Lijuan Fang, ** He in The Whole Process of E-commerce Security M… (2023)

  10. No Access

    Chapter

    E-commerce Security Management Resources and Organization

    This chapter illustrates what is electronic commerce security management resources and their organization, and analyzes the relationship between them. E-commerce security management resources include human res...

    Ronggang Zhang, Lijuan Fang, ** He in The Whole Process of E-commerce Security M… (2023)

  11. No Access

    Chapter

    Controlling Network Risk in E-commerce

    No network security, no e-commerce security. This chapter analyzes the security risks faced by the e-commerce network and how to identify the e-commerce network security risks, then analyzes the e-commerce net...

    Ronggang Zhang, Lijuan Fang, ** He in The Whole Process of E-commerce Security M… (2023)

  12. No Access

    Chapter

    Controlling Credit Risk in E-commerce

    “No man can stand without faith”. Modern society is a credit society, and the importance of social credit system construction is more prominent in the field of e-commerce. This chapter explains what e-commerce...

    Ronggang Zhang, Lijuan Fang, ** He in The Whole Process of E-commerce Security M… (2023)

  13. No Access

    Chapter

    Supervision and Optimization Mechanism of E-commerce Security Management

    Maintaining network security requires the participation of the government, enterprises, social organizations, and the majority of Internet users. This chapter analyzes the supervision mechanism of e-commerce s...

    Ronggang Zhang, Lijuan Fang, ** He in The Whole Process of E-commerce Security M… (2023)

  14. No Access

    Chapter

    E-commerce Security Management Plan

    “Preparedness ensures success and unpreparedness spells failure”. E-commerce security management also follows this rule. This chapter illustrates what is electronic commerce safety management plan, introduces ...

    Ronggang Zhang, Lijuan Fang, ** He in The Whole Process of E-commerce Security M… (2023)

  15. No Access

    Chapter

    Controlling Information Risk in E-commerce

    “The wise hear in silence, the wise see in the invisible”, which illustrates the importance of e-commerce enterprises to prevent information security risks. This chapter presents the information security risk ...

    Ronggang Zhang, Lijuan Fang, ** He in The Whole Process of E-commerce Security M… (2023)

  16. No Access

    Chapter

    Concluding Remarks

    This summative chapter reviews the preceding chapters for trends and themes from contributors’ chapters concerning Taiwan’s Senior Learning Movement. Based on earlier authors’ observations, features of this so...

    Brian Findsen, Hui-Chuan Wei, Ai-Tzu Li in Taiwan’s Senior Learning Movement (2022)

  17. No Access

    Chapter

    Introduction

    This book provides in-depth coverage of historical and recent educational developments in East Asian societies before focusing on the unique development of Taiwan and its senior learning movement. Publications...

    Brian Findsen, Hui-Chuan Wei, Ai-Tzu Li in Taiwan’s Senior Learning Movement (2022)

  18. No Access

    Chapter and Conference Paper

    Detection of Abnormal Crowd Behavior Based on ViBE and Optical Flow Methods

    With the rapid development of computer vision and image processing technology, the detection of abnormal behavior in video has gradually attracted more and more scholars’ attention

    **nqian Zhao, Jian Chen, Hongwei Lin in Image and Graphics Technologies and Applic… (2022)

  19. No Access

    Chapter and Conference Paper

    Attack Methods and Prevention Strategies of Computer Network Security

    Since entering the 21st century, computer Internet technology has made breakthrough progress. However, in the context of network resource sharing, computer network security issues have become more and more imp...

    Yinghuan Wei in The 2021 International Conference on Machi… (2022)

  20. No Access

    Chapter and Conference Paper

    A Study on Image Transmission Based on Hop** LoRa

    LoRa is a low power wide area network (LPWAN) communication that can transmit over long distances under the situation of line of sight, and it is only suitable for transferring small data. Nevertheless, obstac...

    Ching-Chuan Wei, Kuan-Chun Chang in Innovative Mobile and Internet Services in… (2022)

previous disabled Page of 3