ASIA unversity:
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 94286/110023 (86%)
Visitors : 21656050      Online Users : 526
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Collection

    Theses & dissertations [292/294]
    Books [0/8]
    Proceedings [323/666]
    Journal Article [389/674]
    Ministry of Science and Technology College Student Research Projects [14/32]
    Ministry of Science and Technology Research Project [54/57]

    Sub-Community

    Reading Club [0/4]

    Community Statistics


    Item counts issued in 3 years:20(1.15%)
    Items With Fulltext:1072(61.79%)

    Download counts of the item
    Download times greater than 0:1072(100.00%)
    Download times greater than 100:1038(96.83%)
    Total Bitstream Download Counts:515959(3.32%)

    Last Update: 2024-11-28 06:30

    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 951-1000 of 1735. (35 Page(s) Totally)
    << < 15 16 17 18 19 20 21 22 23 24 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    1993 The present situations and prospects of information technology education in the R.O.C. S. S. Tseng
    1996 Primal-dual version space T. P. Hong; S. S. Tseng
    1998-06 Primal-dual version spaces for acquisition of disjunctive concepts T. P. Hong; S. S. Tseng
    2005 Prioritizing the Business Reputation in Information Service Industries Jiunn-I Shieh; 林士彥; 吳信宏; 廖岳祥
    Privacy Image Protection Using Fine-grained Mosaic Technique 陳宜惠; CHEN, YI-HUI; Eric, Jui-Lin; Lu, Eric Jui-Lin; Ts, Meng Fang; Tsai, Meng Fang
    2011-10 A Privacy Reinforcement Approach against De-identified Dataset 陳宜惠; Chen, Yi-Hui
    2011-10 A Privacy Reinforcement Approach against De-identified Dataset 陳宜惠; Chen, Yi-Hui
    1992 A probabilistic perceptron learning algorithm T. P. Hong; S. S. Tseng
    2008-06 Program Peer Assessment Using Tagging Approach 曾憲雄; Tseng, Shian-Shyong
    2003-09-13 The Properties of nanophase separation Polystyrene – Polycaprolactone Diblock Copolymer 周志謂; 江郁霖; 徐善慧; 林助傑
    2003 Protocol based foresight anomaly intrusion detection system M. K. Tsai; S. C. Lin; S. S. Tseng
    2011-09 A provably secure certificateless proxy signature scheme 劉兆樑; Liu, Chao-Liang
    2009 A QFD-Based Framework for Test Software Assessment Yueh-Kuei Chan
    2016-07 QR Code Steganography with Secret Payload Enhancement 林珮瑜; Lin, Pei-Yu; 陳宜惠; CHEN, YI-HUI; *
    2010-04 A Quadtree-based Location Management Scheme for Wireless Sensor Networks 林致宇; Lin, Chih-Yu
    2006-06 A Quality Function Deployment Based Expert System in Service Industry 廖岳祥; Anthony, Y.H.Liao; Chiu, P.-C.
    2013-12 Quantification of Cranial Asymmetry in Infants Based on Facial Features Li, Wei-Cheng; Huang, Chung-Lin; Chang, Chun-Ming; Chang, Pei-Yeh
    2009 Quantifying Uncertainty in Applying Importance-Performance Analysis Jiunn-I Shieh; Hsin-Hung Wu
    1995 Radiosity for scenes with many mirror reflections Jiunn-I Shieh; Steven Dworkin
    2006 Randomly Dynamic Cryptosystem Liu Poyen
    2000 Rating Information Collecting and Distributing in PICS Protocol Y. T. Lin; S. S. Tseng; Y. X. Zhong; Mon-Fong Jiang
    2014-08 An RDF-based P2P overlay network supporting range and and wildcard queries 張英超; Chan, Ing-Chau; 呂瑞麟; Lu, Eric Jui-Lin; 黃宣伊; Shiuan-YinHuang; 陳宜惠; CHEN, YI-HUI
    2015-09 RDF-Chord: A Hybrid PDMS for P2P Systems CHEN, YI-HUI; Eric, Jui-Lin; Huang, Shiuan-Yin; Chang, Yao-Tsan
    2012-05 RDF-Chord: A Semantic-based P2P System for RDF Queries 陳宜惠; Chen, Yi-Hui
    2015-09 RDF-Chord: A Semantic-based P2P System for RDF Queries Chang, 陳宜惠;CHEN YI-HUI;Eric Jui-Lin;Eric Jui-Lin Lu;Shiuan-Yin H;Shiuan-Yin Huang;Yao-Tsan Cha;Yao-Tsan
    2005 Re-exploring agricultural price local volatility using complex system simulation ? analysis in terms of potato and carrot demand-supply in Taiwan LEE SHIN HUEY
    2013-12 Real-time Hand Motion Parameter Estimation with Feature Points Detection using Kinect Chang, Che-Hao; Hsieh, Pei-Chi; Huang, Chung-Lin; Chang, Chun-Ming
    2012-11 Real-Time Human Object Motion Parameters Estimation from Depth Images 黃仲陵; Huang, Chung-Lin
    1989 The reciprocal stable matching problem and its properties R. T. Kuo; S. S. Tseng
    2005 Recognizing Cancer-related Genes based on Single Nucleotide Polymorphisms Y.C. Wang
    2003 The Recurrence Property in A Uniquely Ergodic Dynamical System Jiunn-I Shieh; Hsin-Hung Wu; Shih-Yen Lin; Anthony Y.H. Liao
    2002-05-16 A Refined Proxy Deposit Protocol for E-cash Systems Yu-Yi Chen; Jinn-Ke Jan; Chih-Fang Kuo
    2011 Refinements of Miller's Algorithm over Weierstrass Curves Revisited 劉兆樑; Liu, Chao-Liang
    2004 A Reformed Concept Inheritance Based Testing And Evaluation System hsiao wei jen
    2017 The Relationship between Visual Fatigue and Attention HSIEH, SHANG-FENG
    1990 Reliability-oriented task assignment in distributed systems with software redundancy G. J. Hwang; S. S. Tseng
    1992 Relocation problems of maximizing new capacities under a common due date M. T. Lin; S. S. Tseng
    2004 Remote Supervision and Control Over The Internet Sung-Shan Hung
    2006-09 Removing the Blocking Effects Using Artificial Neural Network Chin-Chen Chang; Chi-Shiang Chan; Wei-Liang Tai
    2006-09 Removing the Blocking Effects Using Artificial Neural Network 詹啟祥; Chan, Chi-Shiang
    2002-05-16 Reparability Analysis for Key Distribution Protocols Wei-Chi Ku (顧維祺); Sheng-De Wang (王勝德); Hui-Lung Lee (李惠龍)
    2003-09-13 Representing and Similarity Querying Biological Sequences 黃智偉; 郭煌政
    2004 The research of computerized adaptive diagnostic testing on knowledge-structured system - Use C++ language field arithmetic and relationship logical operation and input/output functions as example Ming-Ching Ho
    2003-09-13 The Research of Remote Position/Force Control System For Robot 林欽榮; 邱士軒; 李易儒; 張智偉
    2022-07-01 Research on a Trustworthy Digital Learning Roll Call System 廖岳祥; Liao, Anthony Y. H.; 謝玉英; Hsieh, Yu-Ying; Cheng-Ying, Ying Y; Yang, Cheng-Ying; 黃明祥; Hwang, Min-Shiang
    2007 A Research on Applying CMMI to Improve Supplier Management Process in Construction IndustryEE wu yu pin
    2014-07-25 The Research on Service Quality of the Art Museum by Tadao Ando: Case Study of Asia Museum of Modern Art Chang, Po-Wei
    2002-09-13 Research on the Integration of Web Services and Business Process 仲崇寧; 駱仁山
    2022-05-01 Research on the Trusted Online Examination Systems 廖岳祥; Liao, Anthony Y. H.; 謝玉英; Hsieh, Yu-Ying; Cheng-Ying, Ying Y; Yang, Cheng-Ying; 黃明祥; Hwang, Min-Shiang
    1992 Resource-requirement minimization in relocation problems with constraints M. T. Lin; S. S. Tseng

    Showing items 951-1000 of 1735. (35 Page(s) Totally)
    << < 15 16 17 18 19 20 21 22 23 24 > >>
    View [10|25|50] records per page

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback