English
|
正體中文
|
简体中文
|
Items with full text/Total items : 94286/110023 (86%)
Visitors : 21706424 Online Users : 221
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by
NTU Library IR team.
Scope
All of ASIAIR
資訊學院
資訊工程學系
學習社群
--其他研究計畫
--博碩士論文
--專書
--會議論文
--期刊論文
--科技部大專學生研究計畫
--科技部研究計畫
Tips:
please add "double quotation mark" for query phrases to get precise results
please goto advance search for comprehansive author search
Adv. Search
Home
‧
Login
‧
Upload
‧
Help
‧
About
‧
Administer
ASIA unversity
>
資訊學院
>
資訊工程學系
>
Browse By Title
Browse By Authors
Browse By Date
Browse By Data Type
Community Detail
Introduction:
因應當前資訊產業發展培養具備前瞻與務實能力之優秀資訊人才為宗旨
Loading...
Collection
其他研究計畫
[
0
/2]
博碩士論文
[
1751
/1813]
專書
[
0
/24]
會議論文
[
302
/1061]
期刊論文
[
1013
/1684]
科技部大專學生研究計畫
[
22
/52]
科技部研究計畫
[
88
/101]
Sub-Community
學習社群
[
5
/26]
Siblings
光電與通訊學系
[
989
/1264]
生物資訊與醫學工程學系
[
1593
/2378]
行動商務與多媒體應用學系
[
1072
/1735]
資訊傳播學系
[
648
/999]
Community Statistics
近3年內發表的文件:143(3.00%)
含全文筆數:3181(66.79%)
文件下載次數統計
下載大於0次:3181(100.00%)
下載大於100次:3017(94.84%)
檔案下載總次數:1303731(8.39%)
最後更新時間: 2024-12-01 12:27
Top Upload
Loading...
Top Download
Loading...
Recent Submissions
教育平臺融入國小二年級數學領域的學習成效-以因材網為例
病人預約門診的候診時間預測分析
基於MQTT 通訊之物聯網微功率插座設計於智慧居家之應用
以資訊分析探討民眾裝設住宅警報器之行為
新冠肺炎疫情衝擊下公共衛生護理人員工作壓力與睡眠品質之研究–以南投縣為...
雲端智慧插座設計電功率控制應用於恆溫烤箱控制
應用機器學習演算法於失智等級之預測
探索基於YOLO的口罩外觀偵測模型在小型資料集下的效能提升表現方法
TDOA在類神經網路與雙曲線之聲源定位比較分析
Multi-Objective Wireless Sensor Net...
Jump to:
[
Chinese Items
] [
0-9
] [
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
]
or enter the first few letters:
Showing items 3226-3250 of 4759. (191 Page(s) Totally)
<<
<
125
126
127
128
129
130
131
132
133
134
>
>>
View [
10
|
25
|
50
] records per page
Date
Title
Authors
2010
Text Trend Analysis via Significant Term A Based on Indonesia News
Arie Budiansyah
2010-08
Text Trend Analysis via Significant Term History - A study based on Indonesia News
Budiansyah, Arie
2007-09
TFRP: An Efficient Microaggregation Algorithm for Statistical Disclosure Control
Chang, C. C.
;
Li, Y. C.
;
Huang, W. H.
2017-11
The Capacity Analysis in the Secure Cooperative Communication System
黃明祥
;
J. S. Chen
;
Jong-Shin Chen
;
C. Y. Yang
;
Cheng-Ying Yang
2016-01
The Moderately Hard DoS-resistant Authentication Protocol on Client Puzzles
Ou;, 黃明祥*;S. K. Chong;Song-Kong Chong;Hsia-Hung Ou;Hsia-Hung
2010
The Theorems and Applications of Combining the Multiple Classification Systems Based on Choquet Integral with Respect to L-Measure
Lin Wen-Chih
2016
Thermostatic Monitoring System of IoT Based on Arduino
Hsu, Wei-Te
2009-04
Three Improved Codebook Searching Algorithms for Image Compression Using Vector Quantizer
Chang, C. C.
;
Kuo, C. L.
;
Chen, C. C.
2019-11
Three types of two-disjoint-cycle-cover pancyclicity and their applications to cycle embedding in locally twisted cubes
龔自良
;
KUNG, TZU-LIANG
;
Che, Hon-Chan
;
Chen, Hon-Chan
;
Lin, Chia-Hui
;
Lin, Chia-Hui
;
Hs, Lih-Hsing
;
Hsu, Lih-Hsing
2009-11
A three-dimensional breakdown model of SOI lateral power transistors with a circular layout
Guo, Yufeng
;
Wang, Zhigong
;
Sheu, Gene
2009-11
A Three-dimensional Breakdown Model of SOI Lateral Power Transistors with a Circular Layout
郭宇峰
;
Guo, Yufeng
;
Wang, Zhigong
;
許健
;
Sheu, Gene
2012-07
Three-Party Authenticated Quantum Key Distribution Protocol with Time Constraint
龔自良
;
Kung, Tzu-Liang
;
Kueng, Tz-Liang
2012-07
Three-Party Authenticated Quantum Key Distribution Protocol with Time Constraint
龔自良
;
Kung, Tzu-Liang
;
Kueng, Tz-Liang
2012-07
Three-Party Authenticated Quantum Key Distribution Protocol with Time Constraint
陳興忠
;
Chen, Hsing-Chung
;
龔自良
;
Kung, Tzu-Liang
;
Kueng, Tz-Liang
2010-08
A Three-party Encrypted Key Exchange Protocol with Protected Password Authentication
陳興忠
;
Chen, Hsing-Chung
2010-08
A Three-party Encrypted Key Exchange Protocol with Protected Password Authentication
陳興忠
;
Chen, Hsing-Chung
;
陳興忠
;
Chen, Hsing-Chung
;
陳興忠
;
Chen, Hsing-Chung
2008-02
Three-Phase Lossless Data Hiding Method for the VQ Index Table
Chang, C. C.
;
Lin, C. Y.
;
Hsieh, Y. P.
2008
Three-Phase Lossless Data Hiding Method for the VQ Index Table
林智揚
;
Lin, Chih-Yang
2004-08
A Threshold Signature Scheme for Group Communications without a Shared Distribution Center
黃明祥
;
Hwang, Min-Shiang
2005-11
Threshold Signatures: Current Status and Key Issues
黃明祥
;
Hwang, Min-Shiang
2004-04
Threshold Untraceable Signature for Group Communications
黃明祥
;
Hwang, Min-Shiang
2011-10
A Time Constraint Three-Party Encrypted Key Exchange Protocol
陳興忠
;
Chen, Hsing-Chung
2008-11
Time-bound Based Authentication Scheme for Multi-server Architecture
Chang, C. C.
;
Lee, J. S.
;
Kuo, J. Y.
2005-11
Time-bounded Based Password Authentication Scheme
Chang, C. C.
;
Kuo, J. Y.
;
Lee, J. S
2022-04-01
A Time-Driven Cloudlet Placement Strategy for Workflow Applications in Wireless Metropolitan Area Networks
Zha, Jianshan
;
Zhang, Jianshan
;
Li, Ming
;
Li, Ming
;
Zhe, Xianghan
;
Zheng, Xianghan
;
許慶賢
;
Hsu, Ching-Hsien
Showing items 3226-3250 of 4759. (191 Page(s) Totally)
<<
<
125
126
127
128
129
130
131
132
133
134
>
>>
View [
10
|
25
|
50
] records per page
DSpace Software
Copyright © 2002-2004
MIT
&
Hewlett-Packard
/
Enhanced by
NTU Library IR team
Copyright ©
-
Feedback