English
|
正體中文
|
简体中文
|
Items with full text/Total items : 94286/110023 (86%)
Visitors : 21673110 Online Users : 637
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by
NTU Library IR team.
Scope
All of ASIAIR
資訊學院
資訊工程學系
學習社群
--其他研究計畫
--博碩士論文
--專書
--會議論文
--期刊論文
--科技部大專學生研究計畫
--科技部研究計畫
Tips:
please add "double quotation mark" for query phrases to get precise results
please goto advance search for comprehansive author search
Adv. Search
Home
‧
Login
‧
Upload
‧
Help
‧
About
‧
Administer
ASIA unversity
>
資訊學院
>
資訊工程學系
>
Browse By Title
Browse By Authors
Browse By Date
Browse By Data Type
Community Detail
Introduction:
因應當前資訊產業發展培養具備前瞻與務實能力之優秀資訊人才為宗旨
Loading...
Collection
其他研究計畫
[
0
/2]
博碩士論文
[
1751
/1813]
專書
[
0
/24]
會議論文
[
302
/1061]
期刊論文
[
1013
/1684]
科技部大專學生研究計畫
[
22
/52]
科技部研究計畫
[
88
/101]
Sub-Community
學習社群
[
5
/26]
Siblings
光電與通訊學系
[
989
/1264]
生物資訊與醫學工程學系
[
1593
/2378]
行動商務與多媒體應用學系
[
1072
/1735]
資訊傳播學系
[
648
/999]
Community Statistics
近3年內發表的文件:143(3.00%)
含全文筆數:3181(66.79%)
文件下載次數統計
下載大於0次:3181(100.00%)
下載大於100次:3013(94.72%)
檔案下載總次數:1301516(8.38%)
最後更新時間: 2024-11-29 08:39
Top Upload
Loading...
Top Download
Loading...
Recent Submissions
教育平臺融入國小二年級數學領域的學習成效-以因材網為例
病人預約門診的候診時間預測分析
基於MQTT 通訊之物聯網微功率插座設計於智慧居家之應用
以資訊分析探討民眾裝設住宅警報器之行為
新冠肺炎疫情衝擊下公共衛生護理人員工作壓力與睡眠品質之研究–以南投縣為...
雲端智慧插座設計電功率控制應用於恆溫烤箱控制
應用機器學習演算法於失智等級之預測
探索基於YOLO的口罩外觀偵測模型在小型資料集下的效能提升表現方法
TDOA在類神經網路與雙曲線之聲源定位比較分析
Multi-Objective Wireless Sensor Net...
Jump to:
[
Chinese Items
] [
0-9
] [
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
]
or enter the first few letters:
Showing items 3276-3300 of 4759. (191 Page(s) Totally)
<<
<
127
128
129
130
131
132
133
134
135
136
>
>>
View [
10
|
25
|
50
] records per page
Date
Title
Authors
2013-11
Towards Secure and Efficient User Authentication Scheme Using Smart Card for Multi-Server Environments
Chen, Te-Yu
;
Chen, Te-Yu
;
C.C.Lee
;
Lee, Cheng-Chi
;
黃明祥
;
Hwang, Min-Shiang
;
Jan, Jinn-Ke
;
Jan, Jinn-Ke
2002-05
Traceability on Low-Computation Partially Blind Signatures for Electronic Cash
黃明祥
;
Hwang, Min-Shiang
;
Cheng-Chi Lee
;
Yan-Chi Lai
2003
Traceability on RSA-based Partially Signature with Low Computation
黃明祥
;
Hwang, Min-Shiang
;
Cheng-Chi Lee
;
Yan-Chi Lai
2003-02
Traceability on Stadler et al.'s Fair Blind Signature Scheme
黃明祥
;
Hwang, Min-Shiang
;
Cheng-Chi Lee
;
Yan-Chi Lai
2006
Tracking System of Customer Service Using RSS Mechanism
Chin-Hsing, Hung
2006-12
Tracking Transient Source Locations Associated with Voltage Sags and Shunt Capacitor Switchings
張文恭
;
G.W.Chang
;
趙汝鵬
;
J.P.Chao
;
陳正一
;
Chen, Cheng-I
2006-12
Tracking Transient Source Locations Associated with Voltage Sags and Shunt Capacitor Switchings
張文恭
;
G.W.Chang
;
趙汝鵬
;
J.P.Chao
;
陳正一
;
Chen, Cheng-I
2000-05
Traffic Control in an ATM Network Using Distributed Key Techniques
黃明祥
;
Hwang, Min-Shiang
2000-05
Traffic Control in an ATM Network Using Distributed Key Techniques
黃明祥
;
Hwang, Min-Shiang
2022-07-01
Transfer Learning-Based Multi-Scale Denoising Convolutional Neural Network for Prostate Cancer Detection
Chu, Kwok Tai
;
Chui, Kwok Tai
;
Bhoosha, Brij
;
Gupta, Brij Bhooshan
;
Chi, Hao Ran
;
Chi, Hao Ran
;
Arya, Varsha
;
Arya, Varsha
;
Alhala, Wadee
;
Alhalabi, Wadee
;
Torre, Miguel
;
Ruiz, Miguel Torres
;
Sh, Chien-Wen
;
Shen, Chien-Wen
2022-03-01
Tree-based Filtering in Pulse-Line Intersection Method Outputs for An Outlier-tolerant Data Processing
Damarj, Cahya
;
Damarjati, Cahya
;
Trin, Karisma
;
Putra, Karisma Trinanda
;
Wijayan, Heri
;
Wijayanto, Heri
;
陳興忠
;
Chen, Hsing-Chung
;
Nu, Toha Ardi
;
Nugraha, Toha Ardi
2015-05
Tree-Structured Vector Quantization with Flexible Multipath Searching Method Based on Side Match Prediction
Liu), Li Liu(Li
;
Wang), An-Hong Wang(An-Hong
;
CHang)*, 張真誠(Chin-Chen
;
Jin), Qiang Jin(Qiang
;
Xia), Bin-Bin Xia(Bin-Bin
2010-01
Trend of e-learning: The service mashup
Yen, Neil Y
;
Shih, Timothy K
;
Jin, Qun
;
Hsu, Hui-Huang
;
Chao, Louis R
2015-03
TRIPLE HELIX THEORY OF MANAGEMENT OF TECHNOLOGY EDUCATION (MOTE): AN
Chen), 陳坤成(James K.C.
;
lee), sl lee(sl
;
Batchuluun(Batchuluun)
;
Sheu), 許健(Gene
2015-05
A Trust-Based Cooperation Authentication Bit-Map Routing Protocol Against Insider Security Threats in Wireless Ad Hoc Networks
陳興忠
;
Chen, Hsing-Chung
2015-05
A Trust-Based Cooperation Authentication Bit-Map Routing Protocol Against Insider Security Threats in Wireless Ad Hoc Networks
Chen, 陳興忠;Hsing-Chung
2013-10
A Trust-Based Cooperation Bit-Map Routing Protocol for Ad Hoc Networks
陳興忠
;
Chen, Hsing-Chung
;
Lin, Jen-Yung
;
Lin, Jen-Yung
2015-05
A trusted user-to-role and role-to-key access control scheme
Chen)*, 陳興忠(Hsing-Chung
2015-05
A trusted user-to-role and role-to-key access control scheme
陳興忠
;
Chen, Hsing-Chung
2015-05
A trusted user-to-role and role-to-key access control scheme
Chen, 陳興忠;Hsing-Chung
2019-06
A Trustworthy Web-based System Platform for Teaching Evaluation and STEM Education
Chia-Chun Wu
;
Cheng-Yin Yang
;
Min-Shiang Hwang
;
Cheng-Yee Lee
2012
Two Three-Party Key Distribution Protocols with Authenticated Time Constraint
Lin, Syuan-Zong
2008-10
A Two-Codebook Combination and Three-Phase Block Matching Based Image Hiding Scheme with High Embedding-Capacity
Hsieh, Y. P.
;
Chang, C. C.
;
Liu, L. J.
2013-12
The two-disjoint-cycle-cover pancyclicity of locally twisted cubes
Kung, Tzu-Liang
;
Chen, Hon-Chan
2013-12
The Two-Disjoint-Path-Coverable Problem of Crossed Cubes
Chen, Hon-Chan
;
Kung, Tzu-Liang
;
Hsu, Li-Yen
Showing items 3276-3300 of 4759. (191 Page(s) Totally)
<<
<
127
128
129
130
131
132
133
134
135
136
>
>>
View [
10
|
25
|
50
] records per page
DSpace Software
Copyright © 2002-2004
MIT
&
Hewlett-Packard
/
Enhanced by
NTU Library IR team
Copyright ©
-
Feedback