ASIA unversity:
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 94286/110023 (86%)
Visitors : 21692493      Online Users : 860
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Collection

    Other Research Project [0/2]
    Theses & dissertations [1751/1813]
    Books [0/24]
    Proceedings [302/1061]
    Journal Artical [1013/1684]
    Ministry of Science and Technology College Student Research Projects [22/52]
    Ministry of Science and Technology Research Project [88/101]

    Sub-Community

    Reading Club [5/26]

    Community Statistics


    Item counts issued in 3 years:143(3.00%)
    Items With Fulltext:3181(66.79%)

    Download counts of the item
    Download times greater than 0:3181(100.00%)
    Download times greater than 100:3015(94.78%)
    Total Bitstream Download Counts:1302640(8.38%)

    Last Update: 2024-12-01 02:19

    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 51-100 of 4759. (96 Page(s) Totally)
    << < 1 2 3 4 5 6 7 8 9 10 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2017-01 A negotiation-based cooperative RBAC scheme 陳興忠; Hsing-Chung,Chen
    2017-01 A New Lossless Embedding Techniques Based on HDWT 黃明祥; Li C.,Huang; Li-Chin,Huang; T.H.,Feng; Tung-Huang,Feng
    2017-08 A Novel Approach to Extract Significant Patterns of Travel Time Intervals of Vehicles from Freeway Gantry Timestamp Sequences 王經篤; Jing-Doo Wang; 黃銘崇; Ming-Chorng Hwang
    2016-04 A Novel Data-Hiding and Compression Scheme Based on Block Classification of SMVQ indices 張真誠;Chin-Chen, CHang;*;Thai-SonNguy;Thai-SonNguyen;Meng-ChiehLi;Meng-ChiehLin;Chia-ChenLin;Chia-ChenLin;
    2016-04 A Novel Data-Hiding and Compression Scheme Based on Block Classification of SMVQ indices 張真誠; CHang, Chin-Chen; *; Thai-SonNguy; Thai-SonNguyen; Meng-ChiehLi; Meng-ChiehLin; Chia-ChenLin; Chia-ChenLin
    2016-04 A Novel Data-Hiding and Compression Scheme Based on Block Classification of SMVQ indices CHang)*, 張真誠(Chin-Chen; Thai-SonNguy(Thai-SonNguyen); Meng-ChiehLi(Meng-ChiehLin); Chia-ChenLin(Chia-ChenLin)
    2018-07 A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching Wang, Yu-Lun; Wang, Yu-Lun; Shen, Jau-Ji; Shen, Jau-Ji; 黃明祥; Hwang, Min-Shiang; *
    2015-07 A Patient-Driven Mobile Medical Information System Applying to Physician Clinical Care Chen, Ching-Kan Lo;Ching-Kan Lo;Ye-Chi Wu;Ye-Chi Wu;莊政宏;Cheng-Hung Chuang;陳興忠;Hsing-Chung
    2017-06 A Power Frequency Sensing Device Using an Arduino Device and Zero-crossing Algorithm and Its Implementation on Android App 沈慧宇; Hui-Yu Shen; 陳永欽; YEONG-CHIN CHEN; 許釗興; Chao-Hsing Hsu
    2016-01 A Practical Lottery Using Oblivious Transfer CHang;*, Yi-Ning Liu;Yi-Ning Liu;Chi Cheng;Chi Cheng;Tao Jiang;Tao Jiang;張真誠;Chin-Chen
    2016-01 A Practical Lottery Using Oblivious Transfer Liu, Yi-Ning; Liu, Yi-Ning; Cheng, Chi; Cheng, Chi; Jiang, Tao; Jiang, Tao; 張真誠; CHang, Chin-Chen; *
    2016-01 A Practical Lottery Using Oblivious Transfer Liu), Yi-Ning Liu(Yi-Ning; Cheng), Chi Cheng(Chi; Jiang), Tao Jiang(Tao; CHang)*, 張真誠(Chin-Chen
    2017-05 A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms 黃明祥; C. Yi Tsai; Cheng-Yi Tsai; Chi-Yu Liu; S. C. Tsaur; Shyh-Chang Tsaur
    2016-05 A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method Li, Fan; Mao, Qian; 張真誠; CHang, Chin-Chen; *
    2016-05 A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method Li), Fan Li(Fan; Mao), Qian Mao(Qian; CHang)*, 張真誠(Chin-Chen
    2016-01 A Robust and Efficient Dynamic Identity Based Multi-Server Authentication Scheme Using Smart Cards Hsueh;, 張真誠;Chin-Chen CHang;*;Ting-Fang Ch;Ting-Fang Cheng;Wei-Yuan Hsu;Wei-Yuan
    2016-01 A Robust and Efficient Dynamic Identity Based Multi-Server Authentication Scheme Using Smart Cards 張真誠; CHang, Chin-Chen; *; Ch, Ting-Fang; Cheng, Ting-Fang; Hsu, Wei-Yuan; Hsueh, Wei-Yuan
    2016-01 A Robust and Efficient Dynamic Identity Based Multi-Server Authentication Scheme Using Smart Cards CHang)*, 張真誠(Chin-Chen; Cheng), Ting-Fang Ch(Ting-Fang; Hsueh), Wei-Yuan Hsu(Wei-Yuan
    2017-03 A Secure and Efficient One-time Password Authentication Scheme for WSN 黃明祥; C.H.,Ling; Chung-Huei,Ling; C.C.,Lee; Cheng-Chi,Lee; C.C.,Yang; Chou-Chen,Yang
    2018-01 A Secure Color-Code Key Exchange Protocol for Mobile Chat Application 陳興忠; Chen, Hsing-Chung; *; Chang, Hong; Chang, Hong; 龔自良; KUNG, TZU-LIANG; Lin, Ze-Min; Lin, Ze-Min; Yeh, Pei-Chi; Yeh, Pei-Chi; Ruan, Qiu-Hua; Ruan, Qiu-Hua
    2018-03 A Secure Group Signature Scheme", International Journal of Network Security, Vol. 20, No. 2, pp. 201-205, Mar. 2018 Tsa, Cheng-Yi; Tsai, Cheng-Yi; Ho, Pi-Fang; Ho, Pi-Fang; 黃明祥; Hwang, Min-Shiang; *
    2017-03 A Secure Privacy and Authentication Protocol for Passive RFID Tags Wei,Chia-Hui; 黃明祥*; Chin,Y.H.; Chin,Augustin Yeh-Hao
    2017 A Smart Dynamic Resource Allocation Model for Patient-Driven Mobile Medical Information System Using C4.5 Algorithm 羅政勤; Ching-Kan,Lo; 陳興忠; Hsing-Chung,Chen; 李佩淵; Pei-Yuan,Lee; 古鳴洲; Ming-Chou,Ku; Lidia Ogiela; Lidia Ogiela; 莊政宏; Cheng-Hung,Chuang
    2016-03 A Strong RSA-based and Certificateless-based Signature Scheme Chang;, 張真誠;Chin-Chen CHang;*;Chin-Yu Sun;Chin-Yu Sun;Shih-Chang C;Shih-Chang
    2016-03 A Strong RSA-based and Certificateless-based Signature Scheme CHang)*, 張真誠(Chin-Chen; Sun), Chin-Yu Sun(Chin-Yu; Chang), Shih-Chang C(Shih-Chang
    2016-03 A Strong RSA-based and Certificateless-based Signature Scheme 張真誠; CHang, Chin-Chen; *; Sun, Chin-Yu; Sun, Chin-Yu; Shih-Chang, Chang C; Chang, Shih-Chang
    2017-04 A study on an energy consumption model correlated to abnormal behavior by contactless method 蔡志仁; Zhi-Ren Tsai; 張漢威; Han-Wei Zhang; 林進燈; Chin-Teng Lin
    2017-12 A study on the registration strategy for a scant overlap problem with a robot 蔡志仁; Zhi-Ren Tsai
    2018-01 A study on the registration strategy for a scant overlap problem with a robot 蔡志仁; Tsai, Zhi-Ren; *
    2017-07 A study on the robustness and adaptation of unknown nonlinear control system 蔡志仁; Tsai,Zhi-Ren
    2017-10 A study on the robustness of adaptive pattern recognition 蔡志仁; Zhi-Ren Tsai
    2016-09 A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage Liu, Chi-Wei; Liu, Chi-Wei; Hsien, Wei-Fu; Hsien, Wei-Fu; Yang, C. C.; Yang, Chou-Chen; 黃明祥*
    2016-11 A Survey of Data Distortion Watermarking Relational Databases", International Journal of Network Security, Vol. 18, No. 6, pp. 1022-1033, 2016 Xie, Ming-Ru; Xie, Ming-Ru; Wu, Chia-Chun; Wu, Chia-Chun; Shen, Jau-Ji; Shen, Jau-Ji; 黃明祥*
    2016-01 A Survey of Public Auditing for Secure Data Storage in Cloud Computing Hsien), Wei-Fu Hsien(Wei-Fu; Yang), Chou-Chen Ya(Chou-Chen; 黃明祥*
    2016-01 A Survey of Public Auditing for Secure Data Storage in Cloud Computing Hsien, Wei-Fu; Hsien, Wei-Fu; Ya, Chou-Chen; Yang, Chou-Chen; 黃明祥*
    2016-01 A Survey of Public Auditing for Secure Data Storage in Cloud Computing Yang;黃明祥*, Wei-Fu Hsien;Wei-Fu Hsien;Chou-Chen Ya;Chou-Chen
    2016-07 A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing Liu, Chi-Wei; Liu, Chi-Wei; Hsien, Wei-Fu; Hsien, Wei-Fu; Yang, C. C.; Yang, Chou-Chen; 黃明祥*
    2018-01 A Survey of Reversible Data Hiding for VQ-Compressed Images", International Journal of Network Security, Vol. 20, No. 1, pp. 1-8, Jan. 2018 Wang, Yu-Lun; Wang, Yu-Lun; Shen, Jau-Ji; Shen, Jau-Ji; 黃明祥; Hwang, Min-Shiang; *
    2012-08 Ability of Density Feature in Low-Dose Computed Tomography for Evaluating Screened Lung Tumor 沈偉誌; Shen, Wei-Chih
    2011 Abnormality Detection in Video Surveillance Using Trajectory and Frame Features Tzu-Chin Chang
    2009-10 Abnormality Detection in Video Surveillance Using Trajectory and Frame Features 黃惠藩; Ng, Hui-Fuang; 陳瑞奇; Chen, Jui-Chi
    2009-10 Abnormality Detection in Video Surveillance Using Trajectory and Frame Features 黃惠藩; Ng, Hui-Fuang; 陳瑞奇; Chen, Jui-Chi
    2001 Accelerating Fractal Compression with a Real-time Decoder H. T. Chu; C. C. Chen
    2006-03 An Access Control System with Time-constraint Using Support Vector Machines Chang, C. C.; Lin, I. C.; Liao, C. T
    2015 Accessing medical image file with co-allocation HDFS in cloud Leu, Chao-Tung Ya;Chao-Tung Yang;時文中;Wen-Chung Shih;Lung-Teng Ch;Lung-Teng Chen;Cheng-Ta Kuo;Cheng-Ta Kuo;Fuu-Cheng Ji;Fuu-Cheng Jiang;Fang-Yie Leu;Fang-Yie
    2015 Accessing medical image file with co-allocation HDFS in cloud Yang), Chao-Tung Ya(Chao-Tung; Shih), 時文中(Wen-Chung; Chen), Lung-Teng Ch(Lung-Teng; Kuo), Cheng-Ta Kuo(Cheng-Ta; Jiang), Fuu-Cheng Ji(Fuu-Cheng; Leu), Fang-Yie Leu(Fang-Yie
    2006 The Accidental Detection System of Intelligent Clinical Ward by Non-contact Sensing Technologies jang wei cheng
    2013-10 The Accuracy Enhancement of GPS Track in Google Map Lin, Jen-Yung; Lin, Jen-Yung; Yang, Bo-Kai; Yang, Bo-Kai; Do, Tuan Anh; Do, Tuan Anh; 陳興忠; Chen, Hsing-Chung
    2013-02 Accurate equivalent circuit model of deep trench capacitor by numerical simulation and analytical calculation Fathna, Ashif; Fathna, Ashif; kumar, Vikash; kumar, Vikash; 楊紹明; Yang, Shao-Ming; 許健; Sheu, Gene
    Accurate equivalent circuit model of deep trench capacitor by numerical simulation and analytical calculation Fathna, Ashif; Fathna, Ashif; kumar, Vikash; kumar, Vikash; 楊紹明; Yang, Shao-Ming; 許健; Sheu, Gene

    Showing items 51-100 of 4759. (96 Page(s) Totally)
    << < 1 2 3 4 5 6 7 8 9 10 > >>
    View [10|25|50] records per page

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback