English
|
正體中文
|
简体中文
|
Items with full text/Total items : 94286/110023 (86%)
Visitors : 21701842 Online Users : 535
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by
NTU Library IR team.
Scope
All of ASIAIR
資訊學院
資訊工程學系
學習社群
--其他研究計畫
--博碩士論文
--專書
--會議論文
--期刊論文
--科技部大專學生研究計畫
--科技部研究計畫
Tips:
please add "double quotation mark" for query phrases to get precise results
please goto advance search for comprehansive author search
Adv. Search
Home
‧
Login
‧
Upload
‧
Help
‧
About
‧
Administer
ASIA unversity
>
資訊學院
>
資訊工程學系
>
Browse By Title
Browse By Authors
Browse By Date
Browse By Data Type
Community Detail
Introduction:
因應當前資訊產業發展培養具備前瞻與務實能力之優秀資訊人才為宗旨
Loading...
Collection
其他研究計畫
[
0
/2]
博碩士論文
[
1751
/1813]
專書
[
0
/24]
會議論文
[
302
/1061]
期刊論文
[
1013
/1684]
科技部大專學生研究計畫
[
22
/52]
科技部研究計畫
[
88
/101]
Sub-Community
學習社群
[
5
/26]
Siblings
光電與通訊學系
[
989
/1264]
生物資訊與醫學工程學系
[
1593
/2378]
行動商務與多媒體應用學系
[
1072
/1735]
資訊傳播學系
[
648
/999]
Community Statistics
近3年內發表的文件:143(3.00%)
含全文筆數:3181(66.79%)
文件下載次數統計
下載大於0次:3181(100.00%)
下載大於100次:3017(94.84%)
檔案下載總次數:1303731(8.39%)
最後更新時間: 2024-12-01 12:27
Top Upload
Loading...
Top Download
Loading...
Recent Submissions
教育平臺融入國小二年級數學領域的學習成效-以因材網為例
病人預約門診的候診時間預測分析
基於MQTT 通訊之物聯網微功率插座設計於智慧居家之應用
以資訊分析探討民眾裝設住宅警報器之行為
新冠肺炎疫情衝擊下公共衛生護理人員工作壓力與睡眠品質之研究–以南投縣為...
雲端智慧插座設計電功率控制應用於恆溫烤箱控制
應用機器學習演算法於失智等級之預測
探索基於YOLO的口罩外觀偵測模型在小型資料集下的效能提升表現方法
TDOA在類神經網路與雙曲線之聲源定位比較分析
Multi-Objective Wireless Sensor Net...
Jump to:
[
Chinese Items
] [
0-9
] [
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
]
or enter the first few letters:
Showing items 651-700 of 4759. (96 Page(s) Totally)
<<
<
9
10
11
12
13
14
15
16
17
18
>
>>
View [
10
|
25
|
50
] records per page
Date
Title
Authors
2015-04
The Core Pattern Analysis on Chinese Herbal Medicine for Sj?gren's syndrome: A Nationwide Population-Based Study
Chang), Ching-Mao Ch(Ching-Mao
;
Chu), 朱學亭(Hsueh-Ting
;
Wei), Yau-Huei Wei(Yau-Huei
;
Chen), Fang-Pey Che(Fang-Pey
;
Wang), Shengwen Wan(Shengwen
;
Wu), Po-Chang Wu(Po-Chang
;
Yen), Hung-Rong Ye(Hung-Rong
;
Chen), Tzeng-Ji Che(Tzeng-Ji
;
Chang)*, Hen-Hong Cha(Hen-Hong
2015-04
The Core Pattern Analysis on Chinese Herbal Medicine for Sj?gren's syndrome: A Nationwide Population-Based Study
-
2015-04
The Core Pattern Analysis on Chinese Herbal Medicine for Sj?gren's syndrome: A Nationwide Population-Based Study
Ch, Ching-Mao
;
Chang, Ching-Mao
;
朱學亭
;
Chu, Hsueh-Ting
;
Wei, Yau-Huei
;
Wei, Yau-Huei
;
Che, Fang-Pey
;
Chen, Fang-Pey
;
Wan, Shengwen
;
Wang, Shengwen
;
Wu, Po-Chang
;
Wu, Po-Chang
;
Ye, Hung-Rong
;
Yen, Hung-Rong
;
Che, Tzeng-Ji
;
Chen, Tzeng-Ji
;
Cha, Hen-Hong
;
Chang, Hen-Hong
2015-04
The Core Pattern Analysis on Chinese Herbal Medicine for Sj?gren's syndrome: A Nationwide Population-Based Study
Chang, Ching-Mao Ch;Ching-Mao Chang;朱學亭;Hsueh-Ting Chu;Yau-Huei Wei;Yau-Huei Wei;Fang-Pey Che;Fang-Pey Chen;Shengwen Wan;Shengwen Wang;Po-Chang Wu;Po-Chang Wu;Hung-Rong Ye;Hung-Rong Yen;Tzeng-Ji Che;Tzeng-Ji Chen;Hen-Hong Cha;Hen-Hong
2017-04
Correlation of pretreatment 18F-FDG PET tumor textural features with gene expression in pharyngeal cancer and implications for radiotherapy-based treatment outcomes
陳尚文
;
Chen,SW
;
沈偉誌
;
Wei-Chih Shen
;
Lin,YC
;
Chen,R
;
Hsieh,TC
;
Yen,KY
;
Kao,CH
2011
A correlation study between on-line game addiction and parent-child conflict of upper elementary graders in Taichung
Lu, Keh-Ming
2006-07
A Correlation-Based Watermarking System for Proof of Ownership
Jochen, P.
;
Chang, C. C
2008-12
A Countable and Time-Bound Password-Based User Authentication Scheme for the Applications of Electronic Commerce
Chang, C. C.
;
Lin, I. C.
2002-09
Course Authoring and Student Assessment System for Distance Learning
Flora Chia-I Chang
;
Timothy K. Shih
;
Nigel H. Lin
2005-09
Courseware Development Using Influence Diagram Supporting e-Learning Specification
Nigel H. Lin
;
Wen-Chih Chang
;
Timothy K. Shih
;
;
Huan-Chao Keh
2004-06
Courseware Development Using Influence Diagram with SCORM Compatibility
Flora Chia-I Chang
;
Wen-Chih Chang
;
Hsuan-Che Yang
;
Timothy K. Shih
;
Huan-Chao Keh
2012-10
A courseware to script animated pedagogical agents in instructional material for elementary students in English education
洪振偉
;
Hong, Zeng-Wei
2010
Creating the e-Portfolio System with XML Schemas
CHIEN, SHIH-CHAN
2015-12
The Credit Card Visual Authentication Scheme Based on GF(2^8) Field
Wang), Feng Wang(Feng
;
CHang), 張真誠(Chin-Chen
;
Lyu), Wan-Li Lyu(Wan-Li
2000-10
Criteria of Virtual University Operation
Timothy K. Shih
2015-03
A Critique of a Lightweight Identity Authentication Protocol for Vehicular Network
Jia, Xue-Dan
;
Jia, Xue-Dan
;
Chang, Ya-Fen
;
Chang, Ya-Fen
;
張真誠
;
CHang, Chin-Chen
;
Wa, *、Liang-Min
;
Wang, Liang-Min
2015-03
A Critique of a Lightweight Identity Authentication Protocol for Vehicular Network
CHang, Xue-Dan Jia;Xue-Dan Jia;Ya-Fen Chang;Ya-Fen Chang;張真誠;Chin-Chen
2015-03
A Critique of a Lightweight Identity Authentication Protocol for Vehicular Network
Jia), Xue-Dan Jia(Xue-Dan
;
Chang), Ya-Fen Chang(Ya-Fen
;
CHang)*, 張真誠(Chin-Chen
;
Wang), Liang-Min Wa(Liang-Min
2008
A Cross Domain Framework for SCORM Based on Web Service Architecture
Nigel H. Lin
;
Jason C. Hung
;
Hsuan-Pu Chang
;
Timothy K. Shih
2009
A cross-layering IPv6 fast handover scheme for real-time applications in IEEE 802.16e network
Shih, Chen-Hua
;
Chen, Yaw-Chung
Cross-species identification of in silico microsatellite biomarkers for genetic disease
張顥騰(Chang, Hao-Teng)、Lo.Y.-Y.(Lo.Y.-Y.)、Huang, J.-L.(Huang, J.-L.)、Lin, W.-Y.(Lin, W.-Y.)、Pai, T.-W.(Pai, T.-W.)*
2014-06
Cross-species identification of in silico microsatellite biomarkers for genetic disease
張顥騰
;
Chang, Hao-Teng
;
Lo.Y.-Y.
;
Lo.Y.-Y.
;
Huang, J.-L.
;
Huang, J.-L.
;
Lin, W.-Y.
;
Lin, W.-Y.
;
Pai, T.-W.
;
Pai, T.-W.
;
*
2009-09
Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications
Chang, C. C.
;
Lee, C. Y.
;
Lee, W. B
2006-01
Cryptanalysis and Improvement on Batch Verifying Multiple RSA Digital Signatures
黃明祥
;
Hwang, Min-Shiang
2009-12
Cryptanalysis of a Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment
黃明祥
;
Hwang, Min-Shiang
2009-12
Cryptanalysis of a Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment
黃明祥
;
Hwang, Min-Shiang
2004-06
Cryptanalysis of A User Friendly Remote Authentication Scheme with Smart Card
黃明祥
;
Hwang, Min-Shiang
2004-06
Cryptanalysis of A User Friendly Remote Authentication Scheme with Smart Card
黃明祥
;
Hwang, Min-Shiang
2005
Cryptanalysis of an Authenticated Encryption Scheme Using Self-Certified Public Keys
黃明祥
;
Hwang, Min-Shiang
2004-10
Cryptanalysis of an Efficient Secure Group Signature Scheme
黃明祥
;
Hwang, Min-Shiang
2019-03
Cryptanalysis of an ID-based Deniable Threshold Ring Authentication
Tzu-Chun Lin
;
Ting-Yi Yeh
;
Min-Shiang Hwang
2008-11
Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem
Yang, J. H.
;
Chang, C. C
2004-06
Cryptanalysis of Publicly Verifiable Authenticated Encryption
黃明祥
;
Hwang, Min-Shiang
2004-08
Cryptanalysis of Simple Authenticated Key Agreement Protocols
黃明祥
;
Hwang, Min-Shiang
2014-07
Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments
T.H.Feng
;
Feng, Tung-Huang
;
C.H.Ling
;
Ling, Chung-Huei
;
黃明祥
Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments
Ling)、黃明祥, T.H.Feng(Tung-Huang Feng)、C.H.Ling(Chung-Huei
2001-05
Cryptanalysis of The Hwang-Shi Proxy Signature Scheme
黃明祥
;
Hwang, Min-Shiang
2001-05
Cryptanalysis of The Hwang-Shi Proxy Signature Scheme
黃明祥
;
Hwang, Min-Shiang
2005-03
Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach
Chang, C. C.
;
Lin, I. C
2019-01
Cryptanalysis of the Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications
Shu-Fen Chiou
;
Hsien-Tsen Pan
;
Eko Fajar Cahyadi
;
Min-Shiang Hwang
2016-05
Cryptanalysis of Tseng-Wu Group Key Exchange Protocol
Chung-Huei Ling,
;
Shih-Ming Chen
;
黃明祥(Min-Shiang Hwang)*
2016-05
Cryptanalysis of Tseng-Wu Group Key Exchange Protocol
Ling, C. H.
;
Ling, Chung-Huei
;
Chen, S. M.
;
Chen, Shih-Ming
;
黃明祥*
2006-06
A Cryptanalysis on a Generalized Threshold Cryptosystem
Chang, C. C.
;
Wu, W. B.
;
Yeh, J. S
2008-10
A Cryptographic Key Assignment Scheme with Adaptable Time-token Constraint in a Hierarchy , vol.3, no.4, pp. 1–16, October 2008.
陳興忠
;
Chen, Hsing-Chung
2012-01
A Cryptographic Key Generation Scheme Without A Trusted Third Party For Access Control In Multilevel Wireless Sensor Network
黃明祥
;
Hwang, Min-Shiang
2012-01
A Cryptographic Key Generation Scheme Without A Trusted Third Party For Access Control In Multilevel Wireless Sensor Network
黃明祥
;
Hwang, Min-Shiang
2006-10
CTL epitope prediction for cancer/testis (CT) antigens
朱學亭
;
Chu, Hsueh-Ting
2006-10
CTL epitope prediction for cancer/testis (CT) antigens
朱學亭
;
Chu, Hsueh-Ting
;
朱學亭
;
Chu, Hsueh-Ting
2007-12
A Cubic Spline Interpolation Method for Modeling Fluorescent Lamps Dynamic Conductance
張文恭
;
G.W.Chang
;
劉祐任
;
Y.J.Liu
;
陳正一
;
Chen, Cheng-I
2007-12
A Cubic Spline Interpolation Method for Modeling Fluorescent Lamps Dynamic Conductance
張文恭
;
G.W.Chang
;
劉祐任
;
Y.J.Liu
;
陳正一
;
Chen, Cheng-I
Showing items 651-700 of 4759. (96 Page(s) Totally)
<<
<
9
10
11
12
13
14
15
16
17
18
>
>>
View [
10
|
25
|
50
] records per page
DSpace Software
Copyright © 2002-2004
MIT
&
Hewlett-Packard
/
Enhanced by
NTU Library IR team
Copyright ©
-
Feedback