English  |  正體中文  |  简体中文  |  Items with full text/Total items : 94286/110023 (86%)
Visitors : 21701814      Online Users : 533
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Collection

    其他研究計畫 [0/2]
    博碩士論文 [1751/1813]
    專書 [0/24]
    會議論文 [302/1061]
    期刊論文 [1013/1684]
    科技部大專學生研究計畫 [22/52]
    科技部研究計畫 [88/101]

    Sub-Community

    學習社群 [5/26]

    Siblings


    光電與通訊學系 [989/1264]
    生物資訊與醫學工程學系 [1593/2378]
    行動商務與多媒體應用學系 [1072/1735]
    資訊傳播學系 [648/999]

    Community Statistics


    近3年內發表的文件:143(3.00%)
    含全文筆數:3181(66.79%)

    文件下載次數統計
    下載大於0次:3181(100.00%)
    下載大於100次:3017(94.84%)
    檔案下載總次數:1303731(8.39%)

    最後更新時間: 2024-12-01 12:27

    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 1351-1400 of 4759. (96 Page(s) Totally)
    << < 23 24 25 26 27 28 29 30 31 32 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2015-07 A Generalization of Fully Exploiting Modification Directions Data Hiding Scheme Kuo), Wen-Chung Ku(Wen-Chung; Kao), Ming-Chih Ka(Ming-Chih; CHang)*, 張真誠(Chin-Chen
    2003 Generalization of Proxy Signature Based on Discrete Logarithms 黃明祥; Hwang, Min-Shiang
    2004-03 Generalization of Proxy Signature Based on Elliptic Curves 黃明祥; Hwang, Min-Shiang
    2011-03 Generalization of Proxy Signature Based on Factorization 黃明祥; Hwang, Min-Shiang
    2009-04 Generalized Aryabhata Remainder Theorem Chang, C. C.; Yeh, J. S.; Yang, J. H.
    2011-06 A Generalized Associated Temporal and Spatial Role-Based Access Control Model for Wireless Heterogeneous Networks 陳興忠; Chen, Hsing-Chung
    2011-06 A Generalized Associated Temporal and Spatial Role-Based Access Control Model for Wireless Heterogeneous Networks 陳興忠; Chen, Hsing-Chung; 陳興忠; Chen, Hsing-Chung
    2008-07 Generalized Running Coding for Efficient Data Hiding Chang, C. C.; Zhang, X.; Wang, S
    2010-08 A Generalized Temporal and Spatial Role-Based Access Control Model 陳興忠; Chen, Hsing-Chung
    2022-02-01 Generating Multi-Issued Session Key by Using Semi Quantum Key Distribution with Time-Constraint 陳興忠; Chen, Hsing-Chung; DAMARJ, CAHYA; DAMARJATI, CAHYA; PRASETYO, EKO; PRASETYO, EKO; CH, CHAO-LUNG; CHOU_, CHAO-LUNG; 龔自良; KUNG, TZU-LIANG; WE, CHIEN-ERH; WENG, CHIEN-ERH
    2005-06 A Genetic-Based Adaptive Threshold Selection Method for Dynamic Path Tree Structured Vector Quantization Yu, Y. H.; Chang, C. C.; Hu, Y. C
    Genotyping of human neutrophil antigens (HNA) from whole genome sequencing data 朱學亭; Chu, Hsueh-Ting; 林翰; Lin, Han; 曹純惠; Theresa, T.H.Tsao; 張春梵; Chang, Chun-Fan; William, W.L; William, W.L.Hsiao; 葉慈容; Yeh, Tze-Jung; 張清貿; Chang, Ching-Mao; 劉燕雯; Liu, Yen-Wenn; 王澤毅; Wang, Tse-Yi; 楊克鈞; Yang, Ko-Chun; 陳祟瑞; Chen, Tsung-Jui; 陳仁治; Chen, Jen-Chih; 陳光琦; Chen, Kuang-Chi; 高成炎; Kao, Cheng-Yan
    2005 GMPLS路徑保護機制之研究 耿履夷
    2008 Google及Yahoo搜尋引擎排序對B2B網站流量影響之比較分析研究 李慧倫
    2005 GPS 衛星定位的市場需求應用之研究 林欣薇
    GrabCut-Based Abandoned Object Detection Chih-Yang Lin; Chia-Hung Yeh
    1996-11 A Graph-Theoretical Metric for Object-Oriented Software Complexity Chi-Ming Chung; Timothy K. Shih; Dragon Y. Shyy; Chun-Cha Wang
    2015 Grey Relational Analysis on Obtain the Technician Certificate and Employment - An Example for Students in Special Class of Vocational High School in Nantou City Chuang, Yao-Yu
    2008 Grey Relational Analysis on the teachers satisfaction toward school administrative operation of elementary school Liao,Chun-Pao
    2015-03 Group Authentication and Group Key Distribution for Ad Hoc Networks Wang), Feng Wang(Feng; CHang)*, 張真誠(Chin-Chen; Chou), Yeh-Chieh Ch(Yeh-Chieh
    2015-01 A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management Liu, Yanjun; Liu, Yanjun; 張真誠; CHang, Chin-Chen; *、Shih-Chang, C; Chang, Shih-Chang
    2015-01 A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management ; CHang, 張真誠 Chin-Chen
    2015-01 A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management CHang, Yanjun Liu;Yanjun Liu;張真誠;Chin-Chen
    2015-01 A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management Liu), Yanjun Liu(Yanjun; CHang)*, 張真誠(Chin-Chen; Chang), Shih-Chang C(Shih-Chang
    2014-11 Group Rekeying in Wireless Sensor Networks: A Survey Li, Wei Teng; Li, Wei Teng; 林宗輝; 黃明祥
    Group Rekeying in Wireless Sensor Networks: A Survey Li, Wei Teng; Li, Wei Teng; 林宗輝; 黃明祥
    2015-09 A Grouped-scalable Secret Image Sharing Scheme Liu), Wenjie Liu(Wenjie; Wang), Anhong Wang(Anhong; CHang)*, 張真誠(Chin-Chen; Li), Zhihong Li(Zhihong; Liu), Li Liu(Li
    2013-01 Guessing Attacks on Strong-Password Authentication Protocol Le, Cheng-Chi; Lee, Cheng-Chi; Li, Chia-Hsin; Liu, Chia-Hsin; 黃明祥; Hwang, Min-Shiang
    2004-02 Guessing by neighbors: an efficient reconstruction method for transmitting image progressively Chin-Chen Chang; Timothy K. Shih; Iuon-Chang Lin
    2010-08 Guest Editorial for Special Issue: Special Issue on Recent Advances in Networked Computing 陳興忠; Chen, Hsing-Chung
    2011-10 H-inf neural-network-based discrete-time fuzzy control of continuous-time nonlinear systems with dither 蔡志仁; Tsai, Zhi-Ren
    2015-01 An H.264/AVC HDTV Watermarking Algorithm Robust to Camcorder Recording Li, Li; Li, Li; Dong, Zihui; Dong, Zihui; Lu, Jianfeng; Lu, Jianfeng; Dai, Junping; Dai, Junping; Huang, Qianru; Huang, Qianru; 張真誠; CHang, Chin-Chen; Wu, *、Ting; Wu, Ting
    2015-01 An H.264/AVC HDTV Watermarking Algorithm Robust to Camcorder Recording ; CHang, 張真誠 Chin-Chen
    2015-01 An H.264/AVC HDTV Watermarking Algorithm Robust to Camcorder Recording CHang, Li Li;Li Li;Zihui Dong;Zihui Dong;Jianfeng Lu;Jianfeng Lu;Junping Dai;Junping Dai;Qianru Huang;Qianru Huang;張真誠;Chin-Chen
    2015-01 An H.264/AVC HDTV Watermarking Algorithm Robust to Camcorder Recording Li), Li Li(Li; Dong), Zihui Dong(Zihui; Lu), Jianfeng Lu(Jianfeng; Dai), Junping Dai(Junping; Huang), Qianru Huang(Qianru; CHang)*, 張真誠(Chin-Chen; Wu), Ting Wu(Ting
    2006 Hafnium Silicate Nanocrystal Memory Using Sol-Gel Spin Coating Method 遊信強; You, Hsin-Chiang
    2005-07 The Hard SCORM LMS: Reading SCORM Courseware on Hardcopy Textbooks Timothy K. Shih; Nigel H. Lin; Wen-Chih Chang; Te-Hua Wang; Hsiau Wen Lin; Hsuan-Pu Chang; Kuan-Hao Huang; Yun-Long Sie; Mon-Ting Tzou; Jin-Tan Yang
    2007 Harmonics and Interharmonics Theory G. W. Chang; C. I Chen; Y. J. Liu
    2008 he Query of Bioinformatics Literatures By Document Similarity Kuan-Yen Tseng
    2006-09 HerbBlast: A program for similarity and ontology analysis of Chinese herbal medicine 朱學亭; Chu, Hsueh-Ting
    2006-09 HerbBlast: A program for similarity and ontology analysis of Chinese herbal medicine 朱學亭; Chu, Hsueh-Ting; 朱學亭; Chu, Hsueh-Ting
    2006-12 A Heuristic Method for Extracting Enhanced Watermarks from Digital Images Chang, C. C.; Chou, Y. C.; Shen, J. J.
    2006-03 Hiding a Halftone Secret Image in Two Camouflaged Halftone Images Chang, C. C.; Chan, C. S.; Tai, W. L.
    2005-12 Hiding a Secret Color Image in Two Color Images Chang, C. C.; Tai, W. L.; Lin, C. C.
    2003 Hiding Authenticable General Digital Information behind Binary Images with Reduced Distortion Chih-Hsuan Tzeng; Wen-Hsiang Tsai
    2009-02 Hiding Data in Color Palette Images with Hybrid Strategies Chang, C. C.; Lin, C. C.; Chen, Y. H.
    2005-09 Hiding Data in Halftone Images Tseng, H. W.; Chang, C. C
    2006 Hiding Data in VQ-compressed Images Using Dissimilar Pairs 林智揚; Lin, Chih-Yang
    2008-08 Hiding Data in VQ-compressed Images Using Pairwise Nearest Codewords based on Minimum Spanning Tree Lee, C. F.; Chang, C. C.; Wang, K. H.
    2008-12 Hiding Information Employing Reduplicating Embedding Lee, C. F.; Chuang, L. Y.; Chang, C. C

    Showing items 1351-1400 of 4759. (96 Page(s) Totally)
    << < 23 24 25 26 27 28 29 30 31 32 > >>
    View [10|25|50] records per page

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback