English
|
正體中文
|
简体中文
|
Items with full text/Total items : 94286/110023 (86%)
Visitors : 21701814 Online Users : 533
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by
NTU Library IR team.
Scope
All of ASIAIR
資訊學院
資訊工程學系
學習社群
--其他研究計畫
--博碩士論文
--專書
--會議論文
--期刊論文
--科技部大專學生研究計畫
--科技部研究計畫
Tips:
please add "double quotation mark" for query phrases to get precise results
please goto advance search for comprehansive author search
Adv. Search
Home
‧
Login
‧
Upload
‧
Help
‧
About
‧
Administer
ASIA unversity
>
資訊學院
>
資訊工程學系
>
Browse By Title
Browse By Authors
Browse By Date
Browse By Data Type
Community Detail
Introduction:
因應當前資訊產業發展培養具備前瞻與務實能力之優秀資訊人才為宗旨
Loading...
Collection
其他研究計畫
[
0
/2]
博碩士論文
[
1751
/1813]
專書
[
0
/24]
會議論文
[
302
/1061]
期刊論文
[
1013
/1684]
科技部大專學生研究計畫
[
22
/52]
科技部研究計畫
[
88
/101]
Sub-Community
學習社群
[
5
/26]
Siblings
光電與通訊學系
[
989
/1264]
生物資訊與醫學工程學系
[
1593
/2378]
行動商務與多媒體應用學系
[
1072
/1735]
資訊傳播學系
[
648
/999]
Community Statistics
近3年內發表的文件:143(3.00%)
含全文筆數:3181(66.79%)
文件下載次數統計
下載大於0次:3181(100.00%)
下載大於100次:3017(94.84%)
檔案下載總次數:1303731(8.39%)
最後更新時間: 2024-12-01 12:27
Top Upload
Loading...
Top Download
Loading...
Recent Submissions
教育平臺融入國小二年級數學領域的學習成效-以因材網為例
病人預約門診的候診時間預測分析
基於MQTT 通訊之物聯網微功率插座設計於智慧居家之應用
以資訊分析探討民眾裝設住宅警報器之行為
新冠肺炎疫情衝擊下公共衛生護理人員工作壓力與睡眠品質之研究–以南投縣為...
雲端智慧插座設計電功率控制應用於恆溫烤箱控制
應用機器學習演算法於失智等級之預測
探索基於YOLO的口罩外觀偵測模型在小型資料集下的效能提升表現方法
TDOA在類神經網路與雙曲線之聲源定位比較分析
Multi-Objective Wireless Sensor Net...
Jump to:
[
Chinese Items
] [
0-9
] [
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
]
or enter the first few letters:
Showing items 1351-1400 of 4759. (96 Page(s) Totally)
<<
<
23
24
25
26
27
28
29
30
31
32
>
>>
View [
10
|
25
|
50
] records per page
Date
Title
Authors
2015-07
A Generalization of Fully Exploiting Modification Directions Data Hiding Scheme
Kuo), Wen-Chung Ku(Wen-Chung
;
Kao), Ming-Chih Ka(Ming-Chih
;
CHang)*, 張真誠(Chin-Chen
2003
Generalization of Proxy Signature Based on Discrete Logarithms
黃明祥
;
Hwang, Min-Shiang
2004-03
Generalization of Proxy Signature Based on Elliptic Curves
黃明祥
;
Hwang, Min-Shiang
2011-03
Generalization of Proxy Signature Based on Factorization
黃明祥
;
Hwang, Min-Shiang
2009-04
Generalized Aryabhata Remainder Theorem
Chang, C. C.
;
Yeh, J. S.
;
Yang, J. H.
2011-06
A Generalized Associated Temporal and Spatial Role-Based Access Control Model for Wireless Heterogeneous Networks
陳興忠
;
Chen, Hsing-Chung
2011-06
A Generalized Associated Temporal and Spatial Role-Based Access Control Model for Wireless Heterogeneous Networks
陳興忠
;
Chen, Hsing-Chung
;
陳興忠
;
Chen, Hsing-Chung
2008-07
Generalized Running Coding for Efficient Data Hiding
Chang, C. C.
;
Zhang, X.
;
Wang, S
2010-08
A Generalized Temporal and Spatial Role-Based Access Control Model
陳興忠
;
Chen, Hsing-Chung
2022-02-01
Generating Multi-Issued Session Key by Using Semi Quantum Key Distribution with Time-Constraint
陳興忠
;
Chen, Hsing-Chung
;
DAMARJ, CAHYA
;
DAMARJATI, CAHYA
;
PRASETYO, EKO
;
PRASETYO, EKO
;
CH, CHAO-LUNG
;
CHOU_, CHAO-LUNG
;
龔自良
;
KUNG, TZU-LIANG
;
WE, CHIEN-ERH
;
WENG, CHIEN-ERH
2005-06
A Genetic-Based Adaptive Threshold Selection Method for Dynamic Path Tree Structured Vector Quantization
Yu, Y. H.
;
Chang, C. C.
;
Hu, Y. C
Genotyping of human neutrophil antigens (HNA) from whole genome sequencing data
朱學亭
;
Chu, Hsueh-Ting
;
林翰
;
Lin, Han
;
曹純惠
;
Theresa, T.H.Tsao
;
張春梵
;
Chang, Chun-Fan
;
William, W.L
;
William, W.L.Hsiao
;
葉慈容
;
Yeh, Tze-Jung
;
張清貿
;
Chang, Ching-Mao
;
劉燕雯
;
Liu, Yen-Wenn
;
王澤毅
;
Wang, Tse-Yi
;
楊克鈞
;
Yang, Ko-Chun
;
陳祟瑞
;
Chen, Tsung-Jui
;
陳仁治
;
Chen, Jen-Chih
;
陳光琦
;
Chen, Kuang-Chi
;
高成炎
;
Kao, Cheng-Yan
2005
GMPLS路徑保護機制之研究
耿履夷
2008
Google及Yahoo搜尋引擎排序對B2B網站流量影響之比較分析研究
李慧倫
2005
GPS 衛星定位的市場需求應用之研究
林欣薇
GrabCut-Based Abandoned Object Detection
Chih-Yang Lin
;
Chia-Hung Yeh
1996-11
A Graph-Theoretical Metric for Object-Oriented Software Complexity
Chi-Ming Chung
;
Timothy K. Shih
;
Dragon Y. Shyy
;
Chun-Cha Wang
2015
Grey Relational Analysis on Obtain the Technician Certificate and Employment - An Example for Students in Special Class of Vocational High School in Nantou City
Chuang, Yao-Yu
2008
Grey Relational Analysis on the teachers satisfaction toward school administrative operation of elementary school
Liao,Chun-Pao
2015-03
Group Authentication and Group Key Distribution for Ad Hoc Networks
Wang), Feng Wang(Feng
;
CHang)*, 張真誠(Chin-Chen
;
Chou), Yeh-Chieh Ch(Yeh-Chieh
2015-01
A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management
Liu, Yanjun
;
Liu, Yanjun
;
張真誠
;
CHang, Chin-Chen
;
*、Shih-Chang, C
;
Chang, Shih-Chang
2015-01
A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management
;
CHang, 張真誠 Chin-Chen
2015-01
A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management
CHang, Yanjun Liu;Yanjun Liu;張真誠;Chin-Chen
2015-01
A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management
Liu), Yanjun Liu(Yanjun
;
CHang)*, 張真誠(Chin-Chen
;
Chang), Shih-Chang C(Shih-Chang
2014-11
Group Rekeying in Wireless Sensor Networks: A Survey
Li, Wei Teng
;
Li, Wei Teng
;
林宗輝
;
黃明祥
Group Rekeying in Wireless Sensor Networks: A Survey
Li, Wei Teng
;
Li, Wei Teng
;
林宗輝
;
黃明祥
2015-09
A Grouped-scalable Secret Image Sharing Scheme
Liu), Wenjie Liu(Wenjie
;
Wang), Anhong Wang(Anhong
;
CHang)*, 張真誠(Chin-Chen
;
Li), Zhihong Li(Zhihong
;
Liu), Li Liu(Li
2013-01
Guessing Attacks on Strong-Password Authentication Protocol
Le, Cheng-Chi
;
Lee, Cheng-Chi
;
Li, Chia-Hsin
;
Liu, Chia-Hsin
;
黃明祥
;
Hwang, Min-Shiang
2004-02
Guessing by neighbors: an efficient reconstruction method for transmitting image progressively
Chin-Chen Chang
;
Timothy K. Shih
;
Iuon-Chang Lin
2010-08
Guest Editorial for Special Issue: Special Issue on Recent Advances in Networked Computing
陳興忠
;
Chen, Hsing-Chung
2011-10
H-inf neural-network-based discrete-time fuzzy control of continuous-time nonlinear systems with dither
蔡志仁
;
Tsai, Zhi-Ren
2015-01
An H.264/AVC HDTV Watermarking Algorithm Robust to Camcorder Recording
Li, Li
;
Li, Li
;
Dong, Zihui
;
Dong, Zihui
;
Lu, Jianfeng
;
Lu, Jianfeng
;
Dai, Junping
;
Dai, Junping
;
Huang, Qianru
;
Huang, Qianru
;
張真誠
;
CHang, Chin-Chen
;
Wu, *、Ting
;
Wu, Ting
2015-01
An H.264/AVC HDTV Watermarking Algorithm Robust to Camcorder Recording
;
CHang, 張真誠 Chin-Chen
2015-01
An H.264/AVC HDTV Watermarking Algorithm Robust to Camcorder Recording
CHang, Li Li;Li Li;Zihui Dong;Zihui Dong;Jianfeng Lu;Jianfeng Lu;Junping Dai;Junping Dai;Qianru Huang;Qianru Huang;張真誠;Chin-Chen
2015-01
An H.264/AVC HDTV Watermarking Algorithm Robust to Camcorder Recording
Li), Li Li(Li
;
Dong), Zihui Dong(Zihui
;
Lu), Jianfeng Lu(Jianfeng
;
Dai), Junping Dai(Junping
;
Huang), Qianru Huang(Qianru
;
CHang)*, 張真誠(Chin-Chen
;
Wu), Ting Wu(Ting
2006
Hafnium Silicate Nanocrystal Memory Using Sol-Gel Spin Coating Method
遊信強
;
You, Hsin-Chiang
2005-07
The Hard SCORM LMS: Reading SCORM Courseware on Hardcopy Textbooks
Timothy K. Shih
;
Nigel H. Lin
;
Wen-Chih Chang
;
Te-Hua Wang
;
Hsiau Wen Lin
;
Hsuan-Pu Chang
;
Kuan-Hao Huang
;
Yun-Long Sie
;
Mon-Ting Tzou
;
Jin-Tan Yang
2007
Harmonics and Interharmonics Theory
G. W. Chang
;
C. I Chen
;
Y. J. Liu
2008
he Query of Bioinformatics Literatures By Document Similarity
Kuan-Yen Tseng
2006-09
HerbBlast: A program for similarity and ontology analysis of Chinese herbal medicine
朱學亭
;
Chu, Hsueh-Ting
2006-09
HerbBlast: A program for similarity and ontology analysis of Chinese herbal medicine
朱學亭
;
Chu, Hsueh-Ting
;
朱學亭
;
Chu, Hsueh-Ting
2006-12
A Heuristic Method for Extracting Enhanced Watermarks from Digital Images
Chang, C. C.
;
Chou, Y. C.
;
Shen, J. J.
2006-03
Hiding a Halftone Secret Image in Two Camouflaged Halftone Images
Chang, C. C.
;
Chan, C. S.
;
Tai, W. L.
2005-12
Hiding a Secret Color Image in Two Color Images
Chang, C. C.
;
Tai, W. L.
;
Lin, C. C.
2003
Hiding Authenticable General Digital Information behind Binary Images with Reduced Distortion
Chih-Hsuan Tzeng
;
Wen-Hsiang Tsai
2009-02
Hiding Data in Color Palette Images with Hybrid Strategies
Chang, C. C.
;
Lin, C. C.
;
Chen, Y. H.
2005-09
Hiding Data in Halftone Images
Tseng, H. W.
;
Chang, C. C
2006
Hiding Data in VQ-compressed Images Using Dissimilar Pairs
林智揚
;
Lin, Chih-Yang
2008-08
Hiding Data in VQ-compressed Images Using Pairwise Nearest Codewords based on Minimum Spanning Tree
Lee, C. F.
;
Chang, C. C.
;
Wang, K. H.
2008-12
Hiding Information Employing Reduplicating Embedding
Lee, C. F.
;
Chuang, L. Y.
;
Chang, C. C
Showing items 1351-1400 of 4759. (96 Page(s) Totally)
<<
<
23
24
25
26
27
28
29
30
31
32
>
>>
View [
10
|
25
|
50
] records per page
DSpace Software
Copyright © 2002-2004
MIT
&
Hewlett-Packard
/
Enhanced by
NTU Library IR team
Copyright ©
-
Feedback