ASIA unversity:
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 94286/110023 (86%)
Visitors : 21660753      Online Users : 477
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Collection

    Other Research Project [0/2]
    Theses & dissertations [1751/1813]
    Books [0/24]
    Proceedings [302/1061]
    Journal Artical [1013/1684]
    Ministry of Science and Technology College Student Research Projects [22/52]
    Ministry of Science and Technology Research Project [88/101]

    Sub-Community

    Reading Club [5/26]

    Community Statistics


    Item counts issued in 3 years:143(3.00%)
    Items With Fulltext:3181(66.79%)

    Download counts of the item
    Download times greater than 0:3181(100.00%)
    Download times greater than 100:3011(94.66%)
    Total Bitstream Download Counts:1299445(8.36%)

    Last Update: 2024-11-28 14:43

    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 2751-2775 of 4759. (191 Page(s) Totally)
    << < 106 107 108 109 110 111 112 113 114 115 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2008-02 Robust t-out-of-n Proxy Signature Based on RSA Cryptosystems Chang, Y. F.; Chang, C. C.
    2008 A robust technique for character string extraction from complex document images Chen, Yen-Lin
    2008-06 A Robust-FragileWatermarking Scheme for Image Authentication 黃明祥; Hwang, Min-Shiang
    2008-06 A Robust-FragileWatermarking Scheme for Image Authentication 黃明祥; Hwang, Min-Shiang
    2016-02 Robustness and Reliability Evaluations of Image Annotation Tsai;*, 林維昭;Wei-Chao Lin;Shih-Wen Ke;Shih-Wen Ke;Chih-Fong Ts;Chih-Fong
    2016-02 Robustness and Reliability Evaluations of Image Annotation 林維昭; Lin, Wei-Chao; Ke, Shih-Wen; Ke, Shih-Wen; Ts, Chih-Fong; Tsai, Chih-Fong; *
    2016-02 Robustness and Reliability Evaluations of Image Annotation Lin), 林維昭(Wei-Chao; Ke), Shih-Wen Ke(Shih-Wen; Tsai)*, Chih-Fong Ts(Chih-Fong
    2008-02 Robustness design of fuzzy control for nonlinear multiple time-delay large-scale systems via neural-network-based approach 蕭鳳翔; Hsiao, Feng-Hsiag; Xu, Sheng-Dong; Lin, Chia-Yen; 蔡志仁; Tsai, Zhi-Ren
    2018-10 Robustness in adaptive pattern recognition 蔡志仁; Tsai, Zhi-Ren
    2007-11 Role-based Proactive Scheme in an Access Control Hierarchy 陳興忠; Chen, Hsing-Chung
    2014-07 A Role-based RSA Key Management Approach in a Hierarchy Scheme 陳興忠; Chen, Hsing-Chung; Christ, * Anita; Christiana, Anita
    A Role-based RSA Key Management Approach in a Hierarchy Scheme
    2011-06 A Role-Oriented Routing Algorithm Applied for Wireless Heterogeneous Networks 陳興忠; Chen, Hsing-Chung
    2011-06 A Role-Oriented Routing Algorithm Applied for Wireless Heterogeneous Networks 陳興忠; Chen, Hsing-Chung; 陳興忠; Chen, Hsing-Chung; 陳興忠; Chen, Hsing-Chung
    2013-06 Ron Improvement with Duplex Conduction Channel Manjunatha; Manjunatha; Vasanth; Vasanth; kumar, anil; kumar, anil; Kumar, Jaipal; Kumar, Jaipal; 楊紹明; Yang, Shao-Ming; 許健; Sheu, Gene; 陳柏安; P.A.Chen
    Ron Improvement with Duplex Conduction Channel Manjunatha; Manjunatha; Vasanth; Vasanth; kumar, anil; kumar, anil; Kumar, Jaipal; Kumar, Jaipal; 楊紹明; Yang, Shao-Ming; 許健; Sheu, Gene; 陳柏安; P.A.Chen
    2014-05 A Rotation Session Key-Based Transposition Cryptosystem Scheme Applied to Mobile Text Chatting 陳興忠; Chen, Hsing-Chung; Liezel,Alpha; Alpha Liezel, V.Epa
    A Rotation Session Key-Based Transposition Cryptosystem Scheme Applied to Mobile Text Chatting
    2011-07 A Routing Algorithm Based on Event-Oriented Applications for Digital Home Wireless Heterogeneous Networks 陳興忠; Chen, Hsing-Chung; Chi-Tung Chen; Sheg-Hao Fang; Jai-Zong Sun; Kanoksak Wattanachote
    2004 Routing Security for Mobile Wireless Ad Hoc Networks Lin Yi-Ping
    2012 RSA Time-Lock Puzzle Authenticated E-voting System Deviani, Rini
    2007-01 An RSA-based (t, n) Threshold Proxy Signature Scheme with Freewill Identities Chang, Y. F.; Chang, C. C.
    2012 RST-Resistant Reversible Data Hiding for 3D Models Cheng, Chin-Wei
    2011 Rubust Background Modeling Based on Multiscale Color Description 林智揚; Lin, Chih-Yang
    2016-01 SAFQuery: A Simple and Flexible Advanced Web Search Interface Tsai;*, 林維昭;Wei-Chao Lin;Shih-Wen Ke;Shih-Wen Ke;Chih-Fong Ts;Chih-Fong

    Showing items 2751-2775 of 4759. (191 Page(s) Totally)
    << < 106 107 108 109 110 111 112 113 114 115 > >>
    View [10|25|50] records per page

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback