ASIA unversity:
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 94286/110023 (86%)
Visitors : 21706000      Online Users : 386
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Collection

    Other Research Project [0/2]
    Theses & dissertations [1751/1813]
    Books [0/24]
    Proceedings [302/1061]
    Journal Artical [1013/1684]
    Ministry of Science and Technology College Student Research Projects [22/52]
    Ministry of Science and Technology Research Project [88/101]

    Sub-Community

    Reading Club [5/26]

    Community Statistics


    Item counts issued in 3 years:143(3.00%)
    Items With Fulltext:3181(66.79%)

    Download counts of the item
    Download times greater than 0:3181(100.00%)
    Download times greater than 100:3017(94.84%)
    Total Bitstream Download Counts:1304306(8.40%)

    Last Update: 2024-12-01 14:31

    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 3226-3250 of 4759. (191 Page(s) Totally)
    << < 125 126 127 128 129 130 131 132 133 134 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2010 Text Trend Analysis via Significant Term A Based on Indonesia News Arie Budiansyah
    2010-08 Text Trend Analysis via Significant Term History - A study based on Indonesia News Budiansyah, Arie
    2007-09 TFRP: An Efficient Microaggregation Algorithm for Statistical Disclosure Control Chang, C. C.; Li, Y. C.; Huang, W. H.
    2017-11 The Capacity Analysis in the Secure Cooperative Communication System 黃明祥; J. S. Chen; Jong-Shin Chen; C. Y. Yang; Cheng-Ying Yang
    2016-01 The Moderately Hard DoS-resistant Authentication Protocol on Client Puzzles Ou;, 黃明祥*;S. K. Chong;Song-Kong Chong;Hsia-Hung Ou;Hsia-Hung
    2010 The Theorems and Applications of Combining the Multiple Classification Systems Based on Choquet Integral with Respect to L-Measure Lin Wen-Chih
    2016 Thermostatic Monitoring System of IoT Based on Arduino Hsu, Wei-Te
    2009-04 Three Improved Codebook Searching Algorithms for Image Compression Using Vector Quantizer Chang, C. C.; Kuo, C. L.; Chen, C. C.
    2019-11 Three types of two-disjoint-cycle-cover pancyclicity and their applications to cycle embedding in locally twisted cubes 龔自良; KUNG, TZU-LIANG; Che, Hon-Chan; Chen, Hon-Chan; Lin, Chia-Hui; Lin, Chia-Hui; Hs, Lih-Hsing; Hsu, Lih-Hsing
    2009-11 A three-dimensional breakdown model of SOI lateral power transistors with a circular layout Guo, Yufeng; Wang, Zhigong; Sheu, Gene
    2009-11 A Three-dimensional Breakdown Model of SOI Lateral Power Transistors with a Circular Layout 郭宇峰; Guo, Yufeng; Wang, Zhigong; 許健; Sheu, Gene
    2012-07 Three-Party Authenticated Quantum Key Distribution Protocol with Time Constraint 龔自良; Kung, Tzu-Liang; Kueng, Tz-Liang
    2012-07 Three-Party Authenticated Quantum Key Distribution Protocol with Time Constraint 龔自良; Kung, Tzu-Liang; Kueng, Tz-Liang
    2012-07 Three-Party Authenticated Quantum Key Distribution Protocol with Time Constraint 陳興忠; Chen, Hsing-Chung; 龔自良; Kung, Tzu-Liang; Kueng, Tz-Liang
    2010-08 A Three-party Encrypted Key Exchange Protocol with Protected Password Authentication 陳興忠; Chen, Hsing-Chung
    2010-08 A Three-party Encrypted Key Exchange Protocol with Protected Password Authentication 陳興忠; Chen, Hsing-Chung; 陳興忠; Chen, Hsing-Chung; 陳興忠; Chen, Hsing-Chung
    2008-02 Three-Phase Lossless Data Hiding Method for the VQ Index Table Chang, C. C.; Lin, C. Y.; Hsieh, Y. P.
    2008 Three-Phase Lossless Data Hiding Method for the VQ Index Table 林智揚; Lin, Chih-Yang
    2004-08 A Threshold Signature Scheme for Group Communications without a Shared Distribution Center 黃明祥; Hwang, Min-Shiang
    2005-11 Threshold Signatures: Current Status and Key Issues 黃明祥; Hwang, Min-Shiang
    2004-04 Threshold Untraceable Signature for Group Communications 黃明祥; Hwang, Min-Shiang
    2011-10 A Time Constraint Three-Party Encrypted Key Exchange Protocol 陳興忠; Chen, Hsing-Chung
    2008-11 Time-bound Based Authentication Scheme for Multi-server Architecture Chang, C. C.; Lee, J. S.; Kuo, J. Y.
    2005-11 Time-bounded Based Password Authentication Scheme Chang, C. C.; Kuo, J. Y.; Lee, J. S
    2022-04-01 A Time-Driven Cloudlet Placement Strategy for Workflow Applications in Wireless Metropolitan Area Networks Zha, Jianshan; Zhang, Jianshan; Li, Ming; Li, Ming; Zhe, Xianghan; Zheng, Xianghan; 許慶賢; Hsu, Ching-Hsien

    Showing items 3226-3250 of 4759. (191 Page(s) Totally)
    << < 125 126 127 128 129 130 131 132 133 134 > >>
    View [10|25|50] records per page

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback