English
|
正體中文
|
简体中文
|
Items with full text/Total items : 94286/110023 (86%)
Visitors : 21659188 Online Users : 502
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by
NTU Library IR team.
Scope
All of ASIAIR
資訊學院
資訊工程學系
學習社群
--其他研究計畫
--博碩士論文
--專書
--會議論文
--期刊論文
--科技部大專學生研究計畫
--科技部研究計畫
Tips:
please add "double quotation mark" for query phrases to get precise results
please goto advance search for comprehansive author search
Adv. Search
Home
‧
Login
‧
Upload
‧
Help
‧
About
‧
Administer
ASIA unversity
>
資訊學院
>
資訊工程學系
>
Browse By Title
Browse By Authors
Browse By Date
Browse By Data Type
Community Detail
Introduction:
因應當前資訊產業發展培養具備前瞻與務實能力之優秀資訊人才為宗旨
Loading...
Collection
其他研究計畫
[
0
/2]
博碩士論文
[
1751
/1813]
專書
[
0
/24]
會議論文
[
302
/1061]
期刊論文
[
1013
/1684]
科技部大專學生研究計畫
[
22
/52]
科技部研究計畫
[
88
/101]
Sub-Community
學習社群
[
5
/26]
Siblings
光電與通訊學系
[
989
/1264]
生物資訊與醫學工程學系
[
1593
/2378]
行動商務與多媒體應用學系
[
1072
/1735]
資訊傳播學系
[
648
/999]
Community Statistics
近3年內發表的文件:143(3.00%)
含全文筆數:3181(66.79%)
文件下載次數統計
下載大於0次:3181(100.00%)
下載大於100次:3011(94.66%)
檔案下載總次數:1299153(8.36%)
最後更新時間: 2024-11-28 07:53
Top Upload
Loading...
Top Download
Loading...
Recent Submissions
教育平臺融入國小二年級數學領域的學習成效-以因材網為例
病人預約門診的候診時間預測分析
基於MQTT 通訊之物聯網微功率插座設計於智慧居家之應用
以資訊分析探討民眾裝設住宅警報器之行為
新冠肺炎疫情衝擊下公共衛生護理人員工作壓力與睡眠品質之研究–以南投縣為...
雲端智慧插座設計電功率控制應用於恆溫烤箱控制
應用機器學習演算法於失智等級之預測
探索基於YOLO的口罩外觀偵測模型在小型資料集下的效能提升表現方法
TDOA在類神經網路與雙曲線之聲源定位比較分析
Multi-Objective Wireless Sensor Net...
Jump to:
[
Chinese Items
] [
0-9
] [
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
]
or enter the first few letters:
Showing items 2751-2775 of 4759. (191 Page(s) Totally)
<<
<
106
107
108
109
110
111
112
113
114
115
>
>>
View [
10
|
25
|
50
] records per page
Date
Title
Authors
2008-02
Robust t-out-of-n Proxy Signature Based on RSA Cryptosystems
Chang, Y. F.
;
Chang, C. C.
2008
A robust technique for character string extraction from complex document images
Chen, Yen-Lin
2008-06
A Robust-FragileWatermarking Scheme for Image Authentication
黃明祥
;
Hwang, Min-Shiang
2008-06
A Robust-FragileWatermarking Scheme for Image Authentication
黃明祥
;
Hwang, Min-Shiang
2016-02
Robustness and Reliability Evaluations of Image Annotation
Tsai;*, 林維昭;Wei-Chao Lin;Shih-Wen Ke;Shih-Wen Ke;Chih-Fong Ts;Chih-Fong
2016-02
Robustness and Reliability Evaluations of Image Annotation
林維昭
;
Lin, Wei-Chao
;
Ke, Shih-Wen
;
Ke, Shih-Wen
;
Ts, Chih-Fong
;
Tsai, Chih-Fong
;
*
2016-02
Robustness and Reliability Evaluations of Image Annotation
Lin), 林維昭(Wei-Chao
;
Ke), Shih-Wen Ke(Shih-Wen
;
Tsai)*, Chih-Fong Ts(Chih-Fong
2008-02
Robustness design of fuzzy control for nonlinear multiple time-delay large-scale systems via neural-network-based approach
蕭鳳翔
;
Hsiao, Feng-Hsiag
;
Xu, Sheng-Dong
;
Lin, Chia-Yen
;
蔡志仁
;
Tsai, Zhi-Ren
2018-10
Robustness in adaptive pattern recognition
蔡志仁
;
Tsai, Zhi-Ren
2007-11
Role-based Proactive Scheme in an Access Control Hierarchy
陳興忠
;
Chen, Hsing-Chung
2014-07
A Role-based RSA Key Management Approach in a Hierarchy Scheme
陳興忠
;
Chen, Hsing-Chung
;
Christ, * Anita
;
Christiana, Anita
A Role-based RSA Key Management Approach in a Hierarchy Scheme
2011-06
A Role-Oriented Routing Algorithm Applied for Wireless Heterogeneous Networks
陳興忠
;
Chen, Hsing-Chung
2011-06
A Role-Oriented Routing Algorithm Applied for Wireless Heterogeneous Networks
陳興忠
;
Chen, Hsing-Chung
;
陳興忠
;
Chen, Hsing-Chung
;
陳興忠
;
Chen, Hsing-Chung
2013-06
Ron Improvement with Duplex Conduction Channel
Manjunatha
;
Manjunatha
;
Vasanth
;
Vasanth
;
kumar, anil
;
kumar, anil
;
Kumar, Jaipal
;
Kumar, Jaipal
;
楊紹明
;
Yang, Shao-Ming
;
許健
;
Sheu, Gene
;
陳柏安
;
P.A.Chen
Ron Improvement with Duplex Conduction Channel
Manjunatha
;
Manjunatha
;
Vasanth
;
Vasanth
;
kumar, anil
;
kumar, anil
;
Kumar, Jaipal
;
Kumar, Jaipal
;
楊紹明
;
Yang, Shao-Ming
;
許健
;
Sheu, Gene
;
陳柏安
;
P.A.Chen
2014-05
A Rotation Session Key-Based Transposition Cryptosystem Scheme Applied to Mobile Text Chatting
陳興忠
;
Chen, Hsing-Chung
;
Liezel,Alpha
;
Alpha Liezel, V.Epa
A Rotation Session Key-Based Transposition Cryptosystem Scheme Applied to Mobile Text Chatting
2011-07
A Routing Algorithm Based on Event-Oriented Applications for Digital Home Wireless Heterogeneous Networks
陳興忠
;
Chen, Hsing-Chung
;
Chi-Tung Chen
;
Sheg-Hao Fang
;
Jai-Zong Sun
;
Kanoksak Wattanachote
2004
Routing Security for Mobile Wireless Ad Hoc Networks
Lin Yi-Ping
2012
RSA Time-Lock Puzzle Authenticated E-voting System
Deviani, Rini
2007-01
An RSA-based (t, n) Threshold Proxy Signature Scheme with Freewill Identities
Chang, Y. F.
;
Chang, C. C.
2012
RST-Resistant Reversible Data Hiding for 3D Models
Cheng, Chin-Wei
2011
Rubust Background Modeling Based on Multiscale Color Description
林智揚
;
Lin, Chih-Yang
2016-01
SAFQuery: A Simple and Flexible Advanced Web Search Interface
Tsai;*, 林維昭;Wei-Chao Lin;Shih-Wen Ke;Shih-Wen Ke;Chih-Fong Ts;Chih-Fong
Showing items 2751-2775 of 4759. (191 Page(s) Totally)
<<
<
106
107
108
109
110
111
112
113
114
115
>
>>
View [
10
|
25
|
50
] records per page
DSpace Software
Copyright © 2002-2004
MIT
&
Hewlett-Packard
/
Enhanced by
NTU Library IR team
Copyright ©
-
Feedback