English  |  正體中文  |  简体中文  |  Items with full text/Total items : 90453/105672 (86%)
Visitors : 13037295      Online Users : 271
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    其他研究計畫 [0/2]
    博碩士論文 [1642/1704]
    專書 [0/21]
    會議論文 [302/1061]
    科技部大專學生研究計畫 [0/5]
    科技部研究計畫 [68/70]

    Collection Statistics

    近3年內發表的文件:40(2.49%)
    含全文筆數:939(58.47%)

    文件下載次數統計
    下載大於0次:939(100.00%)
    下載大於100次:830(88.39%)
    檔案下載總次數:308175(41.66%)

    最後更新時間: 2021-02-25 09:58


    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed
    Jump to a point in the index:
    Or type in a year:
    Ordering With Most Recent First Show Oldest First

    Showing items 226-250 of 1606. (65 Page(s) Totally)
    << < 5 6 7 8 9 10 11 12 13 14 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2016-01 A Survey of Public Auditing for Secure Data Storage in Cloud Computing Yang;黃明祥*, Wei-Fu Hsien;Wei-Fu Hsien;Chou-Chen Ya;Chou-Chen
    2016 A SoC Integrating ADC and 2DDWT for Video/Image Processing 謝慶發; HSIEH, Chin-Fa; *; 蔡宗漢; TSAI, Tsung-Han; 易昶霈; Yi, Chang-Pei; *
    2015-01 An H.264/AVC HDTV Watermarking Algorithm Robust to Camcorder Recording ; CHang, 張真誠 Chin-Chen
    2015-01 An Adjustable and Reversible Data Hiding Method Based on Multiple-base Notational System without Location Map ; CHang, 張真誠 Chin-Chen
    2015-01 Ciphertext-Auditable Identity-Based Encryption ; CHang, 張真誠 Chin-Chen
    2015-01 A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management ; CHang, 張真誠 Chin-Chen
    2015-01 A 10-bit current-steering CMOS digital to analog converter Yi, 易昶霈 Chang-Pei
    2015-01 A lane detection approach based on intelligent vision ; CHEN, 陳永欽 YEONG-CHIN
    2015-01 A New Investigation Approach for Tracing Source IP in DDoS attack from Proxy Server ; 黃明祥
    2015-12 Adaptive MIMO Supervisory Control Design Using Modeling Error Chang, 蔡志仁;Zhi-Ren Tsai;張耀仁;Yau-Zen
    2015-12 The Credit Card Visual Authentication Scheme Based on GF(2^8) Field Wang), Feng Wang(Feng; CHang), 張真誠(Chin-Chen; Lyu), Wan-Li Lyu(Wan-Li
    2015-12 Combination Therapy Using Chelating Agent and Zinc for Wilson’s Disease Chen)*, 陳瑞奇(Jui-Chi; Chuang), 莊政宏(Cheng-Hung; Wang), 王經篤(Jing-Doo; Wang), 王奇威(Chi-Wei
    2015-12 PubMed文獻之樣式歷史資料形狀查詢-藉由Haar小波 Wang), 王經篤(Jing-Doo; 蔣中凱; Chen), 陳瑞奇(Jui-Chi
    2015-12 Cases Study and Analysis of the Court Judgement of Cybercrimes in Taiwan Sun), Jia-Rong Sun(Jia-Rong; 施茂林; 黃明祥
    2015-11 Adaptive MIMO Supervisory Control Design Using Modeling Error Tsai), 蔡志仁(Zhi-Ren; Chang), 張耀仁(Yau-Zen
    2015-10 Reversible Data Hiding with Oriented and Minimized Distortions Using Cascading Trellis Coding Mao), Qian Mao(Qian; Li), Fan Li(Fan; CHang)*, 張真誠(Chin-Chen
    2015-10 A Secure Multicast Key Agreement Scheme Chen)*, 陳興忠(Hsing-Chung; Chen), Chung-Wei Ch(Chung-Wei
    2015-09 Identification of pLG72-induced oxidative stress using systemic approaches Wang, M.;Wang, M.;Chen, H.-J.;Chen, H.-J.;Zhang, J.;Zhang, J.;Li, W.;Li, W.;Xie, X.;Xie, X.;張顥騰;Chang, Hao-Teng
    2015-09 A Meaningful Scheme for Sharing Secret Images Using Mosaic Images Zhai), Shengyun Zha(Shengyun; Li), Fan Li(Fan; CHang)*, 張真誠(Chin-Chen; Mao), Qian Mao(Qian
    2015-09 A Grouped-scalable Secret Image Sharing Scheme Liu), Wenjie Liu(Wenjie; Wang), Anhong Wang(Anhong; CHang)*, 張真誠(Chin-Chen; Li), Zhihong Li(Zhihong; Liu), Li Liu(Li
    2015-09 Design Monitoring Systems for Multi-Channel Technology in Wireless Sensor Cheng), Chia-Hsin Ch(Chia-Hsin; Shiue), Yeong-Long S(Yeong-Long; Yan), Yi Yan(Yi; Chen), 陳興忠(Hsing-Chung
    2015-09 The Performance Evaluation of IEEE 802.11 DCF Using Markov Chain Model forWireless LANs Chien-ErhWen(Chien-ErhWeng); Chen)*, 陳興忠(Hsing-Chung
    2015-09 A Security Gateway Application for End-to-End M2M Communications Chen)*, 陳興忠(Hsing-Chung; You), Ilsun You(Ilsun; Weng), Chien-Erh We(Chien-Erh; Cheng), Chia-Hsin Ch(Chia-Hsin; Huang), Yung-Fa Huan(Yung-Fa
    2015-09 A Negotiated Virtual Role Solution in RBAC Scheme for Group-Based Heterogeneous Wireless Networks Chen)*, 陳興忠(Hsing-Chung
    2015-09 A Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure Sun), 孫加榮(Jia-Rong; 施茂林; 黃明祥

    Showing items 226-250 of 1606. (65 Page(s) Totally)
    << < 5 6 7 8 9 10 11 12 13 14 > >>
    View [10|25|50] records per page

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback