Tunghai University Institutional Repository:
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4237927      Online Users : 445
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Master's Theses [108/109]
    National Research Council Research Report [19/33]
    Conference Papers [81/129]

    Collection Statistics

    Item counts issued in 3 years:0(0.00%)
    Items With Fulltext:172(78.18%)

    Download counts of the item
    Download times greater than 0:172(100.00%)
    Download times greater than 100:172(100.00%)
    Total Bitstream Download Counts:47562(20.45%)

    Last Update: 2024-12-03 20:17


    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 1-25 of 220. (9 Page(s) Totally)
    1 2 3 4 5 6 7 8 9 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    1999 The 1/ f noise associated with electromigration in AlSiCu thin films Cheng, Y.a, Gong, J.a, Liou, D.-M.b, Yee, H.
    1988 1/F noise in the linear region of LDD MOSFET's Tsai, Cliff Y.H., Gong, Jeng
    1990 1/f2 noise spectrum derived from electromigration-induced resistance change Liou, D.M., Gong, J., Chen, C.C.
    2009 A 5.7-GHz low-noise amplifier with source-degenerated active inductor Chu, C.-H., Huang, I.-L., Lin, Y.-H., Gong, J.
    2009 A 6:1 Unequal Wilkinson Power Divider with EBG CPW C.-P. Chang, C.-C. Su, S.-H. Hung, Y.-H. Wang, and J.-H. Chen
    2008 Access control in user hierarchy based on elliptic curve cryptosystem Y. F. Chung, H. H. Lee, F. P. Lai, and T. S. Chen
    2008 Access control in user hierarchy based on elliptic curve cryptosystem Chung, Y.F.a, Lee, H.H.b, Lai, F.bc, Chen, T.S.
    1988 Activation of boron implanted in Hg0.7Cd0.3Te by high-temperature annealing Wu, T.B.a, Lam, K.Y.b, Chiang, C.D.a, Gong, J.b, Yang, S.J.c
    2008 Adaptive fuzzy-based rate management and power control in multimedia CDMA cellular systems Chen, Y.-L., Lin, Y.-S., Wang, J.-W., Wen, J.-H.
    2010 An Adaptive Multistage Multiuser Detector for MC-CDMA Communication Systems Using Evolutionary Computation Technique H.L. Hung, and J.H. Wen
    2010 An adaptive multistage multiuser detector for MC-CDMA communication systems using evolutionary computation technique Hung, H.-L., Wen, J.-H.
    2011 An agent-based English auction protocol using Elliptic Curve Cryptosystem for mobile commerce Chung, Y.-F., Chen, Y.-T., Chen, T.-L., Chen, T.-S.
    2009 Analysis of a laser post-process on a buckypaper field emitter for high and uniform electron emission YiWen Chen, H. Y. Miao, Mei Zhang,Richard Liang, Chuck Zhang and BenWang
    2009 Analysis of a laser post-process on a buckypaper field emitter for high and uniform electron emission Chen, Y.a, Miao, H.Y.b , Zhang, M.a , Liang, R.a, Zhang, C.a, Wang, B.
    2001 An analytical method of analyzing insulated-gate bipolar transistor characteristics in terms of applied terminal voltages Huang, T.-Y., Gong, J., Lai, J.-H.
    1989 Annealing temperature dependence of the 1/f noise in Si-implanted GaAs Gong, J., Yang, S.H.
    1988 Application of tie-line concept on the liquid phase epitaxial growth of GaInAsP on InP Chang, S.Y.a, Hsueh, K.-L.a, Gong, J.b, Lin, J.C.b
    2009 Approach to designing bribery-free and coercion-free electronic voting scheme Chung, Y.-F.a , Wu, Z.-Y.
    2013 An Architecture Model for Multiple Disease Management Information Systems Chen, L.?,?Yu, H.-C.,?Li, H.-C.,?Wang, Y.-V.,?Chen, H.-J.,?Wang, I.-C.,?Wang, C.-S.,?Peng, H.-Y.,?Hsu, Y.-L.,?Chen, C.-H.,?Chuang, L.-M.,?Lee, H.-C.,?Chung, Y.,?Lai, F.
    1995 Base current degradation of poly-emitter BJT's under AC stress Hsu, Tsun-Lai, Gong, Jeng, Yu, Keh-Yuh
    2008 Bidder-anonymous English auction scheme with privacy and public verifiability Chung, Y.F.a, Huang, K.H.a, Lee, H.H.b, Lai, F.ab, Chen, T.S.
    2010-08 Blind multiuser detection in frequency domain for MC-CDMA systems using particle swarm optimization Wen, Jyh-Horng , Chang, Chuan-Wang and Hung, Ho-Lung.; 溫志宏
    2011 A blind signature based on discrete logarithm problem Shen, V.R.L., Chung, Y.F., Chen, T.S., Lin, Y.A.
    2011 Blind synchronization scheme using the conjugate characters of the OFDM BPSK-modulated symbol Yang, C.-Y., Lee, G.-R., Kuan, W.-H., Wen, J.-H.
    2012 Casting ballots over internet connection against bribery and coercion Chung, Y.-F., Wu, Z.-Y.

    Showing items 1-25 of 220. (9 Page(s) Totally)
    1 2 3 4 5 6 7 8 9 > >>
    View [10|25|50] records per page

    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback