Tunghai University Institutional Repository:
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4247275      Online Users : 502
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Community Statistics


    Item counts issued in 3 years:0(0.00%)
    Items With Fulltext:4173(75.65%)

    Download counts of the item
    Download times greater than 0:4134(99.07%)
    Download times greater than 100:3922(93.99%)
    Total Bitstream Download Counts:2495875(16.06%)

    Last Update: 2024-12-04 16:27

    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 2001-2050 of 5516. (111 Page(s) Totally)
    << < 36 37 38 39 40 41 42 43 44 45 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2006-12-04 A Secure and Efficient Model for Network Defensive Systems 林祝興; Chu-Hsing Lin, Fuu-Cheng Jiang, Yen-Lin Huang, and Chih-Hsiung Huang
    2012 A secure authentication scheme for telecare medicine information systems Wu, Z.-Y., Lee, Y.-C., Lai, F., Lee, H.-C., Chung, Y.
    2013-10-22 Secure authorization for controlling access via key management scheme Hsiao, T.-C.; Chen, T.-L.; Chen, C.-S.; Xu, F.-S.; Tsui, S.; Chung, Y.-F.; Chen, T.-S.
    2012-07-04 A secure communication over wireless environments by using a data connection core Wei, K.-C., Huang, Y.-L., Leu, F.-Y.
    2012-07-04 A secure communication over wireless environments by using a data connection core Wei, K.-C., Huang, Y.-L., Leu, F.-Y.
    2013 A secure communication over wireless environments by using a data connection core? Huang, Y.-L., Leu, F.-Y., Wei, K.-C.
    2011 A secure conference key protocol over ecc-based grey systems Chen, T.-L., Chung, Y.-F., Lin, F.Y.S.
    2012-08-20 A secure data encryption method by employing a feedback encryption mechanism and three-dimensional operation?? Huang, Y.-L., Leu, F.-Y., Dai, C.-R.
    2011 A Secure Integrated Medical Information System Hsiao, T.-C., Wu, Z.-Y., Chung, Y.-F., Chen, T.-S., Horng, G.-B.
    2005-03-25 Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing 林祝興; Chu-Hsing Lin , and Hsiu-Hsia Lin
    2005-03-28 Secure one-round tripartite authenticated key agreement protocol from weil pairing?? Lin, C.-H., Lin, H.-H.
    2006-12-04 A Secure Protocol for Mobile IP Using Smartcards 林祝興; Chu-Hsing Lin, Chien-Liang Tsai, and Chen-Yu Lee
    2008-03-25 Secure Routing Protocol with Malicious Nodes Detection for Ad hoc Networks 林祝興; Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Jean Chou
    2008-03-25 Secure routing protocol with malicious nodes detection for ad hoc networks?? Lin, C.-H., Lai, W.-S., Huang, Y.-L., Chou, M.-C.
    2003-12-14 A Secure Scheme for Users Classification and Contents Protection in Video-on-demand Systems 林祝興; Chu-Hsing Lin, J. S. Chou, T. Y. Lee
    2010 A secure time-bound hierarchical key management scheme based on ECC for mobile agents Huang, J.-Y.a , Chung, Y.-F.b , Chen, T.-S.c , Liao, I.-E.
    2013-10-28 A secure wireless communication system integrating PRNG and Diffie-Hellman PKDS by using a data connection core Huang, Y.-L.; Leu, F.-Y.; Liu, J.-C.; Lo, L.-J.; Chu, W.C.-C.
    2006-07-24 Seeding precision test based on machine vision Li, W., Lin, J.
    1992 Segmentation of echocardiograms using a neural network Sun, Y.-N., Tsai, C.-T.
    2007-08-22 The selection of logical rings for packet transmissions in WDM optical star networks Liu, J.a , Ho, H.-J.b , Lee, S.a
    2012-04 A Semantic Rule-based Detection Scheme against Flooding Attacks on Cloud Environment 林祝興; Lin, Chu-Hsing;Lee, Chen-Yu;Lai, Shin-Pin;Lai, Wei-Shen
    2012 A semantic rule-based detection scheme against flooding attacks on cloud environment Lin, C.-H. Lee, C.-Y. Lai, S.-P. Lai, W.-S.
    2011-06-30 A semi-preemptive ad hoc computational service system with limited resources?? Leu, F.-Y., Chao, K.-Y.
    2011-06-07 A Semi-preemptive Ad Hoc Wireless Cloud Service System with limited Resources to Support Node Mobility Leu, Fang-Yie and Chao, Keng-Yen; 呂芳懌
    2011-06-07 A Semi-preemptive Ad Hoc Wireless Cloud Service System with limited Resources to Support Node Mobility Leu, Fang-Yie and Chao, Keng-Yen; 呂芳懌
    2012-03 A semi-preemptive computational service system with limited resources and dynamic resource ranking Leu, F.-Y., Chao, K.-Y., Lee, M.-C., Lin, J.-C.
    1994 A Server-Aided Computation Protocol for RSA Enciphering Algorithm 林祝興; Lin, Chu-Hsing; Chang, C. C.
    2013 The Service Quality Gaps Discussion Smartphone Customer Expected Service and Perceived Service 陳禹任; Chen, Yu-Jen
    2010 The servicisation of the cutting tool supply chain Cheng, C.-Y.a, Barton, D.b, Prabhu, V.a
    2010-01 The servicisation of the cutting tool supply chain. Cheng, Chen-Yang , Dave Barton, and Vittal Prabhu.; 鄭辰仰
    2013 Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining Huang, J.-Y., Liao, I.-E., Chung, Y.-F., Chen, K.-T.
    2013 Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining Huang, J.-Y.; Liao, I.-E.; Chung, Y.-F.; Chen, K.-T.
    2006 Short time deposition kinetics of diethyl phthalate and dibutyl phthalate on a silicon wafer surface Kang, Y.a, Den, W.b, Bai, H.ac
    2010 Sige0.35μm2GHz頻帶低電流射頻功率放大器之研製 吳心琁; Wu, Hsin-Hsuan
    2003-03-27 Signature Scheme based on Two Hard Problems Simultaneously 林祝興; C. T. Wang, C. C. Chang and Chu-Hsing Lin
    2007 Simple and accurate method of modeling gate current of N-channel metal-oxide-semiconductor field-effect transistor Yeh, C.-C., Neih, C.-F., Chen, Y.-Y., Gong, J.
    2004-03-26 A Simple and Secure Authentication Protocol for Global Roaming Service 林祝興; Chu-Hsing Lin, W. Lee
    1988 SIMPLE CRITERION FOR TESTING NON-MINIMUM-PHASE SYSTEMS. Rao, Ming, Jiang, Tsung-Shann
    2006-06-21 A simple force ripple compensation method for linear motor servo system Lin, J.a , Li, W.a, Zhao, T.b, Zhou, T.b, Wang, X.b , Liu, C.b
    1999 Simple method to analyze the electrical properties of high power lateral double-diffused metal-oxide-semiconductor transistors Huang, Tsung-Yi, Gong, Jeng
    2007 Simplified calculation of tooth stiffness of the involute internal spur gear Kang, Y.ab, Shi, Z.-Y.ab, Yao, W.-X.c, Lin, J.-C.a
    2012-07-04 A simplified wiener-based SIC ICI cancellation scheme for OFDM systems over time-varying channels Yao, Y.-C.a , Kuo, Y.-C.b , Wen, J.-H.
    2010 Simulation and multi-agent-based integrated solution for manufacturing planning and control Cheng, C.Y. , Wang, L.C. , Hsu, S.L.
    2010 Simulation and Multi-Agent-Based Integrated Solution for Manufacutring Planning and Control 鄭辰仰; Chen-Yang Cheng, Li-Chih Wang, Shih-Lun Hsu
    2014 The simulation of an emotional robot implemented with fuzzy logic Leu, F.-Y.; Liu, J.-c.; Hsu, Y.-T.; Huang, Y.-L.
    2010 A simulation of vendor managed inventory dynamics using fuzzy arithmetic operations with genetic algorithms 張炳騰; Lin, K.-P., Chang, P.-T., Hung, K.-C., and Pai, P.-F
    2010 A simulation of vendor managed inventory dynamics using fuzzy arithmetic operations with genetic algorithms Lin, K.-P.a , Chang, P.-T.b, Hung, K.-C.c, Pai, P.-F.d
    2012 Simulation study of an integrated methanol micro fuel processor and fuel cell system Chang, H., Cheng, S.-H., Chiang, H.-C., Chen, Y.-H., Chang, Y.-Y.
    2005 Simulation: The deposition behavior of Brownian particles in porous media by using the triangular network model Chan, H.-C., Chen, S.-C., Chang, Y.-I.
    2013 Simultaneous carbon capture, biomass production, and diary wastewater purification by Spirulina maxima photobioreaction Chang, W.-T., Lee, M., Den, W.

    Showing items 2001-2050 of 5516. (111 Page(s) Totally)
    << < 36 37 38 39 40 41 42 43 44 45 > >>
    View [10|25|50] records per page

    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback