淡江大學機構典藏:
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 64178/96951 (66%)
Visitors : 11124027      Online Users : 21602
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Community Statistics


    Item counts issued in 3 years: 45(1.80%)
    Items With Fulltext: 1682(67.41%)

    Download counts of the item
    Download times greater than 0: 1678(99.76%)
    Download times greater than 10: 1658(98.57%)
    Total Bitstream Download Counts: 553461(2.41%)

    Last Update: 2025-06-02 20:44

    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 101-150 of 2495. (50 Page(s) Totally)
    << < 1 2 3 4 5 6 7 8 9 10 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2011-04-13 An Analysis of Customer Contribution in a Bank Shang, Shari S.-C.; Wu, Ya-ling
    2010-08 An Analysis of Research on Information Reuse and Integration (2003-2008) 戴敏育; Day, Min-yuh;
    1998 An application of information technology to joint vendor and buyer inventory systems 吳元功; Woo, York Y.;
    1994-05-27 An application of petri nets on scheduling expert system 劉艾華; Liou, Ay-hwa Andy;
    2013-12-01 An Authoring System of Creating Graphic-based Map for OPACs in Library Chang, Hsuan-Pu; Chang, Wei-Ting;
    1997-08 An efficient approach to distance calculation in geographic in formation systems 梁恩輝; Liang, En-hui
    2007-12 An Empirical Investigation of Internet Pirate Copying Behavior in Virtual: Community Sharing: The Social Exchange Perspective 楊美蓮; Yang, M. L;
    2011-07 An Enhanced Password-based User Authentication Scheme for Grid Computing Wu, Zhen-yu; Chung, Yu-fang;
    2011-07-05 An Examination of Knowledge Services on User-Generated Content Platforms Wu, Ya-Ling; Chiu, Yu-Chen
    2001-06-21 An Exploratory Study of Cyber Group Development Process Kuo, Feng-yang; Yu, Chia-ping
    2009-07-01 An Exploratory Study of Trust Dynamics in Work-Oriented Virtual Teams Kuo, Feng-yang; 游佳萍;
    2007-04-01 An extension of TOPSIS for group decision making 時序時; Shih, Hsu-shih;
    2006-08-01 An image size unconstrained ownership identification scheme for gray-level and color ownership statements based on sampling methods Hsu, C. S.; 侯永昌;
    2017-10-01 An improved multiattribute decision making method based on new score function of interval-valued intuitionistic fuzzy values and linear programming methodology 王正一; Wang, Cheng-yi;
    2015-02 An innovative approach to measuring technology spillovers in service-dominant logic 解燕豪
    2003-07-01 An integrative model to predict the continuance use of electronic learning systems 吳錦波; Wu, Jiinpo
    2006-01-01 An Integrative Model to Predict the Continuance Use of Electronic Learning Systems: Hints for Teaching 吳錦波; Wu, Jiin-po;
    2017-07-27 An Interactive Telecare System Enhanced with IoT Technology Shih-Jung Wu; Rui-Dong Chiang;
    2009-11-01 An Investigation of Coopetitive Pedagogic Design for Knowledge Creation in Web-Based Learning Fu, Fong-ling; Wu, Ya-ling;
    2018-09 An Investigation of Visual Fatigue in Elementary School Students Resulting from Reading e-books Cheng, Pei-Yu; Su, Yen-Ning;
    2006-09 An Optimization Model for Visual Cryptography Schemes with Unexpanded Shares 侯永昌; Hsu, C. S.;
    2006-09 An Optimization Model for Visual Cryptography Schemes with Unexpanded Shares Hsu, Ching-Sheng; Tu, Shu-Fen;
    2012-06 An Ownership Protection Scheme Based on Visual Cryptography and the Law of Large Numbers Hou, Young-chang; Huang, Pei-hsiu
    1991-09-01 Analysis of branch strategies under hierarchical memory system 李鴻璋; Lee, H. C.;
    2014-03-01 Analysis of fraudulent behavior strategies in online auctions for detecting latent fraudsters Chang, Jau-Shien; Chang, Wen-Hsi;
    2014-08-15 Analysis of Identifying Linguistic Phenomena for Recognizing Inference in Text Day, Min-Yuh; Wang, Ya-Jung;
    2012-06-03 An Analysis of Reward Systems of Electronic Services Yeh, Yi-chen; Shang, Shari S.-C.;
    2001-11-01 Analyzing software reliability growth model with imperfect-debugging and change-point by genetic algorithm Chen, Mu-chen; Wu, Hsiao-pin;
    2012-07 Another way to improve information security behaviors: A control perspective Shih, Sheng-Pao; Hsu, J.S.-C;
    1987-12-01 Application of computer-assisted instruction and canadian scene 黃崇冀; Huang, Henry C.
    2007-10-18 Application of independent component analysis to lossless compression of 3D ultraspectral sounder data Wei, Shih-chieh; Huang, Bormin
    2016-12-06 An Application of Technology-Based Design for Exhibition Services Hsieh, Yen-Hao; Yuan, Soe-Tsyr
    1995-12 Apply the Fuzzy Set Theory to the Structural Query Language of Database 侯永昌; Hou, Young-chang;
    2018-02 Applying a Security Management Mechanism to a System Development Lifecycle C.P. Yu; C.P. Chu;
    2018-02-28 Applying a Security Management Mechanism to a System Development Lifecycle C.P. Yu; C.P. Chu;
    2003-01-01 Applying expectation-confirmation theory to investigating the intention for reusing asynchronous distance learning technology 吳錦波; Wu, Jiin-po;
    1999-03-01 Applying fuzzy adaptive network to fuzzy regression analysis 鄭啟斌; Lee, E. S.
    2006-08-01 Applying Fuzzy Logic Control to Inventory Decision in a Supply Chain 鄭啟斌; Cheng, Chi-bin;
    2018-07-10 Applying parallel association algorithms to value meal design for a Chinese fast food chain restaurant Hsieh, L. Y.; Cheng, C.-B.;
    1994-12-01 Applying petri Nets to scheduling expert system 劉艾華; 魏仲良;
    Applying the framework of Turing Machine developing system for implementing Java virtual machine Liaw, Heh-Tyan; Liou, Ay-Hwa Andy;
    2018-07-07 Artificial Intelligence for Automatic Text Summarization Day, Min-Yuh; Chen, Chao-Yu
    2018-08-28 Artificial Intelligence for Conversational Robo-Advisor Day, Min-Yuh; Lin, Jian-Ting;
    2019-08-27 Artificial Intelligence for ETF Market Prediction and Portfolio Optimization Day, Min-Yuh; Lin, Jian-Ting
    2018-04-02 Artificial Intelligence for Time Series Forecasting in Financial Markets Day, Min-Yuh; Cheng, Tun-Kung;
    1992-12-01 Aspects of Probabilistic Process Algebra 周清江
    1999 ASP商用軟體研發 徐煥智
    2010-11-06 Asset write-offs prediction by support vector machine and logistic regression 鄭啟斌; Wu, C.-W.;
    2013-10 An Asymmetric Image Cryptosystem Based on the Adaptive Synchronization of an Uncertain Unified Chaotic System and a Cellular Neural Network Cheng, Chao-Jung; Cheng, Chi-Bin;
    2000-08 An asymmetric watermarking scheme based on visual cryptography 侯永昌; Hou, Young-chang;

    显示项目101-150 / 2495. (共50页)
    << < 1 2 3 4 5 6 7 8 9 10 > >>
    每页显示[10|25|50]项目

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回馈