淡江大學機構典藏:
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 64185/96959 (66%)
Visitors : 12020116      Online Users : 22410
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Proceeding [929/1854]
    Monograph [65/83]
    Chapter [19/60]
    Research Paper [106/448]
    Thesis [958/960]
    Patent [16/31]
    Audio Visual Work [0/1]
    Others [4/5]

    Collection Statistics

    Item counts issued in 3 years: 59(5.16%)
    Items With Fulltext: 1057(92.48%)

    Download counts of the item
    Download times greater than 0: 1057(100.00%)
    Download times greater than 10: 1057(100.00%)
    Total Bitstream Download Counts: 335040(28.84%)

    Last Update: 2025-06-09 00:06


    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 876-900 of 1143. (46 Page(s) Totally)
    << < 31 32 33 34 35 36 37 38 39 40 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2012 A Reliable Local Recovery Routing Protocol Based on Clustering Coefficient for Mobile Ad Hoc Networks Tsai, Yihjia; Yao, Chenhan;
    2004-08-25 Repairing ElGamal-like multi-signature schemes using self-certified public keys 黃心嘉; Hwang, Shin-jia;
    2004-06-01 Representing Human's Memory Storage Mechanism for Knowledge Management Chung, Chi-ming; Zhang, Ning-jun;
    2009-02 Research on Fabricating CVD Diamond Microstructures Using RIE Process Chou, Wen-chen; Chao, Choung-lii;
    2019-04-17 Research on the Performance of Protocols and the Evaluation Metric for VIDEO Transmissions in an Ad Hoc Network Chen, R.-S.; Chao, Louis R.;
    2009-09 Revision of Using Eigenvalues of Covariance Matrices in Boundary-Based Corner Detection Horng, Wen-Bing; Chen, Chun-Wen;
    2010-12 RFID-Based Human Behavior Modeling and Anomaly Detection for Elderly Care Hsu, Hui-Huang; Chen, Chien-Chen;
    2021-12-13 Risk assessment of metabolic syndrome prevalence involving sedentary occupations and socioeconomic status Chen, Ming-Shu; Chiu, Chi-Hao;
    2021-12-13 Risk assessment of metabolic syndrome prevalence involving sedentary occupations and socioeconomic status Chen, Ming-Shu; Chiu, Chi-Hao;
    2021-12-13 Risk assessment of metabolic syndrome prevalence involving sedentary occupations and socioeconomic status Ming-Shu Chen; Chi-Hao Chiu;
    2023-09-15 RLR: Joint Reinforcement Learning and Attraction Reward for Mobile Charger in Wireless Rechargeable Sensor Networks Shang, C.; Chang, C. Y.;
    2005-09 A Robust Approach for Improving Computational Efficiency of Order-Picking Problems Chiang, Yu-Min; Chen, Shih-Hsin;
    2015-12-01 Robust face hallucination using ensemble of feature-based regression functions and classifiers Tu, Ching-Ting; Luo, Jang-Ren
    2010-10 Robust News Video Text Detection Based on Edges and Line-deletion Yen, Shwu-Huey; Chang, Hsiao-Wei;
    2011 Robust Text Binarization Based on Line-Traversing for News Video Yen, Shwu-Huey; Chang, Hsiao-Wei;
    2010 Rough-Set-Based Association Rules Applied to Brand Trust Evaluation Model Liao, Shu-hsien; Lin, Hwei-jen;
    2009-06-01 RRP: A Register Mechanism Routing Protocol in Wireless Sensor Networks Wang, Ying-Hong; Wang, Chen-An;
    2006-10-01 Rule Base Partitioning for Constructing Meta-rule Lin, Shun-chieh; Wen, Chien-hao;
    2001-03 Rules generation from the decision tree 蔣定安; Chiang, Ding-an;
    2017-07-13 SARA: Sandwiched attestation through remote agents for cluster-based wireless sensor networks Yang, Po-hung
    2005-06-01 Scaffolding for activity supervision and self-regulation in virtual university Yen, Shwu-huey; Deng, Lawrence Y.;
    2014-08-05 A secure and reliable routing protocol for wireless mesh networks Hwang, Ren Junn; Hsiao, Y. K.
    2005-01-01 Secure e-mail protocols providing perfect forward secrecy 孫宏民; Sun, Hung-min;
    2006-09 Secure Key Management Scheme for Wireless LAN 黃仁俊; Hwang, Ren-junn;
    2010-12 Security Analysis and Improvement of the Remote User Authentication Scheme without Using Smart Cards Horng, Wen-Bing; Shieh, Wen-Gong;

    Showing items 876-900 of 1143. (46 Page(s) Totally)
    << < 31 32 33 34 35 36 37 38 39 40 > >>
    View [10|25|50] records per page

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback