English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 47249/51115 (92%)
造访人次 : 14044194      在线人数 : 325
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    主页登入上传说明关于CCUR管理 到手机版
    book [2/2]
    Previous Exams [21/21]
    Previous Exams [24/24]
    Thesis [551/624]
    Proceedings [78/103]
    periodical articles [108/140]
    project [46/46]

    Collection Statistics

    Item counts issued in 3 years:0(0.00%)
    Items With Fulltext:120(100.00%)

    Download counts of the item
    Download times greater than 0:120(100.00%)
    Download times greater than 100:120(100.00%)
    Total Bitstream Download Counts:20536(3.27%)

    Last Update: 2025-04-24 12:48


    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed
    Jump to a point in the index:
    Or type in a year:
    Ordering With Most Recent First Show Oldest First

    Showing items 1-50 of 120. (3 Page(s) Totally)
    1 2 3 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2017 Teaching with a Dual-channel Classroom Feedback System in the Digital Classroom Environment 游源治
    2017 Constructing a User-Friendly and Smart Ubiquitous Personalized Learning Environment by Using a Context-Aware Mechanism 姚慶邦著
    2016 新開放總體經濟模型的三個議題 陳卓泰[撰]
    2015 植基於射頻識別之供應鏈系統的安全與效能研究 奚正德[撰]
    2015 The Application Of Fuzzy Set To Break-Even Point : A Case Of Vanity Box Maker 陳恆生著
    2015 社群媒體行銷使用者行為之研究 張郁婷[撰]
    2015 運用資料探勘技術於電腦化適性測驗之研究 張裕昌撰
    2014 Protecting secret documents via a sharing and hiding scheme 杜淑芬等著
    2014 臺灣民眾使用電子化政府服務行為之研究 崔灝東[撰]
    2014 Is it appropriate to apply similar patterns in deploying IT-enabled service innovation? An exploratory study 郭建良撰
    2014 資訊科技與組織持續競爭優勢之分析 : 採用複雜理論 陳仁偉撰
    2013 一個以空間模型為基礎的智慧家庭系統 游源治
    2013 The effect of social influence on bloggers' usage intention 王舒民等[撰]
    2013 應用虛擬題庫理論 : 電腦化方塊計數測驗之實作 廖文偉[撰]
    2013 Toward an IT-driven Organizational Structure Design Model 林芃君等著
    2012 Learning styles and acceptance of e-learning management systems : an extension of behaviour intention model 呂新科著
    2012 服務人員社會交換類型與服務導向公民行為關係之研究 鄭清揚[撰]
    2011 中國文化大學副教授升等送審資料 : 代表著作 [郭乃文作]
    2011 Authentication Algorithm Based on Grid Environment 陳恆生等著
    2011 Backflush Model for Sequential Test and its and Applications 陳恆生等著
    2011 Dynamic Fuzzy Set in Design and Its Application-Auxiliary Costs of Hair Beauty 陳恆生等著
    2011 行動通信簡訊通報系統對臨床醫師影響之探討及解決方案 : 以某區域醫院為例 傅延宗[撰]
    2010 On the design of authentication mechanisms for RFID systems 葉國暉
    2010 Applying web service technology to build a wireless LAN problem diagnosis expert system 張重正等著
    2010 智慧型線上測驗曁內容感知式學習整合系統 陳恆生等著
    2010 Applied RFID in exhibition for Intelligent guidance and product management 陳恆生等著
    2010 Secure Site Authentication and Message Transmission Based on Grid Environment 陳恆生等著
    2010 Verification of stored security data in computer system 陳恆生等著
    2010 An e-learning system for information management education based on web services 張重正等著
    2010 Using SOA concept to construct an e-learning system for college information management courses 張重正等著
    2010 Using web service technology in development and integration of heterogeneous expert systems 張重正等著
    2010 A wireless LAN problem diagnosis expert system based on web services 張重正等著
    2010 The 12th International Conference on Advanced Communication Technology [電腦檔] 廖文偉著
    2010 五年內著作 廖文偉著
    2010 從外界顧問觀點瞭解跨組織實務社群網路之知曉管理 黃正傑[撰]
    2010 跨產業競合關係中的信任 : 以數位匯流之個案為例 羅嘉惠[撰]
    2010 Ma Design Management : How can design management be used to evaluate the innovation of interation design for input devices such as touch screen and mouse from a consumer perspective? 胡雅倫
    2009 Global defensive alliances in star graphs 王福星等著
    2009 Algorithm of cipher text containing key to produce cipher text transmitted in network security 吳宏文等撰
    2009 A data file backup model based on Grid Environment 吳宏文等撰
    2009 Data transmission encryption and decryption algorithm in network security 吳宏文等撰
    2009 Decision on classifying Chinese Commercial Web Sites by Bayesian Approach 吳宏文等撰
    2009 Keyless cryptology for cipher text transmitted in network 吳宏文等撰
    2009 A study on Keyless-In-Context Technique and application 吳宏文等撰
    2009 Collect and Broadcast News in Security 陳恆生等著
    2009 Electronic-Governance : Dilemmas and Trade-Offs 陳恆生等著
    2009 The Keyless Technique of Text Data Mining and Its Application 陳恆生著
    2009 A resource performance analysis model based on grid environment 陳恆生等著
    2009 RFID智慧型展場導覽曁管理系統 陳恆生等著
    2009 Security of Message Passing Based on Grid Environment 陳恆生等著

    Showing items 1-50 of 120. (3 Page(s) Totally)
    1 2 3 > >>
    View [10|25|50] records per page

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback