網際網路技術學刊,201811,(19:6期)-ERICDATA高等教育知識庫
熱門:
朱丽彬
黃光男
王美玲
王善边
崔雪娟
黃乃熒
首頁
臺灣期刊
學校系所
學協會
民間出版
大陸/海外期刊
政府機關
學校系所
學協會
民間出版
DOI註冊服務
首頁
臺灣期刊
學協會基金會
網際網路技術學刊
201811 (19:6期)
網際網路技術學刊
Journal of Internet Technology
全文閱讀@
201811 (19:6期)期所有篇
A Robust GA/PSO-Hybrid Algorithm in Intelligent Shipping Route Planning Systems for Maritime Traffic Networks
A Robust GA/PSO-Hybrid Algorithm in Intelligent Shipping Route Planning Systems for Maritime Traffic Networks
A Component-based Middleware for Network Function Virtualization
A Component-based Middleware for Network Function Virtualization
Web API Discovery Using Semantic Similarity and Hungarian Algorithm
Web API Discovery Using Semantic Similarity and Hungarian Algorithm
Outage Performance Analysis of Cooperative D2D Communication
Outage Performance Analysis of Cooperative D2D Communication
Adaptive Caching Strategy Based on Big Data Learning in ICN
Adaptive Caching Strategy Based on Big Data Learning in ICN
A Recommendation System for Repetitively Purchasing Items in E-commerce Based on Collaborative Filtering and Association Rules
A Recommendation System for Repetitively Purchasing Items in E-commerce Based on Collaborative Filtering and Association Rules
Agile Business Intelligence: Combining Big Data and Business Intelligence to Responsive Decision Model
Agile Business Intelligence: Combining Big Data and Business Intelligence to Responsive Decision Model
Multi-label Scientific Document Classification
Multi-label Scientific Document Classification
α-Fraction First Strategy for Hierarchical Model in Wireless Sensor Networks
α-Fraction First Strategy for Hierarchical Model in Wireless Sensor Networks
An Energy-aware Method for Multi-domain Service Function Chaining
An Energy-aware Method for Multi-domain Service Function Chaining
Proposed Method for Mobile Forensics Investigation Analysis of Remnant Data on Google Drive Client
Proposed Method for Mobile Forensics Investigation Analysis of Remnant Data on Google Drive Client
A Secure Service Agreement Underlying Cloud Computing Environment
A Secure Service Agreement Underlying Cloud Computing Environment
Addressing Data Governance in Cloud Storage: Survey, Techniques and Trends
Addressing Data Governance in Cloud Storage: Survey, Techniques and Trends
An Improved RFID Authentication Protocol with Privacy Protection Based on Chaotic Maps
An Improved RFID Authentication Protocol with Privacy Protection Based on Chaotic Maps
An Improved Integrated Prediction Method of Cyber Security Situation Based on Spatial-time Analysis
An Improved Integrated Prediction Method of Cyber Security Situation Based on Spatial-time Analysis
Efficient Data-replication between Cluster-heads for Solar-powered Wireless Sensor Networks with Mobile Sinks
Efficient Data-replication between Cluster-heads for Solar-powered Wireless Sensor Networks with Mobile Sinks
Indoor Positioning Systems for Different Mobile Terminal Devices
Indoor Positioning Systems for Different Mobile Terminal Devices
Data Synchronization of Mobile Peer-to-Peer Application: Experiments on the Android Platform
Data Synchronization of Mobile Peer-to-Peer Application: Experiments on the Android Platform
High Efficient and Robust Quantum Watermarking Algorithm Based on Quantum Log-polar Images and Matrix Coding
High Efficient and Robust Quantum Watermarking Algorithm Based on Quantum Log-polar Images and Matrix Coding
Limited-length Suffix-array-based Method for Variable-length Motif Discovery in Time Series
Limited-length Suffix-array-based Method for Variable-length Motif Discovery in Time Series
Tracking Control of Wheeled Mobile Robots Using Fuzzy CMAC Neural Networks
Tracking Control of Wheeled Mobile Robots Using Fuzzy CMAC Neural Networks
Two-dimensional Channel Estimation for Millimeter-wave MIMO Systems with Hybrid Precoding
Two-dimensional Channel Estimation for Millimeter-wave MIMO Systems with Hybrid Precoding
Research on Mobile Robot Target Recognition and Obstacle Avoidance Based on Vision
Research on Mobile Robot Target Recognition and Obstacle Avoidance Based on Vision
A Recoverable Image Authentication Scheme by Reed-Solomon Code
A Recoverable Image Authentication Scheme by Reed-Solomon Code
Space Efficient and Integrity-ensured Secret Sharing Schemes for Multimedia Secrecy without Recursion
Space Efficient and Integrity-ensured Secret Sharing Schemes for Multimedia Secrecy without Recursion
A New Blind Image Authentication for Image Tampering Detection and Recovery Based on Block-wise Feature Classification
A New Blind Image Authentication for Image Tampering Detection and Recovery Based on Block-wise Feature Classification
Fine-grained Image Authorization Mechanism for Image Management Systems
Fine-grained Image Authorization Mechanism for Image Management Systems
A New Third-party Payment Scheme with Anonymity for Mobile Commerce
A New Third-party Payment Scheme with Anonymity for Mobile Commerce
Finding An Optimal Disturbed Square Matrix Using Dynamic Programming Strategy for Steganography
Finding An Optimal Disturbed Square Matrix Using Dynamic Programming Strategy for Steganography
An Examination of Online Discussion Quality of STEM-based Instruction
An Examination of Online Discussion Quality of STEM-based Instruction
Development and Research of an Affective Learning System Combined with Motion-Sensing Interaction, Augmented Reality, and Mid-Air Projection
Development and Research of an Affective Learning System Combined with Motion-Sensing Interaction, Augmented Reality, and Mid-Air Projection
教師服務
合作出版
期刊徵稿
聯絡高教
高教FB
讀者服務
圖書目錄
教育期刊
訂購服務
活動訊息
數位服務
高等教育知識庫
國際資料庫收錄
投審稿系統
DOI註冊
線上購買
高點網路書店
元照網路書店
博客來網路書店
教育資源
教育網站
國際教育網站
關於高教
高教簡介
出版授權
合作單位
知識達
知識達
知識達
知識達
知識達
知識達
版權所有‧轉載必究 Copyright2011 高等教育文化事業股份有限公司 All Rights Reserved
服務信箱:edubook@edubook.com.tw 台北市館前路 26 號 6 樓 Tel:+886-2-23885899 Fax:+886-2-23892500