網際網路技術學刊,202005,(21:3期)-ERICDATA高等教育知識庫
熱門:
朱丽彬
黃光男
王善边
王美玲
崔雪娟
黃乃熒
首頁
臺灣期刊
學校系所
學協會
民間出版
大陸/海外期刊
政府機關
學校系所
學協會
民間出版
DOI註冊服務
首頁
臺灣期刊
學協會基金會
網際網路技術學刊
202005 (21:3期)
網際網路技術學刊
Journal of Internet Technology
全文閱讀@
202005 (21:3期)期所有篇
SAR Image Segmentation with Structure Tensor Based Hierarchical Student’s t-Mixture Model
SAR Image Segmentation with Structure Tensor Based Hierarchical Student’s t-Mixture Model
An Efficient Differential Evolution Via Both Top Collective and P-Best Information
An Efficient Differential Evolution Via Both Top Collective and P-Best Information
A Non-interactive Deniable and Negative Authentication Scheme in Random Oracle Model
A Non-interactive Deniable and Negative Authentication Scheme in Random Oracle Model
An E-lottery System with a Fair Purchasing Environment and an Arbitration Mechanism
An E-lottery System with a Fair Purchasing Environment and an Arbitration Mechanism
Bounding the Sensing Data Collection Time with Ring-based Routing for Industrial Wireless Sensor Networks
Bounding the Sensing Data Collection Time with Ring-based Routing for Industrial Wireless Sensor Networks
Developing a Mobile-Assisted Software Application to Observe University Students’ Vocabulary Growth Through Extensive Reading
Developing a Mobile-Assisted Software Application to Observe University Students’ Vocabulary Growth Through Extensive Reading
Attribute Inference by Link Strength Modeling in Online Social Networks with User Tags
Attribute Inference by Link Strength Modeling in Online Social Networks with User Tags
An Application of Differential Evolution Algorithm-based Restricted Boltzmann Machine to Recommendation Systems
An Application of Differential Evolution Algorithm-based Restricted Boltzmann Machine to Recommendation Systems
Design Issues of the Side-Channel Attacks Protecting Scheme in Cloud Computing Environment
Design Issues of the Side-Channel Attacks Protecting Scheme in Cloud Computing Environment
Certificateless Ring Signature Scheme from Elliptic Curve Group
Certificateless Ring Signature Scheme from Elliptic Curve Group
Handling Failures in Semantic Web Service Composition Through Replacement Policy in Healthcare Domain
Handling Failures in Semantic Web Service Composition Through Replacement Policy in Healthcare Domain
The Impact of Gender and Locus of Control Differences on Hyperlinked Content Used
The Impact of Gender and Locus of Control Differences on Hyperlinked Content Used
Optimal Route Planning System for Logistics Vehicles Based on Artificial Intelligence
Optimal Route Planning System for Logistics Vehicles Based on Artificial Intelligence
The Demodulating and Encoding Heritage (DEH) Platform for Mobile Digital Culture Heritage (M-DCH)
The Demodulating and Encoding Heritage (DEH) Platform for Mobile Digital Culture Heritage (M-DCH)
Deep Learning Approaches for Dynamic Object Understanding and Defect Detection
Deep Learning Approaches for Dynamic Object Understanding and Defect Detection
Research on a LSTM based Method of Forecasting Primary Frequency Modulation of Grid
Research on a LSTM based Method of Forecasting Primary Frequency Modulation of Grid
Fuzzy Clustering Algorithm for Interval Data Based on Feedback RBF Neural Network
Fuzzy Clustering Algorithm for Interval Data Based on Feedback RBF Neural Network
A Dual-branch CNN Structure for Deformable Object Detection
A Dual-branch CNN Structure for Deformable Object Detection
Chinese Microblog Sentiment Analysis by Adding Emoticons to Attention-Based CNN
Chinese Microblog Sentiment Analysis by Adding Emoticons to Attention-Based CNN
Attention-based Recurrent Neural Network for Traffic Flow Prediction
Attention-based Recurrent Neural Network for Traffic Flow Prediction
Efficient Implementation of GMDA-based DOA Technique Using Pre-training Phase Unwrapping for Source Localization
Efficient Implementation of GMDA-based DOA Technique Using Pre-training Phase Unwrapping for Source Localization
Roofline-based Data Migration Methodology for Hybrid Memories
Roofline-based Data Migration Methodology for Hybrid Memories
Target Detection Method for SAR Images Based on Feature Fusion Convolutional Neural Network
Target Detection Method for SAR Images Based on Feature Fusion Convolutional Neural Network
Anomaly Detection in Crowded Scenes Based on Group Motion Features
Anomaly Detection in Crowded Scenes Based on Group Motion Features
Small Sample Image Recognition Based on CNN and RBFNN
Small Sample Image Recognition Based on CNN and RBFNN
Channel Modeling and Characteristics for High Altitude Platform Stations Communication System
Channel Modeling and Characteristics for High Altitude Platform Stations Communication System
A Method for Acquiring Network Information from Linux Memory Image in Software-Defined Networking
A Method for Acquiring Network Information from Linux Memory Image in Software-Defined Networking
教師服務
合作出版
期刊徵稿
聯絡高教
高教FB
讀者服務
圖書目錄
教育期刊
訂購服務
活動訊息
數位服務
高等教育知識庫
國際資料庫收錄
投審稿系統
DOI註冊
線上購買
高點網路書店
元照網路書店
博客來網路書店
教育資源
教育網站
國際教育網站
關於高教
高教簡介
出版授權
合作單位
知識達
知識達
知識達
知識達
知識達
知識達
版權所有‧轉載必究 Copyright2011 高等教育文化事業股份有限公司 All Rights Reserved
服務信箱:edubook@edubook.com.tw 台北市館前路 26 號 6 樓 Tel:+886-2-23885899 Fax:+886-2-23892500