電腦學刊,202002,(31:1期)-ERICDATA高等教育知識庫
熱門:
朱丽彬
黃光男
王美玲
王善边
崔雪娟
黃乃熒
首頁
臺灣期刊
學校系所
學協會
民間出版
大陸/海外期刊
政府機關
學校系所
學協會
民間出版
DOI註冊服務
首頁
臺灣期刊
學協會基金會
電腦學刊
202002 (31:1期)
電腦學刊
Journal of Computers
全文閱讀@
202002 (31:1期)期所有篇
Investing Strategies as Stochastic Oscillator Indicators Staying in Overreaction Zones for Consecutive Days with Big Data Concerns
Investing Strategies as Stochastic Oscillator Indicators Staying in Overreaction Zones for Consecutive Days with Big Data Concerns
HMM-based Fault Diagnosis for Web Service Composition
HMM-based Fault Diagnosis for Web Service Composition
A Crowd Video Retrieval Framework Using Generic Descriptors
A Crowd Video Retrieval Framework Using Generic Descriptors
Deeply Integrated Convolutional Neural Networks
Deeply Integrated Convolutional Neural Networks
Reliability of Cluster-based Mobile Cloud Computing Enhancement Using Optimal Byzantine Agreement
Reliability of Cluster-based Mobile Cloud Computing Enhancement Using Optimal Byzantine Agreement
High Precision Calibration Method for Binocular Visual System
High Precision Calibration Method for Binocular Visual System
An Improved Particle Swarm Optimization Algorithm Based on Restart Strategy
An Improved Particle Swarm Optimization Algorithm Based on Restart Strategy
An Improved Memetic Algorithm for Traction Characteristic Curve Fitting of Urban Rail Vehicle
An Improved Memetic Algorithm for Traction Characteristic Curve Fitting of Urban Rail Vehicle
Using Analytic Hierarchy Process to Assess Network Video Quality
Using Analytic Hierarchy Process to Assess Network Video Quality
Effective Hierarchical Cluster Analysis Based on New Clustering Validity Index
Effective Hierarchical Cluster Analysis Based on New Clustering Validity Index
Multi-Authority Attribute-based Encryption Resilient against Auxiliary-Input Leakage
Multi-Authority Attribute-based Encryption Resilient against Auxiliary-Input Leakage
Multi-object Cosegmentation Using Density-based Clustering
Multi-object Cosegmentation Using Density-based Clustering
Cross-regional Cross-level Encryption Collaborative Data Transmission
Cross-regional Cross-level Encryption Collaborative Data Transmission
A Face Recognition System on Embedded Device
A Face Recognition System on Embedded Device
Research on Cache Timing Template Attack Based on KNN Algorithm
Research on Cache Timing Template Attack Based on KNN Algorithm
A Situation Awareness System for the Information Security of Power Grid
A Situation Awareness System for the Information Security of Power Grid
Neutral Point Clamped Single-phase Three-level Rectifier Operated with SHE-PWM Based on Improved Particle Swarm Optimization
Neutral Point Clamped Single-phase Three-level Rectifier Operated with SHE-PWM Based on Improved Particle Swarm Optimization
A Web Service Composition Model k2-MDD-WS
A Web Service Composition Model k2-MDD-WS
Abnormal-Gait Based Auxiliary Diagnosis System for Parkinson’s Disease
Abnormal-Gait Based Auxiliary Diagnosis System for Parkinson’s Disease
Multi-pose Face Recognition Based on Convolutional Neural Network
Multi-pose Face Recognition Based on Convolutional Neural Network
Generate Football News from Live Webcast Scripts Based on Character-CNN with Five Strokes
Generate Football News from Live Webcast Scripts Based on Character-CNN with Five Strokes
Webshell Detection Based on Multi-classifier Ensemble Model
Webshell Detection Based on Multi-classifier Ensemble Model
Power Data Classification Method Based on Selective Ensemble Learning
Power Data Classification Method Based on Selective Ensemble Learning
Research on Security Communication and Access Control of Grid Service
Research on Security Communication and Access Control of Grid Service
Image Segmentation Method for Brassica Napus L. Based on PSO and Color Space Model
Image Segmentation Method for Brassica Napus L. Based on PSO and Color Space Model
Gesture Recognition System Based on Normalized Neural Network
Gesture Recognition System Based on Normalized Neural Network
Study on V2V Clustering Algorithm in Heterogeneous Network Based on VANET and LTE-V2X
Study on V2V Clustering Algorithm in Heterogeneous Network Based on VANET and LTE-V2X
Deep Learning in Aquaculture: A Review
Deep Learning in Aquaculture: A Review
Chosen-ciphertext Secure Hierarchical Identity-based Encryption from R-LWE
Chosen-ciphertext Secure Hierarchical Identity-based Encryption from R-LWE
教師服務
合作出版
期刊徵稿
聯絡高教
高教FB
讀者服務
圖書目錄
教育期刊
訂購服務
活動訊息
數位服務
高等教育知識庫
國際資料庫收錄
投審稿系統
DOI註冊
線上購買
高點網路書店
元照網路書店
博客來網路書店
教育資源
教育網站
國際教育網站
關於高教
高教簡介
出版授權
合作單位
知識達
知識達
知識達
知識達
知識達
知識達
版權所有‧轉載必究 Copyright2011 高等教育文化事業股份有限公司 All Rights Reserved
服務信箱:edubook@edubook.com.tw 台北市館前路 26 號 6 樓 Tel:+886-2-23885899 Fax:+886-2-23892500