Basic Search / Search Result

  • Search Result: 211results Search Strategy: "吳宗成 ".cadvisor (Phrase)


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    Key Success Factors for Deploying Business Process Management for Manufacturing Enterprises
    • Department of Information Management /109/ Master
    • Author: Wei-Jen Tsai Advisor:
    • Business Process Management refers to the activities or process functions related to process manage…
    • Clicks: 965Downloads: 0
    • Full text public date 2026/02/07 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    2

    Design and Implementation of Q-Learning-based Red/Blue Team Cyber Offensive and Defensive Exercise
    • Department of Information Management /108/ Master
    • Author: Ying-Tang Kuo Advisor:
    • As the Internet becomes increasingly widespread, what follows next is the endless cyber-attacks. Th…
    • Clicks: 713Downloads: 0
    • Full text public date 2025/07/20 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    3

    A Study on Building a Scenic Area Tourist Hotel Industry Ecosystem
    • Department of Information Management /108/ Master
    • Author: Ching-Lin Wu Advisor:
    • Tourist hotels in Taiwan’s scenic areas face many challenges. These include competition from the in…
    • Clicks: 537Downloads: 0
    • Full text public date 2025/07/21 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    4

    Study of Home-Care for Elder People by AI-based Applications
    • Department of Information Management /108/ Master
    • Author: Ming-Iu Lai Advisor:
    • With the advance of medical technology, the average life expectancy of human beings increases conti…
    • Clicks: 925Downloads: 0
    • Full text public date 2025/07/20 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    5

    Design of Retail Customer Relationship Management System in Accordance with GDPR
    • Department of Information Management /108/ Master
    • Author: Ming-Hung Kao Advisor:
    • Today's retail industry market is changing rapidly, from the previous regional retail to e-commerce…
    • Clicks: 619Downloads: 0
    • Full text public date 2025/07/21 (Intranet public)
    • Full text public date 2030/07/21 (Internet public)
    • Full text public date 2030/07/21 (National library)

    6

    Malicious URLs Detection by Deep Learning Approach
    • Department of Information Management /106/ Master
    • Author: CHIANG-WEI Tzeng Advisor:
    • Since the Internet technology improves day by day, the number of malicious URLs and websites is…
    • Clicks: 741Downloads: 13

    7

    Multiple Group signature with Threshold authorization and Document Decomposition
    • Department of Information Management /106/ Master
    • Author: Huei-Yuan Kao Advisor:
    • In recent years, many large-scale integrated projects have been launched, a large and complex integ…
    • Clicks: 527Downloads: 3
    • Full text public date 2023/07/26 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    8

    Application of Smart Contract in Sales Management - A Case of Cars Selling
    • Department of Information Management /106/ Master
    • Author: CHAN WEN DA Advisor:
    • The blockchain has the characteristics of decentralization, openness, anonymity and non-tamperabili…
    • Clicks: 469Downloads: 1

    9

    Authorization Scheme Based on Self-certified Signcryption Cryptography
    • Department of Information Management /106/ Master
    • Author: Ya-Wen Lee Advisor:
    • In this study, we proposed an authorization scheme which allows users of the organization use certa…
    • Clicks: 393Downloads: 1
    • Full text public date 2023/07/27 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    10

    Anti-replicated mechanism with traitor tracing for mobile apps
    • Department of Information Management /104/ Master
    • Author: Chian-An Lo Advisor:
    • In 2014, Tsai et al. presented an android copy protection mechanism based on dynamic loading. App d…
    • Clicks: 455Downloads: 0
    • Full text public date 2021/08/29 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)