Basic Search
/ Search Result
Search Result: 211results Search Strategy: "吳宗成".cadvisor (Phrase)
Refine the results:
Search
Expand the trend chart of search results
Individualized services
:
My Search Strategy
Sort:
Results per page:
Selected0results
Select all on this page
|
1
|
Key Success Factors for Deploying Business Process Management for Manufacturing Enterprises
-
Department of Information Management
/109/ Master
-
Author:
Wei-Jen Tsai
Advisor:
-
Business Process Management refers to the activities or process functions related to process manage…
-
Clicks: 965
Downloads: 0
- Full text public date 2026/02/07 (Intranet public)
- Full text public date This full text is not authorized to be published. (Internet public)
- Full text public date This full text is not authorized to be published. (National library)
|
2
|
Design and Implementation of Q-Learning-based Red/Blue Team Cyber Offensive and Defensive Exercise
-
Department of Information Management
/108/ Master
-
Author:
Ying-Tang Kuo
Advisor:
-
As the Internet becomes increasingly widespread, what follows next is the endless cyber-attacks. Th…
-
Clicks: 713
Downloads: 0
- Full text public date 2025/07/20 (Intranet public)
- Full text public date This full text is not authorized to be published. (Internet public)
- Full text public date This full text is not authorized to be published. (National library)
|
3
|
A Study on Building a Scenic Area Tourist Hotel Industry Ecosystem
-
Department of Information Management
/108/ Master
-
Author:
Ching-Lin Wu
Advisor:
-
Tourist hotels in Taiwan’s scenic areas face many challenges. These include competition from the in…
-
Clicks: 537
Downloads: 0
- Full text public date 2025/07/21 (Intranet public)
- Full text public date This full text is not authorized to be published. (Internet public)
- Full text public date This full text is not authorized to be published. (National library)
|
4
|
Study of Home-Care for Elder People by AI-based Applications
-
Department of Information Management
/108/ Master
-
Author:
Ming-Iu Lai
Advisor:
-
With the advance of medical technology, the average life expectancy of human beings increases conti…
-
Clicks: 925
Downloads: 0
- Full text public date 2025/07/20 (Intranet public)
- Full text public date This full text is not authorized to be published. (Internet public)
- Full text public date This full text is not authorized to be published. (National library)
|
5
|
Design of Retail Customer Relationship Management System in Accordance with GDPR
-
Department of Information Management
/108/ Master
-
Author:
Ming-Hung Kao
Advisor:
-
Today's retail industry market is changing rapidly, from the previous regional retail to e-commerce…
-
Clicks: 619
Downloads: 0
- Full text public date 2025/07/21 (Intranet public)
- Full text public date 2030/07/21 (Internet public)
- Full text public date 2030/07/21 (National library)
|
6
|
Malicious URLs Detection by Deep Learning Approach
-
Department of Information Management
/106/ Master
-
Author:
CHIANG-WEI Tzeng
Advisor:
-
Since the Internet technology improves day by day, the number of malicious URLs and websites is…
-
Clicks: 741
Downloads: 13
|
7
|
Multiple Group signature with Threshold authorization and Document Decomposition
-
Department of Information Management
/106/ Master
-
Author:
Huei-Yuan Kao
Advisor:
-
In recent years, many large-scale integrated projects have been launched, a large and complex integ…
-
Clicks: 527
Downloads: 3
- Full text public date 2023/07/26 (Intranet public)
- Full text public date This full text is not authorized to be published. (Internet public)
- Full text public date This full text is not authorized to be published. (National library)
|
8
|
Application of Smart Contract in Sales Management - A Case of Cars Selling
-
Department of Information Management
/106/ Master
-
Author:
CHAN WEN DA
Advisor:
-
The blockchain has the characteristics of decentralization, openness, anonymity and non-tamperabili…
-
Clicks: 469
Downloads: 1
|
9
|
Authorization Scheme Based on Self-certified Signcryption Cryptography
-
Department of Information Management
/106/ Master
-
Author:
Ya-Wen Lee
Advisor:
-
In this study, we proposed an authorization scheme which allows users of the organization use certa…
-
Clicks: 394
Downloads: 1
- Full text public date 2023/07/27 (Intranet public)
- Full text public date This full text is not authorized to be published. (Internet public)
- Full text public date This full text is not authorized to be published. (National library)
|
10
|
Anti-replicated mechanism with traitor tracing for mobile apps
-
Department of Information Management
/104/ Master
-
Author:
Chian-An Lo
Advisor:
-
In 2014, Tsai et al. presented an android copy protection mechanism based on dynamic loading. App d…
-
Clicks: 455
Downloads: 0
- Full text public date 2021/08/29 (Intranet public)
- Full text public date This full text is not authorized to be published. (Internet public)
- Full text public date This full text is not authorized to be published. (National library)
|