Basic Search / Search Result

  • Search Result: 53results Search Strategy: "項天瑞".cadvisor (Phrase)


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    Learning Motion Representation for UAV Dynamic Obstacle Avoidance Perception

    2

    Dense-UFont:Generating Chinese Fonts from a Small Font Sample Set
    • Department of Computer Science and Information Engineering /110/ Master
    • Author: Tsung-Wei Weng Advisor:
    • Building a complete personalized Chinese font library is a relatively difficult task compared to fo…
    • Clicks: 545Downloads: 0
    • Full text public date 2025/05/04 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    3

    Multi-DoF cooperative transportation with two drones: based on vision and closed-loop system
    • Department of Computer Science and Information Engineering /108/ Master
    • Author: Shu-Ting Li Advisor:
    • Nowadays, object transport is the main application of automated robots, and ground robots are widel…
    • Clicks: 715Downloads: 0
    • Full text public date 2025/01/22 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    4

    Eye-Fixatoin-Based Multi-Patch Aggregation Image Aesthetics Score Assessment System
    • Department of Computer Science and Information Engineering /108/ Master
    • Author: Yung-Yuan Tseng Advisor:
    • As social media sites continue to advance, the aesthetic judgment of a high-quality photo-graph is …
    • Clicks: 538Downloads: 0
    • Full text public date 2025/08/27 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    5

    Identity Authentication Using EEG Characteristics in Visual CAPTCHA Recognition
    • Department of Computer Science and Information Engineering /105/ Master
    • Author: Zheng-Yang Hong Advisor:
    • With the rapid development of internet, keeping the security of user accounts has become essential.…
    • Clicks: 547Downloads: 0
    • Full text public date 2022/08/15 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    6

    Image-based 3D Model Construction of Buildings using Autonomous Quadcopter
    • Department of Computer Science and Information Engineering /104/ Master
    • Author: Chun-Min Yu Advisor:
    • In this paper, we present a monocular vision-based autonomous exploration system by using an open s…
    • Clicks: 667Downloads: 0
    • Full text public date 2021/08/23 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    7

    A Personal Cloud Storage System for Device and User Mobility
    • Department of Computer Science and Information Engineering /103/ Master
    • Author: Hao-Yun Liu Advisor:
    • Cloud storage service has been one of the popular cloud services in recent years.To provide low lat…
    • Clicks: 553Downloads: 2
    • Full text public date 2020/08/06 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    8

    Protecting location privacy in wireless sensor networks
    • Department of Computer Science and Information Engineering /103/ Master
    • Author: Hao-wen Deng Advisor:
    • Since wireless sensor networks (WSNs) are often deployed in open environments,attackers can eavesdr…
    • Clicks: 485Downloads: 0
    • Full text public date 2020/02/09 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    9

    Buffer underflow avoidance scheme for video streaming over wireless ad-hoc networks
    • Department of Computer Science and Information Engineering /101/ Master
    • Author: Hsun-che Li Advisor:
    • Maintaining sufficient buffer is crucial for multimedia streaming services. Buffer overflow causes …
    • Clicks: 534Downloads: 0
    • Full text public date 2018/07/25 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    10

    Independent Adaptive Top-k Monitoring in Wireless Sensor Networks