Basic Search / Search Result

  • Search Result: 11results Search Strategy: "Department of Computer Science and Information Engineering".edept (Phrase) and ekeyword.raw="Markov chain"


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    Performance analysis of functional split in 5G controllers with delay and loss priorities
    • Department of Electrical Engineering /111/ Master
    • Author: Fang-Wen Lin Advisor: Shun-Ping Chung
    • In recent years, 5G technology and the development of the Internet of Things (IoT) are inseparable…
    • Clicks: 769Downloads: 0
    • Full text public date 2025/07/28 (Intranet public)
    • Full text public date 2025/07/28 (Internet public)
    • Full text public date 2025/07/28 (National library)

    2

    Design and Analysis of High Performance Wireless Sensor Networks
    • Department of Electrical Engineering /103/ Doctor
    • Author: EPPY - YUNDRA Advisor: Bih-Hwang Lee
    • The IEEE 802.15.4 is one of candidates for wireless sensor networks. Wireless sensor networks consi…
    • Clicks: 823Downloads: 0
    • Full text public date 2020/07/29 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date 2020/07/29 (National library)

    3

    Cancers metastasis modeling using Markov chain and the impact assessment of healthcare policies
    • Department of Industrial Management /101/ Master
    • Author: Huai-Shen He Advisor: Kung-Jeng Wang
    • This study uses the data from the Taiwan National Health Insurance (NHI) research database between …
    • Clicks: 575Downloads: 1
    • Full text public date 2018/07/30 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date 2018/07/30 (National library)

    4

    Malware Detection Based on Dynamic Behavior Analysis
    • Department of Computer Science and Information Engineering /100/ Master
    • Author: Chun-chih Wu Advisor: Hsing-Kuo Pao
    • Malware detection has been one of the most important research topics since the time we start to use…
    • Clicks: 510Downloads: 1
    • Full text public date 2017/07/23 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    5

    Graph-Based Behavior Analysis for User Verification
    • Department of Computer Science and Information Engineering /98/ Master
    • Author: Fong-Ruei Lee Advisor: Hsing-Kuo Pao
    • Part of our lives exist in an electronic community. Many of our activities rely on web services lik…
    • Clicks: 654Downloads: 2
    • Full text public date 2013/08/03 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    6

    A Time Series Forecast Based on Fuzzy-Markov-Fourier Grey Model

    7

    Performance analysis of functional split in 5G controllers with impatience

    8

    Scheduling of the URLLC system with time-varying channel

    9

    Information theory based approach for constructability assessment in truss structural systems
    • Department of Architecture /105/ Doctor
    • Author: Mei-Chih Chang Advisor: Shen-Guan Shih
    • The importance of constructability is often understated in the design phase of a construction proje…
    • Clicks: 372Downloads: 15

    10

    Optimal Service Channel Selection in WAVE/IEEE 802.11p Networks
    • Department of Information Management /99/ Master
    • Author: CHU-HAN SUN Advisor: Yuan-Cheng Lai
    • The Wireless Access in Vehicular Environments (WAVE) standard is proposed as an amendment to IEEE 8…
    • Clicks: 693Downloads: 1
    • Full text public date 2016/07/15 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)