Basic Search / Search Result

  • Search Result: 97results Search Strategy: "Yuan-Cheng Lai".ecommittee (Phrase) and edept.raw="Department of Information Management" and year="108" and year="108"


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    Combining Connectionist Temporal Classification with Gaussian Mixture Models for English Phone Recognition

    2

    Cache Slicing with Minimum QoS Violation Probability in the Cloud and Edge Systems
    • Department of Information Management /108/ Master
    • Author: Pei-Yin Chen Advisor: Yuan-Cheng Lai
    • The 5G network architecture includes radio access network (RAN) and core network. However, diverse …
    • Clicks: 798Downloads: 0
    • Full text public date 2025/08/19 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    3

    Researching on Evaluation of Indoor Positioning Technologies in Different Fields

    4

    The Entrepreneurship of Hojjaa A Cross-Border Electronic Commerce
    • Department of Information Management /108/ Master
    • Author: Huei-Jing Huang Advisor: Sun-Jen Huang
    • With the blossoming of internet, computers and mobile devices, cross-border electronic commerce get…
    • Clicks: 965Downloads: 0
    • Full text public date 2023/07/12 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    5

    A Study on Combining GA and CNN to Search Optimized Filter for Image Classification
    • Department of Information Management /108/ Master
    • Author: Li-Ching Lien Advisor: Chuan-Kai Yang
    • Filters of convolutional neural network have important impact on extracting features for image cl…
    • Clicks: 858Downloads: 0
    • Full text public date 2025/07/05 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    6

    Bricolage-based Task Technology Fit Model of Innovative IT Applications-A Case Study of Chang Chun Group
    • Department of Information Management /108/ Master
    • Author: Ru-Ru Wang Advisor: Tzu-Chuan Chou
    • The Third Industrial Revolution has triggered the flourish of Information Technology and brought th…
    • Clicks: 675Downloads: 0
    • Full text public date 2025/07/24 (Intranet public)
    • Full text public date 2025/07/24 (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    7

    Design and Development of Cooperative Learning Teaching-Aided Software System
    • Department of Information Management /108/ Master
    • Author: Ping-Jui Chiang Advisor: Sun-Jen Huang
    • In recent years, studies have pointed out that the rigorous Problem-Based Learning teaching method …
    • Clicks: 692Downloads: 0
    • Full text public date 2025/06/08 (Intranet public)
    • Full text public date 2025/06/08 (Internet public)
    • Full text public date 2025/06/08 (National library)

    8

    beanfun! carves out a niche for Gamania

    9

    A Generative Adversarial Network to Generate Link Flooding Attacks
    • Department of Information Management /108/ Master
    • Author: Yu-Ching Huang Advisor: Yuan-Cheng Lai
    • Link Flooding Attack (LFA) will not only attack one server but a target area, which include several…
    • Clicks: 1154Downloads: 0
    • Full text public date 2025/08/21 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    10

    On the Design of Secure Authentication for Blockchain-­Enabled IoT Environment