Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"NSYSU" +contributor:("Chia-Mei Chen"). Showing records 1 – 30 of 90 total matches.

[1] [2] [3]

Search Limiters

Last 2 Years | English Only

Languages

▼ Search Limiters


NSYSU

1. Chen, Pao-Tien. A Study of Information Security for Computerized Process Control.

Degree: Master, Information Management, 2008, NSYSU

 In manufacturing industrial, for example, petrochemical plant, the promotion of technology makes manufacturing process computerization to be possible. The systems which control the manufacturing process… (more)

Subjects/Keywords: Process Control Network; Process Control System; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, P. (2008). A Study of Information Security for Computerized Process Control. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0612108-134113

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Pao-Tien. “A Study of Information Security for Computerized Process Control.” 2008. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0612108-134113.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Pao-Tien. “A Study of Information Security for Computerized Process Control.” 2008. Web. 17 Nov 2019.

Vancouver:

Chen P. A Study of Information Security for Computerized Process Control. [Internet] [Thesis]. NSYSU; 2008. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0612108-134113.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen P. A Study of Information Security for Computerized Process Control. [Thesis]. NSYSU; 2008. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0612108-134113

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

2. Li, Yu-Yun. Botnet Detection Based on Ant Colony.

Degree: Master, Information Management, 2012, NSYSU

 Botnet is the biggest threaten now. Botmasters inject bot code into normal computers so that computers become bots under control by the botmasters. Every bot… (more)

Subjects/Keywords: Ant algorithm; IP detection; Botnet

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, Y. (2012). Botnet Detection Based on Ant Colony. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0914112-080212

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Li, Yu-Yun. “Botnet Detection Based on Ant Colony.” 2012. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0914112-080212.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Li, Yu-Yun. “Botnet Detection Based on Ant Colony.” 2012. Web. 17 Nov 2019.

Vancouver:

Li Y. Botnet Detection Based on Ant Colony. [Internet] [Thesis]. NSYSU; 2012. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0914112-080212.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Li Y. Botnet Detection Based on Ant Colony. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0914112-080212

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

3. Yang, Chia-hui. Code Classification Based on Structure Similarity.

Degree: Master, Information Management, 2012, NSYSU

 Automatically classifying malware variants source code is the most important research issue in the field of digital forensics. By means of malware classification, we can… (more)

Subjects/Keywords: Malware Classification; Source Code; Static Analysis; Structure Similarity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yang, C. (2012). Code Classification Based on Structure Similarity. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0914112-155523

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yang, Chia-hui. “Code Classification Based on Structure Similarity.” 2012. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0914112-155523.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yang, Chia-hui. “Code Classification Based on Structure Similarity.” 2012. Web. 17 Nov 2019.

Vancouver:

Yang C. Code Classification Based on Structure Similarity. [Internet] [Thesis]. NSYSU; 2012. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0914112-155523.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yang C. Code Classification Based on Structure Similarity. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0914112-155523

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

4. Jian, Wan-Rong. Efficient Algorithms for Modular Exponentiation by Block Method in Sparse Form.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 Computing A^X mod n or A^XB^Y mod n for large X, Y, and n is very important in many ElGamal-like public key cryptosystems. In this… (more)

Subjects/Keywords: Sparse Form; Modular Exponentiation; Block Method

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jian, W. (2009). Efficient Algorithms for Modular Exponentiation by Block Method in Sparse Form. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621109-172157

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jian, Wan-Rong. “Efficient Algorithms for Modular Exponentiation by Block Method in Sparse Form.” 2009. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621109-172157.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jian, Wan-Rong. “Efficient Algorithms for Modular Exponentiation by Block Method in Sparse Form.” 2009. Web. 17 Nov 2019.

Vancouver:

Jian W. Efficient Algorithms for Modular Exponentiation by Block Method in Sparse Form. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621109-172157.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jian W. Efficient Algorithms for Modular Exponentiation by Block Method in Sparse Form. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621109-172157

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

5. Chen, Po-Yuan. The System Design and Implementation to Support Dynamic Web Services Selection.

Degree: Master, Information Management, 2012, NSYSU

 Service-Oriented Architecture (SOA) is intended for the integration of heterogeneous applications. Complex business processes are composed by a group of specific Web services using WS-BPEL… (more)

Subjects/Keywords: WS-BPEL; SOA; Web Service; Dynamic Web Services Selection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, P. (2012). The System Design and Implementation to Support Dynamic Web Services Selection. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0209112-143442

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Po-Yuan. “The System Design and Implementation to Support Dynamic Web Services Selection.” 2012. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0209112-143442.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Po-Yuan. “The System Design and Implementation to Support Dynamic Web Services Selection.” 2012. Web. 17 Nov 2019.

Vancouver:

Chen P. The System Design and Implementation to Support Dynamic Web Services Selection. [Internet] [Thesis]. NSYSU; 2012. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0209112-143442.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen P. The System Design and Implementation to Support Dynamic Web Services Selection. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0209112-143442

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

6. Hung, Chung-yang. An Approach to eBook Topics Trend Discovery Based on LDA and Usage Log.

Degree: Master, Information Management, 2012, NSYSU

 With the growth of digital content industry, publishers start to provide online services for ebook search, reading and downloading. Users can access to online resources… (more)

Subjects/Keywords: LDA; Topic Model; Topic; Usage Log; Ebook; LCC; LCSH

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hung, C. (2012). An Approach to eBook Topics Trend Discovery Based on LDA and Usage Log. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0213112-123624

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hung, Chung-yang. “An Approach to eBook Topics Trend Discovery Based on LDA and Usage Log.” 2012. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0213112-123624.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hung, Chung-yang. “An Approach to eBook Topics Trend Discovery Based on LDA and Usage Log.” 2012. Web. 17 Nov 2019.

Vancouver:

Hung C. An Approach to eBook Topics Trend Discovery Based on LDA and Usage Log. [Internet] [Thesis]. NSYSU; 2012. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0213112-123624.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hung C. An Approach to eBook Topics Trend Discovery Based on LDA and Usage Log. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0213112-123624

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

7. Liang, Jin-ming. Using Hybrid Artificial Neural Network to Estimate Software Effort.

Degree: Master, Information Management, 2015, NSYSU

 Abstract In this study, we propose a hybrid artificial neural network for software effort estimation , which developed by fuzzy set, clustering theory and least… (more)

Subjects/Keywords: Software Effort; Estimate; Clustering Theory; Fuzzy Set; Hybrid Artificial Neural Network

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liang, J. (2015). Using Hybrid Artificial Neural Network to Estimate Software Effort. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0613115-111710

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liang, Jin-ming. “Using Hybrid Artificial Neural Network to Estimate Software Effort.” 2015. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0613115-111710.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liang, Jin-ming. “Using Hybrid Artificial Neural Network to Estimate Software Effort.” 2015. Web. 17 Nov 2019.

Vancouver:

Liang J. Using Hybrid Artificial Neural Network to Estimate Software Effort. [Internet] [Thesis]. NSYSU; 2015. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0613115-111710.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liang J. Using Hybrid Artificial Neural Network to Estimate Software Effort. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0613115-111710

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

8. Weng, Hui-Ze. Performance Analysis of Graph Algorithms using Graphics Processing Units.

Degree: Master, Computer Science and Engineering, 2010, NSYSU

 The GPU significantly improves the computing power by increasing the number of cores in recent years. The design principle of GPU focuses on the parallism… (more)

Subjects/Keywords: GPU; Parallel computing; Multi-Core

Page 1 Page 2 Page 3 Page 4 Page 5

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Weng, H. (2010). Performance Analysis of Graph Algorithms using Graphics Processing Units. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0902110-135238

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Weng, Hui-Ze. “Performance Analysis of Graph Algorithms using Graphics Processing Units.” 2010. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0902110-135238.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Weng, Hui-Ze. “Performance Analysis of Graph Algorithms using Graphics Processing Units.” 2010. Web. 17 Nov 2019.

Vancouver:

Weng H. Performance Analysis of Graph Algorithms using Graphics Processing Units. [Internet] [Thesis]. NSYSU; 2010. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0902110-135238.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Weng H. Performance Analysis of Graph Algorithms using Graphics Processing Units. [Thesis]. NSYSU; 2010. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0902110-135238

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

9. Hsin, Tsung-Chin. Design and Implementation of User Authentication Based on Keystroke Dynamic.

Degree: Master, Computer Science and Engineering, 2008, NSYSU

 In the traditional login systems, we use the username and the password to identify the legalities of users. It is a simple and convenient way… (more)

Subjects/Keywords: User Authentication; Biometrics Feature; Keystroke Dynamic

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hsin, T. (2008). Design and Implementation of User Authentication Based on Keystroke Dynamic. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0128108-135223

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hsin, Tsung-Chin. “Design and Implementation of User Authentication Based on Keystroke Dynamic.” 2008. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0128108-135223.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hsin, Tsung-Chin. “Design and Implementation of User Authentication Based on Keystroke Dynamic.” 2008. Web. 17 Nov 2019.

Vancouver:

Hsin T. Design and Implementation of User Authentication Based on Keystroke Dynamic. [Internet] [Thesis]. NSYSU; 2008. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0128108-135223.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hsin T. Design and Implementation of User Authentication Based on Keystroke Dynamic. [Thesis]. NSYSU; 2008. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0128108-135223

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

10. Hu, Ruei-shian. Information Security Risk Assessment Model â A Case Study of a Semiconductor Assembly Company.

Degree: Master, Information Management, 2008, NSYSU

 The information security incidents have most often been reported. The loss of enterprise operation is more and more serious because of information security incidents. There… (more)

Subjects/Keywords: Assets Threats; Assets Vulnerability; Assets Evaluation; Risk Assessment; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hu, R. (2008). Information Security Risk Assessment Model â A Case Study of a Semiconductor Assembly Company. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730108-112423

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hu, Ruei-shian. “Information Security Risk Assessment Model â A Case Study of a Semiconductor Assembly Company.” 2008. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730108-112423.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hu, Ruei-shian. “Information Security Risk Assessment Model â A Case Study of a Semiconductor Assembly Company.” 2008. Web. 17 Nov 2019.

Vancouver:

Hu R. Information Security Risk Assessment Model â A Case Study of a Semiconductor Assembly Company. [Internet] [Thesis]. NSYSU; 2008. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730108-112423.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hu R. Information Security Risk Assessment Model â A Case Study of a Semiconductor Assembly Company. [Thesis]. NSYSU; 2008. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730108-112423

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

11. Lin, Yu-Ping. Use Genetic Algorithms to Construct Mutual Fund Portfolio Based on Perceived Risk Levels.

Degree: Master, Information Management, 2008, NSYSU

 Because the government changed laws and opened the market progressively in recent years, the financial market in Taiwan becomes more and more liberal and international;… (more)

Subjects/Keywords: perceived risk levels; asset allocation; genetic algorithm; mutual fund

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, Y. (2008). Use Genetic Algorithms to Construct Mutual Fund Portfolio Based on Perceived Risk Levels. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0825108-120447

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Yu-Ping. “Use Genetic Algorithms to Construct Mutual Fund Portfolio Based on Perceived Risk Levels.” 2008. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0825108-120447.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Yu-Ping. “Use Genetic Algorithms to Construct Mutual Fund Portfolio Based on Perceived Risk Levels.” 2008. Web. 17 Nov 2019.

Vancouver:

Lin Y. Use Genetic Algorithms to Construct Mutual Fund Portfolio Based on Perceived Risk Levels. [Internet] [Thesis]. NSYSU; 2008. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0825108-120447.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin Y. Use Genetic Algorithms to Construct Mutual Fund Portfolio Based on Perceived Risk Levels. [Thesis]. NSYSU; 2008. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0825108-120447

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

12. Hou, Ya-Fang. An Improvement of The Multiple Polynomial Quadratic Sieve.

Degree: Master, Computer Science and Engineering, 2008, NSYSU

 Large integer factoring problem is a difficult computing problem. The security of many public-key cryptograohy system depend on the large interger factoring problem. Dr. Guan… (more)

Subjects/Keywords: the multiple polynomial quadratic sieve; factoring; quadratic sieve

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hou, Y. (2008). An Improvement of The Multiple Polynomial Quadratic Sieve. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0825108-013923

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hou, Ya-Fang. “An Improvement of The Multiple Polynomial Quadratic Sieve.” 2008. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0825108-013923.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hou, Ya-Fang. “An Improvement of The Multiple Polynomial Quadratic Sieve.” 2008. Web. 17 Nov 2019.

Vancouver:

Hou Y. An Improvement of The Multiple Polynomial Quadratic Sieve. [Internet] [Thesis]. NSYSU; 2008. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0825108-013923.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hou Y. An Improvement of The Multiple Polynomial Quadratic Sieve. [Thesis]. NSYSU; 2008. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0825108-013923

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

13. Lin, Meng-Xiang. A Programming Learning System for Individuals.

Degree: Master, Information Management, 2008, NSYSU

 With the development of computer technology and Internet, e-Learning has become more and more important to support studentâs learning. Novice students usually lack adequate assisting… (more)

Subjects/Keywords: extendable item-bank; Problem-based Learning; Web2.0; Programming Learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, M. (2008). A Programming Learning System for Individuals. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0827108-121031

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Meng-Xiang. “A Programming Learning System for Individuals.” 2008. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0827108-121031.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Meng-Xiang. “A Programming Learning System for Individuals.” 2008. Web. 17 Nov 2019.

Vancouver:

Lin M. A Programming Learning System for Individuals. [Internet] [Thesis]. NSYSU; 2008. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0827108-121031.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin M. A Programming Learning System for Individuals. [Thesis]. NSYSU; 2008. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0827108-121031

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

14. Chen, Hsiao-ying. A Comparison of Three Verification Methods for Keystroke Dynamic.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 In login systems, a user is asked to enter his correct account and password in order to be allowed to enter to the system. The… (more)

Subjects/Keywords: User Authentication; Keystroke Dynamic; Biometrics Feature

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, H. (2009). A Comparison of Three Verification Methods for Keystroke Dynamic. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0211109-214139

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Hsiao-ying. “A Comparison of Three Verification Methods for Keystroke Dynamic.” 2009. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0211109-214139.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Hsiao-ying. “A Comparison of Three Verification Methods for Keystroke Dynamic.” 2009. Web. 17 Nov 2019.

Vancouver:

Chen H. A Comparison of Three Verification Methods for Keystroke Dynamic. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0211109-214139.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen H. A Comparison of Three Verification Methods for Keystroke Dynamic. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0211109-214139

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

15. Tsai, Wan-yi. Malicious Web Page Detection Based on Anomaly Behavior.

Degree: Master, Information Management, 2009, NSYSU

 Because of the convenience of the Internet, we rely closely on the Internet to do information searching and sharing, forum discussion, and online services. However,… (more)

Subjects/Keywords: drive-by download; malicious web page; anomaly behavior

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tsai, W. (2009). Malicious Web Page Detection Based on Anomaly Behavior. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0204109-163602

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tsai, Wan-yi. “Malicious Web Page Detection Based on Anomaly Behavior.” 2009. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0204109-163602.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tsai, Wan-yi. “Malicious Web Page Detection Based on Anomaly Behavior.” 2009. Web. 17 Nov 2019.

Vancouver:

Tsai W. Malicious Web Page Detection Based on Anomaly Behavior. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0204109-163602.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tsai W. Malicious Web Page Detection Based on Anomaly Behavior. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0204109-163602

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

16. Chen, Yan-heng. Analysis of Another Left Shift Binary GCD Algorithm.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 In general, to compute the modular inverse is very important in information security, many encrypt/decrypt and signature algorithms always need to use it. In 2007,… (more)

Subjects/Keywords: Self-test; Modular inverse; GCD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Y. (2009). Analysis of Another Left Shift Binary GCD Algorithm. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714109-121741

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Yan-heng. “Analysis of Another Left Shift Binary GCD Algorithm.” 2009. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714109-121741.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Yan-heng. “Analysis of Another Left Shift Binary GCD Algorithm.” 2009. Web. 17 Nov 2019.

Vancouver:

Chen Y. Analysis of Another Left Shift Binary GCD Algorithm. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714109-121741.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen Y. Analysis of Another Left Shift Binary GCD Algorithm. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714109-121741

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

17. Wu, De-kai. A Heuristic Algorithm for Maximizing Lifetime in Sensor Network.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 Wireless sensor network has applications in environmental surveillance, healthcare, and military operations. Because the energy of sensor nodes is limited and nodes are unable to… (more)

Subjects/Keywords: Heuristic Algorithm; Wireless Sensor Network; Lifetime

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wu, D. (2009). A Heuristic Algorithm for Maximizing Lifetime in Sensor Network. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715109-154428

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wu, De-kai. “A Heuristic Algorithm for Maximizing Lifetime in Sensor Network.” 2009. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715109-154428.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wu, De-kai. “A Heuristic Algorithm for Maximizing Lifetime in Sensor Network.” 2009. Web. 17 Nov 2019.

Vancouver:

Wu D. A Heuristic Algorithm for Maximizing Lifetime in Sensor Network. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715109-154428.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wu D. A Heuristic Algorithm for Maximizing Lifetime in Sensor Network. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715109-154428

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

18. Lin, Jia-bin. Anomaly Based Malicious URL Detection in Instant Messaging.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 Instant messaging (IM) has been a platform of spreading malware for hackers due to its popularity and immediacy. To evade anti-virus detection, hacker might send… (more)

Subjects/Keywords: Malicious URL; Instant Messaging; IM Worms

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, J. (2009). Anomaly Based Malicious URL Detection in Instant Messaging. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715109-165704

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Jia-bin. “Anomaly Based Malicious URL Detection in Instant Messaging.” 2009. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715109-165704.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Jia-bin. “Anomaly Based Malicious URL Detection in Instant Messaging.” 2009. Web. 17 Nov 2019.

Vancouver:

Lin J. Anomaly Based Malicious URL Detection in Instant Messaging. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715109-165704.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin J. Anomaly Based Malicious URL Detection in Instant Messaging. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715109-165704

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

19. Chung, Chi-Hsiu. Achieving Imitation-Based Learning for a Humanoid Robot by Evolutionary Computation.

Degree: Master, Information Management, 2009, NSYSU

 This thesis presents an imitation-based methodology, also a simple and easy way, for a service robot to learn the behaviors demonstrated by the user. With… (more)

Subjects/Keywords: Genetic Algorithm; Imitation Learning; Robot Learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chung, C. (2009). Achieving Imitation-Based Learning for a Humanoid Robot by Evolutionary Computation. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729109-002840

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chung, Chi-Hsiu. “Achieving Imitation-Based Learning for a Humanoid Robot by Evolutionary Computation.” 2009. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729109-002840.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chung, Chi-Hsiu. “Achieving Imitation-Based Learning for a Humanoid Robot by Evolutionary Computation.” 2009. Web. 17 Nov 2019.

Vancouver:

Chung C. Achieving Imitation-Based Learning for a Humanoid Robot by Evolutionary Computation. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729109-002840.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chung C. Achieving Imitation-Based Learning for a Humanoid Robot by Evolutionary Computation. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729109-002840

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

20. Chen, Yi-ling. IRC-Based Botnet Detection on IRC Server.

Degree: Master, Information Management, 2009, NSYSU

 Recently, Botnet has become one of the most severe threats on the Internet because it is hard to be prevented and cause huge losses. Prior… (more)

Subjects/Keywords: IRC Sniffer; IRC-Based Botnet; Botnet

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Y. (2009). IRC-Based Botnet Detection on IRC Server. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0806109-175029

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Yi-ling. “IRC-Based Botnet Detection on IRC Server.” 2009. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0806109-175029.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Yi-ling. “IRC-Based Botnet Detection on IRC Server.” 2009. Web. 17 Nov 2019.

Vancouver:

Chen Y. IRC-Based Botnet Detection on IRC Server. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0806109-175029.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen Y. IRC-Based Botnet Detection on IRC Server. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0806109-175029

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

21. Kuo-Li, Che. Personalized Tag-based Collaborative Filtering & Context-Aware Recommendation for Multimedia.

Degree: Master, Information Management, 2009, NSYSU

 Because electronic commerce has been flourishing in recent year, the amount and the variety of information on the web have also been rapidly increasing. However,… (more)

Subjects/Keywords: multimedia; recommendation system; Folksonomy; context-awareness

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kuo-Li, C. (2009). Personalized Tag-based Collaborative Filtering & Context-Aware Recommendation for Multimedia. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0816109-212902

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kuo-Li, Che. “Personalized Tag-based Collaborative Filtering & Context-Aware Recommendation for Multimedia.” 2009. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0816109-212902.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kuo-Li, Che. “Personalized Tag-based Collaborative Filtering & Context-Aware Recommendation for Multimedia.” 2009. Web. 17 Nov 2019.

Vancouver:

Kuo-Li C. Personalized Tag-based Collaborative Filtering & Context-Aware Recommendation for Multimedia. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0816109-212902.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kuo-Li C. Personalized Tag-based Collaborative Filtering & Context-Aware Recommendation for Multimedia. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0816109-212902

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

22. Luo, Jing-Siang. Malicious Web Page Detection Based on Anomaly Semantics.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 Web services are becoming the dominant way to provide access to on-line information. Web services have a lot of applications, like e-mail, web search engine,… (more)

Subjects/Keywords: Dynamic Webpage; Malicious Webpage; Web Application

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Luo, J. (2009). Malicious Web Page Detection Based on Anomaly Semantics. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0820109-151509

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Luo, Jing-Siang. “Malicious Web Page Detection Based on Anomaly Semantics.” 2009. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0820109-151509.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Luo, Jing-Siang. “Malicious Web Page Detection Based on Anomaly Semantics.” 2009. Web. 17 Nov 2019.

Vancouver:

Luo J. Malicious Web Page Detection Based on Anomaly Semantics. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0820109-151509.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Luo J. Malicious Web Page Detection Based on Anomaly Semantics. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0820109-151509

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

23. Hung, Chun-Chieh. Verifying Web Application Vulnerabilities by Model Checking.

Degree: Master, Information Management, 2009, NSYSU

 Due to the continued development of Internet technology, more and more people are willing to take advantage of high-interaction and diverse web applications to deal… (more)

Subjects/Keywords: Model Checking; SMT; Satisfiability Modulo Theories; Web application vulnerability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hung, C. (2009). Verifying Web Application Vulnerabilities by Model Checking. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0820109-230125

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hung, Chun-Chieh. “Verifying Web Application Vulnerabilities by Model Checking.” 2009. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0820109-230125.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hung, Chun-Chieh. “Verifying Web Application Vulnerabilities by Model Checking.” 2009. Web. 17 Nov 2019.

Vancouver:

Hung C. Verifying Web Application Vulnerabilities by Model Checking. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0820109-230125.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hung C. Verifying Web Application Vulnerabilities by Model Checking. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0820109-230125

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

24. Li, Cheng-Hsuan. A Flexible Combinatorial Strategy based on Constraint Statisfaction Problem.

Degree: Master, Information Management, 2009, NSYSU

 In recent year the research field of the combinatorial testing, which can roughlybe divided into two kinds including pair-wise coverage and multi-wise coverage. a lot… (more)

Subjects/Keywords: combinatorial testing; software testing; CSP; block-box testing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, C. (2009). A Flexible Combinatorial Strategy based on Constraint Statisfaction Problem. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0823109-022837

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Li, Cheng-Hsuan. “A Flexible Combinatorial Strategy based on Constraint Statisfaction Problem.” 2009. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0823109-022837.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Li, Cheng-Hsuan. “A Flexible Combinatorial Strategy based on Constraint Statisfaction Problem.” 2009. Web. 17 Nov 2019.

Vancouver:

Li C. A Flexible Combinatorial Strategy based on Constraint Statisfaction Problem. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0823109-022837.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Li C. A Flexible Combinatorial Strategy based on Constraint Statisfaction Problem. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0823109-022837

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

25. Cheng, Shang-Wen. Teaching Programming Patterns in an Introductory Programming Course.

Degree: Master, Information Management, 2009, NSYSU

 Programming teaching is not effective from experience. Research shows that the main problem novice programmers have is not understanding the syntax and semantics of programming… (more)

Subjects/Keywords: Action Research; Programming Pattern

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheng, S. (2009). Teaching Programming Patterns in an Introductory Programming Course. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0826109-221937

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cheng, Shang-Wen. “Teaching Programming Patterns in an Introductory Programming Course.” 2009. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0826109-221937.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cheng, Shang-Wen. “Teaching Programming Patterns in an Introductory Programming Course.” 2009. Web. 17 Nov 2019.

Vancouver:

Cheng S. Teaching Programming Patterns in an Introductory Programming Course. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0826109-221937.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cheng S. Teaching Programming Patterns in an Introductory Programming Course. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0826109-221937

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

26. Lu, Yi-shan. Efficient Implementation of the Weil Pairing.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 The most efficient algorithm for solving the elliptic curve discrete logarithm problem can only be done in exponential time. Hence, we can use it in… (more)

Subjects/Keywords: Miller's algorithm; Weil Pairing; Elliptic Curve

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lu, Y. (2009). Efficient Implementation of the Weil Pairing. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0831109-235209

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lu, Yi-shan. “Efficient Implementation of the Weil Pairing.” 2009. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0831109-235209.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lu, Yi-shan. “Efficient Implementation of the Weil Pairing.” 2009. Web. 17 Nov 2019.

Vancouver:

Lu Y. Efficient Implementation of the Weil Pairing. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0831109-235209.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lu Y. Efficient Implementation of the Weil Pairing. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0831109-235209

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

27. Chu, I-chun. Phishing Detection Based on URL and TF-IDF.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 Peopel now use E-mail to communicate mutually is widespread. For example, schools convey information to students through e-mail, companies convey to the staff in charge… (more)

Subjects/Keywords: URL; Domain; Phishing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chu, I. (2009). Phishing Detection Based on URL and TF-IDF. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0908109-012739

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chu, I-chun. “Phishing Detection Based on URL and TF-IDF.” 2009. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0908109-012739.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chu, I-chun. “Phishing Detection Based on URL and TF-IDF.” 2009. Web. 17 Nov 2019.

Vancouver:

Chu I. Phishing Detection Based on URL and TF-IDF. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0908109-012739.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chu I. Phishing Detection Based on URL and TF-IDF. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0908109-012739

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

28. Hung, Jui-lin. A Study of Log Patternization for Linux-based Systems.

Degree: Master, Information Management, 2010, NSYSU

 With the rapid development of Internet technology, as well as extensive use of broadband networks, the issues of network security are increasing. In order to… (more)

Subjects/Keywords: Log analyzer; Log patternization; String Similarity Comparision

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hung, J. (2010). A Study of Log Patternization for Linux-based Systems. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0630110-195328

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hung, Jui-lin. “A Study of Log Patternization for Linux-based Systems.” 2010. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0630110-195328.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hung, Jui-lin. “A Study of Log Patternization for Linux-based Systems.” 2010. Web. 17 Nov 2019.

Vancouver:

Hung J. A Study of Log Patternization for Linux-based Systems. [Internet] [Thesis]. NSYSU; 2010. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0630110-195328.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hung J. A Study of Log Patternization for Linux-based Systems. [Thesis]. NSYSU; 2010. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0630110-195328

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

29. Huang, Ming-Zong. Hybrid Botnet Detection.

Degree: Master, Information Management, 2010, NSYSU

 There are three mail types of Botnet: IRC-based Botnet, P2P-based Botnet,Web-based Botnet and they have become major threat to the Internet recently. Web-based Botnet is… (more)

Subjects/Keywords: Botnet; Web-based Botnet; Fast Flux Domain

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, M. (2010). Hybrid Botnet Detection. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0813110-025210

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Ming-Zong. “Hybrid Botnet Detection.” 2010. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0813110-025210.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Ming-Zong. “Hybrid Botnet Detection.” 2010. Web. 17 Nov 2019.

Vancouver:

Huang M. Hybrid Botnet Detection. [Internet] [Thesis]. NSYSU; 2010. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0813110-025210.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang M. Hybrid Botnet Detection. [Thesis]. NSYSU; 2010. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0813110-025210

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

30. Yuan, Tun-Jui. Study of Information Security in Semi-Open Network: Case Study of Marine Container Vessel.

Degree: Master, Information Management, 2013, NSYSU

 Maritime industry is an important industry of national economy, which is an indispensable strategic services industry to Taiwan (R.O.C). Maritime industry has a large contribution… (more)

Subjects/Keywords: Information Security; Semi-open Network; Vessel Information System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yuan, T. (2013). Study of Information Security in Semi-Open Network: Case Study of Marine Container Vessel. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0630113-180259

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yuan, Tun-Jui. “Study of Information Security in Semi-Open Network: Case Study of Marine Container Vessel.” 2013. Thesis, NSYSU. Accessed November 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0630113-180259.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yuan, Tun-Jui. “Study of Information Security in Semi-Open Network: Case Study of Marine Container Vessel.” 2013. Web. 17 Nov 2019.

Vancouver:

Yuan T. Study of Information Security in Semi-Open Network: Case Study of Marine Container Vessel. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Nov 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0630113-180259.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yuan T. Study of Information Security in Semi-Open Network: Case Study of Marine Container Vessel. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0630113-180259

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3]

.