跳至主導覽
跳至搜尋
跳過主要內容
國立成功大學 首頁
English
中文
首頁
概要
研究單位
研究成果
專案
學生論文
設備
獎項
活動
按專業知識、姓名或所屬機構搜尋
計算機與網路中心
國立成功大學
電話
886-6-2757575 Ext. 61000
電子郵件
[email protected]
網站
https://cc.ncku.edu.tw
Postal address
在地圖上顯示
概覽
指紋
網路
概要
(4)
專案
(15)
研究成果
(167)
指紋
查看啟用 計算機與網路中心 的研究主題。這些主題標籤來自此機構會員的作品。共同形成了獨特的指紋。
排序方式
重量
按字母排序
Engineering & Materials Science
Electronic document identification systems
52%
Authentication
39%
Smart cards
35%
Access control
31%
Defects
31%
Web services
29%
Recommender systems
28%
Cryptography
27%
Mobile agents
27%
Testing
24%
Servers
23%
Cloud computing
22%
Selenium
18%
Application programming interfaces (API)
18%
Composite materials
17%
Software testing
16%
Industry
16%
Chemical analysis
16%
Network protocols
16%
Students
16%
Load testing
16%
Factorization
15%
Internet
15%
Petri nets
14%
Shareholders
14%
Repair
13%
Websites
13%
Communication
12%
Deep learning
12%
Tourism
11%
Computer networks
11%
Data mining
11%
Digital video broadcasting (DVB)
11%
Data privacy
11%
Software engineering
11%
Experiments
10%
Multi agent systems
10%
Mobile computing
10%
Distributed computer systems
10%
Decision support systems
9%
Broadcasting
9%
Availability
9%
E-learning
9%
Tomography
9%
Image segmentation
9%
Security of data
9%
Information systems
8%
Personnel
8%
Monitoring
8%
Industry 4.0
8%
Clustering algorithms
7%
Advanced traveler information systems
7%
Visualization
7%
Managers
7%
Air
7%
Vitamins
7%
Statistics
7%
Internet of things
7%
Poultry
7%
Air pollution
6%
Milling cutters
6%
Industrial internet of things (IIoT)
6%
Botnet
6%
Software quality
6%
Engineering education
6%
Dental prostheses
6%
Costs
6%
Neural networks
6%
Hardware security
6%
Thin film transistors
6%
Dentistry
5%
User experience
5%
Semi-supervised learning
5%
Autonomous agents
5%
Linear regression
5%
Hotels
5%
Medicine
5%
Application programs
5%
Computer hardware
5%
HTTP
5%
Blockchain
5%
Support vector regression
5%
Long short-term memory
5%
Genetic programming
5%
Intelligent agents
5%
Electronic commerce
5%
Object oriented programming
5%
Industrial plants
5%
Pathology
5%
Watermarking
5%
Search engines
5%
Information services
5%
Mechatronics
5%
Ant colony optimization
5%
Malware
5%
Rain
5%
Association rules
5%
Pollution
5%
Wireless networks
5%
Mathematics
Signature Scheme
100%
Threshold Signature
42%
Group Signature
26%
Attack
25%
Proxy Signature
24%
Receiver
22%
Digital Signature
21%
Group Scheme
17%
Signature
17%
Discrete Logarithm
16%
Multisignature
16%
Blind Signature
15%
Access Control
15%
Decision Support Systems
15%
Production Line
14%
Learning
13%
Broadcasting
13%
Electronic Learning
13%
Web Services
13%
Data Mining
11%
Cryptosystem
11%
Manufacturing
10%
Agent Architecture
10%
Testing
10%
User Authentication
9%
Mobile Applications
9%
Composite
9%
Context-aware
9%
Information Services
8%
System Architecture
8%
Authenticated Encryption
8%
Authentication Protocol
8%
Mobile Communication
7%
Privacy Protection
7%
Design
7%
Business Process
7%
Gateway
7%
Password
7%
Key Agreement
7%
Mobile Agent
7%
Key Distribution
7%
Communication
7%
Factorization
7%
Identity-based
7%
Life Cycle
6%
Emergency
6%
Multi-agent Systems
6%
Computer Networks
6%
Cryptanalysis
6%
Requirements
6%
Euclidean geometry
6%
Information Systems
6%
Certificate
5%
Biometrics
5%
Segmentation
5%
Artificial Intelligence
5%
Libraries
5%
Petri Nets
5%
Migration
5%
Smart Card
5%
Concepts
5%
Resources
5%
Business & Economics
Testing
11%
Semi-supervised Learning
8%
Colorectal Cancer
7%
Image Segmentation
7%
Business Process Analysis
7%
Liner Shipping
6%
Image Analysis
6%
Air Pollutants
6%
Tagging
6%
Machine Learning
6%
Authentication
6%
Access Control
6%
Business Process Model
6%
Neural Networks
5%
Segmentation
5%
Internet of Things
5%
Connectivity
5%
Web Services
5%
Livestock
5%
Control Mechanism
5%
Influential Factors
5%
Life Cycle
5%
Visualization
5%
Correlation Coefficient
5%