Authors: Fan, Su-Ling
Subject Terms: Soft-logic, Delay claims, Extension of time (EOT)
File Description: 110 bytes; text/html
Relation: Automation in Construction 133, 103971; 全文連結 https://www.sciencedirect.com/science/article/pii/S0926580521004222; http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/122516; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/122516/1/index.html; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/122516/-1/Soft logic delay analysis technique.pdf
Authors: Tsai, Chi-Yi, Lai, Yu-Cheng
Subject Terms: augmented reality, logic programming teaching, learning effectiveness, learning motivation, analysis of covariance
File Description: 99 bytes; text/html
Relation: Sensors 22(1), 389 (17 pages); 全文連結 https://www.mdpi.com/1424-8220/22/1/389; http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/122474; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/122474/1/index.html; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/122474/-1/Design and Validation of an Augmented Reality Teaching System for Primary Logic Programming Education.pdf
Availability:
http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/122474
http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/122474/1/index.html
http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/122474/-1/Design and Validation of an Augmented Reality Teaching System for Primary Logic Programming Education.pdf
Authors: Jeng-Min Chiou, Han-Tsung Liou, and Wan-Hui Chen
Subject Terms: Reliability, Density functional theory, Logic gates, Traffic control, Analytical models, Kernel, Estimation
File Description: 107 bytes; text/html
Relation: IEEE Transctions on Intelligent Transportation Systems 221(1), p.257-266; 全文連結 https://ieeexplore.ieee.org/abstract/document/8924937/keywords#keywords; 1524-9050;1558-0016; https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/118967; https://tkuir.lib.tku.edu.tw/dspace/bitstream/987654321/118967/1/index.html; https://tkuir.lib.tku.edu.tw/dspace/bitstream/987654321/118967/-1/Modeling Time-Varying Variability and Reliability of Freeway Travel Time Using Functional Principal Component Analysis.pdf
Availability:
https://doi.org/10.1109/TITS.2019.2956090
https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/118967
https://tkuir.lib.tku.edu.tw/dspace/bitstream/987654321/118967/1/index.html
https://tkuir.lib.tku.edu.tw/dspace/bitstream/987654321/118967/-1/Modeling Time-Varying Variability and Reliability of Freeway Travel Time Using Functional Principal Component Analysis.pdf
Authors: Po-Jen Chuang, Yen-Feng Tu
Subject Terms: Radio frequency identification (RFID), Security and privacy, Lightweight, authentication protocols, BAN logic, ProVerif, OPNET
File Description: 108 bytes; text/html
Relation: The Journal of Supercomputing 77(9), p.9658-9688; 全文連結 https://link.springer.com/article/10.1007/s11227-021-03656-0; http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/119986; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/119986/1/index.html
Authors: Wang, Fong-jia, Tseng, Kuo-feng, Chung, I-Wei
Subject Terms: service-dominant logic, social identity theory, employees, value co-creation
Relation: 2023 World Congress Sociology of Sport; 查無資訊(112/08/21 呂韶芸); https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/124390
Authors: Wang,F. J., Chiu,W., Tseng,K. F., Cho,H.
Subject Terms: service-dominant logic;creative self-efficacy;collaborative behaviours;fitness service;service innovation
File Description: 108 bytes; text/html
Relation: International Journal of Sports Marketing and Sponsorship, in press; 查無資訊(112/05/01 呂韶芸); https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/124007; https://tkuir.lib.tku.edu.tw/dspace/bitstream/987654321/124007/1/index.html
Subject Terms: Sensors, Surveillance, Wireless sensor networks, Schedules, Energy management, Probabilistic logic
File Description: 109 bytes; text/html
Relation: IEEE Access 8, p.86065-86080; 全文連結 https://ieeexplore.ieee.org/document/9087897; http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/118866; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/118866/1/index.html
Authors: Shang, Cuijuan, Chang, Chih-Yung, Chen, Guilin, Zhao, Shenghui, Chen, Haibao
Subject Terms: Senior citizens, Hidden Markov models, Smart homes, Histograms, Clustering algorithms, Unsupervised learning, Probabilistic logic
File Description: 107 bytes; text/html
Relation: IEEE Journal of Biomedical and Health Informatics 24(6), p.1589-1600; 全文連結 https://ieeexplore.ieee.org/document/8847361; http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/118871; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/118871/1/index.html
Authors: Cheng, Chi-Bin, Lo, Chiao-Yu, Chu, Chih-Ping
Subject Terms: Multi-project scheduling, resource dedication, bi-level decentralized programming, combinatorial optimization, fuzzy logic
File Description: 115 bytes; text/html
Relation: International Journal of Information and Management Sciences 30(2), P143 - 167; 全文連結 http://dx.doi.org/10.6186%2fIJIMS.201906_30(2).0004; http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/119638; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/119638/1/index.html; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/119638/-1/Solving Multi-Mode Resource-Constrained Multi-Project Scheduling Problem with Combinatorial Auction .pdf
Availability:
http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/119638
http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/119638/1/index.html
http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/119638/-1/Solving Multi-Mode Resource-Constrained Multi-Project Scheduling Problem with Combinatorial Auction .pdf
Authors: Fan, Su-Ling, Hung-LinChi, Pan, Po-Quan
Subject Terms: Building information Modelling (BIM), Rule checking, Interface, First-order logic, Construction rules
File Description: 110 bytes; text/html
Relation: Automation in Construction,105,102842; http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/120989; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/120989/1/index.html
Authors: Su-Ling Fan, Hung-Lin Chi, Po-Quan Pan
Subject Terms: Building information Modelling (BIM), Rule checking, Interface, First-order logic, Construction rules
File Description: 110 bytes; text/html
Relation: Automation in Construction 105, 102842; 全文連結 https://doi.org/10.1016/j.autcon.2019.102842; http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/117162; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/117162/1/index.html
Authors: Chi-Bin Cheng, Chiao-Yu Lo, Chih-Ping Chu
Subject Terms: Multi-project scheduling, resource dedication, bi-level decentralized programming, combinatorial optimization, fuzzy logic
File Description: 115 bytes; text/html
Relation: International Journal of Information and Management Sciences, 30(2), 143-167.; 全文連結 https://www.airitilibrary.com/Publication/alDetailedMesh?DocID=10171819-201906-201907160001-201907160001-143-167; http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/117367; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/117367/1/index.html; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/117367/-1/Solving multi-mode resource-constrained multi-project scheduling problem with combinatorial auction mechanisms.pdf
Availability:
http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/117367
http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/117367/1/index.html
http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/117367/-1/Solving multi-mode resource-constrained multi-project scheduling problem with combinatorial auction mechanisms.pdf
Authors: Yu-Hui Fang
Subject Terms: Continuance intention, Service-dominant logic, Branded applications, Goods-dominant logic, Psychological barriers, Task-service fit
Relation: Journal of Services Marketing 31(6), p.574-588; http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/112807; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/112807/1/Exploring Task-Service Fit and Usefulness on Branded Applications Continuance.pdf; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/112807/-1/index.html
Availability:
http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/112807
http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/112807/1/Exploring Task-Service Fit and Usefulness on Branded Applications Continuance.pdf
http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/112807/-1/index.html
Authors: Huey Chen, Hui-Ling Wendy Pan, Liliana Morosanu, Nannette Turner
Subject Terms: action model/change model schema, learning community, logic model, program planning
File Description: 100 bytes; text/html
Relation: Canadian Journal of Program Evaluation 33(1), p. 49-68; 全文已下載 全文連結 https://journalhosting.ucalgary.ca/index.php/cjpe/article/view/42116; http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/115170; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/115170/1/index.html; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/115170/-1/Using logic models and the action model change model schema in planning the learning community program A comparative case study.pdf
Availability:
http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/115170
http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/115170/1/index.html
http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/115170/-1/Using logic models and the action model change model schema in planning the learning community program A comparative case study.pdf
Authors: Hsieh, Yu-Feng, Chen, Si-Hua, Chen, Nan-Yow, Lee, Wen-Jay, Tsai, Jyun-Hwei, Chen, Chun-Nan, Chiang, Meng-Hsueh, Lu, Darsen D., Kao, Kuo-Hsing
Subject Terms: Field effect transistors, Silicon, Tunneling, Heterojunctions, Logic gates, Effective mass
File Description: 106 bytes; text/html
Relation: IEEE TRANSACTIONS ON ELECTRON DEVICES ,65(3) ,P.855-859; 全文已下載 全文連結 https://ieeexplore.ieee.org/document/8267122; http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/115180; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/115180/1/index.html; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/115180/-1/An FET With a Source Tunneling Barrier Showing Suppressed Short-Channel Effects for Low-Power Applications.pdf
Availability:
http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/115180
http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/115180/1/index.html
http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/115180/-1/An FET With a Source Tunneling Barrier Showing Suppressed Short-Channel Effects for Low-Power Applications.pdf
Authors: Wu, Meng-Luen, Lin, Chen, Yu, Po-Cheng
Subject Terms: Adaptation models, Law, Computational modeling, Natural languages, Machine learning, Predictive models, Logic gates
Relation: 2022 International Conference on Machine Learning and Cybernetics (ICMLC); 全文連結 https://ieeexplore.ieee.org/document/9941286; https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/123464; https://tkuir.lib.tku.edu.tw/dspace/bitstream/987654321/123464/1/index.html
Authors: Wang, Fong Jia, Chiu, Weisheng
Subject Terms: Service-dominant logic, fitness service, service encounter, perceived value, service innovativeness, repurchase intention
File Description: 108 bytes; text/html
Relation: International Journal of Sports Marketing and Sponsorship; 全文連結 https://doi.org/10.1108/IJSMS-03-2022-0055; https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/123200; https://tkuir.lib.tku.edu.tw/dspace/bitstream/987654321/123200/1/index.html
Authors: Wang, F. J., Tseng, K. F., Wang, F. I .
Subject Terms: service dominant logic, perceived service value, creativity, reciprocal effect
Relation: 會議連結 https://www.smaanz.org/smaanz-2021-conference; http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/121530; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/121530/1/index.html
Authors: Wang, W.Y., Li), Y.H. Li (I.H.
Subject Terms: Genetic algorithms, Function approximation, Fuzzy logic, Spline, Neural networks, Learning systems, Convergence, Fuzzy systems, Automatic control, Optimization methods
File Description: 107 bytes; text/html
Relation: IEEE Transactions on Systems, Man, and Cybernetics-Part B 33(6), p.966-976; 全文連結 PDF已下載https://ieeexplore.ieee.org/abstract/document/1245271; http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/115967; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/115967/1/index.html; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/115967/-1/Evolutionary learning of BMF fuzzy-neural networks using a reduced-form genetic algorithm.pdf
Availability:
http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/115967
http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/115967/1/index.html
http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/115967/-1/Evolutionary learning of BMF fuzzy-neural networks using a reduced-form genetic algorithm.pdf
Authors: 洪偉程, HUNG, Wei-Chang
Contributors: 淡江大學資訊工程學系碩士班, 洪文斌
Subject Terms: authentication, BAN logic, telecare medicine information systems, Wireless sensor networks, 無線感測網路, 認證, 遠端醫療信息系統
File Description: 144 bytes; text/html
Relation: [1] Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, “Fuzzy extractors: How to generate strong keys from biometrics and other noisy data,” Journal on Computing, vol. 38, no. 1, pp.97-139(1), 2008. [2] P. Bergamo, P. D’Arco, A. De Santis, and L. Kocarev, “Security of public-key cryptosystems based on Chebyshev polynomials,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 52, no. 7, 2005. [3] L. Kocarev, and Z. Tasev, “Public-key encryption based on Chebyshev maps,” Proceedings of the 2003 International Symposium on Circuits and Systems, ISCAS ''03, 2003. [4] D. Xiao, X. Liao, G. Tang, and C. Li, “Using Chebyshev chaotic map to construct infinite length hash chains,” 2004 International Conference on Communications, Circuits and Systems, ICCCAS 2004, 2004 [5] M. Burrows, M. Abadi, and R. Needham, “A logic of authentication,” Journal ACM Transactions on Computer Systems (TOCS), vol. 8 no. 1, pp. 18-36, 1990. [6] L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,” Computer networks, vol. 54, no. 15, pp. 2787–2805, 2010. [7] M. Turkanovic, B. Brumen, and M. Holbl, “A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion,” Ad Hoc Network, vol. 20,pp. 96–112, Sep. 2014 [8] K. H. M.Wong, Y. Zheng, J. Cao, and S.Wang, “A dynamic user authentication scheme for wireless sensor networks,” Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, vol. 1, pp. 244–251, 2006. [9] H. R. Tseng, R. H. Jan, and W. Yang, “An improved dynamic user authentication scheme for wireless sensor networks,” Proceedings of the Global Communications Conference, 2007, pp. 986–990, 2007. [10] M. L. Das, “Two-factor user authentication in wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 3, pp. 1086–1090, 2009. [11] K. Xue, C. Ma, P. Hong, and R. Ding, “A temporal-credential-based mutual authentication and key agreement scheme for wireless sensornetworks,” Journal of Network and Computer Applications, vol. 36, no. 1, pp. 316–323, 2013. [12] M. K. Khan, and K. Alghathbar, “Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks,” Sensors, vol. 10, no. 3, pp. 2450–2459, 2010. [13] H. Khemissa, D. Tandjaoui, “A Novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of internet of things” Wireless Telecommunications Symposium (WTS), 2016. [14] H. Krawczyk, R. Canetti, and M. Bellare, “Hmac: Keyed-hashing for message authentication,” RFC Editor, United States, 1997. [15] S. Roy, S. Chatterjee, S. Chattopadhyay, and A. K. Gupta, “A biometrics-based robust and secure user authentication protocol for e-healthcare service,” 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2016. [16] Z.Y. Wu, Y. Chung, F. Lai, and T.S. Chen, “A password-based user authentication scheme for the integrated EPR information system,” Journal of Medical Systems, vol. 36, no. 2, pp. 631–638, 2012. [17] Z.Y. Wu, Y.J. Tseng, Y. Chung, Y.C. Chen, and Feipei Lai, “A reliable user authentication and key agreement scheme for web-based hospital-acquired infection surveillance information system,” Journal of Medical Systems,vol.36, no. 4, pp.2547-2555, 2011. [18] T.F. Lee, I.P. Chang, T.H. Lin, and C.C. Wang, “A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system,” Journal of Medical Systems, vol. 33, no. 3, pp. 9941, 2013. [19] Z.Y. Wu, Y.C. Lee, F. Lai, H.C. Lee, and Y. Chung, “A secure authentication scheme for telecare medicine information systems,” Journal of Medical Systems, vol. 36, no. 3, pp. 1529–1535, 2012. [20] J. Wei, X. Hu, and W. Liu, “An improved authentication scheme for telecare medicine information systems,” Journal of Medical Systems, vol. 36, no. 6, pp. 3597–3604, 2012. [21] Z. Zhu, “An efficient authentication scheme for telecare medicine information systems,” Journal of Medical Systems, vol. 36, no. 6, pp. 3833–3838, 2012. [22] H. Debiao, C. Jianhua, Z. Rui, “A more secure authentication scheme for telecare medicine information systems,” Journal of Medical Systems, vol. 36, no. 3, pp. 1989–1995, 2012. [23] H.M. Chen, J.W. Lo, and C.K. Yeh, “An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems,” Journal of Medical Systems, vol. 36, no. 6, pp. 3907–3915, 2012. [24] T. Cao, and J. Zhai, “Improved dynamic ID-based authentication scheme for telecare medical information systems,” Journal of Medical Systems, vol.37, no. 2, pp. 9912, 2013. [25] T.F. Lee, C.M. Liu, “A Secure Smart-Card Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems,” Journal of Medical Systems, vol. 37, no. 3, pp.9933, 2013. [26] A.K. Das, and B. Bruhadeshwar, “An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system,” Journal of Medical Systems, vol. 37, no. 5, pp. 9969, 2013. [27] C. Guo, and C.C. Chang, “Chaotic maps-based password-authenticated key agreement using smart cards,” Communications in Nonlinear Science and Numerical Simulation, vol. 18, no. 6, pp. 1433–1440, 2013. [28] X. Hao, J. Wang, Q. Yang, X. Yan, and P. Li, “A chaotic map-based authentication scheme for telecare medicine information systems,” Journal of Medical Systems, vol. 37, no. 2, pp.9919, 2013. [29] Q. Jiang, J. Ma, X. Lu, and Y. Tian, “Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems,” Journal of Medical Systems, vol. 38, no. 2, pp. 12, 2014. [30] W.C. Yau, and R.C. Phan, “Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems,” Journal of Medical Systems, vol. 37, no. 6, pp.9993, 2013. [31] T.F. Lee, “An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems,” Journal of Medical Systems, vol. 37, no. 6, pp.9985, 2013. [32] C.T. Li, C.C. Lee, and C.Y. Weng, “A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems,” Journal of Medical Systems, vol. 38, no. 9, pp.77, 2014.; U0002-2607201700405100; http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/114710; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/114710/1/index.html