English
| 正體中文 |
简体中文
|
Items with full text/Total items : 21921/27947 (78%)
Visitors : 4219773 Online Users : 247
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by
NTU Library IR team.
Scope
All of THUIR
國際學院
東海大學
文學院
理學院
工學院
管理學院
社會科學學院
農學院
創意設計暨藝術學院
法律學院
行政單位
學生優質學習報告數位典藏(OAPS)
全球環境暨永續社會發展(GREEnS)
Tips:
please add "double quotation mark" for query phrases to get precise results
please goto advance search for comprehansive author search
Adv. Search
Home
‧
Login
‧
Upload
‧
Help
‧
About
‧
Administer
Browse all
Communities
& Collections
Title
Date
Authors
Relevant Link
東海大學首頁 THU
東海圖書館 THULIB
東海碩博士論文建檔
東海碩博士論文查詢
臺灣學術機構典藏系統
機構典藏計畫網站
解壓縮軟體
Adobe Reader
Tunghai University Institutional Repository
>
Browse by Title
Loading...
Jump to:
[
Chinese Items
] [
0-9
] [
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
]
or enter the first few letters:
Showing items 126-150 of 27924. (1117 Page(s) Totally)
<<
<
1
2
3
4
5
6
7
8
9
10
>
>>
View [
10
|
25
|
50
] records per page
Date
Title
Authors
2012
A1至B2水準之言語行動所須言語能力及評估基準之基礎研究 -以台灣的大學生之「說話」的接觸場面為主
工藤節子
2004
ABCA1 modulates the oligomerization and Golgi exit of caveolin-1 during HDL-mediated cholesterol efflux in aortic endothelial cells
Lin, Y.-C., Lin, C.-H., Kuo, C.-Y., Yang, V.C.
2009
ABCA1 modulates the oligomerization and Golgi exit of caveolin-1 during HDL-mediated endothelial cells. cholesterol efflux in aortic endothelial cells
Lin Y.C., Lin C.H. and Yang V.C.
;
鄭葳
2008
The aberrant epigenetic modification of imprinting genes in cloned bovine genomes.
Lin, C. C., P. C. Shen, W. T. K. Cheng(鄭登貴), C. J. Shen, and C. M. Chen.
2011
Aberrant TGFβ/SMAD4 signaling contributes to epigenetic silencing of a putative tumor suppressor, Runx1T1 in ovarian cancer
Yeh, K.-T.alm, Chen, T.-H.b, Yang, H.-W.cd, Chou, J.-L.cd, Chen, L.-Y.cd, Yeh, C.-M.c, Chen, Y.-H.f, Lin, R.-I.gh, Su, H.-Y.cd, Chen, G.C.W.i, Deatherage, D.E.i, Huang, Y.-W.i, Yan, P.S.i, Lin, H.-J.ij, Nephew, K.P.k, Huang, T.H.M.i, Lai, H.-C.gh, Chan, M.W.Y.c
2009
Aberration reprogramming life cycle of imprinted genes in cloned porcine genome.
Shen, C. J., S. C. Wu, W. T. K. Cheng(鄭登貴), T. C. Chai, C. H. Chen, H. L. Chen, and C. M. Chen.
2015-01
The absence of ion-regulatory suppression in the gills of the aquatic air-breathing fish Trichogaster lalius during oxygen stress
林惠真
;
Lin, Hui-Chen
;
Huang, Chun-Yen
;
Lin, Hsueh-Hsi
;
Lin, Cheng-Huang
2006-07-09
Abstraction of nano copper in a room temperature ionic liquid??
Peng, C.Y., Wang, H.P., Huang, C.H., Wei, Y.
2011
Abundance of insect seed predators and intensity of seed predation on Shorea (Dipterocarpaceae) in two consecutive masting events in Peninsular Malaysia.
Hosaka, T.,Yumoto, T, Chen, Y-Y., Sun, I-F., Wright, S., SupardiN
;
孫義方
2006-04-00
AB型人格特質與不同的螢幕背景亮度對平板電腦操作績效影響之探討
陳潭;徐欣怡;龔倬雲
;
Chan, Tam
;
Hsu, Hsin-yi
;
Kung, Cho-yun
2011-06-07
An AC LED Smart Lighting System with Visible Light Time-Division Multiplexing Free Space Optical Communication
Jenq, Fenq-Lin, Liu, Tang-Jen and Leu, Fang-Yie
;
呂芳懌
2011-06-07
An AC LED Smart Lighting System with Visible Light Time-Division Multiplexing Free Space Optical Communication
Jenq, Fenq-Lin, Liu, Tang-Jen and Leu, Fang-Yie
;
呂芳懌
2011-06-30
An AC LED smart lighting system with visible light time-division multiplexing free space optical communication?
Jenq, F.-L., Liu, T.-J., Leu, F.-Y.
1988-06-00
Academeocracy in Taiwan:A Historical-Eidetic Analysis of Education in Modern Cathay
Smith, Douglas C.
2011-06-27
The Academic and Hospitality Industry Partnership in Taiwan: A Gap Analysis.
Kuo, C.F. , Chen, McCain and S.L.
;
郭振?
2009
Access Control and Key Management Scheme based on Bilinear Pairings over Elliptic Curves for Mobile Agent
鐘玉芳
2009-06-04
Access control and key management scheme based on bilinear pairings over elliptic curves for mobile agent
Liu, C.-H.a , Chung, Y.-F.b , Chen, T.-S.c , Wang, S.-D.
2008
Access control in user hierarchy based on elliptic curve cryptosystem
Y. F. Chung, H. H. Lee, F. P. Lai, and T. S. Chen
2008
Access control in user hierarchy based on elliptic curve cryptosystem
Chung, Y.F.a, Lee, H.H.b, Lai, F.bc, Chen, T.S.
2008-01-02
Access control in user hierarchy based on elliptic curve cryptosystem
Chung, Y.F., Lee, H.H., Lai, F., Chen, T.S.
2009-08
Access Log Generator for Analyzing Malicious Website Browsing Behaviors
林祝興
;
Chu-Hsing Lin, Jung-Chun Liu, and Ching-Ru Chen
2009-08-01
Access Log Generator for Analyzing Malicious Website Browsing Behaviors
劉榮春
;
Chu-Hsing Lin, Jung-Chun Liu, and Ching-Ru Chen
2009-08-18
Access Log Generator for Analyzing Malicious Website Browsing Behaviors
林祝興
;
Chu-Hsing Lin, Jung-Chun Liu, and Ching-Ru Chen
Access log generator for analyzing malicious website browsing behaviors
Lin, C.-H., Liu, J.-C., Chen, C.-R.
2009
Access log generator for analyzing malicious website browsing behaviors??
Lin, C.-H., Liu, J.-C., Chen, C.-R.
Showing items 126-150 of 27924. (1117 Page(s) Totally)
<<
<
1
2
3
4
5
6
7
8
9
10
>
>>
View [
10
|
25
|
50
] records per page
本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
DSpace Software
Copyright © 2002-2004
MIT
&
Hewlett-Packard
/
Enhanced by
NTU Library IR team
Copyright ©
-
Feedback