Journal of Information ManagementVol. 19 iss. 3
李俊賢;陳玟彣;
頁: 475-507
日期: 2012/07
關鍵字: Neuro-fuzzy system (NFS);Particle swarm optimization (PSO);Recursive least squares estimator (RLSE);Noise canceling;Computational intelligence;
Keywords: Neuro-fuzzy system (NFS);Particle swarm optimization (PSO);Recursive least squares estimator (RLSE);Noise canceling;Computational intelligence;
摘要: Image signal may be interfered by some unknown mechanisms during transmission or transformation, resulting in image corruption that useful information or details in the image can be lost more or less. In the paper, we propose a computational intellig...
瀏覽次數: 19162 下載次數: 273
引用 導入Endnote
頁: 475-507
日期: 2012/07
關鍵字: Neuro-fuzzy system (NFS);Particle swarm optimization (PSO);Recursive least squares estimator (RLSE);Noise canceling;Computational intelligence;
Keywords: Neuro-fuzzy system (NFS);Particle swarm optimization (PSO);Recursive least squares estimator (RLSE);Noise canceling;Computational intelligence;
摘要: Image signal may be interfered by some unknown mechanisms during transmission or transformation, resulting in image corruption that useful information or details in the image can be lost more or less. In the paper, we propose a computational intellig...
瀏覽次數: 19162 下載次數: 273
引用 導入Endnote
2. The Effects of Internet Privacy Concerns and Website Trust on Online Shopping Intension-A Comparison between Initial and Repeat Customers
廖則竣;陶蓓麗;劉玉萍;蕭銘偉;黃姮儀;
頁: 509-531
日期: 2012/07
關鍵字: Trust;Internet Privacy Concerns;Online Shopping;initial customers;repeat customers;
Keywords: Trust;Internet Privacy Concerns;Online Shopping;initial customers;repeat customers;
摘要: Trust has been considered as a determinant of using shopping websites for consumers. While the improvement of retrieving customers' information for companies and rise of consumers' awareness in individual's privacy, a shopping website should not only...
瀏覽次數: 22834 下載次數: 277
引用 導入Endnote
頁: 509-531
日期: 2012/07
關鍵字: Trust;Internet Privacy Concerns;Online Shopping;initial customers;repeat customers;
Keywords: Trust;Internet Privacy Concerns;Online Shopping;initial customers;repeat customers;
摘要: Trust has been considered as a determinant of using shopping websites for consumers. While the improvement of retrieving customers' information for companies and rise of consumers' awareness in individual's privacy, a shopping website should not only...
瀏覽次數: 22834 下載次數: 277
引用 導入Endnote
3. A Social-Tag-Based Query Expansion Approach for Supporting Video Retrieval in Video Sharing Websites
李彥賢;楊錦生;廖國堯;
頁: 533-565
日期: 2012/07
關鍵字: query expansion;video retrieval;social tagging;context aware;search engine;
Keywords: query expansion;video retrieval;social tagging;context aware;search engine;
摘要: The advance of Internet and information technologies has turned the information sharing on the Web from the form of textual content into that of multimedia and fostered the development of video sharing websites. To ease the access of the large number...
瀏覽次數: 22693 下載次數: 1030
引用 導入Endnote
頁: 533-565
日期: 2012/07
關鍵字: query expansion;video retrieval;social tagging;context aware;search engine;
Keywords: query expansion;video retrieval;social tagging;context aware;search engine;
摘要: The advance of Internet and information technologies has turned the information sharing on the Web from the form of textual content into that of multimedia and fostered the development of video sharing websites. To ease the access of the large number...
瀏覽次數: 22693 下載次數: 1030
引用 導入Endnote
官大智;陳嘉玫;林家賓;王則堯;
頁: 567-589
日期: 2012/07
關鍵字: Instant Messaging;Malicious URL;IM Worms;
Keywords: Instant Messaging;Malicious URL;IM Worms;
摘要: Instant messaging (IM) has been a platform of spreading malware for hackers due to its popularity and immediacy. To evade anti-virus detection, hacker might send malicious URL message, instead of malicious binary file. A malicious URL is a link point...
瀏覽次數: 16958 下載次數: 1875
引用 導入Endnote
頁: 567-589
日期: 2012/07
關鍵字: Instant Messaging;Malicious URL;IM Worms;
Keywords: Instant Messaging;Malicious URL;IM Worms;
摘要: Instant messaging (IM) has been a platform of spreading malware for hackers due to its popularity and immediacy. To evade anti-virus detection, hacker might send malicious URL message, instead of malicious binary file. A malicious URL is a link point...
瀏覽次數: 16958 下載次數: 1875
引用 導入Endnote
韓文銘;張均漢;
頁: 591-620
日期: 2012/07
關鍵字: Software project measurement;Functional point analysis;Software size;Analytic network process;Software project management;
Keywords: Software project measurement;Functional point analysis;Software size;Analytic network process;Software project management;
摘要: Functional Point Analysis (FPA) is a widely adopted approach that measures the functional size of software systems. This approach uses 43 rules for counting function points provide a quantifiable size measure to support the cost and schedule evaluati...
瀏覽次數: 18197 下載次數: 614
引用 導入Endnote
頁: 591-620
日期: 2012/07
關鍵字: Software project measurement;Functional point analysis;Software size;Analytic network process;Software project management;
Keywords: Software project measurement;Functional point analysis;Software size;Analytic network process;Software project management;
摘要: Functional Point Analysis (FPA) is a widely adopted approach that measures the functional size of software systems. This approach uses 43 rules for counting function points provide a quantifiable size measure to support the cost and schedule evaluati...
瀏覽次數: 18197 下載次數: 614
引用 導入Endnote
宋佩貞;古政元;陳加屏;
頁: 621-652
日期: 2012/07
關鍵字: Computer Virus Propagation;System Dynamics;Epidemic Model;Anti-Virus Policy;
Keywords: Computer Virus Propagation;System Dynamics;Epidemic Model;Anti-Virus Policy;
摘要: Anti-virus action is the core of information security policy. Many researchers focus on the technology of anti-virus, but not on the anti-virus policies because of the difficulty for obtaining data in empirical research. The research goal of this pap...
瀏覽次數: 20292 下載次數: 302
引用 導入Endnote
頁: 621-652
日期: 2012/07
關鍵字: Computer Virus Propagation;System Dynamics;Epidemic Model;Anti-Virus Policy;
Keywords: Computer Virus Propagation;System Dynamics;Epidemic Model;Anti-Virus Policy;
摘要: Anti-virus action is the core of information security policy. Many researchers focus on the technology of anti-virus, but not on the anti-virus policies because of the difficulty for obtaining data in empirical research. The research goal of this pap...
瀏覽次數: 20292 下載次數: 302
引用 導入Endnote