Skip navigation

DSpace JSPUI

DSpace preserves and enables easy and open access to all types of digital content including text, images, moving images, mpegs and data sets

Learn More
DSpace logo
English
中文
  • Browse
    • Communities
      & Collections
    • Publication Year
    • Author
    • Title
    • Subject
    • Advisor
  • Search TDR
  • Rights Q&A
    • My Page
    • Receive email
      updates
    • Edit Profile
  1. NTU Theses and Dissertations Repository
  2. 管理學院
  3. 資訊管理學系
Please use this identifier to cite or link to this item: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/65517
Full metadata record
???org.dspace.app.webui.jsptag.ItemTag.dcfield???ValueLanguage
dc.contributor.advisor林永松(Frank Yeong-Sung Lin)
dc.contributor.authorChun-Fu Linen
dc.contributor.author林俊甫zh_TW
dc.date.accessioned2021-06-16T23:47:54Z-
dc.date.available2017-07-27
dc.date.copyright2012-07-27
dc.date.issued2012
dc.date.submitted2012-07-23
dc.identifier.citation[1] C. Abraham, V. Ahuja, A.K. Ghosh, P. Pakanati, “Inventory management using passive RFID tags: a survey,” Department of Computer Science, The University of Texas at Dallas, Richardson, Texas, pp. 1-16, October, 2002.
[2] R. K. Ahuja, T. L. Magnanti, and J. B. Orlin, “Network flows: theory, algorithms and applications,” Prentice-Hall, 1993.
[3] Auto-ID Center, “Draft protocol specification for a 900 MHz class 0 radio frequency identification tag,” February, 2003.
[4] S.M. Birari and S. Iyer, “Mitigating the reader collision problem in RFID networks with mobile readers,” 13th IEEE International Conference on Networks, (ICON), November, 2005.
[5] M.A. Bonuccelli, F. Lonetti, and F.Martelli, “Instant collision resolution for tag identification in RFID networks,” Elsevier Ad Hoc Networks, November, 2007.
[6] M. V. Bueno-Delgado, J. Vales-Alonso, C. Angerer, and M. Rupp, “A comparative study of RFID schedulers in dense reader environments,” Proceedings of the International Conference on Industrial Electronics, IEEE ICIT, pp.1353-1358, March 2010.
[7] J. I. Capetanakis, “Tree algorithms for packet broadcast channels,“ IEEE Transactions on Information Theory, vol. 25, issue 5, pp. 505-515, September, 1979.
[8] B. Carbunar, M.K. Ramanathan, M. Koyuturk, C. Hoffmann, and A. Grama, “Redundant reader elimination in RFID systems,” Proceedings of Sensor and Ad Hoc Communications and Networks, IEEE SECON, pp. 176-184, September, 2005.
[9] V. Cerny, “Thermodynamnical approach to the traveling salesman problem: an efficient simulation algorithm,” Journal of Optimization Theory and Applications, vol.45, pp.41-51, 1985.
[10] J.-R. Cha and J.-H. Kim, “Novel anti-collision algorithms for fast object identification in RFID systems,” 11th International Conference on Parallel and Distributed Systems, vol. 2, pp. 63-67, 2005.
[11] Y. -C. Chen, J. -R. Chiang, H. -H. Chu, Polly Huang, and A.-W. Tsui, “Sensor-assisted Wi-Fi indoor location system for adapting to environmental dynamics,” Proceedings of the 8th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems, October 10–13, 2005.
[12] W.-T. Chen, “An accurate tag estimate method for improving the performance of an RFID anti-collision algorithm based on dynamic frame length ALOHA,” IEEE Transactions on Automation Science and Engineering, vol. 6, Issue 1, pp. 9-15, 2009.
[13] W.-T. Chen and G.-H. Lin, 'An efficient scheme for multiple access in a RFID system,” 2006 International Conference on Wireless Networks, Las Vegas, USA, June, 2006.
[14] L. -P. Chin and C. -L. Wu, “The role of electronic container seal (e-Seal) with RFID technology in the container security initiatives,” Proceedings of the 2004 International Conference on MEMS, NANO and Smart Systems (ICMENS’04), 2004.
[15] P. H. Cole and D. C. Ranasinghe, “Networked RFID systems and lightweight cryptography: raising barrier to product counterfeiting,” Springer, 2008.
[16] G. Cornuejols, M. L. Fisher and G. L. Nemhauser, “Location of bank accounts to optimize float: an analytic study of exact and approximate algorithms,” Management Science, vol. 23, No. 8, pp. 789-810, April, 1977.
[17] M. Dunque-Anton, D. Kunz, and B. Ruber, “Channel assignment for cellular radio using simulated annealing,” IEEE Transactions on Vehicular Technology, vol.42, pp.14-21, 1993.
[18] R. W. Eglese, “Simulated annealing: a tool for operational research,” European Journal of Operational Research, vol. 46, 1990.
[19] D. W. Engels and S. E. Sarma, “The reader collision problem,” Systems, Man and Cybernetics, 2002 IEEE International Conference, vol.3, pp. 6-9, 2002.
[20] EPCglobal,C1G2 UHF Air Interface Protocol Standards, 2005.
[21] W. Feller, “An introduction to probability theory and its applications,” vol. 1, 3rd edition, New York: Wiley, 1970.
[22] K. Finkenzeller, “RFID handbook,” 2nd edition, John Wiley, New York, 2003.
[23] M. L. Fisher, “The Lagrangean relaxation method for solving integer programming problems,” Management Science, vol.27, pp 1-18, 1981.
[24] M. L. Fisher, “Optimal solution of scheduling problems using Lagrange multipliers: part I,” Operations Research, vol. 21, pp. 1114-1127, 1973.
[25] M. L. Fisher, “A dual algorithm for one-machine scheduling problem,” Math. Programming, vol. 11, 1976, pp. 229-251.
[26] M. L. Fisher, “An applications oriented guide to Lagrangean Relaxation,” Interfaces, vol. 15, no. 2, March-April 1985, pp. 10-21.
[27] M. L. Fisher and J. F. Shapiro, “Constructive duality in integer programming,” SIAM Journal on Applied Mathematics, vol. 27, pp. 31-52, 1974.
[28] A. M. Geoffrion, “Lagrangean relaxation and its use in integer programming,” Math. Programming Study, vol. 2, pp.82-114, 1974.
[29] GNU, GLPK (The GNU Linear Programming Kit), http://www.gnu.org/software/glpk/glpk.html
[30] W. K. Hale, “Frequency assignment: theory and applications,” Proceedings of IEEE, vol.68, pp. 1497-1514, 1980.
[31] P. Hawkes, 'Supertag—stock counting off its trolley', Sensor Review, vol. 14 issue 3, pp.23 – 25, 1994.
[32] M. Held, P. Wolfe, and H. D. Crowder, “Validation of subgradient optimization,” Mathematical Programming, vol. 6, pp. 62-88,1974.
[33] L. Ho, M. Moh, Z. Walker, T. Hamada, and C. -F. Su, “A prototype on RFID and sensor networks for elder healthcare: progress report,” Proceedings of ACM SIGCOMM Workshop on Experimental Approaches to Wireless Network Design and Analysis, pp. 70–75, 2005.
[34] T. Hori and M. Matsumoto, “The challenges of wireless and mobile technologies: the RFID encourages the mobile phone development,” Proceedings of the 3rd International Conference on Mobile and Ubiquitous Multimedia, 2004.
[35] D.R. Hush, and C. Wood, “Analysis of tree algorithms for RFID arbitration,” IEEE International Symposium on Information Theory, pp. 107, August 16–21, 1998.
[36] ILOG CPLEX, “Mathematical programming optimizers,” http://www.ilog.com/products/cplex/
[37] IT Law Wiki, “Definition of Semi-active tag,” http://itlaw.wikia.com/wiki/Semi-active_tag
[38] ISO/IEC 18000-3, “Information technology -- radio frequency identification for item management -- part 3: parameters for air interface communications at 13.56 MHz,” 2010.
[39] ISO/IEC 18000-6, “Information technology -- radio frequency identification for item management -- part 6: parameters for air interface communications at 860 MHz to 960 MHz,” 2010.
[40] A. Juels , R. L. Rivest and M. Szydlo, “The blocker tag: selective blocking of RFID tags for consumer privacy, ” 8th ACM Conference on Computer and Communications Security, 2003.
[41] A. Juels and J. Brainard, “Soft blocking: flexible blocker tags on the cheap,” Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society (WPES '04), 2004.
[42] C.-S. Kim, K.-L. Park, H.-C. Kim and S.-D. Kim, 'An efficient stochastic anti-collision algorithm using bit-slot mechanism,' Int'l Conference of Parallel and Distributed Programming Techniques and Applications, June 2004, Las Vegas, Nevada, USA.
[43] C. Kim, Y. Ju, H. Kim and J.-H. Kim, “Resource management in civil construction using RFID technologies,” 26th International Symposium on Automation and Robotics in Construction (ISARC 2009), pp. 105-108, 2009.
[44] S. Kirkpatrick, C. D. Gelatt, and M. P. Vecchi, “Optimization by simulated annealing,” Science, vol.220, no.4598, pp.671-680, May 13, 1983.
[45] D.K. Klair, K. Chin, and R. Raad, “On the accuracy of RFID tag estimate functions,” International Symposium on Communications and Information Technologies 2007 (ISCIT '07), pp.1401-1406, October 17-19, 2007.
[46] D. E. Knuth, “The art of computer programming,” Vol. 2, Addison Wesley.
[47] M.S. Kodialam, and T. Nandagopal, “Fast and reliable estimate schemes in RFID systems,” Proceedings of the 12th Annual International Conference on Mobile Computing and Networking (MOBICOM), pp.322-333, 2006.
[48] C. Law, K. Lee, and K.-Y. Siu, “Efficient memory-less protocol for tag identification,” Proceedings of the 4th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, pp. 75–84, August 11, 2000.
[49] S.-R. Lee, S.-D. Joo and C.-W. Lee, “An enhance dynamic framed slotted ALOHA algorithm for RFID tag identification,” Proceedings of International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2005.
[50] C. -F. Lin and Frank Y.-S. Lin, 2007, 'A simulated annealing algorithm for RFID reader networks', IEEE Wireless Communications and Networking Conference (WCNC’07), pp. 1669 – 1672, March 11-15, 2007.
[51] C. -F. Lin, Frank Y. -S. Lin and C. -T. Lee, 2006, 'A near-optimal slot assignment algorithm for RFID reader networks', Proceedings of 9th Joint Conference on Information Sciences (JCIS), 2006.
[52] C.-F. Lin and Frank Y.-S. Lin, 2010, 'Efficient estimate and collision-group based anti-collision algorithms for dynamic frame-slotted ALOHA in RFID networks', IEEE Transactions on Automation Science and Engineering, vol. 7, issue 4, pp. 840-848, October 2010.
[53] Frank Y. -S. Lin, “Quasi-static channel assignment algorithms for wireless communication network,” Proceedings of 12th International Conference on Information Networking (ICOIN-12), pp. 434 – 437, January 21-23. 1998.
[54] Frank Y. -S. Lin, “Network planning and capacity management,” Lecture Notes on Advanced Network Course, Information Management Department, National Taiwan University.
[55] Frank Y.-S. Lin, W.-M. Lin, Y.-D. Lin, and C.-H. Lin, “Optimal ranging algorithms for medium access control in hybrid fiber coax networks,” IEICE Transactions on Communication, vol. E85–B, N0.10, pp. 2319-2326, October 2002.
[56] Y.-Y. Liu, K. Lin, T.-C. Yeh, and C. Lin, “Low-cost RFID identification variation,” Proceedings of 9th Joint Conference on Information Sciences (JCIS), 2006.
[57] J. Landt, 'Shrouds of time: the history of RFID, Pittsburgh, AIM-Inc,' March 2005. http://www.aimglobal.org/technologies/rfid/resources/shrouds_of_time.pdf.
[58] M. Langheinrich, “RFID and privacy,” Petkovic M, Jonker W (eds.) Security, Privacy, and Trust in Modern Data Management. Springer, Berlin Heidelberg New York. 2007.
[59] F. Maffioli, G. Andreatta, F.Mason, and P. Serafini, 'Randomized heuristics for NP-hard problems', Advanced School on Stochastic in Combinatorial Optimization, World Scientific, Singapore, pp.76-93, 1987.
[60] G. Maselli, C. Petrioli, and C. Vicari, “Dynamic tag estimate for optimizing tree slotted aloha in RFID networks,” Proceedings of ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 2008.
[61] D. Molnar and D. Wagner, “Privacy and security in library RFID issues, practices, and architectures,” Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004.
[62] J. Myung, W. Lee, and Timothy K. Shih, “An adaptive memoryless protocol for RFID tag collision arbitration,” IEEE Transactions on Multimedia, vol. 8, No. 5, pp.1096-1101, October, 2006.
[63] D. Pardo, A. Vaz, S. Gil, et al., “Design criteria for full passive long range UHF RFID sensor for human body temperature monitoring,” Proceedings of the IEEE International Conference on RFID, pp. 141–148, 2007.
[64] Philip Semiconductor, I-CODE SLI, Product Specification Rev. 3.0, January 2003, http://www.nxp.com/documents/data_sheet/SL058030.pdf.
[65] M. Philipose, J. R. Smith, B. Jiang, A. Mamishev, S. Roy, and K. Sundara-Rajan, “Batteryfree wireless identification and sensing,” IEEE Pervasive Computing, vol. 4, issue 1, pp. 37- 45, 2005.
[66] F.-X. Qiao, L. Yu, R. Zhang, Z. Chen, and R. Fatholahzadeh, “RFID applications in transportation operation and intelligent transportation system (ITS),” Technical Report, June, 2009
[67] D. C. Ranasinghe, M. Harrison and P. H. Cole, “Chapter 4- EPC network architecture,” Networked RFID Systems and Lightweight Cryptography, Springer, 2008.
[68] M. R. Rieback, G. N. Gaydadjiev, B. Crispo, R.F.H. Hofman, and A. S. Tanenbaum, “A platform for RFID security and privacy administration, ” Proceedings of the 20th Conference on Large Installation System Administration, 2006.
[69] M. R. Rieback, P. N.D. Simpson, B. Crispo, and A. S. Tanenbaum, “RFID malware: design principles and examples,” Pervasive and Mobile Computing in Special Issue on PerCom, vol. 2, no. 4. pp. 405-426, November, 2006.
[70] RFID Journal, “Taiwan customs officials adopt RFID-enabled container seals,” http://www.rfidjournal.com/article/view/4727, 2009.
[71] RFID Journal, “Taiwan extends EPC Gen 2 e-Seals to ports around the country,” http://www.rfidjournal.com/article/view/7670, 2011.
[72] RFID News, “PDA RFID reader with WiFi, bluetooth and GPRS capabilities,” December 4, 2009. http://www.rfidnews.org/2009/12/04/pda-rfid-reader-with-wifi-bluetooth-and-gprs-capabilities.
[73] RFID Journal, “GS1 Taiwan expands E-seal initiative, ” August 11, 2011.
http://www.rfidjournal.com/article/view/8692
[74] RFID Journal, “Active e-Seals expedite cargo shipments in Taiwan,” October 27, 2011. http://www.rfidjournal.com/article/view/8907
[75] S. E. Sarma, S. A. Weis, and D. W. Engels, “RFID systems and security and privacy implications,” Workshop on Cryptographic Hardware and Embedded Systems (CHES ’02), pp. 454–469, 2003.
[76] James P. Sethna, “Stirling's Formula for N!”, May 24, 1997, http://www.lassp.cornell.edu/sethna/Cracks/Stirling.html
[77] F.C. Schoute, “Dynamic frame length ALOHA,” IEEE Transactions on Communications, vol. COM-31, no.4, pp.565–568, April 1983.
[78] D. -H. Shih, P. -L. Sun, David C. Yen, and S. -M. Huang, “Taxonomy and survey of RFID anti-collision protocols,” Computer Communications, vol. 29, no. 11, pp. 2150-2166, 2006.
[79] Smart & Secure Tradelanes, “The comprehensive supply chain security and productivity initiative addressing global transportation issues for the intermodal Community,” SST White Paper, May 2003.
[80] T. Staake, F. Thiesse, and E. Fleisch, “Extending the EPC network – the potential of RFID in anti-counterfeiting,” Proceedings of the 2005 ACM Symposium on Applied Computing (SAC 05), pp. 1607-1612, 2005.
[81] Sun Microsystems, “Sun EPC network architecture, a technical white paper,” February 2004, http://www.sun.com/aboutsun/media/presskits/networkcomputing04q2/epc_whitepaper.pdf
[82] H. Vogt, “Efficient object identification with passive RFID tags,” Proceedings of International Conference on Pervasive Computing, pp.98-113, 2002.
[83] H. Vogt, “Multiple object identification with passive RFID tags,” IEEE International Conference on Systems, Man and Cybernetics (SMC '02). October 2002.
[84] J. Waldrop, D. W. Engels, and S. E. Sarma, “Colorwave: a MAC for RFID reader networks,” IEEE Wireless Communications and Networking Conference (WCNC 2003), vol. 3, pp.1701 – 1704, 16-20 March 2003.
[85] R. Want, “Enabling ubiquitous sensing with RFID,” Computer, vol. 37, issue 4, pp. 84 – 86, April 2004.
[86] M. Ward and R. V. Kranenburg, “RFID: frequency, standards, adoption and innovation,” JISC Technology and Standards Watch, May 2006.
[87] S. A. Weis, S. E. Sarma, R. L. Rivest , and D. W. Engels, “Security and privacy aspects of low-cost radio frequency identification systems,” Lecture Notes in Computer Science - Security in Pervasive Computing, vol. 2802, pp. 50–59, 2004.
[88] Wiki, “Radio-Frequency Identification,” http://en.wikipedia.org/wiki/RFID
[89] C.-P. Wong and Q.-Y. Feng, “Grouping based bit-slot ALOHA protocol for tag anti-collision in RFID systems,” IEEE Communications Letters, vol. 11, No. 12, December 2007.
[90] World Customs Organization, “WCO SAFE framework of standards,” June 2007.
[91] F. Wu, F. Kuo, and L. W. Liu, “The application of RFID on drug safety of inpatient nursing healthcare,” Proceedings of the 7th international Conference on Electronic Commerce (ICEC '05), pp. 85-92, 2005.
[92] Bart J. Van Zeghbroeck, “Stirling's approximation for factorials”, 1997, http://ecee.colorado.edu/~bart/book/stirling.htm
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/65517-
dc.description.abstract在採用分時多工存取(Time-Division Multiple- Access, TDMA)協定的無線射頻辨識網路(Radio Frequency Identification Networks, RFID Networks)中,存在著三類型的研究議題:第一類型,是研究如何有效處理RFID reader collision問題,這問題已被證實是一個NP-hard的問題。第二類型,是如何有效地估計位於RFID reader有效詢答區域(interrogation zone)內可能存在的RFID tag數量。第三類型,是設計一個有效的辨識演算法(Tag arbitration algorithm),使得reader可以用最少的時間,完全辨識位於其有效詢答區域內RFID tag。
在本論文中,我們分別探討上述三類型研究問題,針對第一類問題,我們提出一個廣義的數學模型,並使用Lagrangean Relaxation方法與Simulated Annealing方法來設計快速與有效的演算法來解決屬於NP hard的整數規劃問題。於第二類問題,我們提出一個全新的數學模型,來有效的估計未知的tag數量,實驗數據顯示我們的方法所產生的估計誤差值最小,在研究過程中,我們也提出完全碰撞現象(Full Collision Phenomenon),及其對大多估計演算法所產生的影響。關於第三類問題,我們提出Collision Group Algorithm(CGA),可以有效使RFID reader對其有效詢答區域內RFID tag,進行完全辨識,與其他演算法相比,我們的演算法所需時間較短,也能有效率的處理突然暴增的tag數量對系統所產生的不確定性。
zh_TW
dc.description.abstractRecently there are three research issues giving rise to interest in Radio Frequency Identification (RFID), which adopt Time-Division Multiple-Access (TDMA) protocols: reader collision problem (RCP), estimate problem (EP) and tag arbitration problem (TAP). RCP is known to be a NP-hard problem whose best known algorithm is non-polynomial. EP is also a difficult problem because estimate has to be made based on little information derived from single reading outcome. TAP has lots of research works and some of them are even adopted by international organizations for standards. However, the design of arbitration algorithms to improve the efficiency and stability of current solutions still leaves open to be challenged.
In this dissertation, we have studied RCP, EP, and TAP and proposed solutions for them. For RCP, we proposed a general mathematic framework that can describe time slot overlapping and the reader collision problem at the same time. Lagrangean Relaxation (LR) and Simulated Annealing (SA) methods were used to solve RCP. We have also proposed two heuristic algorithms that can have good solution quality of answer but take less time.
For EP, we have proposed a distinct estimate model. The experimental results showed our method has the lower estimate error. The full collision phenomenon and its impact on major estimate algorithms were addressed and studied. We also proposed two sliding window methods to enhance estimate accuracy of proposed algorithm.
In regard to TAP, we propose a new algorithm based on divide-and-conquer principle with alternation of two distinct reading cycles for tag arbitration on MAC layer. The proposed algorithms are useful for engineers to implement the RFID systems by setting proper frame length to enhance the current RFID standards such as ISO 18000-6 or EPC class 1 generation 2.
en
dc.description.provenanceMade available in DSpace on 2021-06-16T23:47:54Z (GMT). No. of bitstreams: 1
ntu-101-D92725002-1.pdf: 7387004 bytes, checksum: 8cfe2637ea65b4c98ecf20004422026a (MD5)
Previous issue date: 2012
en
dc.description.tableofcontents口試委員審定書 i
謝辭 iii
論文摘要 v
Dissertation Abstract vii
List of Tables xii
List of Figures xiii
Chapter 1 Introduction 1
1.1 Motivations 1
1.2 Contribution 3
1.3 Research Scope 5
1.4 Dissertation Layout 7
Chapter 2 Research Background 8
2.1. Reader Collision Problem (RCP) 9
2.2. Estimate Problem (EP) 13
2.3. Tag Arbitration Problem (TAP) 16
2.3.1 Tree-based Algorithms 19
2.3.2 ALOHA-based Algorithms 20
2.4. Lagrangean Relaxation Methods 22
2.5. Simulated Annealing Method 24
Chapter 3 Anti-Collision Algorithms for RCP 28
3.1 Overview 28
3.2 Problem Definition 37
3.3 Mathematic Model 38
3.4 Solution Approaches 41
3.4.1 LR Solution Approach 41
3.4.2 SA Solution Approach 43
3.4.3 Heuristic Algorithms 46
3.5 Computational Results 53
3.6 Concluding Remarks 62
Chapter 4 Estimation Algorithms for EP 65
4.1 Overview 65
4.2 Proposed Estimate Model (PEM) 68
4.3 Sliding Window Methods 81
4.4 Concluding Remarks 95
Chapter 5 Algorithms for TAP 98
5.1 Overview 98
5.2 The Setting of Optimal Frame Size 103
5.3 Proposed Arbitration Algorithm 105
5.4 Computational Results 113
5.5 Concluding Remarks 121
Chapter 6 Conclusions and Future Works 123
6.1 Conclusions 123
6.2 Future Works 126
References 129
Publications 136
dc.language.isoen
dc.subject估計問題zh_TW
dc.subjectRFID網路zh_TW
dc.subject辨識問題zh_TW
dc.subject碰撞問題zh_TW
dc.subjectReader Collision Problemsen
dc.subjectTag Identification Problemsen
dc.subjectEstimate Problemen
dc.subjectRFID Reader Networksen
dc.title應用於無線射頻辨識網路之分時多工擷取演算法zh_TW
dc.titleTime-Division Multiple-Access Algorithms for Radio Frequency Identification Networksen
dc.typeThesis
dc.date.schoolyear100-2
dc.description.degree博士
dc.contributor.oralexamcommittee蘇順豐(Shun-Feng Su),鍾嘉德(Char-Dir Chung),李瑞庭(Anthony.J.T. Lee),林盈達(Ying-Dar Lin),莊東穎(Tong-Ying Juang)
dc.subject.keyword碰撞問題,辨識問題,估計問題,RFID網路,zh_TW
dc.subject.keywordReader Collision Problems,Tag Identification Problems,Estimate Problem,RFID Reader Networks,en
dc.relation.page136
dc.rights.note有償授權
dc.date.accepted2012-07-24
dc.contributor.author-college管理學院zh_TW
dc.contributor.author-dept資訊管理學研究所zh_TW
Appears in Collections:資訊管理學系

Files in This Item:
File SizeFormat 
ntu-101-1.pdf
  Restricted Access
7.21 MBAdobe PDF
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved