|
[1] P.-P. M.Institute., “PMBoK®-A Guide to the Project Management Body of Knowledge,” A Guid. to Proj. Manag. Body Knowl. (pmb. Guid., 2018. [2] 謝光玉 T A - Ta QuangNgoc, “公司在採用雲端運算之下的競爭優勢和資源配置 TT - Competitive Advantage and Resource Configurations of companies in Cloud computing business,” 國立交通大學, 新竹市, 2010. [3] 張家瑋 T A - Jia-WeiZhang, “雲端平台大數據資料庫研究-以報關訊息資料為例 TT - Big Data Computing Performance Analysis on Cloud Platform: A Case Study of Custom Application Messages,” 龍華科技大學, 桃園縣, 2014. [4] 許賓鄉 T A - PIN-HSIANGHSU, “雲端服務模式探討:以銀髮族居家安全健康互 動雲端服務為例 TT - Model of Cloud Services – Senior Home Care Cloud Service Case Study,” 國立臺灣科技大學, 台北市, 2012. [5] K.-H.彭康桓 TA - Peng, “雲端商業智慧服務策略之研究 TT - An Innovative Approach in the Business Intelligence Service via Cloud Computing,” 國立交通大學, 新竹市, 2009. [6] 黃健原 T A - Chien-YuanHuang, “物聯網在智慧住宅節能與安全之應用 TT - Application of Internet of Things on Intelligent Residential Energy Conservation and Safety,” 國立臺北科技大學, 台北市, 2017. [7] G.Aloi et al., “A mobile multi-technology gateway to enable IoT interoperability,” in Proceedings - 2016 IEEE 1st International Conference on Internet-of-Things Design and Implementation, IoTDI 2016, 2016, pp. 259–264. [8] X.Ren, S.Du, andY.Zheng, “Parallel RCNN: A deep learning method for people detection using RGB-D images,” in 2017 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), 2017, pp. 1– 6. [9] S.Ren, K.He, R.Girshick, andJ.Sun, “Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 39, Jun.2015. [10] Z.Tian, W.Huang, H.Tong, P.He, andY.Qiao, Detecting Text in Natural Image with Connectionist Text Proposal Network, vol. 9912. 2016. [11] B.Shi, X.Bai, andS.Belongie, “Detecting Oriented Text in Natural Images by Linking Segments,” in 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017, pp. 3482–3490. [12] X.Zhou et al., “EAST: An Efficient and Accurate Scene Text Detector,” in 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017, pp. 2642–2651. [13] M.Jaderberg, K.Simonyan, A.Vedaldi, andA.Zisserman, “Reading Text in the Wild with Convolutional Neural Networks,” Int. J. Comput. Vis., vol. 116, Dec.2014. [14] Z.Zhang, C.Zhang, W.Shen, C.Yao, W.Liu, andX.Bai, “Multi-oriented Text Detection with Fully Convolutional Networks,” in 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016, pp. 4159–4167. [15] J.Long, E.Shelhamer, andT.Darrell, “Fully convolutional networks for semantic segmentation,” in 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015, pp. 3431–3440. [16] K.-H.Kim, Y.Cheon, S.Hong, B.Roh, andM.Park, “PVANET: Deep but Lightweight Neural Networks for Real-time Object Detection,” Aug.2016. [17] O.Ronneberger, P.Fischer, andT.Brox, U-Net: Convolutional Networks for Biomedical Image Segmentation, vol. 9351. 2015. [18] W.Wang et al., Shape Robust Text Detection with Progressive Scale Expansion Network. 2019. [19] T.Lin, P.Dollár, R.Girshick, K.He, B.Hariharan, andS.Belongie, “Feature Pyramid Networks for Object Detection,” in 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017, pp. 936–944. [20] B.Shi, X.Bai, andC.Yao, “An End-to-End Trainable Neural Network for Image-Based Sequence Recognition and Its Application to Scene Text Recognition,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 39, no. 11, pp. 2298–2304, 2017. [21] D.Nadeau andS.Sekine, “A survey of named entity recognition and classification,” Lingvisticae Investig., vol. 30, no. 1, pp. 3–26, 2007. [22] K.Humphreys et al., “University of Sheffield: Description of the LaSIE-II system as used for MUC-7,” Proc. Seventh Messag. Underst. Conf., Jun.2001. [23] G. R.Krupka andK.Hausman, “IsoQuest Inc.: Description of the NetOwl Extractor System as Used for {MUC}-7,” in Seventh Message Understanding Conference ({MUC}-7): Proceedings of a Conference Held in Fairfax, Virginia, April 29 - May 1, 1998, 1998. [24] W. J.Black, F.Rinaldi, andD.Mowatt, “FACILE: Description of the NE System Used for MUC-7,” in Seventh Message Understanding Conference (MUC-7): Proceedings of a Conference Held in Fairfax, Virginia, April 29 - May 1, 1998, 1998. [25] C.Aone, L.Halverson, T.Hampton, andM.Ramos-Santacruz, “SRA: Description of the IE2 System Used for MUC-7,” in Seventh Message Understanding Conference (MUC- 7): Proceedings of a Conference Held in Fairfax, Virginia, April 29 - May 1, 1998, 1998. [26] D.Appelt et al., SRI International FASTUS system: MUC-6 test results and analysis. 1995. [27] A.Mikheev, M.Moens, andC.Grover, “Named Entity Recognition Without Gazetteers,” in Proceedings of the Ninth Conference on European Chapter of the Association for Computational Linguistics, 1999, pp. 1–8. [28] O.Etzioni et al., “Unsupervised named-entity extraction from the Web: An experimental study,” Artif. Intell., vol. 165, no. 1, pp. 91–134, 2005. [29] S. R.Eddy, “Hidden Markov models,” Curr. Opin. Struct. Biol., vol. 6, no. 3, pp. 361– 365, 1996. [30] J. R.Quinlan, “Induction of decision trees,” Mach. Learn., vol. 1, no. 1, pp. 81–106, 1986. [31] J. N.Kapur, Maximum Entropy Models in Science and Engineering. Wiley, 1990. [32] L.Li, S.Ma, andY.Zhang, “Optimization algorithm based on genetic support vector machine model,” in Proceedings - 2014 7th International Symposium on Computational Intelligence and Design, ISCID 2014, 2015, vol. 1, pp. 307–310. [33] Y.Nuo, X.Yan, Z.Yu, S.Huang, andJ.Guo, “A Khmer NER method based on conditional random fields fusing with Khmer entity characteristics constraints,” in Proceedings of the 29th Chinese Control and Decision Conference, CCDC 2017, 2017, pp. 7464–7471. [34] R.Collobert, J.Weston, L.Bottou, M.Karlen, K.Kavukcuoglu, andP.Kuksa, “Natural Language Processing (Almost) from Scratch,” J. Mach. Learn. Res., vol. 12, pp. 2493– 2537, 2011. [35] Z.Huang, W.Xu, andK.Yu, “Bidirectional LSTM-CRF Models for Sequence Tagging,” Aug.2015. [36] J.Li, A.Sun, J.Han, andC.Li, “A Survey on Deep Learning for Named Entity Recognition,” CoRR, vol. abs/1812.0, 2018. [37] E. F.Tjong Kim Sang andF.DeMeulder, “Introduction to the CoNLL-2003 Shared Task: Language-independent Named Entity Recognition,” in Proceedings of the Seventh Conference on Natural Language Learning at HLT-NAACL 2003 - Volume 4, 2003, pp. 142–147. [38] S.Pradhan, A.Moschitti, N.Xue, O.Uryupina, andY.Zhang, “CoNLL-2012 Shared Task: Modeling Multilingual Unrestricted Coreference in OntoNotes,” in Joint Conference on EMNLP and CoNLL - Shared Task, 2012, pp. 1–40. [39] V.VanAsch, “Macro-and micro-averaged evaluation measures [[basic draft]],” Belgium: CLiPS, pp. 1–27, 2013. [40] P.-H.Li, R.-P.Dong, Y.-S.Wang, J.-C.Chou, andW.-Y.Ma, “Leveraging Linguistic Structures for Named Entity Recognition with Bidirectional Recursive Neural Networks,” in Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, 2017, pp. 2664–2669. [41] M.Honic, I.Kovacic, G.Sibenik, andH.Rechberger, “Data- and stakeholder management framework for the implementation of BIM-based Material Passports,” J. Build. Eng., vol.23, pp. 341–350, 2019. [42] 林昭嘉 T A - Chao-chiaLin, “結合雲端資料庫與智慧型手持行動裝置於施工管理 跨平台之應用 TT - The Application of Combining Cloud Database and Intelligent Mobile Devices on Construction Management,” 國立臺北科技大學, 台北市, 2017. [43] S.-T.張守德 TA - Chang, “物聯網與深度學習影響下 伺服器的演進與未來發展 TT - The Evolution and Future Development in Server Effected by Internet of Things and Deep Learning,” 輔仁大學, 新北市, 2017.
|