參考文獻 |
[1] P.-P. M.Institute., “PMBoK®-A Guide to the Project Management Body of Knowledge,” A Guid. to Proj. Manag. Body Knowl. (pmb. Guid., 2018.
[2] 謝光玉 T A - Ta QuangNgoc, “公司在採用雲端運算之下的競爭優勢和資源配置
TT - Competitive Advantage and Resource Configurations of companies in Cloud computing business,” 國立交通大學, 新竹市, 2010.
[3] 張家瑋 T A - Jia-WeiZhang, “雲端平台大數據資料庫研究-以報關訊息資料為例 TT - Big Data Computing Performance Analysis on Cloud Platform: A Case Study of Custom Application Messages,” 龍華科技大學, 桃園縣, 2014.
[4] 許賓鄉 T A - PIN-HSIANGHSU, “雲端服務模式探討:以銀髮族居家安全健康互 動雲端服務為例 TT - Model of Cloud Services – Senior Home Care Cloud Service Case Study,” 國立臺灣科技大學, 台北市, 2012.
[5] K.-H.彭康桓 TA - Peng, “雲端商業智慧服務策略之研究 TT - An Innovative Approach in the Business Intelligence Service via Cloud Computing,” 國立交通大學, 新竹市, 2009.
[6] 黃健原 T A - Chien-YuanHuang, “物聯網在智慧住宅節能與安全之應用 TT - Application of Internet of Things on Intelligent Residential Energy Conservation and Safety,” 國立臺北科技大學, 台北市, 2017.
[7] G.Aloi et al., “A mobile multi-technology gateway to enable IoT interoperability,” in Proceedings - 2016 IEEE 1st International Conference on Internet-of-Things Design and Implementation, IoTDI 2016, 2016, pp. 259–264.
[8] X.Ren, S.Du, andY.Zheng, “Parallel RCNN: A deep learning method for people detection using RGB-D images,” in 2017 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), 2017, pp. 1– 6.
[9] S.Ren, K.He, R.Girshick, andJ.Sun, “Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 39, Jun.2015.
[10] Z.Tian, W.Huang, H.Tong, P.He, andY.Qiao, Detecting Text in Natural Image with Connectionist Text Proposal Network, vol. 9912. 2016.
[11] B.Shi, X.Bai, andS.Belongie, “Detecting Oriented Text in Natural Images by Linking Segments,” in 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017, pp. 3482–3490.
[12] X.Zhou et al., “EAST: An Efficient and Accurate Scene Text Detector,” in 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017, pp. 2642–2651.
[13] M.Jaderberg, K.Simonyan, A.Vedaldi, andA.Zisserman, “Reading Text in the Wild with Convolutional Neural Networks,” Int. J. Comput. Vis., vol. 116, Dec.2014.
[14] Z.Zhang, C.Zhang, W.Shen, C.Yao, W.Liu, andX.Bai, “Multi-oriented Text Detection with Fully Convolutional Networks,” in 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016, pp. 4159–4167.
[15] J.Long, E.Shelhamer, andT.Darrell, “Fully convolutional networks for semantic segmentation,” in 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015, pp. 3431–3440.
[16] K.-H.Kim, Y.Cheon, S.Hong, B.Roh, andM.Park, “PVANET: Deep but Lightweight Neural Networks for Real-time Object Detection,” Aug.2016.
[17] O.Ronneberger, P.Fischer, andT.Brox, U-Net: Convolutional Networks for Biomedical Image Segmentation, vol. 9351. 2015.
[18] W.Wang et al., Shape Robust Text Detection with Progressive Scale Expansion Network. 2019.
[19] T.Lin, P.Dollár, R.Girshick, K.He, B.Hariharan, andS.Belongie, “Feature Pyramid Networks for Object Detection,” in 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017, pp. 936–944.
[20] B.Shi, X.Bai, andC.Yao, “An End-to-End Trainable Neural Network for Image-Based Sequence Recognition and Its Application to Scene Text Recognition,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 39, no. 11, pp. 2298–2304, 2017.
[21] D.Nadeau andS.Sekine, “A survey of named entity recognition and classification,” Lingvisticae Investig., vol. 30, no. 1, pp. 3–26, 2007.
[22] K.Humphreys et al., “University of Sheffield: Description of the LaSIE-II system as used for MUC-7,” Proc. Seventh Messag. Underst. Conf., Jun.2001.
[23] G. R.Krupka andK.Hausman, “IsoQuest Inc.: Description of the NetOwl Extractor System as Used for {MUC}-7,” in Seventh Message Understanding Conference ({MUC}-7): Proceedings of a Conference Held in Fairfax, Virginia, April 29 - May 1, 1998, 1998.
[24] W. J.Black, F.Rinaldi, andD.Mowatt, “FACILE: Description of the NE System Used for MUC-7,” in Seventh Message Understanding Conference (MUC-7): Proceedings of a Conference Held in Fairfax, Virginia, April 29 - May 1, 1998, 1998.
[25] C.Aone, L.Halverson, T.Hampton, andM.Ramos-Santacruz, “SRA: Description of the IE2 System Used for MUC-7,” in Seventh Message Understanding Conference (MUC- 7): Proceedings of a Conference Held in Fairfax, Virginia, April 29 - May 1, 1998, 1998.
[26] D.Appelt et al., SRI International FASTUS system: MUC-6 test results and analysis. 1995.
[27] A.Mikheev, M.Moens, andC.Grover, “Named Entity Recognition Without Gazetteers,” in Proceedings of the Ninth Conference on European Chapter of the Association for Computational Linguistics, 1999, pp. 1–8.
[28] O.Etzioni et al., “Unsupervised named-entity extraction from the Web: An experimental study,” Artif. Intell., vol. 165, no. 1, pp. 91–134, 2005.
[29] S. R.Eddy, “Hidden Markov models,” Curr. Opin. Struct. Biol., vol. 6, no. 3, pp. 361– 365, 1996.
[30] J. R.Quinlan, “Induction of decision trees,” Mach. Learn., vol. 1, no. 1, pp. 81–106, 1986.
[31] J. N.Kapur, Maximum Entropy Models in Science and Engineering. Wiley, 1990.
[32] L.Li, S.Ma, andY.Zhang, “Optimization algorithm based on genetic support vector machine model,” in Proceedings - 2014 7th International Symposium on Computational Intelligence and Design, ISCID 2014, 2015, vol. 1, pp. 307–310.
[33] Y.Nuo, X.Yan, Z.Yu, S.Huang, andJ.Guo, “A Khmer NER method based on conditional random fields fusing with Khmer entity characteristics constraints,” in Proceedings of the 29th Chinese Control and Decision Conference, CCDC 2017, 2017, pp. 7464–7471.
[34] R.Collobert, J.Weston, L.Bottou, M.Karlen, K.Kavukcuoglu, andP.Kuksa, “Natural Language Processing (Almost) from Scratch,” J. Mach. Learn. Res., vol. 12, pp. 2493– 2537, 2011.
[35] Z.Huang, W.Xu, andK.Yu, “Bidirectional LSTM-CRF Models for Sequence Tagging,” Aug.2015.
[36] J.Li, A.Sun, J.Han, andC.Li, “A Survey on Deep Learning for Named Entity Recognition,” CoRR, vol. abs/1812.0, 2018.
[37] E. F.Tjong Kim Sang andF.DeMeulder, “Introduction to the CoNLL-2003 Shared Task: Language-independent Named Entity Recognition,” in Proceedings of the Seventh Conference on Natural Language Learning at HLT-NAACL 2003 - Volume 4, 2003, pp. 142–147.
[38] S.Pradhan, A.Moschitti, N.Xue, O.Uryupina, andY.Zhang, “CoNLL-2012 Shared Task: Modeling Multilingual Unrestricted Coreference in OntoNotes,” in Joint Conference on EMNLP and CoNLL - Shared Task, 2012, pp. 1–40.
[39] V.VanAsch, “Macro-and micro-averaged evaluation measures [[basic draft]],” Belgium: CLiPS, pp. 1–27, 2013.
[40] P.-H.Li, R.-P.Dong, Y.-S.Wang, J.-C.Chou, andW.-Y.Ma, “Leveraging Linguistic Structures for Named Entity Recognition with Bidirectional Recursive Neural Networks,” in Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, 2017, pp. 2664–2669.
[41] M.Honic, I.Kovacic, G.Sibenik, andH.Rechberger, “Data- and stakeholder management framework for the implementation of BIM-based Material Passports,” J. Build. Eng., vol.23, pp. 341–350, 2019.
[42] 林昭嘉 T A - Chao-chiaLin, “結合雲端資料庫與智慧型手持行動裝置於施工管理 跨平台之應用 TT - The Application of Combining Cloud Database and Intelligent Mobile Devices on Construction Management,” 國立臺北科技大學, 台北市, 2017.
[43] S.-T.張守德 TA - Chang, “物聯網與深度學習影響下 伺服器的演進與未來發展
TT - The Evolution and Future Development in Server Effected by Internet of Things and Deep Learning,” 輔仁大學, 新北市, 2017. |