2007¸ê°T¬ì§Þ°ê»Ú¬ã°Q·|
2007 International Conference on Advanced Information Technologies, AIT

¥D¿ì³æ¦ì¡G´Â¶§¬ì§Þ¤j¾Ç¸ê°T¾Ç°|¡B
¸ê°T¬ì§Þ¬ã¨s©Ò¡B
ºô¸ô»P³q°T¬ã¨s©Ò¡B
¸ê°TºÞ²z¨t¤Î¸ê°T¤uµ{¨t
¨ó¿ì³æ¦ì¡G¨|¹F°Ó·~§Þ³N¾Ç°|
¸ê°TºÞ²z¨t¤Î¦h´CÅé»P¹CÀ¸µo®i¬ì¾Ç¨t

¦aÂI¡G´Â¶§¬ì§Þ¤j¾Ç®É¿ïÆU

¦a§}¡G¥x¤¤¿¤Ãú®p¶m¦N®pªF¸ô168¸¹

Ápµ¸¹q¸Ü¡G(04)23323000Âà7703§ù¯ø­ë¤p©j
¶Ç¯u¡G(04)23304902
E-mail¡Gcoinfo@cyut.edu.tw

¤j·|ijµ{

¤é´Á ¾Ç³N¬ã°Q ®É¡@¶¡ ¤º¡@®e

96
¦~
4
¤ë
28
¤é
¡_
¬P
´Á
¤»
¡`

08:30¡ý
09:00

³ø¡@¨ì

09:00¡ý
09:30

¶}¹õ¨å§¡B¶Q»«­Pµü

¥D«ù¤H

´Â¶§¬ì§Þ¤j¾ÇÁé¥ôµ^®Õªø
¤ý²Q­ë°|ªø

09:30¡ý
10:30

¥DÃDºtÁ¿¤H¡G°ê¥ß¤¤¿³¤j¾Ç´¿Ì°¥É±Ð±Â
Á¿ÃD¡GMetaheuristic Methods and Their Applications

10:30¡ý
11:00

¯ù±Ô

11:00¡ý
12:00

²Ä1-A~1-G³õ
(¥­¦æ7­Ó³õ¦a¦P®É¶i¦æ)

12:00¡ý
13:00

¤ÈÀ\¡þ¥ð®§

13:00¡ý
14:00

²Ä2-A~2-G³õ
(¥­¦æ7­Ó³õ¦a¦P®É¶i¦æ)

14:00¡ý
15:00

²Ä3-A~3-G³õ
(¥­¦æ7­Ó³õ¦a¦P®É¶i¦æ)

15:00¡ý
15:30

¯ù±Ô

15:30¡ý
16:30

²Ä4-A~4-G³õ
(¥­¦æ7­Ó³õ¦a¦P®É¶i¦æ)

AIT2007½×¤å¶°

²Ä1-A~1-G³õ
®É¶¡ ¦aÂI ¤º®e

11:00
¡U
12:00

²Ä1-A³õ¥D«ù¤H¡G¨H»F°ò ±Ð±Â

T2-106

½×¤åÃD¥Ø

µoªí¤H

Ãþ¯«¸gºô¸ôÀ³¥Î©ó¥xÆW³£·|°Ï¦a¾_°Ñ¼Æ³]­p¤§µû¦ô

¬_«F¦|¡B¿à©v½å¡B¸â¶®¬Â

¹B¥Î§ï¨}¦¡°ò¦]ºtºâ¨D¸ÑµL¬É­­­I¥]°ÝÃD

³¯ºaÀR¡B²µ{½÷

¼Ò½k·§©À¤ÀªR¬°°ò¦ªº¥»Åé½×¦X¨Ö¤èªk

¸­®m¾§¡B³¯ºaÀR

¹B¥Î¼Ò½k¾AÀ³²z½×»²§U¨D¸Ñ¤j«¬®È¦æªÌ±À¾P­û°ÝÃD

¥Ð¤èªv¡B³¯«ÛÀM

¨ã¦³·¾³qµ¦²¤¤§¤À¸s²É¤l¸sºtºâªk

¶À©ÓÀs¡B¨H®a»¨

²Ä1-B³õ¥D«ù¤H¡G³\»Y«Û ±Ð±Â

T2-107

½×¤åÃD¥Ø

µoªí¤H

An Effective Blending Method for Panoramic Images in Image-based Virtual Reality

Wu-Chih Hu¡BChin-Hao Chang¡BYa-Fang Liang¡BChen-Tsung Wu

¤¬°Ê¦¡¦Û¦æ¨®¼ÒÀÀ¾¹À³¥Î©óµêÀÀ¹ê¹Ò¤§¬ã¨s

¶Àºa°ó¡B³¯®p³Ç

²V¦XÃþ¯«¸gºô¸ôÀ³¥Î©ó¼v¹³¨®¸¹¿ëÃÑ

±i°]ºa¡B¿à«Ø®x

¥b¾ÉÅé¦Û°Ê¤Æª«®Æ·h¹B¨t²Î¤§¼ÒÀÀ»P¤ÀªR---¥HOHS¤º­y¥x¨®¼Æ³Ì¨Î¤Æ¬°¨Ò

§õ¥°·u¡B³¢­×ÝÂ

µêÀÀÀô¹Ò¨Ï¥Î±¡¹Ò·Pª¾¤Hª«Áy³¡±¡§ÎÅܧ޳N

¿c¤ÑÄQ¡B±i§»¹ü

²Ä1-C³õ¥D«ù¤H¡G³¯¥ÃºÖ ±Ð±Â

T2-108

½×¤åÃD¥Ø

µoªí¤H

¥H¤ä´©¦V¶q¾÷¿ëÃѤ£¦P¯f²z«¬ºA¤§¶WÁ¡¤l®cÀV©Ù¤ù²Ó­M¼v¹³

¸â¥Ã¼e¡B³¯ºaÀR¡B¶À¦tºÍ¡B¶À³ÕµX

´Ó°ò²É¤l¸s³Ì¨Î¤Æºtºâªk©ó»y·N¼v¹³¤ÀÃþ

§õ¦¶¼z¡B³\§Ó§»

°ò©ó¨©Ãþ¥¿­±¯S¼x¼v¹³¿ëÃÑÀ˯Á§Þ³N

§õ¹ÅÓT¡B½²­õ¥Á¡B¤ý«Ø¤¯¡B½²¤å¦N¡B§d©ú©ø

Segmentation and Grading of Hepatocellular Carcinoma in Biopsy Images

Yee-Jee Jan¡BShou-Kuo Dai¡BYan-Hou Lai¡BHsi-Chi Chen¡BShu-Jiuan Lin

Correlation-Based Image Scaling with Separable and Nonseparable Kernels

Che-Cheng Hu ¡BJiann-Der Lee

²Ä1-D³õ¥D«ù¤H¡G·¨¬F¿o ±Ð±Â

T2-109

½×¤åÃD¥Ø

µoªí¤H

¹B¥Î°Ï°ì¦Û¬ÛÃö¤è¦¡¹ê²{LED´¹²É­p¼Æ¥\¯à

³¯°ö¤å¡BÁ¬F¾±

Development of Sewing Path Design Software for Broidery

Chie-Chi Chao¡BChun-Yen Lin¡BShiuan Tai Chen

A New Nonlinear Chua¡¦s Chaotic Structure System for Information Cipher Applications

You-Yu Jan¡BYuan-Fong Chau¡BYuh-Sien Sun

Modified SLM Method by Using Phase Label Insertion for PAPR Reduction in OFDM Systems

Shu-Hong Lee¡BChengChu-Hsuan¡BJyh-Horng Wen

²Ä1-E³õ¥D«ù¤H¡G¬x°êÄ_ ±Ð±Â

T2-114

½×¤åÃD¥Ø

µoªí¤H

¦bÀH·N¦¡µL½uºô¸ôÀô¹Ò¤¤¥H­«¤ß¤À¸sªk´£¨Ñí©w¤§ªA°È

¤ý²Q­ë¡BÄY°ê¼y¡B¼ï«H§»¡BªL»A´@

¥H¶ZÂ÷¤Î³Ñ¾l¹q¶q¦Ò¶q¤§µL½uÀH·Nºô¸ô¶®|¨ó©w

¤ý·×«°¡B³¯¤å§»

Performance Evaluation of Parallel Packet Switches using the Proportional Bounded Copy Multicast Scheme

³¯§¡»Ê¡B©P«a§»¡B ªL°¶

°ò©óCDMA¤§µL½u·P´úºô¸ô³s±µ©Ê¤§®e¿ù®Ä¯à

¶À¥Ãµo¡B´¿Ä£¥Á¡B¼B³Íµ¾

¨Ï¥Î·sªº§Ö¨ú°O¾ÐÅé¬[ºc¼W¶i¥HÂø´êªí¬°°ò¦ªºIP¬dªíºtºâªk¤§®Ä¯à

§d¨ä¬F¡B¶À«Û²[¡B§dªF¦°

²Ä1-F³õ¥D«ù¤H¡G§f·çÅï ±Ð±Â

T2-115

½×¤åÃD¥Ø

µoªí¤H

Development of Integrated Headphone Communication System Using Active Noise Control

Chien-Wun Chiu¡BChun-Cheng Lin¡BYen-Nien Wang

¹B¥Î©óNetwork Mobility¬[ºc¤§Home Agent³Æ¥÷»P­«·s«ì´_¾÷¨î¬ã¨s

ªL¤å©v¡BÁ©ú­õ

¤@­ÓJADE¬°¥Dªº¦³®Ä·¾³q¨t²Î

³¯©¾«H¡B¶À«aÀM¡B¶À­P¤¤

¹ê§@µêÀÀSIP¦øªA¾¹¤§Ad Hoc VoIP¨t²Î

½²Ãh¿³¡B§º«T½÷¡Bªô¥K¯q¡B±iªL·×

Using SCTP to improve the network efficiency under asymmetric transmission link

Bo-Yi Ho¡B Lin-Huang Chang

²Ä1-G³õ¥D«ù¤H¡G§õª÷»ñ ±Ð±Â

T2-116

½×¤åÃD¥Ø

µoªí¤H

¨ãÁô¨p«OÅ@¤§ÂåÀø°·ÀËÃöÁp³W«h±´°É

Á§¦g¬Ã¡B®}Ãý¶²

¦³®Ä²vªº¥H¦ì¤¸§Þ³N«õ±¸³sÄò¼Ë¦¡ªº¤èªk

±i¥É¬Õ¡B¶À¥ß¤å¡B³¯«Tºa¡B§d«Ø½÷

«Øºc°]°È¦M¾÷¹w´ú¤§³Ì¨Î¸ê®Æ±´°É¼Ò¦¡

½²§ÓÂסBªô°¶©ú

¹B¥Î²ÊÁW¶°¦X²z½×©ó¤G¶¥¬q¤èªk¤¤±´°É¿}§¿¯fÁ{§É¥ÎÃĪ¾ÃÑ

¶À¯Â±Ó¡BªL»a¦ë¡B±iºë­õ

µ²¦XÃöÁp³W«h»P²`«×Àu¥ý·j´M©ó§ä´M¨Ï¥ÎªÌÂsÄý¸ô®|

§õ¦¶¼z¡B³Å¬Rµ¾

²Ä2-A~2-G³õ
®É¶¡ ¦aÂI ¤º®e

13:00
|
14:00

²Ä2-A³õ¥D«ù¤H¡GÁ§¦g¬Ã ±Ð±Â

T2-106

½×¤åÃD¥Ø

µoªí¤H

À³¥ÎRFID§Þ³N³W¹º«Øºc´¼¼z«¬º®´ä·§©À¤§¬ã¨s

§õ§Ó§»¡BªLÀ³ÅÒ

¥H¤º®e¤ÀªRªk¤ÀªRRFID©ó²£·~¤§À³¥ÎÁͶÕ-¥H¥xÆWºÓ¤h½×¤å»PABI/Global¾Ç³N½×¤å¬°¥D

±ä¥Ã©¾¡B½²­^¼w¡B³\´¼¸Û

¨ã¦³¥æ¤¬»{ÃÒ¤ÎÁô¨p«OÅ@ªºµL½u®gÀW¿ëÃѨt²Î

³¯ª÷¹a¡B¾Hµú¤¸

µL½u®gÀWÃѧO²¼¾Ú¥i¦æ©Ê¬ã¨s

±i·ç¯q¡B«J§Ê°¶¡B¤_ïú¹ü¡B®]«a§»

RFID´¼¼z´¹¤ù¥dÀ³¥Î©ó¨®½ø¾ã¦X¨t²Î¤§¬ã¨s

±i®Ñ·½¡B«J§Ê°¶¡B±ç´¼¯à¡B®]«a§»

²Ä2-B³õ¥D«ù¤H¡G±i°a®x ±Ð±Â

T2-107

½×¤åÃD¥Ø

µoªí¤H

A Closed-Form Solution for Image Warping of Mesh in Quad-Tree Representation

Chih-Cheng Wei¡BChin-Hsing Chen¡BJin-Yuan Wang

À³¥Î¦Ç¦â¦h¶µ¦¡¤º´¡ªk©ó­°§C¼v¹³À£ÁY¤§°Ï¶ô®ÄÀ³

¶À¥ô½å¡BÁ¬F¾±¡B³¯°ö¤å

¥H¤HÃþµøı¤§¤pªiÂà´«¬°°ò¦ªº¼v¹³À£ÁY

¶Àª÷¥»¡Bµ{¥@¦{¡B±i­õÞ³¡B³¯¥@¿Ä¡B½²©ú¾Ç¡B³¢¬Õ§g

°ò©ó¦h­«¸ÑªR«×·j´M¤§¸H§Î¼v¹³½s½X

±i°a®x¡B³\§Ó¥ò

¥H°Ï¶ôDCT«Y¼Æ¬Û¦ü©Ê§ï¨} JPEG/MPEG½s½X«~½è¤§¬ã¨s

³\§Ó¥ò¡B±i°a®x

²Ä2-C³õ¥D«ù¤H¡Gù¦³¶© ±Ð±Â

T2-108

½×¤åÃD¥Ø

µoªí¤H

Representation of the Reversible TSG Gate by Reed-Muller Expansions

³¯«Ø§»¡B³¯¶i¿³

A Time Scenes Simulation Using Multiple Regression of the Discrete Cosine Transform of Color Block¡¦s Time Images

Chen-Chung Liu¡BKai-Wen Chuang¡BWen-Yuan Chen¡BChi-Chao Yang

±M§Q§Þ³N³Ð·s¤Î«IÅv¤ÀªR¡Ð¥H¥Í§Þ²£·~¬°¨Ò

¤ý¤W©ú¡BÀ¹¦°°ó¡B¤ý¥­

The Study of Adolescent attitudes and behaviors towards Information Ethics

Chang, Raie Kuan¡BChen, Yi Ling

R-tree¤@­Ó¦hª«¥ó§R°£ªº«ü¥O

³¯¹t°ê¡B¶À¤¯°¶

²Ä2-D³õ¥D«ù¤H¡G§õ¦¶¼z ±Ð±Â

T2-109

½×¤åÃD¥Ø

µoªí¤H

¨Ï¥Î¼v¹³­×¸É§Þ³N®ø°£¼Æ¦ì³æ²´¬Û¾÷·P¥ú¤¸¥ó¬V¹Ð

§d«TÀM¡B¿c±ÓÂ`

¨ã®É¶¡¥­²¾¤§²{³õ¦ê¬y¦h´CÅé±µÄò¼½©ñ¾÷¨î

¶À°ê¦w¡B³¯«³¦w

²V¦X¾ðª¬µ²ºc¤§­µ¼Ö¸ê®Æ¦h¯S¼x¯Á¤Þ

ù¦³¶©¡B¤ý«T¶¯

°ª°ÊºA½d³ò¼v¹³­·®æ¤Æºtºâªk

©PÀ[ªö¡B¶À©ú¶©¡B¤ý©v»Ê

²Ä2-E³õ¥D«ù¤H¡GªL¬K§» ±Ð±Â

T2-114

½×¤åÃD¥Ø

µoªí¤H

°ò©óHTTP¨ó©wªº¸õÀWÁôÂóq¹D

ªL¤h¥¿¡B¼B®¶ºü¡BªL¸Î´Ü

°ò©ó¦h¥N²z¤H¬[ºc¤§¬x¤ô¦¡¤À´²ªýµ´ªA°È§ðÀ»°»¨¾¾÷¨î

¼B¸g½n¡B±ä°¶Â@

Two New Mobile Single-Sign-On Systems Against Guessing Attack

Yung-Cheng Lee¡B Jung-Lu Chu¡B Huan-Cheng Lien

¥H°¨¥i¤Ò¨Mµ¦¬°°ò¦ªº«H¥ô­È­pºâ»Pª÷Æ_ºÞ²z©óµL½u¸s¼½¦æ°ÊÀH·Nºô¸ô¤§¬ã¨s

±i¥»ªN¡B³¢«ä¨}¡B­ð¤¸«G

·sªºWLAN »{ÃÒ®zÂI¤§°»¨¾¾÷¨î

±ä°¶Â@¡B§õ­õºû

²Ä2-F³õ¥D«ù¤H¡G¶À¥Ãµo ±Ð±Â

T2-115

½×¤åÃD¥Ø

µoªí¤H

Virtual laboratory Management Systems

´¿¨å²»¡B®]¤ßÄõ¡B¦¿·É©ú

A Tele-Emergent System with power-saving scheme over Cluster-Based Wireless Sensor Network

D.Y. Huang¡B J. H .Cheng

°ª¶¥¼ÒºA¦â´²¸ÉÀv§Þ³N§ïµ½°ª±K«×¤Àªi¦h¤u¨t²Î©Ê¯à

ªL­×¸t¡B¿à¬f¬w¡B±i¨|¸Û¡B³¯ªÚ¶h

Analysis of FTP over SCTP and TCP in congested network

Lin-Huang Chang¡BMing-Yi Liao¡BDe-Yu Wang

°ªÀW¼e©µ¿ð­¼¿nºô¸ô¤W¤§TCP Vegas®Ä¯à§ï¶i¬ã¨s

¸â¯qºÕ¡B¤ý§µ®¦¡B®}§Óºa¡B¶À¬fÀM¡B³\¹Å¾ì¡B¶ÀÃv¼ý¡B¶Àµa¶{

²Ä2-G³õ¥D«ù¤H¡G¹ù±m¶³ ±Ð±Â

T2-116

½×¤åÃD¥Ø

µoªí¤H

¨ã­Ó¤H¤Æ¯S¦âªº´¼¼z«¬ÂIºq¨t²Î

³¯ºa©÷¡B¶ÀÄR¬ü

³¡¸¨®æ®Ö¤ßºôµ¸¤§¤ÀªR-¥HBlog¶m§ø¥xÆW¯¸¬°¨Ò

¿c¯à±l¡BĬ¤å¼z

À³¥ÎBizTalk¥­¥x©ó¸ê°T¦w¥þ¹q¤l¤Æ¤å¥óºÞ²z¨t²Î³]­p¤§­Ó®×¬ã¨s

±i¥ÃªY¡B³\¥üº_¡B¦¿³q¾§¡BªL©¨¾±¡BªL·¡­}¡B¶À¼y¨|

¸ê°T¬ÛÃö¬ì¨t²¦·~­û¤u»P¸ê°T³¡ªù«´¦X«×¬ã¨s

¶À¯Â±Ó¡B½²¼y¬W¡B¼B¾J´I

¼Æ¦ì®a®x¤§¼Æ¦ìÅv§QºÞ²z»P¤À¨É¾÷¨î

Á§¦g¬Ã¡B·¨§Ó§»

²Ä3-A~3-G³õ
®É¶¡ ¦aÂI ¤º®e

14:00
¡U
15:00

²Ä3-A³õ¥D«ù¤H¡G­JªZ»x ±Ð±Â

T2-106

½×¤åÃD¥Ø

µoªí¤H

À³¥Î°ò¦]ºtºâªk©ó¤j±M°|®Õ±Ð®v¬£½Ò°ÝÃD¤§¬ã¨s

´å®pºÓ¡B¤ý¤l®L

¹B¥ÎSBDªk¶}µoICT¾Ç²ß¤è®×¦b°ê¤p¸ê°T¬ì§Þ¿Ä¤J±Ð¾Ç¤W¤§³]­p»PÀ³¥Î

±ç©v¶P¡B³¯¶®ÄR¡B³¯·Ø±l¡B§ù¨û®S¡B¶À¶®¶Q

½u¤W»²§U±Ð¾Çºô­¶¤§¬ã¨s-¥H¯à·½§Q¥Î¬°¨Ò

¶Àñü¦w¡B¹ùªö¦æ¡B·¨§»¹F

ºô¸ô¶EÂ_µû¶q¨t²Î¤§«Ø¸m¢w¥H°ê¤p¥|¦~¯Å¼Æ¾Ç¬ì¬°¨Ò

©P¨Ý¾§¡B¤~¥@©÷¡B³¯ªl¨}

¾Ç²ß¾úµ{ªº¸ê®Æ±´°É-¥H¥¬ªLÅÞ¿è¬d¸ß½Òµ{³æ¤¸¬°¨Ò

³¯¬R¥ô¡B·¨ÀA¼æ

²Ä3-B³õ¥D«ù¤H¡G§f·O¯Â ±Ð±Â

T2-107

½×¤åÃD¥Ø

µoªí¤H

«O«ù«á¨®¦æ¨®¦w¥þ¶¡¶Z¨Ã®ø°£µøı¦º¨¤¨t²Î¬ã¨s

¾G¥­¦u¡B½²©v¨j¡B¶À·®ùÛ¡B»¯©y´@¡B¾G¦t²[

¨T¨®«e«á¤è¦w¥þ¨t²Î¤§¬ã¨s

¾G¥­¦u¡B½²©v¨j¡B»¯©y´@¡B¶À·®ùÛ¡B¾G¦t²[

Novel verifiable multi-secret sharing scheme using bilinear pairing

Hung-Yu Chien

¶¥¼h¦¡¦h­«µøı¯µ±K¤À¨É¾÷¨î©ó¦Ç¶¥¼v¹³¤§¬ã¨s»PÀ³¥Î

¹ù´f¶²¡BªL¨q»_

¼v¹³¯µ±K¤À¨É¤èªk¤§°»´ú»PŲ§O

®]¥úÄ£¡B³¯«Ø¹ü

²Ä3-C³õ¥D«ù¤H¡G´¿Åã¤å ±Ð±Â

T2-108

½×¤åÃD¥Ø

µoªí¤H

¦Ç¶¥¸H§Î¼v¹³»PÁô¹³³N¤§¬ã¨s

¬xºû®¦¡B³\§Óºû¡B½²¶®¯Â

´Ó°ò©ó¹w´ú»~®tÂX®i¤§¥i°f¦¡¸ê°TÁôÂç޳N

´¿Åã¤å¡BÁ¨äÙy

A data hiding technique in binary image by using distance transform without look-up tables

Chyuan-Huei Thomas Yang¡BKen-Ching Lee

´Ó°ò©ó½ÆÂø«×¤ÀªR¤§¸ê°TÁôÂç޳N

§f·O¯Â¡B¶À¬F¶v

¤£»Ý­ì©l¼v¹³¤§±j¶´ÃöÁp¦¡¯B¤ô¦L°»´ú§Þ³N

§õª÷»ñ¡B·¨©v®a

²Ä3-D³õ¥D«ù¤H¡G³¯©¾«H ±Ð±Â

T2-109

½×¤åÃD¥Ø

µoªí¤H

Service Quality of Information System Center Evaluated by Revised Gap Analysis

Jih-Kuang Chen¡BYu-Cheng Lee

A user study on purchasing tourism products via web-based online booking systems

Shuchih Ernest Chang¡BCheng-Hui Liu¡BKai-Win Cheng¡BHsin-Jung Chi

§ï¨}¦¡¶¥¼h»E¦Xºtºâªk¤§¬ã¨s

¶À¯Â±Ó¡B§õ©y¾ì¡B³¯ª~ÂÔ

Constructing Alternative Routes for VANET Using Machine Learning Techniques

Chenn-Jung Huang¡BYi-Ta Chuang¡BYou-Jia Chen¡BYun-Cheng Luo¡BDian-Xiu Yang

¤À´²¦¡¥­¦æ©ñ¸mÀɮ׶ǿé¨ó©w

§d¬³¹F¡B¹ù«TŲ

²Ä3-E³õ¥D«ù¤H¡G¦¿·É©ú ±Ð±Â

T2-114

½×¤åÃD¥Ø

µoªí¤H

Design and Implementation of Uninterruptible Power Line Communication Network for Fire Detection System

Kuo-An Hwang¡BYi-Huei Chen

Combined Call Admission Control and Power Control in Multimedia CDMA Cellular Systems

Jyh-Horng Wen¡BYoung-Long Chen¡BJyu-Wei Wang¡BJyh-Liang Chen

Efficient Unicast-based MultiHop Local Repair for Wireless Multicast MANET

Ben-Jye Chang¡BJyh-Wei Wang

®a®x°ª³t¹q¤O½uºô¸ô¶Ç¿é¤zÂZ¤§¬ã¨s

·¨µÏ³Í¡B§õºa·ç¡B¤ý¤«·Ö

µL½uºô¸ô¤W¨Ï¥Î®°§Î¤Ñ½u¤§³Ì¤p¹q¤O³æ¤@¨Ó·½¦h¼½Â¶°e°ÝÃD¤§§Ö³t³Ì¨Î²V¦X¾ã¼Æ½u©Ê³W¹º

³\¥Aºa¡B½²§»·½¡B³¯®õ©ô

²Ä3-F³õ¥D«ù¤H¡GÁ¬F¾± ±Ð±Â

T2-115

½×¤åÃD¥Ø

µoªí¤H

An Adaptive Video-on-Demand Resource Sharing Scheme for Next-Generation Heterogeneous Networks

Chenn-Jung Huang¡BYi-Ta Chuang¡BYan-Wei Huang¡BYou Jia Chen¡BChih-Tai Guan¡BDian-Xiu Yang

ITU-T G.723.1»y­µ½s½X¾¹¤§¾AÀ³©Ê½Xï§Ö³t·j´Mºtºâªk

³¯­§©÷¡BªLºa¤T¡B³¯ºÖ©[

The PAPR Reduction in OFDM System with the Help of Signal Mapping Scheme

Cheng-Ying Yang¡BGwo-Ruey Lee¡BChun-Hung Chen¡BJyh-Horng Wen

À³¥Î2-D®iÀW¤§OFCDMµL½u¦æ°Ê³q°T¨t²Î¤§¤À¶°©Ê¼W¯q®Ä¯à

½²´¼Ùy¡B¶À¥Ãµo

Scaleable and Recursive Chien Search Architecture for BCH codes Decoding

Yi-Nan Lin¡BWei-Wen Hung¡BJia-Wei Huang

²Ä3-G³õ¥D«ù¤H¡G³¯ºaÀR ±Ð±Â

T2-116

½×¤åÃD¥Ø

µoªí¤H

°ò©óª¾ÃÑ¥»Å餧·§©À±À²z·j´M¥N²z¤H - ¥H·j´M¹q¸£¹s¥ó¬°¨Ò

³¯§Ó»¨¡Bªô­^µØ

¨ã¸Ñ¨M°ÝÃD¯S©Ê¤§ª¾ÃÑ¥»Åé¼Ò¦¡

°ª²Q¬Ã¡B²ø¶²­s

«Øºc©I§l·ÓÅ@ª¾ÃÑ¥»Å餧¬ã¨s

§õ°·¿³¡B±iµú²E¡B¿à­s¦¼¡B±i¤D¤å¡B³¯©y´@¡B³\µÏ´Ü

À³¥Î¬¡°Ê²z½×»P¥»Åé½×«Øºc¤@°ª¶¥¥DºÞª¾ÃѨt²Î

³\»Y«Û¡B§õ´ð¯ø

§Q¥Î¥»Åé½×«Ø¥ß­Ó¤H°¾¦n¾ð©ó­Ó¤H¤Æ±ÀÂË

§õÄRµØ¡B§õ´I¥Á¡B¼Ú¤¯¼w¡B¼B¶®¯ø¡B¸â©|Æk

²Ä4-A~4-G³õ
®É¶¡ ¦aÂI ¤º®e

15:30
¡U
16:30

²Ä4-A³õ¥D«ù¤H¡G§õ´I¥Á ±Ð±Â

T2-106

½×¤åÃD¥Ø

µoªí¤H

¸ê°T¯À¾i¿Ä¤J©ó¼Æ¦ì±Ð¾Çµ¦²¤±´°Q¤§¬ã¨s¥H¼Æ¦ì­ÜÀx¬°¨Ò

·Å¹Åºa¡B³¢³Ó·×¡B¬x¾Ë¯à

A Learning Style Aware Diagnosis Agent for Computer Supported Cooperative Learning

Chenn-Jung Huang¡BHong-Xin Chen¡BYi-Ta Chuang¡BYun-Cheng Luo¡BTun-Yu Chang¡BDian-Xiu Yang

®Õ¶éÂ×´I±Ð¨|Àô¹Òªººô¸ô¶}¾÷¤è®×

²j¼wß»¡B¬x´Â¶Q

µ²¦X¤£¦P¨©¤óºô¸ô¤§¶EÂ_´úÅç¤Î¸É±Ï±Ð¾Ç¨t²Î¬ãµo¡Ð¥H°ê¤p¼Æ¾Ç»â°ì¡u¥N¼Æ¡v¬°¨Ò

±i¨£»Ê¡B±i§»¤å¡BªL«Ø²±¡B¼B´ð¤t¡B³¢§B¦Ú

µ²¦XAHP»PFuzzy¬°¦h·Ç«h¤ÀªR¤§°ò¦-¥H²¦·~®È¹C¦æµ{³W¹º¬°¨Ò

³¯Ì°¨q¡B³¯º³ª´¡B½²­õ¥Á¡BÃC¦uÁú

²Ä4-B³õ¥D«ù¤H¡G³¯ºa©÷ ±Ð±Â

T2-107

½×¤åÃD¥Ø

µoªí¤H

¤G­È¤Æ¼v¹³¤§½uµÑ¨ú

±ç¥@©÷¡B³¯¤å»ü

A Simple Edge Detection Method by Discrete Pascal Transformation

ªL·ç²±

¨®µP¦r¤¸¦Û°Ê¤Á³Î»P¿ëÃÑ

ªL¬K§»¡BªL¬F«Â¡B¤ý«T¤Ò¡B³¯Îr¬À

¥HFPGA¹ê²{»Ö­È°Ñ¼Æ¤Æ¤§Sobel¼v¹³Ãä½t°»´úºtºâªk

¶Àµn²W¡B¤ý¹Å§»¡BÁ“Ã

§Q¥Î¾AÀ³©Êµøµ¡¤ÀªR¼v¹³¯¾²z¤§ª«¥ó¤À³Î§Þ³N

½²Ä£¥°¡B§f«Â§Ê

²Ä4-C³õ¥D«ù¤H¡G§d¥@¥° ±Ð±Â

T2-108

½×¤åÃD¥Ø

µoªí¤H

A Steganographic Method on MP3

ªL¸Î´Ü¡B¼B®¶ºü¡BªL¤h¥¿

µL»Ý­ì©l¼Æ¦ì¼v¹³¤§¤pªiÂà´«¯B¤ô¦L§Þ³N

§õ«n¶h¡B¤ý¹t¶v

¤@­Ó¿ù»~ÁÙ­ì½s½X§Þ³N´Ó°ò©ó¦Û§ÚÁôÂûP¤ÀÃþ¦¡½s½X蠟Ãä½t§k¦X¦V¶q¶q¤Æ©óJPEG¼v¹³¶Ç¿é

§õª÷»ñ¡B§õÃh®¦

¶¥¼h¦¡¯B¤ô¦L§Þ³N¤§¥¢¯u±±¨î¾÷¨î

§f·O¯Â¡B³\Ä×ÄÖ

JPEG®e¿ù«¬¼v¹³ÅçÃÒ§Þ³N

¬_¬¯¦w¡B³¯«Ø¹ü

²Ä4-D³õ¥D«ù¤H¡G±iªL·× ±Ð±Â

T2-109

½×¤åÃD¥Ø

µoªí¤H

¥H³Æ´©ºÞ²zªÌ¤Î­t¸ü°»´ú¾÷¨îºûÅ@¤À¸sµL½u·P´úºô¸ô¤§®Ä¯à

ÄY°ê¼y¡B¤ý²Q­ë¡B¸³¨|µÓ

±ÛÂà¹Ï¤§¤¬¥¸°ÝÃDºtºâªk

ªL§»¤¯¡BªL¨Î»T

Âǥѥ­¿ÅDescription¤À§G»P¸`ÂI­t¾á´£¤ÉP2Pºô¸ô®Ä¯à

ªL´Â¿³¡B®}ºû§Ê¡B¾G¸qÄ~

À³¥Î¼Ò½k²z½×©óÀH·N¦¡ºô¸ôªººÞ²zªÌ¿ï¬£¾÷¨î

³¯ºa©÷¡B¬x¼á·ì

«Ø¸m¾ã¦X¦¡®Õ¶é¹q¸£±Ð«Çºô¸ôºÞ²z¨t²Î

¶À¤åÁo¡B³¯ÚzÀM¡B²ø¬ü¬Â

²Ä4-E³õ¥D«ù¤H¡G¹ù«TŲ ±Ð±Â

T2-114

½×¤åÃD¥Ø

µoªí¤H

¥H¤T¶¥¬qí©w©Ý¾ë¾÷¨î§ïµ½°ÊºAµL½u·P´úºô¸ô¤§Ã­©w©Ê

¤ý²Q­ë¡B¿½¥¿¤T¡BÄY°ê¼y

«Øºc©óµL½u·P´úºô¸ô¤W¨ã¯à·½®Ä¯qªºªi®ö¦¡Â¶®|¨ó©w

±i§Ó¥ô¡B¶À§Ó»Ê

¤g¥Û¬yÆ[´ú¯¸¤§³q°T¶Ç¿é«Ø¨î»P»ö¾¹ºûÅ@¤ÀªR

¤èÄ£¥Á¡B§õªÃ°®¡B©P¤Ñ¿o¡B³s´f¨¹¡B±i­^·u¡B¿½®õ¤¤¡B³sºa¦N¡B¤¨§µ¤¸

´Ó°ò©óRFID¤§²¾°Ê¸Ë¸m¤§¦ì¸mÅçÃÒ

¬x°êÄ_¡B³¯¥@¨|

´£ª@¸I¼²¨Mijºtºâªk¹ï802.11¤À´²¨ó½Õ¥\¯à¨ó©wªº®Ä¯q

³¯«T¦ö¡BÁ§»Ê¹b¡B¤ýÄP¦à¡B¦M¥Ã¤¤

²Ä4-F³õ¥D«ù¤H¡G³¯¹t°ê ±Ð±Â

T2-115

½×¤åÃD¥Ø

µoªí¤H

¥H§ï¨}¦¡Min-Min±Æµ{ºtºâªk´£ª@¤T¶¥¼h¦¡ÂI¹ïÂIºô¸ô©Ý¾ë¤§­t¸ü¥­¿Å

ÄY°ê¼y¡B¤ý²Q­ë¡B³¯¨qªÚ

§Q¥Î·P´úºô¸ô¨Ó¹F¨ì¤õ¨a¹w¥ý¹w´ú»PÁ×Ãø¤Þ¾É

¶À°ê¦w¡B½²©ö©÷

¥[±K¤å¥ó¤§·j´M¨t²Î

¾G´ººa¡B¾GÀAÝß¡B³¢¤å¤¤

Using SIP Protocol for Bi-directional Push-to-Talk Mechanism over Ad-Hoc Network

Shih-yi Chiu ¡BLin-huang Chang

¾É¤J¤u§@¬yµ{©óºô®æ­pºâ¤§¬ã¨s

±i»ö¿³¡B´^ª÷¶©¡BĬ«Ø°p

²Ä4-G³õ¥D«ù¤H¡G¬x°êÀs ±Ð±Â

T2-116

½×¤åÃD¥Ø

µoªí¤H

´Ó°ò©óXML§Þ³N¤§¹q¤l°Ó°Èªí³æÅçÃҮج[

´å®pºÓ

¥H¨â¶¥¬qªk¨D¸Ñ§Y®É»Ý¨Dª«¬y°t°e°ÝÃD¤§¬ã¨s

¹ù±m¶³¡B¶ÀÚ{²Q

GNC«O°·­¹«~±M½æ©±ÅU«È®ø¶O¸gÅç¹ïÃö«Y¸ê¥»¼vÅT¦]¯À¤§¬ã¨s

³¯¬ü¯Â¡B¿½¤å³Í¡BÁ´ܩú

XML°ÊºA¯Á¤Þ¸ê®Æ¸`ÂI¼Ð°O½s½Xªº¦r¤¸Â_¥y¤èªk

³¯¹t°ê¡B®}¥ôÄP

¥H§ï¨}¦¡ºô­¶·j´M§Þ³Nµ²¦X­Ó¤H¤Æ±Æ§Ç¤§¬ã¨s

±ç¿ü­ë¡Bù¨ô¶¯¡B¹ù±Ó¦m¡B¶ÀÄÀ½n