¬¡°Ê¤é´Á¡G2013/4/26~2013/04/27         ¥D¿ì³æ¦ì¡G´Â¶§¬ì§Þ¤j¾Ç¸ê°T¾Ç°|/¸ê°TºÞ²z¨t 

B1-01 ³Ì¨Î½×¤åÄvÁÉ¡iI¡j ¡@
053 §Ö³t¸£ªi¤¤¤å¿é¤J¨t²Î ®]¥ú¤Ñ¡B¶À«ºÞ³¡BÀ¹§uÞ±¡B¥Ð¦tÚô
118 ©ó´O¤J¦¡ºô¸ô¶}µo¥­¥x¹ê²{¨ã³Æ¼u©Ê¤§³nÅé¹B¦æÀô¹Ò ©P«p¨^¡B½²¨¹ºû¡Bù©s«Û¡B·¨¦Ë¬P
145 µ²¦X¦h¶µ¦¡¹w´ú»P¼Ò½k±±¨î¤§¤p¥\²v¤Ó¶§¯à¼Ò²Õ¤§³Ì¤j¥\²vÂI°lÂÜ ¹ù±ù§g¡B´¿¥ß¤¨
150 ¨Å©Ð¶t¤ÆÂI§Îª¬¿ëÃѨt²Î Á©s­õ¡B®}ÄRÄ«¡BÃQ¸t­ì¡B¶ÀÄQ¦w¡B³¯­«¥ú
166 ¿Ä¦X¦â±m©M²`«×¸ê°Tªº°ÊºA¤H¹³¤Á³Î §d©úÀO¡B¹QÂ×À·
178 ¹B¥Î¸£ªiÃѧO±Mª`ª¬ºA ¦¶Â{½@¡B¦¿¬F¯§¡B¼B¹çº~
B2-01 ³Ì¨Î½×¤åÄvÁÉ¡iII¡j ¡@
025 Hash-Based Indexing for Cloud Databases Yu-lung Lo, Choon-Yong Tan, Min-Hsuan Lai
041 «Øºc¥Hª«Ápºô¬°°ò¦¤§¹q¤l°Ó°È¼Ò«¬ ¤ý²Q­ë¡B¤ý¶¶¥Í¡BÄY°ê¼y¡B¿c¥i¯ô
045 Âù°ò¦a¦h¿é¤J¦h¿é¥X¹p¹F¤§Áp¦XDOD©MDOA¦ô´ú ±i¦w¦¨¡B³¯§Ó©¾
060 A Constellation Extension Based BCM-SLM Scheme for PAPR Reduction of OFDM Signals Hsin-Ying Liang, Chang-Jay Liu, Guo-Lun Huang
123 Interference and Noise Cancellation Based on Complex/Real-Valued Blind Maximum-A-Posteriori Probability Algorithms with Symmetric Constraint Jiunn-Yann Chen, Yao-Jen Chang, Chia-Lu Ho
140 Delay-Aware Routing based on Game Theory  in Vehicular Wireless Networks Jian-Hao Su, Tsan-Pin Wang
S1-01 ¯S§Oijµ{-Intelligent Techniques and Applications ¥D«ù¤H¡G¬x©v¨© 
901 An extended ACS approach for continuous domain Min-Thai Wu, Tzung-Pei Hong, Chung-Nan Lee
902 Community Detection with Similarity Transition  Jian-Wei Lee, Hung-Wen Peng, Shie-Jue Lee
903 Building a Frame-Based Anti-Phishing Model based on Phishing Ontology  ´¿¾Ë¶¯¡BÅUÀR«í¡B§õ©v¾§¡B¯Õ¥ú­è¡B¤ý¸Î³Ç
904 ¤@­Ó§Ö³tªº¶q¤lºt¤ÆªkÀ³¥Î©ó¸ê®Æ¤À¸s°ÝÃD ¹ù«É³Ô¡B ½²±RÞm¡B¦¿©ú´Â 
905 The allocation algorithm for data centers in cloud computing architecture from security perspective Chuan-Gang Liu ,Hsin-Yi Lin, Kun-Ta Hsien
906 °ò©ó«D»¼°j¦¡¶g´Á©ÊÂ÷´²¤pªiÂà´«©ó·Æ°Ê¦¡µøµ¡¨®µP¿ëÃѬã¨s ½²ª÷Â×
S2-01 ¯S§Oijµ{-´¼¼z¥Í¬¡¤Î´¼¼z®È¹C ¥D«ù¤H¡G²§»¦t 
911 Zigbee¤§¤¬°Ê¸ê°T¾ÉÄý¨t²Î ²§»¦t¡B³¯¥Û©[¡BªL²M¶§¡B¹ù±L¨°¡B³¯¤A§Ê¡B¿à¬f¦|¡B³¯«a¾§¡B¦¶®Ù¼Ý
912 ¥HWiki¬°°ò¦ªº¸s²Õ¤u§@¥­¥x³]­p ³¯«Ø§»¡B¼ï«T¸Û¡B¤ý«H¾Ë
913 ®Õ¶éRFID¸ô½u°lÂÜ©w¦ì¨t²Î §õÀR©É¡B§õ©É¼z¡B³¯«Û¦w¡B½²¨Ø®e
914 ´¼¼z®È¹Cª¾ÃѨt²Îªì±´-¥x¤@¥ÍºA¥ð¶¢¹A³õª¾Ãѫظm ²§»¦t¡B¯Î»Ê¿A¡B§õÌ°¡B¬x«T¦ö¡BªL©v½n¡B½²´µµ{
915 ´¼¼z¤Æ©~¦íªÅ¶¡±MÄݺô¯¸µo®i²{ªp ¼ï«H§»¡B§õ±l¦{¡B¸­©ú¶Q
916 ¾ã¦XGPS»P¤Gºû±ø½X¤§¦æ°Ê¾ÉÄý¨t²Î¬[ºc ³¯«Ø§»¡B³¯¥Éªâ¡B¿½¸qª@
S2-02 ¯S§Oijµ{-¦Ç¦â¨t²Î¤Î¸ê³q°T¨t²Î¤§À³¥Î ¥D«ù¤H¡G¶À¥Ãµo 
921 °ò©ó³Å¥ß¸­Âà´«¹ï°¸©Ê­°§COFDM¨t²Î®p§¡¥\²v¤ñ­È¤§§ïµ½¬[ºc §õ¾ðÂE¡B³¯¥ú¤¯¡B¦¿°êÞ³
922 À³¥Î¦ÇÃöÁp¤ÀªR¦b¹ê¬I®wÂêѻPªÑ»ù²§±`³ø¹Sªº±´°Q¡X¥H¥xÆW¤W¥«¤½¥qª÷¿ÄªÑ¬°¨Ò ³¯¿³©¾¡AÁÂÄR¬õ
923 A High-Precision NDIR CO2 Sensing Module for ZigBee Applications  ±i®aÀÙ¡B·¨¬F峯
924 °ò©ó±¡¹Ò·Pª¾¤§®a®x¸ê°T¨t²ÎÀ³¥Î §õ°ê·ç¡B¤ýµ¾Åb¡B³¯Áé½å¡B¬xÒ»¶©
925 À³¥Î¦ÇÃöÁp¤ÀªR©ó¹q¸£¿ïÃD¤§¿ïÃDµ¦²¤¬ã¨s ¶À¥Ãµo¡BÃCºÑ¬Â¡BªL©[½n¡B³\²Q¬Â
926 ¹B°Ê¤¶¤J¨­Åé½è¶q«ü¼ÆÅܤƤ§¼vÅT¦]¯À¬ã¨s¡X¥H°ê¤¤Åé±±¯Z¾Ç¥Í¬°¨Ò  ªL©[½n¡B³\²Q¬Â¡B¶À¥Ãµo¡BÃCºÑ¬Â
S3-01 ¯S§Oijµ{-Application services of cloud computing  ¥D«ù¤H¡G¤ý²Q­ë 
931 ®ø¨¾ºÊ´ú¶³ºÝ¥­¥x¤§¹ê§@ ¦¿­Zºú¡BÄÁ¤l´¼¡B¶ÀÚz³Ó¡Bù»Ú¦w¡B¨H¦Ö®e¡B¿cµq«Â¡B¼BÂ@¦¨
932 ´¼¼z«¬¸Ë¸m©ó¶³ºÝ¹Bºâ¤§À³¥Î-¥HÀ\ÆU·j´M¬°¨Ò  ¦¿­Zºú¡B¼ï«H§»¡B±i¥ß³Ç¡B§d­PÞ³¡B½²©ú¥Ð¡B¸âºa­õ¡B·¨¤h¼Ý
933 ¶³ºÝ¥«¶°ÀH¿ïÀ³¥ÎªA°È´£¨Ñ¥­¥x ¦¿­Zºú¡BªL¶Çµ§¡B¤ý¥Ã²»¡BªL¥K°a¡B³¯堃ºû¡B´¿²ú¶®¡B³¯¬R³Í¡B³¯«äºú
934 ¦b¶³ºÝ¹BºâÀô¹Ò¤U¥H·s«¬ºA¹q¤l°Ó°È¼Ò¦¡´£°ª¶³ºÝªA°È«~½è ÄY°ê¼y¡B¤ý²Q­ë¡B¼ï«H§»¡B³\³Í³Ç¡B³¯»T¼z¡B³¯»Ê®p¡B³¯«³¹F¡B¶À±ê¸a¡B§õ¼z¬õ¡B®]¹l²»
¡@
935 ¦b¶³ºÝ¹BºâÀô¹Ò¤U¥HµL½u®gÀW§Þ³N´£¤É½Ò°óÂI¦W®Ä²v ¤ý¶¶¥Í¡B¤ý²Q­ë¡BÄÁ¤l´¼¡BªLªy«Ø¡B±i¤åµ¾¡B±i¶h°a¡B¦¿¨Îª³¡BªL«T¦ö¡B³¯¥@¦t¡B³¯«T¦t
¡@
936 «Øºc¶³ºÝ¸ê·½ºÞ²z¾ã¦X¥­¥x¡X¥HHadoop¬°¨Ò ¤ý²Q­ë¡B§õª÷»ñ¡B¦¿­Zºú¡B´¿²ú¶®¡B¯dÌÉÀ·¡B¬xÞ³­×¡B²½÷»Ê¡B¤ò¤W¤¯
S3-02 ¯S§Oijµ{-Networking Technology and Communication for Ubiquitous applications  ¥D«ù¤H¡G±iªL·× 
941 ¨Ï¥Î°T¸¹±j«×¸s²Õ¤Æ¤èªk©µªøWSN¥Í¦s´Á ©P©Ó½n¡B¹ù«TŲ
942 ¥H¹q¸£µøı»PµL½u³q°T¬°°ò¦¤§¾÷¾¹¤H¤Þ¾É¬ã¨s  §f¥þÙy¡B¸­¹F¾ì
943 ´£¤ÉIEEE 802.15.4 ¦b²§½è¦@¦sºô¸ô¤¤¤§¶Ç¿é¾÷²v §õ©v¿«¡BÁ©úÂ@¡B±iªL·×¡B温´¼µq¡B¦¿§»­×
944 µL½u·P´úºô路¤¤°ò©óÄvª§¸`ÂI¤ÀªR¦b¯à量®ø¯Ó»P¶Ç¿é®Ä²v¤§µû¦ô §õ©v¿«¡B温´¼µq¡B±iªL·×¡BÁ©úÂ@¡B¦¿§»­×
945 Composite Metrics for Routing in Low Power and Lossy Networks Chia-Chun Chang and Yen-Wen Lin
946 Urban atmospheric visibility measurement in the different cut-off frequencies Dai-Ling Tsai and Jiun-Jian Liaw
R1-01 ¦æ°Ê»PµL½uºô¸ô ¥D«ù¤H¡G±i­^¶W ¦¶ÂE´Ñ
014 Disc-Ring Network: A Novel Architecture of Interconnection Network Ruo-Wei Hung, Chien-Chiao Chien, Shang-Ju Chan
068 °ò©ó§ï¨}¦¡³Ì¤p¿é¥XÅܲ§§Þ³N©ó¥æ´OFDMA¤WÃì¨t²Î¤§¸üªiÀW²v°¾²¾¦ô´ú ¿à¨°«Û¡BÁ¤Ͷv¡B³¢¨|¸Û
114 A Reliable Packet Aggregation Mechanism for Vehicular Wireless Networks Pei-Shan Li and Tsan-Pin Wang
184 °ò©ó¼Ò½k³W«h®w¤§¤â¶ÕÃѧO¨t²Î ¦¶ÂE´Ñ¡B¶À¸t´¼
197 «D¹ïºÙ¦¡µL½u·P´úºô¸ô¤§¦h¸õ¦¡¸ô¥Ñ³]­p ¶À§Ó©ú¡B¾G·çùÚ¡BªL¥¿¸q¡B³¯ªÃ·z
206 Radio Resource Allocation with Power Control for Femto Base Stations in Broadband Mobile Cellular Systems  Chaoyang University
R1-02 ¹q¤l°Ó°È»Pª¾ÃѺ޲z ¥D«ù¤H¡G¹ù±m¶³ 
018 ±qªÀ·|ºô¸ô²z½×»P³Ð·sÂX´²Æ[ÂI±´°Q¼vÅT³Ð·NÂX´²¤§¦]¯À-¥H³¡¸¨®æ¥­¥x¬°¨Ò ¾G¨qµØ
044 ¥D°Ê¦¡¡B³Q°Ê¦¡¥«³õ¾É¦V»P¸ó²Õ´¾ã¦X¹ï·s²£«~µo®iÁZ®Ä¼vÅT¤§¬ã¨s ªL©úªN¡B¼BÅtè°¡B²ø¶{¶V¡B±iº_®e
086 ¬°¦ó¤H­Ì­nÁʶR®ø¶O©Ê¹q¤l²£«~¢w¥H³Ð·s¯S½è¤Î®ø¶OªÌ»ù­È²z½×¬°°ò¦ ªL«Ø¨}¡B·¨¦ë§Q
167 ±´°Q®ø¶OªÌ¨Ï¥Îºô¸ô¹ÎÁʺô¯¸¤§¦]¯À¡X¥H«H¥ô¶É¦V¬°¤zÂZÅÜ¼Æ ±i²K­»¡B·¨´f²z¡B´¿¥ì×W¡B§fÏÉ¿·¡B¶À±Ó²[
168 µ²¦X½u¤Wº¡·N»PTAM¹ïÁʪ«ºô¯¸¨Ï¥Î·NÄ@¤§¬ã¨s ±i²K­»¡B¼B¸t¤å¡B¶ÀÖö´@¡B§d®a¼c¡B¬h¶®¤å
R1-03 ¸ê°T¦w¥þ ¥D«ù¤H¡GªLµú³¹ ·¨¥ñ¦i
016 QR Code Forensics in the case of On-Line Game ¤ý¦°¥¿¡BÄÁ±Ó¦p
023 Virtual Forensics in Evidence Investigations ¤ý¦°¥¿¡B§dªY¾§
116 «OÅ@¨Ï¥ÎªÌ¨­¤À¸ê°Tªº»{ÃÒ¤è®× ·¨¥ñ¦i¡B³¯«a¦t
151 ¦æ°Ê¶³ºÝ®ÑÂd¤§À³¥ÎªA°È Á§¦g¬Ã¡Bªô«F¾§
165 °ò©ó¨­¥÷ªº»{ÃÒ±KÆ_¨ó°Ó¤è®× ·¨¥ñ¦i¡B¿½¦t´­
174 °ò©ó¥N²zñ³¹ªº¦h¦øªA¾¹»{ÃÒ¤è®× ·¨¥ñ¦i¡BªL«Â§Ê
R1-04 ¼Æ¦ì¾Ç²ß ¥D«ù¤H¡G§f·O¯Â
021 ½u¤W¾Ç²ß¨t²Î¾Ç²ßªÀ¸sªºµû¶q ³¯Ì°¨q¡B©P¾å¤¦
031 ¤¬°Ê¦¡µêÀÀ¹q¤l¥ÕªO¹B¥Î©ó°ê¤p¤G¦~¯Å¼Æ¾Ç±Ð¾Ç¤§¬ã¨s ¬x¤hµ{¡B¬xÖö¥­
081 Moodle ¼Æ¦ì¾Ç²ß¥­¥x¹ï±Ð¾Ç¼vÅTªº±´°Q¡X¥H°ê¤¤ªÀ·|¬ì¤¤°ê¦a²z¡uæ°ì»P°Ï°ìµe¤À¡B¦a§Î¡v¬°¨Ò ¤ý¼wÅA¡BªL¤å¸q¡B±ç·ë¤ß
142 À³¥Î¤¬°Ê¦¡±¡¹Ò¼ÒÀÀ¨t²Î©ó½Ò»²§Ó¤u°V½m¤§¬ã¨s¡G¥H°ê¤p¥|«h¹Bºâ¬°¨Ò ÁÂÂÍÁ¨¡B²«C·ì¡B®É¤å¤¤
180 À³¥Î¼ç¦b»y·N©ó¦Û°Ê¤Æ¤å¥»¤ÀªR ½²¨È­³¡B ³¯¤åÄõ¡B³¢§B¦Ú¡B¹ù±á´f¡B¥ÕñZ»x
181 ¨àµ£¤å³¹­«½Æ»yµü¤ÀªR¦Û°Ê¤Æ«ü¼Ð«Ø¸m»PÀ³¥Î-¥H¦Wµü¡B°Êµü¡B¹êµü¬°¨Ò ¶À«iØÌ¡B½²¨È­³¡B³¢§B¦Ú¡B¹ù±á´f¡B¥ÕñZ»x
R1-05 ¦æ°Ê­pºâ»P°Ó°ÈÀ³¥Î ¥D«ù¤H¡G¼Bº·¼ä
117 ®ø¶OªÌ¹ï©ó´¼¼z«¬¤â¾÷¥­¥xªº±Ä¯Ç¨Mµ¦¤§¬ã¨s-¥HAndroid¥­¥x¬°¨Ò ¬x¬°Ã¢¡B·¨«í
126 Android¤â¾÷µ{¦¡¦Û°ÊÅçÃÒ¨t²Î¬ã¨s ¤è¤å¸u¡B¹ù¤l¸©¡B§õ­s¿p
177 ¤â«ùª¼¥Î¾É¯è¨t²Î¤§¤H¾÷¤¶­±³]­p §d¨È¿«¡B¼B¹çº~
198 °ò©óAndroid¥­¥x«O¥ÀºÊ±±À³¥Î¨t²Î §õ«Ø½n¡B¼B¬u¦ö¡B±i©É§g¡B·¨ÖsÄ£¡B§d§Ó»¨
199 Android¤â«ù¸Ë¸m©ó¾A¦a©ÊÀ³¥ÎªA°È¤§¹q·½ºÞ²z¾÷¨î §õ«Ø½n¡B¬I¦AÁc¡B½²Á½÷¡B±i©É§g
200 ¹D¸ô¿ý¼v½Õ¾\±ÀÂ˨t²Î §õ«Ø½n¡B¶À®õ·½¡B±i©É§g¡B­J§Ó±Ó¡B§ºªÃ®Ù¡B³¯ÂEÙy
R1-06 ¸ê°T§Þ³N¬ÛÃö¬ã¨s ¥D«ù¤H¡G³¯§»¹F
026 Low Power Counter Design Using Wired Logic Circuit Technique Dong-Ting Hu, Jin-Fa Lin, Chen-Syuan Wong , Jui-Yang Liao, Chia-Ching Chen
036 ¥H¥­§¡¬G»Ù¶¡¹j®É¶¡¬°°ò¦¤§®ð´õ½üµo¹q¾÷¼ö¤¸¥ó¥Î®Æ»Ý¨D¨Mµ¦¤ÀªRµ¦²¤--¥H«n³¡¬Y¹q¼t¬°¨Ò ¤ý²Q­ë¡B¹ù¤å»«¡BÄY°ê¼y¡B¤ý¶¶¥Í
076 À³¥Î­Ë¶Ç»¼Ãþ¯«¸gºô¸ô©ó®ð¬Û¨I¿n¾¹¤§¥­©Z«×®Õ¥¿ ¶À¶ÔÂï¡B«J©vøÊ
077 ¨Ï¥ÎKINECT ·P´ú¾¹½Õ±±¿O¥ú ¬I¥­½÷¡B¶Àµn²W¡BÁéÁl¯à
112 ¥HGPU¥[³tSIFTºtºâªk ½²ºÍÒm¡BªL¬F§»
155 ¸`¯à²B®ð·P´ú¨t²Î ªL©[½n¡B¹ù¥ÛÀs¡B¾GÙɤ¤¡B¹ù«a¥°
R1-07 Sensor network¡iI¡j ¥D«ù¤H¡G±i¼yÀs ¬x­Y°¶
170 Performance Analysis of IEEE 802.15.4 868MHz, 915MHz and 2.4GHz Physical Schemes in 6LoWPAN Tsung-Han Lee, Hung-Shiou Chiang, Lin-Huang Chang, Ming-Chun Hsieh
191 ¨ã¸`¯à¤ÎQoS¤§¦hÂI¸õÅD¶Ç¿é±Æµ{¾÷¨î ²ºÓº½¡B±iªL·×¡B§õ©v¿«¡B±i¨q®p
201 ³]­p»P¹ê§@¦hÂI¸õÅD»y­µ¶Ç¿é©óZigbeeºô¸ô ±i®f¾±¡B±iªL·×¡B§õ©v¿«¡B®}¹Å¦ö¡B±i¨q®p
204 ÀH¾÷¨Æ¥ó¤Þ°_²¾°Ê¦¡·P´úºô¸ô©Ý¾ë§ïÅܤ§¬ã¨s ¼ï¥@¾ì¡B¦¶¼S¬î
209 An Energy-Efficiency-Oriented Routing Algorithm over RPL Cheng-Yen Liao, Lin-Huang Chang, Tsung-Han Lee, Shu-Jan Chen
169 À³¥Î©ó¨®¸ü³q°T¤§±ÏÅ@¨®»ï²ÃÁn¿ëÃѤèªk ¤ý¤å¸t¡B¹ù«TŲ¡B´^¸tªÇ
R2-01 Sensor network¡iII¡j ¥D«ù¤H¡G¹ù«TŲ
037 µL½u·P´úºô¸ô¤W¤@­Ó­Ý¨ã¯à·½»P®É¶¡®Ä¯qªº¦h­«¦æ°Ê¥N²z¤H¸ê®Æ¦¬¶°¾÷¨î ¶À§Ó»Ê¡B³\©ùµO¡BÀ¹¼`¬Â
085 ¥HSketchup¬°°ò¦¤§®a®x¯à·½ºÞ²z¨t²Î¤H¾÷¤¶­±³]­p ³¯¦öÀM¡B½²©s¦ù
101 ·P´ú¾¹¶Ç¿é¶ZÂ÷½Õ¾ã¹ïºô¸ô¯Ó¯à¤§¼vÅT¤Î¤ÀªR ¶À§Ó©ú¡B¾G·çùÚ¡B¶À®õ©ú
115 ¥úÆl¶i¤ôºÊ´ú¨t²Î¤§«Øºc¤ÀªR»PÀ³¥Î¬ã¨s ¤è ¼Ý¡B¤ý§Ó¯q¡BªL³ÓºÖ
212 A Probabilistic Sensor Detection Model Based on Contour Graph for Network Coverage in Wireless Sensor Networks Jyh-Horng Wen, Cheng-Chih Yang, Yung-Fa Huang
217 À³¥Î©óµL½u·P´úºô¸ô¤§¸`¯à¤À¸sºtºâªk³]­p ¶À¸qùÚ¡B¬I¦AÁc
R2-02 ¼v¹³¬ÛÃö¬ã¨s ¥D«ù¤H¡G½²ÂE¦° ¦¿­Zºú
055 °ò©ó¦â±mªÅ¶¡½ÕÅܤβɤlÂoªi¾¹¹ê²{§Y®É¥Ø¼Ð ³¯¥K»Ê¡B¶À¦Ð½å¡BÁéÁl¯à
078 ¨Ï¥ÎÃä½t«O¯d»P¬Û¾Fµøµ¡Åܤƽվãªk©ó¨ü¤zÂZ¼v¹³¤¤²¾°£´ÔÆQÂø°T ³¯²NౡB³°²M¹F
171 À³¥Î¦Ç¦â¨Mµ¦©ó¦÷º¿®Õ¥¿¬[ºc¤§µwÅé¹ê§@¤ÀªR ¾G¸s¬P¡B¸­«Ø½÷¡B¶À¤h¹Å
172 À³¥Î¦Ç¦â¹w´ú©ó«Øºc½s½Xï­I´º¼Ò«¬¤§«e´º°»´ú ¾G¸s¬P¡B¹ù«T¹Å¡B¶À¤h¹Å
173 À³¥Î¦Ç¦âÃöÁp¤ÀªR©ó¸ë§BÂoªi°»´ú¤§¼v¹³¥hÂø°T ¾G¸s¬P¡BµJ¦W·¢¡B¶À¤h¹Å
R2-03 ¸ê®Æ±´°É ¥D«ù¤H¡G·¨ªFÅï ±i´ººa
022 ¥H¼Ò½k­­¨î¬°°ò¦¤§¨Ï¥ÎªÌ´y­z¬ö¿ý¾Ç²ß¤èªk³]­p ³¯¸tÀÜ¡B§E¤Bºa¡B¥ªªN©x
027 À³¥Î¸ê®Æ±´°É§Þ³N©ó°ê¤p±Ð®v¤u§@À£¤O¤§¬ã¨s~¥H¹ü¤Æ¿¤¬°¨Ò ¬x¤hµ{¡BªL²Qªâ
030 ¹B¥Î¤G¶¥¬q¤ÀÃþ§Þ³N«õ±¸¼ç¦b¤¤¤p¥ø·~­É¶U¤á¤§¬ã¨s §õ±sâ¡BÃC¨q¬Ã¡B¤B©ú«i¡B³¢®aºÕ¡B»¯®a§»
103 ¿ëÃѬì§Þ²£«~¾Þ§Ëµû½×¤§¬ã¨s ³¯¶©ª@¡BªL·ç¸Î
107 ¤¬°Ê¦¡¸ê®Æ¦ê¬y°ªÀW«Ê³¬¶µ¥Ø¶°±´°É Wan-Chao Lee, Tzer-Fu Tu, Ming-Yen Lin
R2-04 ¨ÑÀ³ÃìºÞ²z»PRFID ¥D«ù¤H¡G³¯Ì°¨q
013 ªñ³õ³q°T©ó¦æ°Ê°Ó°È¤§À³¥Î-¥HÀ\ÆU°Ó°È¨t²Î¬°¨Ò ´¿羣°¶¡B½²Ìɧ»
042 ¦bª«Ápºô«Øºc¥HªA°È¬°¾É¦Vªº¬[ºc©M§@·~¬yµ{--¥H¨¾¨aºÊ´úªA°È¬°¨Ò ¤ý¶¶¥Í¡B¤ý²Q­ë¡BÄY°ê¼y¡B¤ý«H³Ç
046 A Study of Supply Chain Management Disruption Risks for Manufactures Chao-Ran Cheng and Kuo-Hwa Chang
063 A Refrigerated Cargo Tracking System Using GPS, Google Map API and PHP Web Service Jen-Yung Lin, Tuan-Anh Do, Bo-Kai Yang
218 ¦h¥Ø¼Ð¨ÑÀ³Ã쩵¿ðµ¦²¤³Ì¨Î¤Æ¤§¬ã¨s-¥H¤ô²£«~¥[¤u²£·~¬°¨Ò ¹ù±m¶³¡B¤ý¥à¹l
219 ¦b¶³ºÝ­pºâÀô¹Ò¤U¨Ï¥Î§ï¨}ªºD_EDF±Æµ{ºtºâªk¤§Xen±Æµ{¾¹ ´¿¹Å¼v¡B¶À¬f¶v
R2-05 ¥Íª«¸ê°T»PÂåÀø¬ã¨s ¥D«ù¤H¡G®]¤Ñ¥ú ªL¶iµo
008 ÂåÀø²Õ´ÃöÁ䬡°Ê»P¸ê°T¬ì§Þ¯à¤O³sµ²¹ï²Õ´ÁZ®Ä¤§¼vÅT-¸ê·½°ò¦²z½×¤§Æ[ÂI ¬x¬°Ã¢¡B³¯¬R»¨
125 ¥H­pºâ²z½×±´°Q¯f¬r¬Ì­]³]­p¤§¥i¦æ©Êµû¦ô ­J¸Î¤¯¡B¤ýµÏ¼w¡B­J¸ÎµØ¡B¬_§ÓÙy¡B¤ý¿«ÀM¡BªL¬f¼Ý¡BªL¸q³Ç¡B·Å­^µØ
¡@
143 ¦h¼Ò¦¡¤§¾r¾p½OºÎ¸£ªi°»´ú¬ã¨s ®}²»»ï¡B¦¿¬F¯§¡B¼B¹çº~
050 ¹B¥Î¸£ªi¨Æ¥ó¬ÛÃö¹q¦ì¨ó§UªÏÅé»ÙêªÌ¤Wºô¾Ç²ß¤§¬ã¨s ®]¥ú¤Ñ¡B¥Ð¦tÚô¡BÀ¹§uÞ±¡B¦±°¶µq¡B¶À«ºÞ³
080 §Q¥Îµøı»¤µo¹q¦ì¤ÀªR¸£ªi¯S¼x°T¸¹ ¶À¶ÔÂï¡B§õ¹Å²M
R2-06 ¸ê°TÁôÂà ¥D«ù¤H¡G¨H»F°ò ¬x°êÀs
019 ¥ßÅéÅ]³N¤è¶ô¦b¸ê°TÁôÂêºÀ³¥Î §N½÷¥@¡B´¿Åã¤å
074 ©è§Ü¦C¦L±½´y§ðÀ»¤§±m¦â¼v¹³¯B¤ô¦LÁôÂç޳N ³¯§B©¨¡BªL§ÓÀs
079 ¾Fªñ¹³¯À¼Ð·Ç®t»PJND­ÈÃö«Yªº¬ã¨s §N½÷¥@¡B±iºû­è
084 §ï¨}MEDÃä½tÀË´úªk¥H¼W¥[¥i°f¦¡ÁôÂÃÂöqªº¤èªk §N½÷¥@¡B§E«³¾Ë
127 °ªÂäJ®Ä²vªºÂù¼v¹³¥i°f¦¡¸ê°TÁôÂç޳N §f·O¯Â¡B³\¥Ã©ú¡B¶À­^°a
214 ´Ó°ò©ó¼Ò¦¡¨ç¼Æ¤§¾AÀ³©Ê°Ï¶ô¹w´ú¸ê°TÁôÂà ´¿Åã¤å¡B¾G»E½á
R2-07 ÂåÀø¸ê°T»P¼v¹³¬ã¨s ¥D«ù¤H¡G®}ÄRÄ« ´¿Åã¤å
091 A Brain Extraction Algorithm for Brain Magnetic Resonance Images Geng-Jin Liou, Kuo-Hsing Huang, Yue-Jing He, Chen-Chung Liu
128 °ò©ó§ÎºA¾ÇÂùºc¼Ò«¬ªº¤l®cÀV©Ù¤ù²Ó­M¤À³Î»P¤ÀÃþ À¹²Ð°ê¡B¶À«T»¨¡BªL²Q®S
136 °ò©óÃä½tÅܤƪº¤G¶¥¬q¤l®cÀVÀù¤ÀÃþ À¹²Ð°ê¡B²ø¤l¼y
146 A Breast Tumors Segmentation Algorithm for Digital Mammograms Sheng-Wen Zheng, Yue-Jing He, Yung-Tsang Chang, Chen-Chung Liu
161 EMR¾É¦Vªº¤â³N¬ö¿ý³ø§i¨t²Î ³¯¹t°ê¡B³¯¹ÅµX
R3-01 ¶³ºÝ­pºâ»PÀ³¥Î ¥D«ù¤H¡GªL©ú¨¥ ù¦³¶©
024 ¶³ºÝ¥D¾÷¤§¸ê®Æ®w¥­¿Å­t¸ü ù¦³¶©¡B¿à¥Á°a
040 ¥H»´¶q¤ñ¹ï¤§¸ê®Æ­«½Æ§R°£¾÷¨î´£ª@¶³Àx¦sÀô¹Ò¤§®Ä¯à ¤ý¶¶¥Í¡BÄY°ê¼y¡B¤ý²Q­ë¡B³¯¬fÞm
175 ´Î²y­y¸ñ­««Ø§Þ³N»P¶³ºÝªA°ÈÀ³¥Î ½²Ä£¥°¡B¤ý±á¦Ð¡BÁ§ÀA¦N
186 ´Ó°ò©ó¶³ºÝÀÉ®×Àx¦sªA°È¤§Àɮת©¥»±±ºÞ¨t²Î §õÄRµØ¡B§õ´I¥Á¡BªLªQ¬ì¡BªL¨Î¾ç
195 °ò©ó¶³ºÝ°ò¦¤§³q¥Î­Ó¤H½ü¹ø §õÄRµØ¡B§õ´I¥Á¡B¼Ú¤¯¼w¡B±i¥ò¼Ý
213 ¨ã´¼¯à¬ã°Q·|¶³ºÝ¥­¥x°ò©óHadoop ³\¤A²M¡B§fªY®p
R3-02 ¼v¹³»P¸ê®ÆºÞ²z¬ã¨s ¥D«ù¤H¡GÀ¹²Ð°ê
061 Data Stewardship and Flow Management for Data Quality Improvement Thien-Vu Tran, Sunho Kim, Ming-Hsiung Hsiao
062 User Satisfaction of EDUSOFT in Managing Students¡¦Data at University of Dalat, Vietnam Phan Thanh Dong
164 ¦h¶¥¬q¼v¹³¿Ä¦X§Þ³N À¹²Ð°ê¡B³¯¶®ºÂ
192 §ï¨}°ò©ó½d¨Ò¤§¼v¹³­×¸É¤èªk Á¬F¾±¡BªL¨|¸t¡B½²·¨¤¯¡BÀs«ÛÀM¡B½²ªÚ³Ó
193 An Object Finding Robot Vision System forthe Indoor Living Environment Based on Saliency Map and SIFT Jyun-Han Wei and Shih-Hung Wu
210 Sub-Optimal Search Algorithms for PTS Phase Selection Yung-Cheng Yao, Fang-Yu Chang , Jyh-Horng Wen
R3-03 °Ó·~´¼¼z»P¼Æ¦ì¾Ç²ß ¥D«ù¤H¡G§õ±sâ ¹ù±ù§g
039 ¥HRFM¸ê®Æ¤ÀªR¬°°ò¦«Ø¥ßÀɮפÀ¸s¾÷¨î´£¤É¶³ºÝ¹BºâªºªA°È®Ä¯à ¤ý¶¶¥Í¡BÄY°ê¼y¡B¤ý²Q­ë¡B³¯¸t¤¤
139 ¥H¤å¥óÃö«Y¬°°ò¦¤§¤å¥ó¤ÀÃþ¤èªk ´^°ê«Û¡B³¯·Ô¤¯¡BªL·®«C¡B§d ®S¡Bªô«n¬P¡Bªô¬L¹ü
157 2005-2011¦~½u¤W¦X§@¾Ç²ßÃö©ó¹Î¶¤¬ã¨s¤åÄm¤§¤º®e¤ÀªR»P±´°Q ³¯Ì°¨q¡B§d¬îµØ
158 ¹q¸£¤ä´©¨ó§@¾Ç²ß»â°ì¬ã¨s»Pµo®iÁͶաG·¾³q«¬ºA¬ã¨sªº¤º®e¤ÀªR ³¯Ì°¨q¡B½²ªN§Ó
215 ±¡¹Ò·Pª¾¤§ªÅ¶¡¥»Å骾Ãѫغc»P±À½× ³¯ºaÀR¡B½²®a»Ê
216 ·s»D¨Æ¥ó°»´ú»P°lÂܤ§¤À¸s¤ÀÃþºtºâªk¬ã¨s ¶À¯Â±Ó¡B³¯Áo©y¡B¸â¶®µ®
R3-04 ¦h´CÅéÀ³¥Î»P¬ã¨s¡iI¡j ¥D«ù¤H¡G³¯ºa©÷
070 Safe Driving System Jui-Cheng Yen, Hsiao-Fen Pai, Qiang-Rui Su
088 °ò©óRFID»Pµøı§Þ³N¤§¥X¤J¤f¤H­û°lÂÜÃѧO¨t²Î ³¯¤S»Ê¡B¹ùÒ¹¬w
106 ¥HÂX¼W¹ê¹Ò¬°°ò¦ªº¤¬°Ê¦¡3D«Ø¼Ò¨t²Î ³¯¬fëù¡B¾H¶i§»
131 3D¼v¹³¬d¸ß¨t²Î §õ¦¶¼z¡BªLª÷¾ð
153 ¤Tºû¤G¨¬¨¤¦â¤§°Ê§@¤ÏÀ³»P¥­¿Å±±¨î ½²¤Kæ@¡B¿c¤ÑÄQ
162 µ²¦X­±¬Û¾Ç»P¤HÁy¯S¼x¤ÀªR¨Ó¶i¦æ­±¬Û»P­Ó©ÊÃö«Y¤§¬ã¨s ³¯ºa©÷¡B·¨³ÍÅï¡B³¯­ì±L
R3-05 ¦h´CÅéÀ³¥Î»P¬ã¨s¡iII¡j ¥D«ù¤H¡G¹ùÒ¹¬w
012 ³z¹L¦h¼h¯Å¤§²V¦X¦¡§Ö¨ú¬[ºc¨Ó¥[³t¤j¶q¼v¹³¸ê®Æ®w¬d¸ß ½²©ú¼w¡B¾G·¶¿Ä¡BªL©û¼w¡B¿½¤@»¨
099 °ò©óµø®t¤À§Gªº¯S©Ê§ïµ½¥ßÅé¼v¹³µøıµÎ¾A«× ­J©|¤¯¡BªL©v¿«
147 °ò©ó¦h¤¸°jÂk¤ÀªR¤§²´©³¼v¹³«~½è´£ª@ »¯¶®´P¡B¼B¥¿©¾¡B³ë¥Û¥Í
148 An Optic Disc Detection Scheme on Retinal Images Guan-Ming Lin, Chen-Chung Liu, Chun-Yuan Yu,, Shyr-Shen Yu
152 ¥ô·N¤è¦V¤Î±Æ¦Cªº¤å¦r°»´ú  ³¯§B©¨¡B°ª°¶®æ
188 ¥iÀ³¥Î¦b¿Ã¹õ¸ÑÂꤧ°ÊºA¤HÁy¿ëÃѧ޳N ½²Ä£¥°¡B¶À¾åµÓ
R3-06 ¸ê°T¨t²Î¬ã¨s ¥D«ù¤H¡GÃC¨q¬Ã ¾G¨qµØ
049 ¥H±µ¨ü«á«ùÄò¨Ï¥Î¼Ò¦¡²z½×±´°Q¶EÂ_ÃöÁp¸s¸ê°T¨t²Î¤§¹êÃÒ¬ã¨s  ¶Àºû¥Á¡B¨LÅA¯è¡B§õ¨|¯è¡B¶ÀÃý¼ä
064 ºô¸ôªÀ¸s»P©¯ºÖ·P¤§¬ÛÃö¬ã¨s-¥HFacebook¬°¨Ò ¼Bº·¼ä¡B¼B¹Å¯\¡B¤ý¸a¶®
067 ¼vÅT¨Ï¥ÎªÌ¨Ï¥Î¹Ï®ÑÀ]Plurk·NÄ@¤§¦]¯À¬ã¨s ¼Bº·¼ä¡B¤ý«É±¶¡B¯ÎÞ³¨°¡B¾G¤Í³Ó¡B³¯¯E¦w¡B±i¯uºÍ¡B
075 °O±b¤h±q·~¤H­û¾¯à¼Ò«¬¤§¬ã¨s--¥H¤¤³¡¦a°Ï·|­p¨Æ°È©Ò¬°¨Ò ÄY°ê¼y¡B¤ý²Q­ë¡B´^ª÷¤s¡B¤ý¶¶¥Í
122 °ò©ó¼W±j¦¡¾Ç²ß§Þ³Nªº¾A©Ê¤ÆÂsÄý±ÀÂË ­ð»È§D¡B¤B¤@½å
138 §Q¥Îºô¸ô¨¥½×»PÃöÁä¦r¼öªù«×±À´ú¨T¨®¾P°â¶q ®}¹ÅÂE¡B¾G´IÒm¡B®}­b¬Â¡Bªô«n¬P¡Bªô¬L¹ü
R3-07 ´¼¼z«¬¨t²Î ¥D«ù¤H¡G½²±RÞm ¬_¨q¨Î
038 ³z¹L¤¤¤¶¼h¾÷¨î¹F¨ì¸ê®Æ¦bª«Ápºô¤Uªº¥i¥Î©Ê»P¦w¥þ©Ê ¤ý²Q­ë¡B³¯¼yºû¡B¤ý¶¶¥Í¡BÄY°ê¼y
089 ±Ð¾Ç«~«O¨t²Î«Øºc §f·O¯Â¡B²§»¾§¡B³¯»ïµú¡B¿½·¶¼w¡B¤B¤åªl¡Bªô´¼«i
108 ¹B¥Î¸ê®Æ³B²z»PEXCELµ²¦Xªº´¼¼z«¬³øªí²£¥Í¨t²Î ³¯¹t°ê¡B¿cºÖ¶¯
130 ±q¥æ©öÃö«Y¤§Æ[ÂI³]­pºô©ç²§±`±b¸¹¤ÀÃþ¤èªk ¿½§Ó»¨¡B¿½¤ßÌÉ¡B³s¤_¸©¡B¥j¥Ã©÷¡Bªô¬L¹ü
133 ¥xÆW¤j±M°|®Õ¤§ºô¸ô¤f¸O¤ÀªR-¥H¤¸´¼¤j¾Ç¬°¨Ò Á¨K¦t¡B±iºÍÑÔ¡B¶À«H¿o¡B§º·çµë¡Bªô¬L¹ü
194 ¶ð¦Ìº¸¤å»y­µ¿ëÃѨt²Î¤§³]­p¬ã¨s ³¯§Ó°í¡BªL«Â§Ê
P1-01 ®ü³ø½×¤å¡iI¡j ¡@
028 MapleªºÀ³¥Î¡Ð¥H¨D¸Ñ¤G­«·å¿n¤À°ÝÃD¬°¨Ò¤l §E±Ò½÷
065 À³¥Î¼v¹³³B²z§Þ³N©ó¤½¸ô¨®½ø°»´ú¤Î°lÂܤ§¬ã¨s »¯«aºû¡B¸­©ú©v¡BÁéÁl¯à
087 Maple¦b¥|ºØ¨âÅܼƨç¼Æ°¾·L¤À°ÝÃD¤WªºÀ³¥Î §E±Ò½÷
109 USB¼Ò²ÕÀ³¥Î©ó¾÷¹q¾ã¦X±Ð¾Ç¤§¬ã¨s ¥Û¤å³Ç¡B·¨©u¾ì¡B¶Àà±²E
119 °ò©óNBNºtºâªk§ï¨}¼Ò½kÃþ¯«¸gºô¸ô¤§¦¬ÀĮIJv ªL­õ½n¡B¬x°êÄ_
120 µL½u·P´úºô¸ô¦w¥þ»{ÃÒ¾÷¨î¯Ê¥¢¤Î¨ä§ïµ½¤èªk ¿àªY¬R¡B§õ¥Ã®¶
189 ¥H¼v¹³·N¸q´M§ä¥iµø¯B¤ô¦L¦ì¸m¤èªk ¤è¤å¸u¡B¿c¸t°a¡B¼B¦Wµq¡B¿à¿õ¥°
196 A Low Complexity Embedding Algorithm Based on a Low Weight Search Method for Steganography Zih-Syuan Lian, Chi-Yuan Lin, Jyun-Jie Wang, Houshou Chen
208 ¨ã¦¨¥»Àu¶Õ´O¤J¦¡¼Æ¦ìÃþ¤ñ¼v­µ½s¸Ñ½X¨t²Î¤§¬ã»s ±i´Ü´¼¡B²ø°êÞm
P2-01 ®ü³ø½×¤å¡iII¡j ¡@
032 ¹B¥ÎiOSµ²¦XIPCamµL½u»»±±¦Û¨«¨®¤§¬ã»s §õ«áÀé¡B½²²»ÀM¡B³¯¥ò¯þ¡B¦¿«B®x¡B¦ó¹Å¿³¡BªL¨|ºö
058 ­^¤å¾\Ū ¤j¸£»{ª¾¤§¬ã¨s ®]¥ú¤Ñ¡B³\¥@¿o¡B³¢®xµØ¡B¸­ªY´@¡B³¯Ìɵa
069 App¦b¹Ï®Ñ¸ê°TªA°ÈªºÀ³¥Î»Pµo®i ¤ý¨qÆq¡B´^¤l¤_
083 ¥H¸ê®Æ±´°É§Þ³N«Ø¸m¦h·Ç«h¨Mµ¦ ¶À¥ú¦t¡BªL«Â§Ê
100 ®ø¶OªÌ©ó´¼¼z«¬¤â¾÷À³¥Î³nÅé±µ¨ü·NÄ@¤§¬ã¨s ¶ÀÁ¾¶¶¡BÁ§·¶¬À¡B±i¤S¤¯
149 ºô©çªA¹¢·~¸gÀçÃöÁ䦨¥\¦]¯À¤§¬ã¨s ³\¸t³Ç¡B¯³®Ü·s¡B¤ý«F±©
163 ¥H³nÅé¤uµ{«äºû¦b¨¤¦â©w¦ì¤W»s§@¼Æ¦ì¾Ç²ß±Ð®× ­ð¤¸«G¡B±ç¿ü­ë¡B§f®aºö
179 ¥H©Ý¾ë³Wµe©µªø²¾°Ê¦¡·P´úºô¸ô¹Ø©R¤§¬ã¨s ¦¶¼S¬î¡BªL¥@¨|
187 ¤@ºØ·sªº¹Ï½×¼Ò«¬À³¥Î©ó°t¹q¨t²Î¤§õX½u­«ºc Shih-Zhang Li, Han-Lin Shih, Rueiher Tsaur
202 PRNG-CBC»PAES¸ê®ÆÅͶîįà¤ñ¸û¤§¬ã¨s ³Å®¶µØ¡BªL«Û¦Ë¡B³¯¾Ë¬w