Graduate Students

  1. ¦óºÖ¦w¡BÁ´ܦ°¡B¬x·ù®p¡A°ò©ó¶}©ñ¶°¦XÃѧOªº¤¬¤ÏÂI¾Ç²ß¤§¥¼ª¾¤À´²¦¡ªýÂ_ºô¸ô§ðÀ»°»´ú (Open-Set Recognition in Unknown DDoS Attacks Detection with Reciprocal Points Learning)¡A2024¡C
  2. ¨¿«C«T¡BÁ´ܦ°¡B¬x·ù®p¡A´Ó°ò©ó²`«×¾Ç²ß»P¶}¶°ÃѧO§Þ³N¤§¥¼ª¾¤Î¹ï§Ü¦¡DDoS§ðÀ»°»´ú (Detection of Unknown and Adversarial DDoS Attacks with Deep Learning and Open Set Recognition Technologies)¡A2023¡C
  3. °ªµq¡BÁ´ܦ°¡B¬x·ù®p¡A°ò©ó Fuzzy C-Means ¶}¶°ÃѧO§Þ³N¤§¥¼ª¾ DDoS §ðÀ»°»´ú (Unknown DDoS Attack Detection with Open Set Recognition using Fuzzy C-Means)¡A2023¡C
  4. ³¯«Ø¦t¡B¬x·ù®p¡BÁ´ܦ°¡A°ò©óÃä½t°»´ú»PYolov5¤£¦P¤èªk¤§³è²G¼v¹³¤¤ªº¦Ï¾¦ª¬µ²´¹¿ëÃѧ޳N¬ã¨s (Research on Recognition of Ferning Crystals in Saliva Images Based on Methods of Edge Detection and Yolov5)¡A2023¡C
  5. §õ¼á©ù¡B¬x·ù®p¡BÁ´ܦ°¡A¤@ºØ¥i¥H¥Î©ó´_°·µû¦ôªº¾AÀ³©Ê ¨BºA·P´ú¸`ÂI³]­p¤Î¨ä¹ê²{ (A Design and Implementation of Adaptive Gait Sensing Node for Rehabilitation Assessment)¡A2023¡C
  6. ¦ó¸q²S¡BÁ´ܦ°¡BªL§Ó¾Ç¡A°ò©ó²É¤l¸s²V¦X±Ä¼Ëªº¤£¥­¿Å¸ê®Æ¤ÀÃþ (Classification of Imbalance Data with Particle Swarm Mixed Sampling)¡A2023¡C
  7. ¬xÂ@«Û¡BÁ´ܦ°¡B¬x·ù®p¡A°ò©óÃä½tÀË´ú©M¿³½ì°Ï°ì¤À³Îªº¨xŦ¹q¸£Â_¼h¼v¹³¦Û°Ê¼Ðµù¤èªk (Automatic Labeling for Liver CT Image Based on Edge Detection and Region of Interest Segmentation)¡A2023¡C
  8. ©P­õÞm¡B¬x·ù®p¡BÁ´ܦ°¡A¥iÀ³¥Î©ó¤û°¦°·±dºÞ²z¤¤°ò©ó¦h¤¸¾÷¾¹¾Ç²ßªº ¤û°¦¦æ¬°¿ëÃѧ޳N (Multi-Model Machine Learning Based Cattle Behavior Recognition Technology Apply To Cattle Health Management)¡A2023¡C
  9. ½²©Ó­õ¡B¬x·ù®p¡BÁ´ܦ°¡A¤@ºØ°ò©ó¼v¹³³B²z¹ï©ó©CÄZ¡B§]Ã`¯à¤O¶q¤Æµû¦ôªº·s¿o¤èªk (A Novel Method for Quantitative Assessment of Chewing and Swallowing Abilities based on Image Processing)¡A2023¡C
  10. ±ç­×»Í¡BÁ´ܦ°¡BªL§Ó¾Ç¡AÀ³¥Î©ó¤£¥­¿Å¸ê®Æ¤ÀÃþªº¦Û¾AÀ³¯T¸s²V¦X±Ä¼Ëªk(Mixed Sampling with Adaptive Wolf Pack Method for Imbalance Data Classification)¡A2022¡C
  11. ³¯¸s©¨¡BÁ´ܦ°¡B¬x·ù®p¡A¨Ï¥Î­«ºc»~®t»P³æÃþ¤ä´©¦V¶q¾÷¤§¥¼ª¾¤À´²¦¡ªýÂ_ªA°È§ðÀ»°»´ú(Detection of Unknown DDoS Attack using Reconstruct Error and One-Class SVM)¡A2022¡C
  12. ¸â­õ·ì¡BªL§Ó¾Ç¡BÁ´ܦ°¡A¦Û¾AÀ³²`«×´Ý®t¦¬ÁYºô¸ô§Þ³NÀ³¥Î©ó°ª»ù­È¦©¥ó¤§¦Û°Ê¥ú¾Ç«~½èÀË´ú(Adaptive deep residual shrinkage network technology applied to automatic optical quality inspection of high-value fasteners),2022¡C
  13. ¨¿®x±j¡BÁ´ܦ°¡B¬x·ù®p¡A¥H§ï¨}¦¡¬À·äÁGÀu¤Æªk¸Ñ¨M¹s¤u¦¡±Æµ{°ÝÃD(Modified Coral Reef Optimization Methods for Job Shop Scheduling Problems)¡A2022¡C
  14. ³¯«TÀM¡B¬x·ù®p¡BÁ´ܦ°¡A°ò©óºD©Ê·P´ú¤§°ªºë·Ç«×§Y®ÉÅé·P¦³®ñ®±À»¿ëÃѨt²Î(An IMU-based Approach to High Accuracy Real-time Activity Recognition of Aerobic Boxing)¡A2021¡C
  15. ¤ý«Âµ¾¡B¬x·ù®p¡BÁ´ܦ°¡A°ò©ó²£·~¬ÛÃöªÑ²¼ªí²{¤ÀªR¤§±ÀÂ˧޳N¬ã¨s(A Study on Stock-Recommendation Based on Supply-Chain Dependence Information Analysis)¡A2021¡C
  16. ±i¨°¦N¡BªL§Ó¾Ç¡BÁ´ܦ°¡A°ò©óELECTRA »y¨¥¼Ò«¬¤§ÃöÁäµü¿z¿ï§Þ³N¥Î©óª÷Äݲ£·~ª¾ÃѹÏÃÐ(Keyword screening technology based on ELECTRA language model for metal industry knowledge map)¡A2021¡C
  17. ¶À¥ÃÀM¡BÁ´ܦ°¡B¬x·ù®p¡A´Ó°ò©óÂùŲ§O¾¹¥Í¦¨¹ï§Üºô¸ô¬[®Ø¤§¹ï§Ü¦¡DDoS§ðÀ»°»´ú§Þ³N(The Detection of Adversarial DDoS Attacks using Generative Adversarial Network with Dual Discriminators)¡A2021¡C
  18. ­J®aâò¡BªL§Ó¾Ç¡BÁ´ܦ°¡A°ò©ó¼Ò¤ºÀ£¤O»P¾÷¾¹¾Ç²ß¤§¦Xª÷ű³y«~½èÀË´ú§Þ³N(Alloy casting quality inspection technology based on in-mold pressure and machine learning)¡A2021¡C
  19. ªL¬R¤å¡BÁ´ܦ°¡B¬x·ù®p¡A°ò©ó¥[±j«¬¹w°V½m»y¨¥¼Ò«¬¹ê²{¤£­­»y¨¥¯S©Ê¤§²Ó¿°±¡·P¤ÀªR¤èªk(Realization of Unconstrained Language Formality with Fine-Grained Sentiment Analysis based on Enhanced Pre-Trained Natural Language Processing Model)¡A2020¡C
  20. ³¯¿K§»¡BÁ´ܦ°¡BªL§Ó¾Ç¡A´Ó°ò©ó²`«×¾Ç²ß»P°ª´µ²V¦X¼Ò«¬¤§DDoS¥¼ª¾§ðÀ»°»´ú(Detection of Unknown DDoS Attacks with Deep Learning and Gaussian Mixture Model)¡A2020¡C
  21. ¶À«kºÍ¡B¬x·ù®p¡BÁ´ܦ°¡A°ò©ó²`«×¾Ç²ß¹w´ú­t¸ü¤Î´£¨Ñ¥Î¹q«~½è©Ó¿Õªº¦A¥Í¯à·½Àx¯à¨t²Î-¥H¹üÀØ­·¹q¼t¬°¨Ò(Renewable Energy Storage System With Service Quality Commitment based on Deep-Learning and Load-Prediction-An Example of Chang-Bin Wind Power Plant)¡A2020¡C
  22. §õªÃªQ¡BªL§Ó¾Ç¡BÁ´ܦ°¡A¨ã³nÅé½T®Ä¤§³Ð·s«¬±Ó±¶¦¡±M®×ºÞ²z-¥H«D«I¤J¦¡Àù¯gÀË´ú¨t²Î¬°¨Ò(Innovative Agile Project Management with Software Validation¡GAn Example of Non-invasive Cancer Detection System)¡A2020¡C
  23. ±i®aºö¡B¬x·ù®p¡BÁ´ܦ°¡A¥Hæi¬ù§ô¦h¼Ë©Ê¤Gºû°ò¦]ºtºâªk¬°°ò¦ªº²§½è¤u¥ó¤H¤O±Æµ{³Ì¨Î¤Æ§Þ³N(An optimal human-power scheduling for heterogeneous part manipulation based a 2D genetic algorithm with entropy-constrained population diversity)¡A2020¡C
  24. ÃÓ©É®¦¡BÁ´ܦ°¡B¬x·ù®p¡A´¼¼z®a®xÀô¹Ò¤¤³z¹L¦Û¾A©Ê¦æ¬°¼Ò¦¡±´°É¶i¦æ¶g´Á©Ê¬¡°Ê¿ëÃÑ(Periodic Activity Recognition with Adaptive Patterns Mining Approach in Smart Home Environments)¡A2020¡C
  25. ½²µÏ³Ç¡B¬x·ù®p¡BÁ´ܦ°¡A¥H¤¤¤p¥ø·~»Ý¨D¾É¦V´£¨Ñºô¸ô«~½è»P¦w¥þ«OÅ@ªº³nÅé©w¸qºô¸ôºÞ²z¾÷¨î(SME-oriented Software Defined Network Management to Support Network Quality and Security)¡A2019¡C
  26. ®]ºû²O¡BÁ´ܦ°¡B¬x·ù®p¡A´Ó°ò©ó¾÷¾¹¾Ç²ß¤§¤À´²¦¡ªýÂ_ªA°È§ðÀ»°»´ú(Detection of Distributed Denial of Service with Machine Learning Technologies)¡A2019¡C
  27. °ªºÍªN¡B¬x·ù®p¡BÁ´ܦ°¡A°ò©ó¾÷¾¹¾Ç²ß¥HIEC61850¾ã¦X²§½è¹q¼t¤Î¨ä¹w´ú©Ê¹q¤O½Õ«×¤èªk(A Machine-Learning Approach to Predictive Power Load Dispatch for IEC61850-Connected Heterogenous Power Plants)¡A2019¡C
  28. ´¿¼y¹F¡BÁ´ܦ°¡B§õ°]ºÖ¡A¨Ï¥Î¦]¤l¬D¿ï¼W¶i¤ä«ù¦V¶q¾÷»P¨©¤óºô¸ôºtºâªk¦b¨ÅÀù¯f±w±µ¨ü©ñ®g©ÊªvÀø«áµo¥ÍªÍª¢¨Öµo¯g¹w´ú®Ä¯à(Using Feature Selection Based Support Vector Machines and Bayes Classification Algorithm to Improve the Predictive Performance of Radiation-Induced Pneumonitis Complication in Breast Cancer)¡A2019¡C
  29. §ºªøÓT¡BÁ´ܦ°¡A¤À´²¦¡±±¨î¾¹¤¤¿é¥X¤J¼Ò²Õ¤§§ï¨}(Enhanced Input/Output Modules for Distributed Control Systems)¡A2019¡C
  30. ³Å®x¼Ý¡BÁ´ܦ°¡A³]­p¨Ã¹ê§@°w¹ïªÅ½Õ¤Î§N­á/Âñ±¨î¾÷ªO¤§¥iÂX¥R«¬¥Í²£¦Û°ÊÀË´ú¨t²Î(The Design and Implementation of Production Automatic Inspection Systems for Air Conditioners and Refrigerators Control Panels)¡A2019¡C
  31. Ò\©s¨Î¡B¬x·ù®p¡BÁ´ܦ°¡A§Q¥Î¥é¥Íª«­pºâÀu¤Æ¥dº¸°ÒÂoªi¾¹¤§¤ô¤U·Æµ¾¾÷©w¦ì§Þ³N(Kalman filter optimized by bio-inspired computation for underwater glider localization)¡A2018¡C
  32. ªLÅAùÚ¡B¬x·ù®p¡BÁ´ܦ°¡A§Q¥ÎUHF RFIDµ²¦X¨©¤ó©w²zÀ³¥Î©ó¥Íªø´Á¦×½Þ¤§¶¼­¹ºÊ´ú¤èªk¬ã¨s(A Study of Grower Pig Diet Monitoring Using UHF RFID and Bayes' Theorem)¡A2018¡C
  33. ¿à©¾«Ø¡BÁ´ܦ°¡B¬x·ù®p¡A´Ó°ò©ó°Ï¶ôÃì§Þ³N¤§ª«Ápºô¸ê°T¦w¥þ(Information Security of IoT with Blockchain Technology)¡A2018¡C
  34. Ĭ¥[´I¡B¬x·ù®p¡BÁ´ܦ°¡A¦Û¾AÀ³©Ê°¼±½Án¯Ç¼v¹³ª¼°Ï°»´úºtºâªk(An Adaptive Blind Zone Detection Algorithm for Side Scan Sonar Images)¡A2018¡C
  35. ¸âµúµ¾¡BÁ´ܦ°¡B¬x·ù®p¡A±Òµo¦¡³Ì¨Î¤Æ¤èªkÀ³¥Î©ó¼v¹³ª«¥ó°lÂÜ(Application of Heuristic Optimization Methods to Video Object Tracking)¡A2018¡C
  36. ªL©ø¦ö¡B¬x·ù®p¡BÁ´ܦ°¡A°ò©ó¨©¤ó©w²zªº´¼¼z®a®xªA°È±ÀÂ˧޳N(A Service Recommendation Technology Based on Bayes' Theorem for Smart Home)¡A2017¡C
  37. ¼B¼z§g¡BÁ´ܦ°¡BªL«Â¦¨¡A²§½è©Ê¸ê®Æ®w¬Û¦üª«¥ó·j´Mªk¤Î¨ä¦b©Ð«Î¥æ©öºô¯¸¤§À³¥Î(Locating of Similar Items in Heterogeneous Databases and Its Application to Housing Transaction)¡A2017¡C
  38. ªL¸t¬°¡B¬x·ù®p¡BÁ´ܦ°¡A°ò©ó¶°¦X½×»P¹Ï½×¤§°ªºû«×«D¼Æ­È¤Æ¸ê®Æ»EÃþ¤èªk-À³¥Î©óÀ\¶¼ªA°È(A New Clustering Algorithm Based on Set Theory and Graph Theory for High-Dimensional Non-Numeric Data - An Example of Food Services)¡A2017¡C
  39. ÅUµqµ¾¡BÁ´ܦ°¡B¬x·ù®p¡A´Ó°ò©óSCTP¤§ÀH¿ïµø°TªA°È¾E±p(SCTP-based Service Migration for VOD Service)2017¡C
  40. ÃC§Ó¿o¡BÁ´ܦ°¡B¬x·ù®p¡A´Ó°ò©ó³nÅé©w¸qºô¸ô¤§ª«ÁpºôºÞ²z¬[ºc(SDN-based Management Framework for IoT)¡A2017¡C
  41. ¤ý«Û´¼¡B¬x·ù®p¡BÁ´ܦ°¡A¹B¥ÎÃþ¯«¸gºô¸ô«ØºcSMT«Ê¸Ë¤¸¥ó»²§U¤ÀÃþ¨t²Î(An Assistant Classification System based on Artificial Neural Network for SMT Components)¡A2017¡C
  42. §f¾Ç¹Å¡BÁ´ܦ°¡B¹ùÙy¼Ý¡A¿nÅé¹q¸ô¹s¥ó²Å¸¹»²§U«Ø¸m§Þ³N(Technology for Automatic Generation of IC Symbols)¡A2017¡C
  43. Á©¯¥ú¡BÁ´ܦ°¡A²©ö¦^õX¦¡¿é¤J±M§QÀ˯Á¨t²Î(A Novice-oriented Patent Search System with Feedback-based Query Construction)¡A2017¡C
  44. ¨½¾ôº¸¡BÁ´ܦ°¡B¬x·ù®p¡A±Òµo¦¡³Ì¨Î¤Æ¤èªkÀ³¥Î©ó´¼¼z¹qºô¤§°t¸m»PºÞ²z(Configuration and Management of Smart Grids with Heuristic Optimization Methods)¡A2016¡C
  45. ¾¤¥úºû¡BÁ´ܦ°¡A±Òµo¦¡³Ì¨Î¤Æ¤èªkÀ³¥Î©óµL½u·P´úºô¸ô¤§¸`ÂI¤À¸s(Node Clustering in Wireless Sensor Networks with Heuristic Optimization Methods)¡A2016¡C
  46. ½²¤åÅa¡BÁ´ܦ°¡A±Òµo¦¡³Ì¨Î¤Æ¤èªkÀ³¥Î©óµL½u·P´úºô¸ô¤§¸`ÂI©w¦ì(Node Localization in Wireless Sensor Networks with Heuristic Optimization Methods)¡A2016¡C
  47. ¨¿¥òÅé¡BÁ´ܦ°¡B¼ï¤Ñ½ç¡B¬x·ù®p¡AÀ³¥Î©óµL½u·P´úºô¸ôªº­pºâ´¼¯à¤èªk¬ã¨s(Study on Computational Intelligence for Wireless Sensor Networks)¡A2016¡C
  48. ¤ýµq§Ê¡BÁ´ܦ°¡B¹ùÙy¼Ý¡Aµ²¦X°ò¦]ºtºâªk»P¥ýÅçºtºâªk¥Î©ó³W«h±´°É(Mining of Association Rules using Hybrid Genetic and Apriori Algorithms)¡A2016¡C
  49. §f¬F¹F¡BÁ´ܦ°¡A¥H³nÅé©w¸qºô¸ô§Þ³N¹ê²{ªA°È¾E±p¾÷¨î(The Design and Implementation of Service Migration with Software-defined Networks)¡A2015¡C
  50. ³¯¬R¦W¡BÁ´ܦ°¡A§Ö³t³¡¸pÀô¹ÒºÊ´ú¤ÀªR¨t²Î¤§³]­p»P¹ê²{(The Design and Implementation of Fast-deployment Environmental Monitoring and Analysis Systems)¡A2015¡C
  51. ¨H¥@§»¡BÁ´ܦ°¡A¹ùÙy¼Ý¡Aµ²¦XOpenFlow¤ÎIP¤À¸s§Þ³N¤§­t¸ü¥­¿Å¨t²Î(A Load Balancing Mechanism Incorporating OpenFlow and IP Splitting)¡A2015¡C
  52. ªL¤åµX¡BÁ´ܦ°¡AOpenStackÀô¹Ò¤¤´Ó°ò©ó°ÊºA¾E±p¤§­t¸ü¥­¿Å¾÷¨î(Load Balancing in OpenStack Environment with Dynamic VM Migration)¡A2014¡C
  53. ³¯©v¨}¡B¹ùÙy¼Ý¡BÁ´ܦ°¡A¥HµL½u°Ï°ìºô¸ô°ò¦³]¬I¶i¦æ¥æ³q¬y¶q¦ô´ú(Traffic Estimation Using WLAN Infrastructure)¡A2014¡C
  54. ¤B«C«C¡BÁ´ܦ°¡A´Ó°ò©ó¤ôÁn¯S©Ê»PÃþ¯«¸gºô¸ô¤§²î²íÃѧO(Vessel Identification based on Acoustic Characteristics and Artificial Neural Networks)¡A2014¡C
  55. ¤ý«T³Í¡BÁ´ܦ°¡AªA°È¾E±p¤¤ÀW¼e¦ô´ú¾÷¨î¤§¹ê²{(Implementation of Bandwidth Estimation for Service Migration)¡A2014¡C
  56. ±i°û·ì¡BÁ´ܦ°¡B¹ùÙy¼Ý¡A¶³ºÝªA°ÈµêÀÀ¥­¥x¤¤¥i¾A©Ê­t¸ü¥­¿Å¾÷¨î¤§³]­p»P¹ê§@(The Design and Implementation of Load Balancing Mechanisms for Cloud Service Virtual Platforms)¡A2013¡C
  57. ¯Î¸t?¡BÁ´ܦ°¡B¹ùÙy¼Ý¡A°ò©ó´¼¼z¤â¾÷µø°T³B²z¤§ª¼¤H»²§U¨t²Î(Assistive Systems for Visually Impaired based on Video Processing with Smartphones)¡A2013¡C
  58. ÃC»F¦ö¡B¼ï¥¿²»¡BÁ´ܦ°¡Aµ²¦XZigBee»P3GÀ³¥Î©ó§NÃ쪫¬y¤§°ª¥i¾a«×ºÊ±±¨t²Î(High Reliable Monitoring System for Cold Chain Logistics with Integrated ZigBee and 3G Networks)¡A2013¡C
  59. ¹ù§Ê²F¡B¼ï¥¿²»¡BÁ´ܦ°¡A°ò©ó¿ß¸s³Ì¨Î¤Æºtºâªk¤§ª«¥ó·j´M»P°lÂÜ(An Object Searching and Tracking Framework Based on Cat Swarm Optimization)¡A2013¡C
  60. °ª·q©ý¡BÁ´ܦ°¡B¬x·ù®p¡A²Å¦XSensorML¼Ð·Ç¨Ã¨ã¸ê®ÆÀ£ÁY¯à¤Oªºª«Ápºô·P´ú¸`ÂI³]­p¤èªk¤Î¨ä®Ä¯à¤ÀªR(A Design Method of Sensor Nodes with SensorML Standards and Data Compression for Internet of Things and its Efficiency Analysis)¡A2013¡C
  61. ¶À¸Ö¤ª¡BÁ´ܦ°¡B¬x«a©ú¡APLM¨t²Î¹B¦æ»P±M®×ºÞ²z¬yµ{¤§¬ã¨s±´°Q-¥H»s³y·~K¤½¥q¬°¨Ò(A Case Study on PLM System and Project Management)¡A2012¡C
  62. °q¿[»x¡BÁ´ܦ°¡A´Ó°ò©óºô­¶ªA°È»P¥N²zµ{¦¡¤§»·ºÝºÊ±±¥­¥x(Remote Control Platforms based on Web Services and Agents)¡A2012¡C
  63. §º«³¬¯¡B¬x·ù®p¡BÁ´ܦ°¡B´¿?°¶¡A°ò©óµL½u³q°T§Þ³N¤§¶³ºÝ¦Û°Ê¤Æ°ª¥i¾a«×¸`¯àLED·Ó©ú¨t²Î¤Î¨ä¨t²Î¤ÀªR(LED Lighting Cloud Service Analysis and Implementation Based-on Wireless Communication for Energy-Saving and High Reliability)¡A2012¡C
  64. Á©өw¡B¹ùÙy¼Ý¡BÁ´ܦ°¡A´Ó°ò©ó¥[³t«×·P´ú¾¹¤§ªñ³õ³q°T³]³Æ»²§U»{ÃÒ¾÷¨î(Auxiliary Authentication Mechanism based on G-Sensor for NFC Devices)¡A2012¡C
  65. ³¯«T¨¦¡BÁ´ܦ°¡B¬x·ù®p¡A´Ó°ò©ó¤â«ù³]³Æµø°T³B²z¤§¨®¹D°¾²¾»P«e¤è¸I¼²Äµ¥Ü¨t²Î(Lane Departure and Forward Collision Warning Systems Based on Video Processing Technology for Handhold Devices)¡A2012¡C
  66. ¬x¨£©v¡BÁ´ܦ°¡A´Ó°ò©ó¼Ò½k±±¨î¤§ÁC»ÄÅK¾Y¹q¦À¬Û¹ï¹q¦À´Ý¶q¦ô´ú(Estimation of Relative State of Charge in LIFEPO4 Batteries using Fuzzy Control Theory)¡A2012¡C
  67. §d®¶»Ê¡B¹ùÙy¼Ý¡BÁ´ܦ°¡AÀ³¥Î§ï¨}¦¡K-means¤À¸sªk©ó­Ó¤H¤Æ­µ¼Ö±ÀÂ˪A°È¨t²Î¤§¹ê²{(Application of Refined K-means Clustering to the Implementation of Personalized Musical Recommendation System)¡A2012¡C
  68. ªL¨¶«H¡BÁ´ܦ°¡B¹ùÙy¼Ý¡A´Ó°ò©óOSGi»P¯S¼x¿ï¨ú¤§­Ó¤H¤Æ±ÀÂ˨t²Î(OSGi-based Recommender Systems with Feature Selection using Heuristic Search)¡A2011¡C
  69. Á¬F¦ö¡BÁ´ܦ°¡B¼ï¥¿²»¡A¥H¤â«ù¦¡²¾°Ê³]³Æ¬°¼Ðªº¤§¨®¹D½u°¾²¾°»´ú¨t²Î(Lane Departure Detection Systems Targeted at Handhold Devices)¡A2011¡C
  70. ¶À·×Ùy¡BÁ´ܦ°¡A¥H·L³B²z¾¹»PSIP¨ó©w¹ê²{ºô¸ô»y­µ¼s¼½¨t²Î(Implementation of Voice Broadcasting Systems Using Microcontrollers and SIP Protocol)¡A2011¡C
  71. ªô´¼Às¡BÁ´ܦ°¡A¹q¤OªÅ½Õ¶°¤¤ºÊ±±ºû¹B¨t²ÎÀ³¥Î©ó³q«H¾÷©Ð¤§¸`¯à±´°Q(Investigation on POSS Energy Management for Communication Base Stations)¡A2011¡C
  72. ªô«H³Ç¡B¼ï¥¿²»¡BÁ´ܦ°¡A¶³ºÝ²×ºÝ¾÷¶´Åéºô¸ô§ó·s§Þ³N¤§¹ê²{(The Implementation of Network-based Firmware Update for Cloud Terminals)¡A2011¡C
  73. §ù©ø¿p¡B¼ï¥¿²»¡BÁ´ܦ°¡A°ò©óµL½u°T¸¹±j«×»P«H¸¹¥­§¡­È¤§°Ï°ì©w¦ì¨t²Î(Implementation of Indoor Positioning Using Measured Signal from Infrastructures)¡A2011¡C
  74. ¶À¤å¡BÁ´ܦ°¡B¬x·ù®p¡A°ò©óXMPP»POSGi§Þ³N¦b®a®x¦Û°Ê¤Æ¤§³Ð·sÀ³¥Î-¥H¼Æ¦ì¦B½c¹B¦æ¬G»ÙÀË´ú¾÷¨î¬°¨Ò(A New Approach based on XMPP and OSGi technology to Home Automation-A Study Case on Fault Detection of Digital Refrigerator)¡A2010¡C
  75. ¦¶«ÛÀM¡B¬x·ù®p¡BÁ´ܦ°¡A¨ã¼Æ¦ì¤º®e«OÅ@¾÷¨î¤§IPTV¨t²Î¹ê§@¤§¬ã¨s(An Implementation of IPTV Systems with Digital Content Protection Mechanism)¡A2010¡C
  76. ´¿°¶­Û¡B¹ùÙy¼Ý¡BÁ´ܦ°¡AIPTV¨t²Î¤¤´Ó°ò©ó¥i¥ÎÀW¼e¤§®t²§©ÊÀH¿ïµø°TªA°È(Video-on-Demand with Differentiated QoS based-on Available Bandwidth in IPTV)¡A2010¡C
  77. °ª¥@¨|¡BÁ´ܦ°¡A¤º®e¤À°e¨t²Î¤¤¦øªA¾¹¤§¦Û°Ê¤Á´«¾÷¨î(QoS-Aware Server Switching in Content Distribution Systems)¡A2010¡C
  78. ªL«i¦¨¡BÁ´ܦ°¡A©óµL½uºôª¬ºô¸ô¤W°ò©ó³Ì¨Î¸ô®|¾ðªº¸s¼½¸ô¥Ñºtºâªk(A Multicast Routing Algorithm Based on Best Path Tree in Wireless Mesh Networks)¡A2009¡C
  79. ³\­õÞ³¡BÁ´ܦ°¡A¦h´CÅé¦ê¬y¨t²Î¤¤ªA°È¾E®{¤§³]­p»P¹ê²{(The Design and Implementation of Service Migration in Multimedia Streaming Systems)¡A2008¡C
  80. ªL¤@¦¨¡BÁ´ܦ°¡A¥H¦ê¬y±±¨î¶Ç¿é¨ó©w§ïµ½²§½è©Êºô¸ô¤§««ª½¥æ»¼®Ä¯à(Improvement of Vertical Handover Performance in Heterogeneous Network with SCTP)¡A2008¡C