![Open Access](https://jit.ndhu.edu.tw/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://jit.ndhu.edu.tw/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Table of Contents
Articles
Zhi-Feng Jiang, Victor C. M. Leung
|
367-375
|
J. T. Chen, S. R. Tsa, C. M. Lee, C. H. Lok
|
377-384
|
Yau-Hwang Kuo, Chang-Shing Lee, Shu-Mei Guo, Ying-Hsu Chen
|
385-394
|
Harry Chia-Hung Hsu, Alan Liu
|
395-402
|
Jen-Her Wu, Tse-Chih Hsia, Sun-Jen Tsai, Chang-Tseh Hsieh
|
403-412
|
Wen-Lung Shu, Siou-Jyuan Lin
|
413-418
|
The Application of Face Authentication System for Internet Security Using Object-Oriented Technology
Chia-Te Chu, Ching-Han Chen
|
419-425
|
Chien-Min Wang, Shun-Te Wang, Shyh-Fong Hong, Hsi-Min Chen
|
427-436
|
Hei-Chia Wang, Tsz-Chuen Wang
|
437-444
|
Han-Wen Hsiao, Meng-Shu Tsai, Jeffrey J. P. Tsai
|
445-452
|
Jen-Her Wu, Yen-Chieh Huang, Shin-Shing Shin
|
453-461
|
Da-Yin Liao, Chan-Wen Hsu
|
463-468
|
Chao-Tung Yang, Hsin-Chuan Ho, I-Hsien Yang
|
469-476
|
Judy C. R. Tseng, Gwo-Jen Hwang
|
477-485
|