Proceedings of the 21st Workshop on Combinatorial Mathematics and Computation Theory, Taichung, Taiwan, May 21-22, 2004.
	A       
    Frequency-Sensitive Competitive Learning Networks with Hadamard      
    Transform Applied to Color 
      
    Image Compression..................................................................................................................................1
  
    Chi-Yuan Lin, Chin-Hsing Chen
	Robust    
    Watermarking Scheme Using Phase Shift Keying  
    Embedding...................................................8      
    Wen-Yuan      
    Chen, Chio-Tan Kuo, Jiang-Nan Jow
	The  
    Quantization Effects of CORDIC Arithmetic for Digital Signal 
    Processing    
    Applications..............16 
 Tze-Yun    
    Sung Yi-Hsun Sung
	使用二元樹表示法與基因演算法合成被動濾波電路...........................................................................26   
    侯浩生,      
    張守進,      
    蘇炎坤
	The      
    Design of Improved Dynamic AES and Hardware Implementation Using FPGA...........................31   
 
    C.L. Lee, Y.Z. Liang, C.D. Lee, J.Y. Hwang
	Case      
    Study of Protein Stability by Using Topological      
    Properties...........................................................36 
    Jiunn-I Shieh, Kuei-Jen Lee
	Ordering    
    Analysis of Gene Expression    
    Dynamics...................................................................................53
    Chia-Lin Shen, Kuei-Jen Lee, Hsiang-Chuan Liu
	RNA    
    Secondary Structure Alignment Based on Stem    
    Representation...................................................60
    Meng-Yi    
    Wu, Chang-Biau Yangy, Kuo-Si Huang
	Constrained    
    Sequence Alignment: A Dedicated Version and Its    
    Applications........................................70
    Yun-Sheng Chung,    
    Chuan Yi Tang
	Topological  
    Properties, Optimal Routing, and Embedding on the 
	 K-valent    
    Graph................................76 
    Sun-Yuan Hsieh, Tien-Te Hsiao
	On    
    the C4-destroying of Bipartite Permutation    
    Graphs...........................................................................86
    Sheng-Lung Peng, Jian-Hong Lee, Jun-Rong Lin, Chih-Shan Liu
	Balancing  
    Minimum Spanning Trees and Multiple-Source 
	 Minimum     
    Routing Cost Spanning Trees on Metric     
    Graphs............................................................................................................................................91 
    Chung-Ming Lin, Yin Te Tsai, Chuan Yi Tang
	Mutually  
    Independent Hamiltonian Paths in Star 
	 Networks.....................................................................96 
  
    Cheng-Kuan Lina, Hua-Min Huanga, Lih-Hsing Hsub, Sheng Bau
	Use  
    Knowledge Bases and HMM Approach to 
	 Predict    
    Protein Secondary Structure.............................105 
  
    Wen-Lung Shu,    
    Morris Chou, Johnson Chen
	Prediction    
    of Specific 70-mer Oligonucleotide with Neural Network    
    Model...........................................114
    Chun-Chi Liu, Wen-Shyen    
    E. Chen, Gwoboa Horng, Jeremy J.W. Chen, Pei-Chin Chang
	利用微陣列基因表現資料分析癌症相關基因之研究............................................................................119
    沈詩珊,     
    石貴中,     
    梁綺雯,     
    劉峰銘,     
    陳榮銘,     
    張建國,     
    蔡進發,     
    施河
	以調控序列叢集分析人類啟動子區域....................................................................................................124
    陳士農,     
    蔡進發,     
    林俊谷,     
    黃志瑋
	On     
    the uniform edge-partition of a     
    tree.....................................................................................................132
    Bang Ye Wu, Hung-Lung Wang, Shih Ta Kuan, Kun-Mao Chao
	The    
    Constrained Independent Domination    
    Problem.................................................................................141
    Yu-Wei Chang, Meng-Ti Liu, and Chang Wu Yu
	Lower    
    Bounds to the Size of the Minimum Feedback Vertex Sets in    
    Split-stars.....................................148
    Fu–Hsing Wang,    
    Cheng–Ru Hsu
	Generalized  
    pancake graphs  的漢米爾頓容錯性質................................................................................153
    
    賴盈志,     
    洪春男
	On     
    the Connectivity of a Graph and its Complement 
	 Graph....................................................................165 
  
    Jia–De Lin1, Yue–Li Wang1, Jou–Ming Chang, Hung–Chang Chan
	24皇后問題共有227,514,172,009,468個解..............................................................................................171 
    
    謝育平, 
    項潔,     
    黃光璿,     
    許德標
	GLY     
    Conjecture on Counting number of integral points in a general     
    n-dimensional tetrahedra............177 
 
    Ke-Pao Lin
	求出正整數所有因數分解形式之演算法................................................................................................189 
    
    黃德豐 
    
	植基於超增序列的單伺服器私密資訊擷取機制....................................................................................193 
    
    陳俊華 
    
	An     
    Efficient Parallel-Pipelined Algorithm and Architecture for    
    Computation of 2-D DCT on Two    
    Successive    
    Processors................................................................................................................................200
    Tze-Yun Sung,    
    Yi-Hsun Sung, 
    Chih-Sin Chen
	An  
    Efficient Parallel Algorithm for Linear Programming  
    Problems........................................................208 
    
    Ming-Chang Lee
	A  
    Parallel-Pipelined Constant Geometry Algorithm (PCGA) for Computation 
    of FFT on a Special   
    Processor...................................................................................................................................................218
    
     
    Tze-Yun Sung
	On  
    arbitrary binary trees of hypercubes...................................................................................................228  
    
    Shin-Feng Tsai,   
    Hui-Ling Huang
	Ideal  
    and Perfect Secret Sharing for Fault-Tolerant Distributed 
    Access Control of Secure Data   
    via Nondominated Bicoteries...........................................................................................................................234  
    
 
     
    Jehn-Ruey Jiang
	On  
    the Selection of Robust Tag SNPs.......................................................................................................241  
    
    Yao-Ting Huang,   
    Kun-Mao Chao
	A  
    Case Study of Predicting the Class of the Unknown Viruses 
    of ssRNA positive-strand in  
    NCBI........249 
    Jing-Doo Wang
	An  
    Optimal Algorithm for the Range Maximum-Sum Segment Query  
    Problem.....................................257  
    Kuan-Yu   
    Chen and Kun-Mao Chao
	Efficient  
    Algorithms for Some Variants of the Farthest  
    String Problem.................................................266  
    
    Chih Huai Cheng, Ching Chian Huang, Shu Yu Hu, Kun-Mao Chao
	Local  
    Rules for Protein Folding on Triangular Lattice in the 2D 
    HP  
    Model...........................................273 
    
    Sheng-Lung Pengy, Yung-Sen Liuy, Hui-Chun Wuy, Chuan Yi Tang