نتایج جستجو برای: chang method

تعداد نتایج: 1635805  

Journal: :Microelectronics Journal 2005
Shang-Chia Chen Shih-Kai Lin Kun-Ta Wu Chao-Ping Huang Pen-Hsiu Chang N. C. Chen Chin-An Chang Hsian-Chu Peng Chuang-Feng Shih Kuo-Shung Liu

Pen-Hsiu Chang , N.C. Chen, Chin-An Chang1, Hsian-Chu Peng, Chuang-Feng Shih, KuoShung Liu, Shih-Kai Lin, Kun-Ta Wu, Shang-Chia Chen, Chao-Ping Huang, Hong-Syuan Wang, Pu-Tai Yang, C.-T. Liang, Y.H. Chang and Y.F. Chen Institute of Electro-Optical Engineering, Chang Gung University, Kwei-Shan, Tao-Yuan 333, Taiwan Department of Materials Science and Engineering, National Tsing Hua University, H...

Journal: :Computers & Electrical Engineering 2014
Saru Kumari Muhammad Khurram Khan Xiong Li

Recently, Kumari et al. pointed out that Chang et al.’s scheme “Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update” not only has several drawbacks, but also does not provide any session key agreement. Hence, they proposed an improved remote user authentication Scheme with key agreement on Chang et al.’s Scheme. After cryptanalysis, they confirm ...

Journal: :Gut 1981
M Chiba W Bartnik S G ReMine W R Thayer R G Shorter

Colonic mucosal lymphoid cells, selectively enriched for intraepithelial (IEL) or lamina proprial lymphocytes (LPL), were isolated by sequential EDTA-collagenase treatment of resected human colons. Cytotoxic activities of colonic and peripheral blood lymphoid cells (PBL) were tested in three different assays, using chicken erythrocytes (CRBC) and Chang cells as targets. Antibody-dependent cell-...

Journal: :I. J. Network Security 2005
Cheng-Chi Lee

In 2000, Lee and Chang proposed a user identification scheme with key distribution preserving anonymity for distributed computer networks. Recently, Wu and Hsu pointed out that there are two weaknesses in the LeeChang scheme. They further not only proposed a new scheme to remedy the security leaks of the Lee-Chang scheme, but also reduced computation complexities and communication cost as compa...

Journal: :International journal of molecular medicine 2011
Ratakorn Srisuttee Sang Seok Koh Eun Hee Park Il-Rae Cho Hye Jin Min Byung Hak Jhun Dae-Yeul Yu Sun Park Do Yun Park Mi Ock Lee Diego H Castrillon Randal N Johnston Young-Hwa Chung

The hepatitis B virus X (HBX) protein, a regulatory protein of the hepatitis B virus (HBV), has been shown to generate reactive oxygen species (ROS) in human liver cell lines; however, the mechanism by which cells protect themselves under this oxidative stress is poorly understood. Here, we show that HBX induces the up-regulation of Forkhead box class O 4 (Foxo4) not only in Chang cells stably ...

Journal: :Computers & Mathematics with Applications 2009
Ting-Zhu Huang Li-Tao Zhang

Relaxed technique is one of techniques for improving convergence rate of splitting iterative methods. Based on local relaxed method and system relaxed method of parallel multisplitting Frommer andMayer [A. Frommer, G. Mayer, Convergence of relaxed parallel multisplitting methods, Linear Algebra Appl. 119 (1989) 141–152], we give the global relaxed parallel multisplitting (GRPM) method by introd...

Journal: :سیاست 0
قاسم افتخاری دانشیار گروه روابط بین الملل دانشکده حقوق و علوم سیاسی دانشگاه تهران علی باقری دولت آبادی استادیار گروه علوم سیاسی دانشگاه یاسوج

lots of papers has been written about iran’s military strategy explain military strategy of iran is deterrence, but there is a little paper that explain why iran chose this strategy? the paper tries to answer this question. two hypotheses are presented as probable answers to the question: 1-chang of balance power in the middle east 2- intensification of u.s pressure on iran for regime change.lo...

Journal: :Computers & Mathematics with Applications 2008
Kuo-Nan Huang Jui-Jung Liao

In this paper, we discuss a paper of Chang and Teng [C.T. Chang, J.T. Teng, Retailer’s optimal ordering policy under supplier 4 credits, Mathematical Methods of Operations Research 60 (2004) 471–483], they established an inventory model for deteriorating 5 items when the supplier permits not only a cash discount but also a permissible delay. They also proved a closed-form solution 6 of the inve...

2015
Hyuncheol Bryant Kim Beliyou Haile Taewha Lee

Using data from a randomized controlled trial involving door-to-door HIV education, homebased voluntary HIV counseling and testing (VCT), and facility-based VCT, the latter of which relies on conditional cash transfers, we find that both home-based VCT and facility-based VCT significantly increase HIV testing take-up, with the former being more effective in detecting HIV-positive cases. We also...

1996
Xiaoyu Liu Larry L. Schumaker

We develop a method for interpolating scattered data on sphere-like surfaces based on a local triangular patch which is constructed from a blend of certain spherical Bernstein-B ezier polynomials introduced recently by Alfeld, Neamtu & Schumaker 2]. The method produces a C 1 interpolant which matches values and derivatives, and is a natural analog of a planar method of Foley & Opitz 6] and Good...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید