نتایج جستجو برای: tsai equations

تعداد نتایج: 240253  

2009
Chia-Ti Tsai Cho-Kai Wu Chuen-Den Tseng Yin-Tsen Huang Chia-Shan Hsieh Wei-Shan Tsai Jiunn-Lee Lin Fu-Tien Chiang

http://jra.sagepub.com/content/10/3/121 The online version of this article can be found at: DOI: 10.1177/1470320309342732 2009 10: 121 originally published online 17 July 2009 Journal of Renin-Angiotensin-Aldosterone System Chia-Ti Tsai Cho-Kai Wu, Chuen-Den Tseng, Yin-Tsen Huang, Chia-Shan Hsieh, Wei-Shan Tsai, Jiunn-Lee Lin, Fu-Tien Chiang and myocytes Angiotensin II does not influence expres...

Journal: :Review of Polarography 1973

Journal: :Thin-walled Structures 2022

We numerically analyze transient plane stress deformations of linearly elastic laminates and sandwich structures by using a coupled space–time finite element method with the weak form governing equations derived least-squares method. The are written as seven first-order partial differential in state space formulation, each variable is approximated piece-wise continuous basis functions. sum inte...

2012
Caitlin Sedwick

C dk5 is a kinase expressed mainly in neurons, where it helps regulate the activity of a whole host of downstream targets, including ion channels and synaptic scaffold proteins. Thus, it's perhaps to be expected that Cdk5 dysregulation is associated with many neuropathologies (1). Li-Huei Tsai cloned Cdk5 as a post-doc (2) and decided she wanted to study it further in her own lab. When asked du...

Journal: :Heliyon 2023

Under the influence of axial forces and uniform temperature variations, thermal buckling postbuckling composite beams reinforced functionally graded multilayer graphene platelets (GPLs) resting on nonlinear elastic foundations are examined. The Halpin-Tsai model is used to calculate modulus each layer GPL-reinforced (GPLRC). According virtual work principle, governing equations for beam obtaine...

2011
Dae-Soo Kim Gil-Je Lee Kee-Young Yoo

In 2009, Tsai et al. proposed reversible image hiding scheme using linear prediction coding and histogram shifting. Tsai et al.’s scheme improved the hiding capacity of Ni et al.’s scheme using the linear prediction coding and two histograms. In the linear prediction coding, however, the basic pixel is not used. If a value of basic pixel is the largest or the smallest in a block, only one histo...

2014
Neri Oxman Jorge Duro-Royo Steven Keating Ben Peters Elizabeth Tsai

Technology (MIT) Mediated Matter Group is honing its research into robotic swarm printing by focusing its efforts on material sophistication, or ‘tunability’, and communication or coordination between fabrication units. Here, the group’s Neri Oxman, Jorge Duro-Royo, Steven Keating, Ben Peters and Elizabeth Tsai illustrate this by describing three case studies that investigate robotically contro...

1998
S. WANG Shyi-Wu Wang Ching-Lin Tsai

CHIEN-CHEN LU,1 SHIOW-CHWEN TSAI,1 SHYI-WU WANG,2 CHING-LIN TSAI,3 CHIN-PANG LAU,1 HSI-CHANG SHIH,1 YEN-HAO CHEN,1 YU-CHUNG CHIAO,1 CHARLIE LIAW,1 AND PAULUS S. WANG1 1Department of Physiology, School of Life Science, National Yang-Ming University, and 3Department of Orthopaedic Surgery, School of Medicine, National Taiwan University, Taipei, and 2Department of Physiology, Chang-Gung University...

Journal: :JDCTA 2010
Jianhong Zhang Min Xu Xue Liu Xiuna Su

Abstract Multi-authenticated encryption is an important message transmission technique, which can send message in a secure and authentic way, and allows a group of signers to cooperatively produce a valid authenticated ciphertext so that only the specific recipient can recover the message and verify the signature. In 2008, Wu et al. proposed a convertible multi-authenticated encryption scheme. ...

2012
Chunguang Ma Ding Wang Ping Zhao Yu-Heng Wang

Forward secrecy is one of the important properties of remote user authentication schemes to limit the effects of eventual failure of the entire system when the long-term private keys of one or more parties are compromised. Recently, Tsai et al. showed that Wang et al.’s dynamic ID-based remote user authentication scheme fails to achieve user anonymity and is vulnerable to user impersonation att...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید