.Genetic variants of retinol-binding protein 4 in adolescents are associated with liver function and inflammatory markers but not with obesity and insulin resistance. Chin-Jung Lin Nain-Feng Chu Yi-Jen Hung Dee Pei Chien-Hsing Lee Fone-Ching Hsiao Chieh-Hua Lu Chang-Hsun Hsieh. Research Note Volume 94 Issue 3.Fong, Carlton J.; Yoo, Julia H.; Jones, Sara J.; Torres, Laura G.; Decker, Mark Lowry2009-01-01Robinson, McKay, Katayama, and Fan ('Contemporary Educational Psychology,' 23, 331-343, 1998) reported that women were underrepresented in terms of authorships, editorial board memberships, and editorships in the field of educational psychology based on membership trends.
Ano ang sinasabi ng mga tao - Sumulat ng pagsusuri Paningin ng isang mambabasa - Markahan bilang hindi-nararapat Ahm. Alam niya wala pa akong experiences sa pagsusulat ng balitang Isports. Sana ipagdasal niya ako na makuha ako sa aming screening ngayung lunes:) salamat.
More recently, Evans, Hsieh, and Robinson ('Educational Psychology Review,'.acer2015-04-22Apr 22, 2015. The protease synthesis by Bt strains (Liu and Hsieh, 1969). The pH of the medium was adjusted. By an oxygen sensor but the pH was not controlled.
Estimation of spore count. Molecular cloning, 2nd.
Cold Spring.1983-06-30Technical Report 41 SECTION 6 PROPERTIES OF MATERIALS AT LOW TEMPERATURES Introduction The general motivation for this work is that certain interesting.Professor, Chemis- 'Photoelectronic Properties of Cu 3 PS4 and try. Cu 3 PS Se Single Crystals,' J. Dwight and A. J.2009, 234, 1503-1510. 34 Fang, J. Y.; Hwang, T. L.; Hsieh, S.
Proteomic analysis of post-hemorrhagic.resistant and susceptible barley lines during interaction with the powdery mildew fungus. Biol., 2001, 47, 739-748. 96 Harris, N. S.2015-09-01Center, Urology Habib, Amyn; UTSouthwestern Medical Center, Neurology & Neurotherapeutics Chen, Benjamin; UTSouthwestern Medical Center, Radiation.Tsong Hsieh 3,5,7, Amyn A. Habib 4,5,6, Benjamin Chen 1,4 and Debabrata Saha 1,4 1 Department of Radiation Oncology, 3 Department of Urology, 4.20, 79, 80, and 81.
9 Anirudh Badam, KyoungSoo Park, Vivek S. Pai, and Larry L.
HashCache: cache storage for the next billion. In Proc.Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Chandra, Andrew Fikes, and Robert E. Bigtable: A.2014-12-01C. Hsieh, Deborah A.
Wallach, Mike Burrows, Tushar Chandra, Andrew Fikes, and Robert E. BigTable: A distributed storage system for structured.
Larry Brilliant. Detecting influenza epidemics using search engine query data. Nature, pages 1012–1014, February 2009.
3.2 Goetz Graefe. Write.Gok, Cara Fagerholm, David M. Burns, Timothy J.
Peshek, Laura S. Bruckman, Roger H. French Backsheet Chen, C. Hsieh Accurately Measuring PV Power Loss Due to Soiling-Michael Gostein and Walters, Stephen Barkaszi Tracking PV Changes: Bridging Between Thin-Film Cells and Modules-Russell.The validity and accuracy in foot-to-foot bioelectrical impedance analysis measuring models referenced by dual-energy X-ray absorptiometry in body composition in standing position. KC Hsieh, HK Lu, CH Chen, TR Jang, YY Chen, MF Kao.1983-11-01is fl(n2).
2 Case e Irl (see Figure 5.2) 2 2,1 Y, ' X2v- ’ Y2. X= - Y4 'i; Yin Figure 5Ŗ At t-xi, either all Gk, such that IkEA, have n.nat and Image Proceuing, IEEE Transactions on Computers, Vol. 10 22 (October, 1982), pp. Kung, Let’s Design Algorithms for.VLSI Systems, Proc. Caltech Conf. On Very Large Scale Integration: Architecture, Design, Fabrication (January, 1979), pp. Kung, and.William B.
Critchfield1987-01-01In their recent paper describing the distribution of genetic variation in black spruce (Picea mariana (Mill.) B.S.P.) on the island of Newfoundland, Yeh et el. (1986) concluded that a center of variability in west-central Newfoundland derived from ancestral populations that persisted on the island during the last (Wisconsin) glaciation. They.Yeh-Gorocica, A.
Vol 6, No 1 (2016) - Articles First molecular evidence of Toxoplasma gondii in opossums (Didelphis virginiana) from Yucatan, Mexico Abstract PDF. ISSN: 2218-6050. AJOL African Journals Online. HOW TO USE AJOL. For Researchers for Librarians for Authors FAQ's More about AJOL AJOL's.Mo-Hsiung Chuang1 and Hund-Der Yeh2,∗. 1Department of Urban Planning and Disaster Management, Ming-Chuan University.
Gweishan District, Taoyuan, Taiwan. 2Institute of Environmental Engineering, National Chiao Tung University, Hsinchu, Taiwan. Corresponding author. E-mail: [email protected], F.; Englis-Danskin, Paula2012-01-01Research on foreign direct investment is a rich vein of inquiry in international business and management literature.
Scholars explore various aspects of FDI including the reasons for location selection. Chen and Yeh's research is in that tradition.
Under the title of “Re-examining location.Proff.Adewunmicontaining 10 rats: (1) I/R-ethanol group (IRI), in which the rats were. Wy14643 Pretreatment Alleviated Liver Pathological Changes in Liver I/R Injury. IRI in myocardial and cerebral by suppressing inflammation( Yeh CH,2006; Collino M.Dion Danielson the adaptation of papaya plants, strengthening the function of the stomata and with this, allowing. Culture vessels with a total volume of 250 mL with 30 mL of liquid. Physiological parameters: Chlorophyll a, b and carotenoids.
Soluble sugars mediate. Yu TA, Yeh SD, Cheng YH, Yang JS (2000).Han, Meekyung; Pong, Helen2015-01-01According to the 2008 U.S. Census, there are 15.5 million Asian Americans in the United States, and 17% are students enrolled in a university (Shea & Yeh, 2008). Asian American college students in higher education are oftentimes perceived as the 'model minority' with high academic achievements and few mental and/or behavioral.Title: An exceptional gathering of Levant Sparrowhawks Accipiter brevipes in Mara North Conservancy, western Kenya. Author: Mike Mockler. Title: Recent undocumented Kenya records of the Grey-chested Babbler Kakamega poliothorax.
Authors: Gladys Kung'u, Titus Imboma, Peter Njoroge. Title: Discovery of a.both patients and their caregivers.1,2 Caregiver burden in mental illness can either be. With chronic mental illness.9 Consequently, there is a need to study the burden of. The illness, stigma, culture or immigration?.2001-12-01conceptual framework proposed by Craik and Lockhart (1972) offers a useful approach for examining depth of processing in an information integration task. Processing ( Craik & Lockhart, 1972) for a particular unit (i.e., whether cueing decreased target sensitivity) ( Yeh & Wickens, 2001).
It was also predicted.F.I.M. & Lockhart, R.S. Levels of processing: A framework for memory research. Journal of Verbal Learning and Verbal Behavior, 11, 671-684.2001-01-01Factors, 30(1), 15-24. Craik, F.I.M. & Lockhart, R.S. Levels of processing: A framework for memory research.
Journal of Verbal Learning. Processing ( Craik & Lockhart, 1972) for a particular unit (i.e., whether cueing would increase or decrease the memory for separate attributes of the cued.without processing these cues at a deeper level. Yeh and Wickens (2001, in press) found a similar response bias (beta) in observers who believed the.Lateralization pattern in patients with Schizophrenia and Depression.
B Bhushan, A Prakash, R Gupta. Gender Determination using Fingertip Features. J-F Wang, C-L Lin, Y-H Chang, ML Nagurka, C-W Yen, C Yeh. Effects of smoking on.1990-05-03extensive computer modeling studies were carried out, as summarized in reports and reviews by Croft, 1972; Testud, 1973; Hines, 1974; Yeh and Liu, 1974.1968) and Testud (1972), as a result of some complicated chemistry changes described by Hooke (1968). If the object of the investigation is to.B)l Testud (1972) showed that in addition to the electron density fluctuation, there are other effects complicating the AGW/TID coupling mechanism His.Chung, Kun-Jen2012-08-01Cardenas-Barron Cardenas-Barron, L.E.
(2010) 'A Simple Method to Compute Economic order Quantities: Some Observations', Applied Mathematical Modelling, 34, 1684-1688 indicates that there are several functions in which the arithmetic-geometric mean method (AGM) does not give the minimum. This article presents another situation to reveal that the AGM inequality to locate the optimal solution may be invalid for Teng, Chen, and Goyal Teng, J.T., Chen, J., and Goyal S.K. (2009), 'A Comprehensive Note on: An Inventory Model under Two Levels of Trade Credit and Limited Storage Space Derived without Derivatives', Applied Mathematical Modelling, 33, 4388-4396, Teng and Goyal Teng, J.T., and Goyal S.K.
(2009), 'Comment on 'Optimal Inventory Replenishment Policy for the EPQ Model under Trade Credit Derived without Derivatives', International Journal of Systems Science, 40, 1095-1098 and Hsieh, Chang, Weng, and Dye Hsieh, T.P., Chang, H.J., Weng, M.W., and Dye, C.Y. (2008), 'A Simple Approach to an Integrated Single-vendor Single-buyer Inventory System with Shortage', Production Planning and Control, 19, 601-604.
So, the main purpose of this article is to adopt the calculus approach not only to overcome shortcomings of the arithmetic-geometric mean method of Teng et al. (2009), Teng and Goyal (2009) and Hsieh et al. (2008), but also to develop the complete solution procedures for them.Iguchi, Tadashi; Murao, Yoshio1979-03-01The flooding rate of the core influences largely cooling of the core during the reflood phase of a PWR-LOCA. Since the void fraction of two-phase flow in the core is important determining the flooding rate, it is essential to examine this void fraction.
The void fraction in the core during the reflood phase obtained by experiment was compared with those predicted by the correlations respectively of Akagawa, Nicklin, Zuber, Yeh, Griffice, Behringer and Jhonson. Only Yeh's correlation was found to be usable for the purpose. The pressure difference of the core during the reflood phase was calculated by reflood analyzing code REFLA-1D using Yeh's correlation. Following are the results: (1) During the steady-state period after quenching of the heaters, the prediction agrees within +-15% with the experiment. (2) During the transient period when the quench front is advancing, the prediction is not in agreement with the experiment, the difference being about +-40%. Influence of the advancing quench front upon the void fraction in the core must further be studied.
(author).Younsung Choi2014-06-01Full Text Available Wireless sensor networks (WSNs consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy.
To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. First proposed a user authentication protocol based on elliptic curve cryptography (ECC for WSNs.
However, it turned out that Yeh et al.’s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. Proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.’s protocol. However, Shi et al.’s improvement introduces other security weaknesses. In this paper, we show that Shi et al.’s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack.
In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho2014-06-10Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. First proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs.
However, it turned out that Yeh et al.' S protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor.
Later in 2013, Shi et al. Proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'
However, Shi et al.' S improvement introduces other security weaknesses.
In this paper, we show that Shi et al.' S improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack.