Skip to main content

previous disabled Page of 23
and
  1. No Access

    Chapter and Conference Paper

    Evaluation of Early Detection and Treatment of Hepatocellular Carcinoma

    During 1972–1991, 1443 patients with hepatocellular carcinoma (HCC) were studied. Comparison between screening (n=522) and nonscreening (n=921) groups revealed higher small HCC percentage (49.4% vs. 12.4%), hi...

    Zhao-You Tang, Ye-Qin Yu, Bing-Hui Yang in Recent Advances in Management of Digestive… (1993)

  2. No Access

    Chapter and Conference Paper

    Numerical Analysis of Residual Stress due to Surface Induction Hardening

    A finite element method (FEM) was utilized here to analyse the distribution of residual stresses generated by surface induction hardening. The transformation induced plasticity (TRIP) and the latent heat were ...

    Dong-hui Xu, Zhen-Bang Kuang in Computational Mechanics ’95 (1995)

  3. No Access

    Chapter and Conference Paper

    Intelligent routing for global broadband satellite internet

    With the fast development of internet, the multicasting applications (such as Distant Learning) have become more and more important. Since multicasting multimedia information over the wired links might generat...

    Chao-Hsu Chang, Hsiao-kuang Wu, Ming-Hui ** in High-Performance Computing and Networking (1999)

  4. No Access

    Chapter and Conference Paper

    On the Spring Configurations of Ancient Chinese Locks

    The majority of ancient Chinese locks are key-operated bronze padlocks with splitting-springs. Chinese splitting-spring locks can be characterized based on the types, the materials, the engraving, the shapes, ...

    Hong-Sen Yan, Hsing-Hui Huang in International Symposium on History of Mach… (2000)

  5. No Access

    Chapter and Conference Paper

    Reducing the Location Query Cost Based on Behavior-Based Strategy

    In a location query process the most expensive procedure is maintaining the location information of mobiles. To reduce the expensive cost, we adopt the profile-based approach to design a behavior-based strateg...

    Ming-Hui **, Jorng-Tzong Horng, Hsiao-Kwang Wu in Database and Expert Systems Applications (2000)

  6. No Access

    Chapter and Conference Paper

    Phylogenetic k-Root and Steiner k-Root

    Given a graph G = (V,E) and a positive integer k, the Phylogenetic k-Root Problem asks for a (unrooted) tree T without degree-2 nodes such that its leaves are labeled by V and (u, v)E if and only if d ...

    Guo-Hui Lin, Paul E. Kearney, Tao Jiang in Algorithms and Computation (2000)

  7. No Access

    Chapter and Conference Paper

    A Signal Process Method for Detection of Micro-Channel Electrophoresis

    This paper presents a signal process method for detection of micro-channel electrophoresis. It was developed and optimized using a laser induced fluorescence (LIF) based detection system. In this detection sys...

    Ji-Feng Chen, Qing-Hui **, Jian-Long Zhao in Micro Total Analysis Systems 2001 (2001)

  8. No Access

    Chapter and Conference Paper

    The Effects of Triphenylethylene Antiestrogens on Parameters of Multistage Hepatocarcinogenesis in the Rat

    Carcinogenesis is a multi-stage (1,2), multi-step (3,4), and multi-pathway (5) process. Certain chemicals may modulate this process at any step in a genetic and/or epigenetic manner. In animals, the stages of ...

    Yvonne P. Dragan, Emile Nuwaysir, Linda Sargent, Dong-Hui Li in Hormonal Carcinogenesis III (2001)

  9. No Access

    Chapter and Conference Paper

    Automatic Information Extraction for Multiple Singular Web Pages

    The World Wide Web is now undeniably the richest and most dense source of information, yet its structure makes it difficult to make use of that information in a systematic way. This paper extends a pattern dis...

    Chia-Hui Chang, Shih-Chien Kuo, Kuo-Yu Hwang in Advances in Knowledge Discovery and Data M… (2002)

  10. No Access

    Chapter and Conference Paper

    Treecode Algorithms for Computing Nonbonded Particle Interactions

    Two new algorithms are described for computing nonbonded particle interactions in classical molecular systems, (1) a particle-cluster treecode for the real space Ewald sum in a system with periodic boundary co...

    Robert Krasny, Zhong-Hui Duan in Computational Methods for Macromolecules: … (2002)

  11. No Access

    Chapter and Conference Paper

    Fault Diagnosis of Air-conditioning System Using CMAC Neural Network Approach

    In this paper, a CMAC neural network application on fault diagnosis of a large air-conditioning system is proposed. This novel fault diagnosis system contains an input layer, binary coding layer, and fired up ...

    Chin-Pao Hung, Mang-Hui Wang in Advances in Soft Computing (2003)

  12. Chapter and Conference Paper

    The Secret and Beauty of Ancient Chinese Padlocks

    Most ancient Chinese padlocks are key-operated locks with splitting springs, and partially keyless letter-combination locks. They can be characterized based on the types of locks, the shapes of locks, the engr...

    Hong-Sen Yan, Hsing-Hui Huang in Advances in Cryptology - ASIACRYPT 2003 (2003)

  13. No Access

    Chapter and Conference Paper

    Visual Features Extracting & Selecting for Lipreading

    This paper has put forward a way to select and extract visual features effectively for lipreading. These features come from both lowlevel and high-level, those are compensatory each other. There are 41 dimensi...

    Hong-xun Yao, Wen Gao, Wei Shan, Ming-hui Xu in Audio- and Video-Based Biometric Person Au… (2003)

  14. No Access

    Chapter and Conference Paper

    Location Query Based on Moving Behaviors

    The importance of location prediction is rapidly increasing with the current trend of database applications in mobile computing environment. However, current personal communication services (PCS) could only pr...

    Ming-Hui **, Eric Hsiao-Kuang Wu in Database and Expert Systems Applications (2003)

  15. No Access

    Chapter and Conference Paper

    Functional and Molecular Imaging Using Positron Emission Tomography

    Positron emission tomography (PET) is a nuclear medicine imaging method in which radioisotopes are employed to label biochemical substrates for use as tracers to follow function and physiology inside living b...

    Chin-Tu Chen Ph.D., Malcolm Cooper Kao Chien-Min in Frontiers in Biomedical Engineering (2003)

  16. No Access

    Chapter and Conference Paper

    A Remote Technique Support System of Engineering Equipment

    According to the characteristics of engineering support, three kinds of wireless info-net model of remote technique support for equipment are built based on the Satellite Mobile Communication Technique (SMCT),...

    Huan-Liang Li, Qi Zhang, Cheng-**an Yang in Perspectives from Europe and Asia on Engin… (2004)

  17. No Access

    Chapter and Conference Paper

    A Gravity-Based Intrusion Detection Method

    It is an important issue for the security of network to detect new intrusions attack. We introduce the idea of the law of gravity to clustering analysis, and present a gravity-based clustering algorithm. At th...

    Sheng-Yi Jiang, Qing-Hua Li in Grid and Cooperative Computing - GCC 2004 Workshops (2004)

  18. No Access

    Chapter and Conference Paper

    A PRA Approach to Evaluate Post-Fire Safe Shutdown Capacity for Risk-Informed Fire Analysis in Taiwan

    A project sponsored by Taipower Company (TPC), called “Application of Risk-Informed Fire Analysis on Cable-Tray Wrap** for a BWR-4 in Taiwan”, was accomplished in January 2003. Meanwhile, another TPC sponsor...

    Ching-Hui Wu, Tsu-Jen Lin, Tsu-Mu Kao in Probabilistic Safety Assessment and Management (2004)

  19. No Access

    Chapter and Conference Paper

    Mining Maximal Frequent Itemsets for Intrusion Detection

    It has been the recent research focus and trend to apply data mining techniques in an intrusion detection system for discovering new types of attacks, but it is still in its infancy. This paper presents an inn...

    Hui Wang, Qing-Hua Li, Huanyu **ong in Grid and Cooperative Computing - GCC 2004 … (2004)

  20. No Access

    Chapter and Conference Paper

    A Study on Western and Chinese Locks Based on Encyclopedias and Dictionaries

    This work collects and integrates locks-related information and literatures in English encyclopedias and dictionaries to explore their meanings and mechanisms in different periods. First, we classify the basic...

    Hong-Sen Yan, Hsing-Hui Huang in International Symposium on History of Mach… (2004)

previous disabled Page of 23