Zobrazeno 1 - 10
of 22
pro vyhledávání: '"李明昌"'
Publikováno v:
Zhongshan Daxue xuebao. Yixue kexue ban, Vol 28 (2007)
【目的】基因芯片技术建立颅内动脉瘤患者血液单核细胞基因表达谱,筛选与信号传导相关的基因表达情况。【方法】50例颅内动脉瘤患者外周血,10例正常成人作为对照组,分离血液单核细胞,
Externí odkaz:
https://doaj.org/article/e650ea7939b64d6e9e2de1b986a439bb
Autor:
Lee Ming Ching, 李明昌
103
This research aims to understand the needs of baby boomers for health information and how they seek related health information. The subjects are selected within Taipei City and New Taipei City,with age range from 50 to 68. This study used
This research aims to understand the needs of baby boomers for health information and how they seek related health information. The subjects are selected within Taipei City and New Taipei City,with age range from 50 to 68. This study used
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/9r9wd3
Autor:
Lee, Ming-Chang, 李明昌
103
Recently, several different types of distributed computation and storage systems, such as data grids, YouTube, and Hadoop YARN system, have been widely employed around the world to respectively resolve complex scientific computation and stor
Recently, several different types of distributed computation and storage systems, such as data grids, YouTube, and Hadoop YARN system, have been widely employed around the world to respectively resolve complex scientific computation and stor
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/99808945472329041277
Autor:
Ming-Chang Lee, 李明昌
99
Increased globalization, improved information technology, advanced production technology, and environmental claims are all important factors that have led to increased competition and led to firms being more focused on supply chain management
Increased globalization, improved information technology, advanced production technology, and environmental claims are all important factors that have led to increased competition and led to firms being more focused on supply chain management
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/78958215927464483823
Autor:
Ming-Chang Lee, 李明昌
97
The main purpose of this study is to investigate the relationships between returns of equity funds and those of bond funds by employing VAR model .The empirical results are as follows: 1.The exhibits negative relationship between the returns
The main purpose of this study is to investigate the relationships between returns of equity funds and those of bond funds by employing VAR model .The empirical results are as follows: 1.The exhibits negative relationship between the returns
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/57089598705168095574
Autor:
Ming-Chang Li, 李明昌
95
This study is based on the GAO restatement sample, which consists of 919 restatements of financial statements by listed corporations from the period between 1997 through June 30, 2002. This database has been employed by many studies to examin
This study is based on the GAO restatement sample, which consists of 919 restatements of financial statements by listed corporations from the period between 1997 through June 30, 2002. This database has been employed by many studies to examin
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/06991320505518302260
Autor:
Ming-Chang Li, 李明昌
94
The total amount controls is used to develop and use environmental sources under the acceptable capacity of environmental,and reduced the impacts and problem causing of unsuitable developments and uses.Meanwhile,total amount controls focuses
The total amount controls is used to develop and use environmental sources under the acceptable capacity of environmental,and reduced the impacts and problem causing of unsuitable developments and uses.Meanwhile,total amount controls focuses
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/53902292449699471978
Autor:
Ming-Chang Li, 李明昌
94
Nowadays, Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) are the most destructive network threats coming from Internet. Hackers, exploiting all kinds of malicious softwares to attack and usurp network hosts, servers and band
Nowadays, Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) are the most destructive network threats coming from Internet. Hackers, exploiting all kinds of malicious softwares to attack and usurp network hosts, servers and band
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/59593116931489604811
Autor:
Ming-Chang Lee, 李明昌
92
Excellent error correction capability and near Shannon limiting performance make turbo code to be the most important error correcting code recently. However, turbo decoder uses enormous calculations and iterations, which is difficult to be im
Excellent error correction capability and near Shannon limiting performance make turbo code to be the most important error correcting code recently. However, turbo decoder uses enormous calculations and iterations, which is difficult to be im
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/38443606247585605090