Zobrazeno 1 - 10
of 29
pro vyhledávání: '"Chi-hsiang Hung"'
Autor:
Yi-Chen Chen, Hsuan-Yun Wang, Futoshi Ogita, Chi-Hsiang Hung, Chia-Hua Kuo, Jie-Ping Wang, Chia-Min Wang, Chien-Wen Hou, Ting-Yao Wang
Publikováno v:
Journal of the International Society of Sports Nutrition, Vol 21, Iss 1 (2024)
Introduction High-intensity interval training (HIIT) has been shown to improve chronic diseases. Probiotics have been found to have similar effects. However, the additive effects of HIIT in combination with probiotics supplementation are unclear. The
Externí odkaz:
https://doaj.org/article/f2bcf70100f543a4a11c8d77da95ac6e
Publikováno v:
IEEE Access, Vol 12, Pp 183089-183102 (2024)
Microbursts pose a significant challenge in 5G networks, leading to packet drops and high latency that impact user experience. Existing mitigation systems often suffer from transmission delays, high packet drop rates, and potential failure due to imp
Externí odkaz:
https://doaj.org/article/f321c883db8e40698ff72cdbf53aad87
Publikováno v:
IEEE Access, Vol 10, Pp 2446-2456 (2022)
Microbursts in the datacenter network (DCN) last for an extremely short time in switches and are difficult to discover from a coarse-grained perspective. Most prior works are dedicated to in-network detection of microbursts and have not yet attempted
Externí odkaz:
https://doaj.org/article/ce18b1f6adb340fbb582e873043aea6c
Autor:
Jie-Ping Wang, Chen-Chan Wei, Yun-Dong Peng, Hsuan-Yun Wang, Chi-Hsiang Hung, Yin-Hui Hong, Yuh-Feng Liou, Chien-Wen Hou
Publikováno v:
Frontiers in Physiology, Vol 13 (2022)
Caffeinated energy drinks are commonly taken to improve exercise performance, but there are few studies on the influence of different doses on an athlete’s performance. We conducted a double-blind, randomized, counter-balanced, and crossover resear
Externí odkaz:
https://doaj.org/article/685ae1d49a9647f0bfab6bd897130d16
Autor:
Chi-Hsiang Hung, 洪吉祥
101
As the rapid progress in network technology, people can communicate efficiently and easily via internet. However, there are various malicious activities to sabotage the network usage. That makes people to concern seriously about the network
As the rapid progress in network technology, people can communicate efficiently and easily via internet. However, there are various malicious activities to sabotage the network usage. That makes people to concern seriously about the network
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/33449252495513890375
Autor:
Chi-Hsiang Hung, 洪啟翔
101
In this study, the electric motorcycles produced by the commercially available depot in nearly three years are studied with young consumers’ cognition and preference to the image. Experiment with Taguchi method, by using the concept of the
In this study, the electric motorcycles produced by the commercially available depot in nearly three years are studied with young consumers’ cognition and preference to the image. Experiment with Taguchi method, by using the concept of the
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/55393497526148989706
Autor:
Chi-hsiang Hung, 洪頎祥
101
In this study, a new process method has been developed to prepare a low-temperature sintering titanium dioxide paste to make photoelectrodes for the application of dye sensitized solar cells (DSSCs). Herein, the definition of “low-temperat
In this study, a new process method has been developed to prepare a low-temperature sintering titanium dioxide paste to make photoelectrodes for the application of dye sensitized solar cells (DSSCs). Herein, the definition of “low-temperat
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/k5p96d
Autor:
Chi-Hsiang Hung, 洪啟翔
100
Implantation and placentation are critical precesses in pregnancy. During implantation, trophoblast increases the ability of migration and invasion to invade deeply enough into the endometrium in order to secure the embryo. Previous studies
Implantation and placentation are critical precesses in pregnancy. During implantation, trophoblast increases the ability of migration and invasion to invade deeply enough into the endometrium in order to secure the embryo. Previous studies
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/81075710184041786246
Autor:
Chi-Hsiang Hung, 洪吉祥
94
We propose an off-line roaming authentication protocol which not only the server in a foreign network authenticates any roaming user without the involvement of the home network, but also the anonymity of the user is preserved. That is, the us
We propose an off-line roaming authentication protocol which not only the server in a foreign network authenticates any roaming user without the involvement of the home network, but also the anonymity of the user is preserved. That is, the us
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/15942391570703243715