http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Chen, Ming-Ju,Chen, Kun-Nan,Lin, Chin-Wen Asian Australasian Association of Animal Productio 2003 Animal Bioscience Vol.16 No.6
Prebiotics (peptides, N-acetyglucoamine, fructo-oligosaccharides, isomalto-oligosaccharides and galactooligosaccharides) were added to skim milk in order to improve the growth rate of contained Lactobacillus acidophilus, Lactobacillus casei, Bifidobacterium longum and Bifidobacterium bifidum. The purpose of this research was to study the potential synergy between probiotics and prebiotics when present in milk, and to apply modern optimization techniques to obtain optimal design and performance for the growth rate of the probiotics using a response surface-modeling technique. To carry out response surface modeling, the regression method was performed on experimental results to build mathematical models. The models were then formulated as an objective function in an optimization problem that was consequently optimized using a genetic algorithm and sequential quadratic programming approach to obtain the maximum growth rate of the probiotics. The results showed that the quadratic models appeared to have the most accurate response surface fit. Both SQP and GA were able to identify the optimal combination of prebiotics to stimulate the growth of probiotics in milk. Comparing both methods, SQP appeared to be more efficient than GA at such a task.
Constructing a Conversation Key in Three-Party Communications Environment
Chin-Chen Chang,Yu-Wei Su,Chia-Yin Lee 보안공학연구지원센터 2008 International Journal of Multimedia and Ubiquitous Vol.3 No.1
This article proposes an efficient, less communication rounds, three-party encrypted key exchange protocol to achieve the authentication requirement. The protocol is provided with (1) no asymmetric encryption algorithm which is adopted to reduce the costs (such as any public-key infrastructure); (2) using pre-shared key to prevent adversaries that masquerade as legal users after guessing attacks; (3) avoiding the variant man-in-the-middle attacks on Diffie-Hellman based protocols; (4) achieving mutual authentication. With these four features, the proposed protocol is suitable for being applied for establishing secure channels between two clients, which are supported with the same trusted server.
A Comparison of Different Vocabulary Learning Strategy Use between EFL and CSL Learners
( Chin Min Lin ),( Chi Ta Wu ),( Li Chin Chen ) 전북대학교 인문학연구소 2014 건지인문학 Vol.12 No.-
This research aims to compare the similarity and difference in vocabulary strategy use between EFL and CSL learners. There were 217 subjects in Taiwan participated in this study. Vocabulary Learning Strategy Inventory was conducted to identify the strategies for both EFL and CSL learners used to learn English vocabulary or Chinese characters. SPSS is employed to analyze the data collected. The results showed that two of the strategies used by EFL and CSL learners are different and the other 16 strategies used are the same. The outcome revealed that vocabulary learning is similar across these two languages. Thus EFL and CSL teachers can facilitate learners to apply their first language vocabulary learning strategies and transfer those to second/foreign language learning. In the meantime, teachers ought to pay attention to the fundamental differences between the two languages to help learners to seize the vocabulary learning strategies based on the language features specifically.
Optimization of the Viability of Probiotics in a Fermented Milk Drink by the Response Surface Method
Chen, Ming-Ju,Chen, Kun-Nan,Lin, Chin-Wen Asian Australasian Association of Animal Productio 2004 Animal Bioscience Vol.17 No.5
Growth promoters were added to skim milk to retain the viability of Lactobacillus acidophilus and Bifidobacterium longum to help the product meet the "therapeutic minimum" at the time of consumption. The experiments were divided into two parts. The first part of the study used chicory inulin, isomalto-oligosaccharides and sucrose to investigate the effects of sugars on the activity of L. acidophilus and B. longum. The results indicated that the addition of isomalto-oligosaccharides stimulated growth of L. acidophilus and B. longum, resulting in a higher level of the probiotics after one month storage and yielded better $\beta$-galactosidase activity during fermentation. The second part studied the effects of three growth promoters on the viability of the probiotic cultures and the response surface method was employed to find the optimal ratio for addition of the growth promoters. The optimal ratio for added calcium gluconate, sodium gluconate and N-acetylglucosamine in fermented milk drinks were established. The response surface method proved to be a very effective way of optimizing the activity of probiotic cultures when developing a new fermented milk drink.
Chin-Sheng Chen,Si-Yu Lin 제어로봇시스템학회 2021 제어로봇시스템학회 국제학술대회 논문집 Vol.2021 No.10
The environmental conditions corresponding to dangerous or collided areas are generally represented by Costmap when the Autonomous Mobile Robot (AMR) is navigated. Here, this paper provides a Costmap 2D layer plugin, Velocity Obstacle layer, it can accurately detect obstacle’s coordination and radius and then estimate the obstacle’s velocity to create Velocity Obstacle which can represent the potential collision vector in the future. In the simulation, we assume the robot’s max velocity is 0.2m/s and an obstacle move forward to the robot with 0.3m/s. The results show the AMR can avoid the obstacle well. In experiment, the AMR also can avoid the people moving toward it in the real world.
Chin-Shan LU,Chen-Ning HSU,Chen-Han LEE 국제이네비해양경제학회 2016 International Journal of e-Navigation and Maritime Vol.4 No.1
This research aims to examine the effects of national culture and leadership style on safety performance in bulk shipping companies. Survey data collected from 322 respondents working in dry bulk carriers was used, a multiple regression analysis was conducted to analyze the influence of national culture and leadership styles (i.e. transformational, passive management, and contingent reward) on safety attitude and safety behavior. The results indicate that national culture dimensions such as power distance, uncertainty avoidance, collectivism, and long-term orientation had a positive influence on safety behaviour. Long-term orientation had a positive influence on safety attitude, whereas masculinity had a negative influence on safety attitude of seafarers. Specifically, this research found that transformational leadership had a positive influence on safety attitude and safety behaviour of seafarers. Moreover, practical implication from the research findings to improve ship safety in dry bulk shipping were discussed.
TiO₂ Nanotube Photocatalysts Decorated with Perovskite Quantum Dots for CO₂ Conversion
Chen-Chin Lee,Yun-Ju Liu,Hyeonseok Lee 한국고분자학회 2021 한국고분자학회 학술대회 연구논문 초록집 Vol.46 No.2
Nanostructured TiO₂ is considered as a promising photocatalyst for CO₂ conversion. However, even the nanostructured TiO₂ can not overcome its innate limitations such as its wide bandgap. In this work, we demonstrate the synthesis of perovskite quantum dots (PQDs) and its incorporation to TiO₂ nanotubes (TNTs) as light absorber. Two different PQDs based on CH₃NH₃PbBr₃ and CH3NH3PbI3 are prepared and decorated to TNT. The PQD-decorated TNTs are characterized, varying the PQD solution concentration. The PQD-decorated TNTs show the enhanced absorbance through all measured wavelengths and excellent charge tranfer properties. In particular, among the samples, the PQD/TNT photocatalysts prepared with 70-times diluted PQD solution produce the most improved photocurrents under CO₂-saturated electrolyte both for CH₃NH₃PbBr₃ QD/TNT (~50 μA) and CH₃NH₃PbI₃ QD/TNT (~70 μA), suggesting superior photocatalytic capability for CO₂ conversion.
An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards
Chin-Chen Chang,Hao-Chuan Tsai,Yi-Hui Chen 보안공학연구지원센터 2007 International Journal of Security and Its Applicat Vol.1 No.2
In 2003, Yang, Chang, and Hwang proposed an enhanced scheme of Peyravivan-Zunic’s password authentication scheme by using the Diffie-Hellman scheme. Later, Yoon, Ryu, and Yoo demonstrated that Yang-Chang-Hwang’s scheme is vulnerable to a stolen-verifier attack and a denial-of-service attack, and then proposed an improved scheme. In this paper, we show that Yoon-Ryu-Yoo’s scheme is still vulnerable to a stolen-verifier attack and a server spoofing attack under some reasonable assumption. In addition, we propose an improved scheme to eliminate such security flaws.