http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
A comparative study of academic dishonesty among university students in Mainland China and Taiwan
Shu Ching Yang,Feng Kuang Chiang,Chiao Ling Huang 서울대학교 교육연구소 2017 Asia Pacific Education Review Vol.18 No.3
The purpose of this study was to compare the academic dishonesty (AD) experience of students from Mainland China and Taiwan. Specifically, we investigated students’ current self-reported personal AD, their perception of peers’ AD, the climate of academic integrity and their awareness of AD’s seriousness. Furthermore, we sought to explore the relationship between AD behavior and several variables. In total, 605 students from Mainland China (n = 368) and Taiwan (n = 237) were recruited to participate in the study. All the participants perceived that they were less involved in AD than their peers, and students from both areas ranked the gravity of AD offenses similarly. However, Chinese students generally reported higher rates of improper credit attribution, fraudulence, and falsification than their Taiwanese counterparts. Finally, two regression models revealed gender, perception of peer AD, and awareness of AD’s seriousness were significant variables in terms of predicting self-reported personal AD, and there existed interactions between the students’ perception of peer AD and gender. Witnessing peers’ misconduct influenced males more than females in terms of engaging in AD for both Mainland Chinese and Taiwanese students.
Reaching Byzantine Agreement underlying VANET
( Shu-ching Wang ),( Ya-jung Lin ),( Kuo-qin Yan ) 한국인터넷정보학회 2019 KSII Transactions on Internet and Information Syst Vol.13 No.7
The Internet of Things (IoT) enables machines and devices in a global network to connect and provide applications. The Vehicular Ad-hoc NETwork (VANET) allows vehicles in the network to communicate with each other as an application of the IoT. The safety and comfort of passengers can be improved through VANET related applications. In order to be able to provide related applications, there must be a reliable VANET topology. As a result of the Byzantine agreement (BA), fault tolerance can be solved in VANET. In order to improve the reliability of the system, even if some components in the system are damaged, a protocol is needed to assist the system to perform normally. Therefore, the BA problem in VANET with multiple impairments is revisited in this research. The proposed protocol allows all normal processing elements (PEs) to reach agreement using the least amount of information exchange. Moreover, the proposed protocol can tolerate the largest number of damaged PEs in VANET.
Shu-Tong Chang,Shu-Hui Liao,Wei-Ching Wang,Chung-Yi Lin,Jun-Wei Fan 한국물리학회 2008 THE JOURNAL OF THE KOREAN PHYSICAL SOCIETY Vol.53 No.2
The physical mechanisms of electron mobility and balistic drain curent enhancement by stress are investigated. From modified higher-order k·p band calculations, the stress-induced split of the conduction band edge and the effective mass change are quantitatively evaluated. It was experimentaly and theoreticaly demonstrated that the energy surface of 2-fold valeys in Si NMOSFETs on a (001) wafers is especially warped due to a uniaxial [110] stress, resulting in a lighter transverse effective mass of the 2-fold valleys parallel to the stress. The physical reasons for the warped subband structure and the abnormal mobility enhancement caused by the uniaxial stres are investigated. The rates of variation of the experimental electron mobility in NMOSFETs on wafers with (01) orientations undera <110> uniaxial stress as a function of the channel direction is theoretically studied. The limits of electron mobility enhancement and the effectiveness of stress enginering in enhancing the balistic drain current of NMOSFETs are also discussed.
The Influence of Resilience on the Coping Strategies in Patients with Primary Brain Tumors
Shu-Yuan Liang,Hui-Chun Liu,Yu-Ying Lu,Shu-Fang Wu,Ching-Hui Chien,Shiow-Luan Tsay 한국간호과학회 2020 Asian Nursing Research Vol.14 No.1
Purpose: The purpose of this study was to assess the amount of variance in the coping strategies of patients with brain tumors that could be accounted for by resilience. Methods: This cross-sectional survey involved 95 patients who had experienced surgical, chemotherapy, or radiotherapy therapies for their brain tumors at least 1 month before data collection. The investigator collected data using the scales of the Ways of Coping Checklist-Revised and Resilience Scale. Data were analyzed using descriptive statistics, t tests, analysis of variance, Pearson product–moment correlation, and hierarchical multiple regression. Results: The results revealed that resilience was significantly positively associated with patients' problem-focused coping (r = .65, p < .001) and total coping (r = .49, p < .001). In addition, resilience accounted for 27% (R2inc = .27, p < .001) and 16% (R2inc = .16, p < .001) of the distinct variances in predicting patients’ problem-focused coping and total coping. Conclusion: The current results provide evidence to support the importance of resilience in shaping the coping strategies of relevant patients. As resilience shows a crucial element in patient coping with brain tumors, health team members should develop and employ appropriate strategies to improve the resilience of patients with brain tumors.
Depression and Predictors in Taiwanese Survivors with Oral Cancer
Chen, Shu-Ching,Huang, Bing-Shen,Lin, Chien-Yu Asian Pacific Journal of Cancer Prevention 2013 Asian Pacific journal of cancer prevention Vol.14 No.8
Background: Depression is a comorbid disabling problem and potentially affects patient likelihood of survival. The aims of this study were to recognize the characteristics of depression and investigate associated predictor factors in patients with oral cancers. Methods: A cross-sectional and correlational design was used to collect data for this study conducted in northern Taiwan. A set of questionnaires was used to measure depression, symptom distress, performance status, social support, and demographic and disease-related information. Logistic regression was conducted to determine important factors predicting depression. Results: A total of 132 oral cancer patients participated in this study. Of these, 18.2% were identified as depression cases. The patient average performance status score was 90 or higher. Patients reported mild-to-moderate levels of symptom distress. The majority of social support was from families. Religious belief, alcohol use, symptom distress, and social support from family were found to be important factors predicting depression. Patients with religious belief with alcohol use reported greater symptom distress, and those with lower levels of social support from families were significantly more likely to develop depression. Conclusions: Clinicians should assess patient emotional status and manage symptoms in a timely manner to enhance coping abilities. Supportive care provides assurance during the acute survivor phase.
Po-Ching Kao,Shu-I Lin,Chin-Chih Chang,Ching-Wen Huang,Chien-Chi Liu 한국물리학회 2012 THE JOURNAL OF THE KOREAN PHYSICAL SOCIETY Vol.60 No.10
A cathode buffer layer of lithium hydroxide (LiOH) was used to improve the electro-optical properties of organic light-emitting diodes (OLEDs). LiOH layers with various thicknesses were prepared by thermally evaporating LiOH powders. When a 1-nm-thick LiOH layer was inserted between the aluminum (Al) cathodes and the tris(8-hydroxyquinolinato)aluminum (Alq3) electrontransporting layers, device properties such as the turn-on voltage, the maximum luminance, and the device efficiency were improved, becoming better than those of the device with a LiF buffer layer. The surface of the Alq3 film became smoother after the LiOH layer had been deposited. Ultraviolet photoelectron spectroscopy results show that the reaction between LiOH and Alq3 results in an n-type doping effect, which moves the Fermi level close to the lowest unoccupied molecular orbital (LUMO) of Alq3. Thus, the electron-injection efficiency was enhanced due to a lower electron injection barrier, which improved the charge carrier balance in the OLEDs and led to a better device efficiency.
Shu Zhang,Man Ching Esther Chan,David Clarke,Yiming Cao 대한수학교육학회 2021 수학교육학연구 Vol.31 No.3
In this paper we report on a case study involving four Chinese students; the aim of the study was to develop a conceptual framework for investigating student participation in a collaborative task in mathematics. Building on previous research on student participation, we defined student participation in a collaborative task in mathematics as the process of taking part in student interactions and task completions. A video recording and transcript of students involved with collaborative task in mathematics were analyzed. Four categories (initiation, response, evaluation, and non-interactive) were created for analyzing the students’ interactions. The four students showed different approaches to communicating with other group members. The content of the group’s discussion was examined in terms of the negotiation process. By looking at the content of the group’s discussion, the process how the group work on the task could be revealed. We identified that students showed involvement in the group discussion by proposing and revisiting topics. It was found that through forming an interactive pair, students might be able to take up the leading role in working on the task and controlling the conversation of the group.
An Imperceptible Watermarking Scheme Using Variation and Modular Operations
Ching-Sheng Hsu,Shu-Fen Tu 보안공학연구지원센터 2008 International Journal of Hybrid Information Techno Vol.1 No.4
The aim of this paper is to propose an imperceptible wavelet-based watermarking scheme. In our scheme, we use variation to define the degree of transparence of coefficients of LL band and further determine transparent coefficients of HL3 and LH3 bands. Then, the watermark is embedded into those coefficients. In addition, the modular operation is utilized during watermark embedding. In the experimental results, we simulate some common attacks on the watermarked image. It is shown that our scheme is robust against most attacks; moreover, the watermarked image is highly imperceptible.