Showing 641 - 660 results of 1,163 for search '"Java"', query time: 0.06s Refine Results
  1. 641
  2. 642
  3. 643

    Cyanidin and Cyanidin-3-Glucoside Alleviate Peptic Ulcer Disease: Insights from in vitro, and in vivo Studies by Prayoga DK, Aulifa DL, Budiman A, Levita J, Jiranusornkul S

    Published 2025-02-01
    “…Deshanda Kurniawan Prayoga,1,* Diah Lia Aulifa,2,* Arif Budiman,3,* Jutti Levita,4,* Supat Jiranusornkul5,* 1Doctoral Program in Pharmacy, Faculty of Pharmacy, Padjadjaran University, Sumedang, West Java, Indonesia; 2Department of Pharmaceutical Analysis and Medicinal Chemistry, Faculty of Pharmacy, Padjadjaran University, Sumedang, Indonesia; 3Department of Pharmaceutics and Pharmaceutical Technology, Faculty of Pharmacy, Padjadjaran University, Sumedang, Indonesia; 4Department of Pharmacology and Clinical Pharmacy, Faculty of Pharmacy, Padjadjaran University, Sumedang, Indonesia; 5Department of Pharmaceutical Science, Faculty of Pharmacy, Chiang Mai University, Chiang Mai, Thailand*These authors contributed equally to this workCorrespondence: Jutti Levita, Department of Pharmacology and Clinical Pharmacy, Faculty of Pharmacy, Padjadjaran University, Sumedang, West Java, 46363, Indonesia, Tel +6222 84288888 Ext 3510, Email jutti.levita@unpad.ac.idAbstract: Peptic ulcer disease (PUD) remains a significant global health issue, affecting millions despite a decrease in overall prevalence. …”
    Get full text
    Article
  4. 644

    Research on dynamic array honeypot for collaborative network defense strategy by Le-yi SHI, Jie LI, Xin LIU, Chun-fu JIA

    Published 2012-11-01
    “…Inspired by the ancient battle diagram for military purpose,a concept of dynamic array honeypot was proposed to bewilder the attackers by coordinating and changing the role pseudo-randomly as a huge dynamic puzzle.The dynamic array honeypot model was presented,system simulation through NS2 was performed,and the prototype implementation with Java was carried out.Detailed empirical studies were launched upon both the simulation model and the prototype.The simulation results demonstrates that the dynamic array honeypot system is feasible and effective for active network confrontation.…”
    Get full text
    Article
  5. 645

    Performance analysis of selected database management systems by Radosław Kowalczyk, Jakub Smołka

    Published 2024-09-01
    “…In order to conduct the tests, an application running in Java environment and using an ORM tool such as Hibernate for communication with the database was used. …”
    Get full text
    Article
  6. 646

    Detection of Pentastomida on Crab-Eating Frog (Fejervarya cancrivora) in Surabaya and Sidoarjo Areas by Gilang Maulana Putra, Emmanuel Djoko Poetranto, Fedik Abdul Rantam

    Published 2020-09-01
    “…The result of this research showed that there found Pentastomida on Crab-eating Frog collected Surabaya and Sidoarjo areas, East Java.…”
    Get full text
    Article
  7. 647

    Research based on the method of Android system active defense without Root permission by Jing-qiang LIU, Bin LI, Li-zhang CHEN, Bin CHEN

    Published 2016-01-01
    “…In order to solve the problem that the system security is reduced through getting Root permission and that the security of Android smartphone is not effective without Root permission, the working principle of ART, the Java reflection mechanism and AOP principle were studied. …”
    Get full text
    Article
  8. 648

    An analysis of consumer behavior regarding green product purchases in Semarang, Indonesia: The use of SEM-PLS and the AIDA model by Tampubolon Nobel K. T., Roessali Wiludjeng, Santoso Siswanto I.

    Published 2025-01-01
    “…Semarang, the capital of Central Java, is one of Indonesia’s top trash producers and requires more sustainable and effective waste management. …”
    Get full text
    Article
  9. 649

    Design and implementation of an intrusion-tolerant application server middleware by GUO Yuan-bo, LIU Wei, YUAN Shun, ZHOU Rui-peng

    Published 2009-01-01
    “…An intrusion-tolerance middleware model based on the interceptor was proposed, with a component named intrusion-tolerance framework which logically divided the intrusion-tolerance functions into service providers and service management.The system analyses were designed by adapting intrusion tolerance security model and element technology, the theory of intrusion tolerance mechanism and the strategy of implementation were described, and the intrusion tolerance technology and implementation method was extracted.Finally, an intrusion-tolerance J2EE middleware was realized, built on JBoss-an open source J2EE application server platform, and was implemented through Java class load mechanism with the dynamic load of the intrusion-tolerance class.…”
    Get full text
    Article
  10. 650

    Software watermarking scheme with cloud computing constraints by Guang SUN, Xiao-ping FAN, Wang-dong JIANG, Hang-jun ZHOU, Sheng-zong LIU, Chun-hong GONG, Jing ZHU

    Published 2016-09-01
    “…A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transform rules were embedded concurrently into these obfuscated codes.The recovery module was a recognizer to prove the watermarks when the original program was recovering.Experimental results,using Java decompliers,indicate that the code become ob-fuscated,is difficult to reverse engineering,thereby mabe the watermarks robust.…”
    Get full text
    Article
  11. 651

    TeiCoPhiLib: A Library of Components for the Domain of Collaborative Philology by Federico Boschetti, Angelo Mario Del Grosso

    Published 2015-09-01
    “…Finally, we present case studies in which some components of our library currently implemented in Java have been used.…”
    Get full text
    Article
  12. 652

    L’Estremo Oriente di Djemil Anik. Influssi e interpolazioni delle danze giavanesi nell’attività artistica e pedagogica by Fiorella Cardinale Ciccotti

    Published 2024-12-01
    “…Starting from the historical-critical analysis of the first solos, the paper depicts the strategies she implemented to address the cultural mutations linked to the sharpening of contemporary ethnographic consciousness, which include trips to Java for field research and a theoretical and pedagogical approach that aims at hybrid education.…”
    Get full text
    Article
  13. 653

    Accelerating cryptographic computation with parallel computing mechanisms in Android platform by Ning FANG, Weibing CAO, Donghe NI, Guandong DI

    Published 2019-02-01
    “…Aiming to accelerate cryptographic computation in Android platform,parallel computing method is adopted.Utilizing RenderScript framework in Android platform,big integer multiplication operation is implemented in parallel,which provides efficient and fast basic operations for cryptographic schemes such as elliptic curve.Storage structure and computing logic are designed and implemented for parallel computation of big integer multiplication.Integers are decomposed and handled as matrix elements,so that all additive and multiplicative operations can be performed simultaneously,which provides accelerated intermediate result for multiplication operations.Experiment results show that,compared to the original Java library for big integers in the Android platform,the proposed method has distinctive advantage in execution time.…”
    Get full text
    Article
  14. 654

    Early childhood parenting in the review of Islamic religious perspectives in Songgom Brebes by Dedi Romli Triputra

    Published 2020-05-01
    “…Pertiwi Songgom village District Brebes of Central Java. The method used in this research is a qualitatively descriptive method. …”
    Article
  15. 655

    WEB based system for analysing mathematics learning results of students by Vytautas Janilionis, Mindaugas Baltutis

    Published 2003-12-01
    “…The models and software were developed using statistical methods (descriptive statistics, analysis of variance, nonparametric tests and correlation analysis) and object programming technologies of webAF and webEIS for Java applets, as components of SAS AppDev Studio. …”
    Get full text
    Article
  16. 656
  17. 657
  18. 658
  19. 659
  20. 660