-
641
A CASE REPORT: UNILATERAL COMPLETE CLEFT LIP RECONSTRUCTION USING THE MODIFICATION MILLARD TECHNIQUE
Published 2023-06-01Get full text
Article -
642
-
643
Cyanidin and Cyanidin-3-Glucoside Alleviate Peptic Ulcer Disease: Insights from in vitro, and in vivo Studies
Published 2025-02-01“…Deshanda Kurniawan Prayoga,1,* Diah Lia Aulifa,2,* Arif Budiman,3,* Jutti Levita,4,* Supat Jiranusornkul5,* 1Doctoral Program in Pharmacy, Faculty of Pharmacy, Padjadjaran University, Sumedang, West Java, Indonesia; 2Department of Pharmaceutical Analysis and Medicinal Chemistry, Faculty of Pharmacy, Padjadjaran University, Sumedang, Indonesia; 3Department of Pharmaceutics and Pharmaceutical Technology, Faculty of Pharmacy, Padjadjaran University, Sumedang, Indonesia; 4Department of Pharmacology and Clinical Pharmacy, Faculty of Pharmacy, Padjadjaran University, Sumedang, Indonesia; 5Department of Pharmaceutical Science, Faculty of Pharmacy, Chiang Mai University, Chiang Mai, Thailand*These authors contributed equally to this workCorrespondence: Jutti Levita, Department of Pharmacology and Clinical Pharmacy, Faculty of Pharmacy, Padjadjaran University, Sumedang, West Java, 46363, Indonesia, Tel +6222 84288888 Ext 3510, Email jutti.levita@unpad.ac.idAbstract: Peptic ulcer disease (PUD) remains a significant global health issue, affecting millions despite a decrease in overall prevalence. …”
Get full text
Article -
644
Research on dynamic array honeypot for collaborative network defense strategy
Published 2012-11-01“…Inspired by the ancient battle diagram for military purpose,a concept of dynamic array honeypot was proposed to bewilder the attackers by coordinating and changing the role pseudo-randomly as a huge dynamic puzzle.The dynamic array honeypot model was presented,system simulation through NS2 was performed,and the prototype implementation with Java was carried out.Detailed empirical studies were launched upon both the simulation model and the prototype.The simulation results demonstrates that the dynamic array honeypot system is feasible and effective for active network confrontation.…”
Get full text
Article -
645
Performance analysis of selected database management systems
Published 2024-09-01“…In order to conduct the tests, an application running in Java environment and using an ORM tool such as Hibernate for communication with the database was used. …”
Get full text
Article -
646
Detection of Pentastomida on Crab-Eating Frog (Fejervarya cancrivora) in Surabaya and Sidoarjo Areas
Published 2020-09-01“…The result of this research showed that there found Pentastomida on Crab-eating Frog collected Surabaya and Sidoarjo areas, East Java.…”
Get full text
Article -
647
Research based on the method of Android system active defense without Root permission
Published 2016-01-01“…In order to solve the problem that the system security is reduced through getting Root permission and that the security of Android smartphone is not effective without Root permission, the working principle of ART, the Java reflection mechanism and AOP principle were studied. …”
Get full text
Article -
648
An analysis of consumer behavior regarding green product purchases in Semarang, Indonesia: The use of SEM-PLS and the AIDA model
Published 2025-01-01“…Semarang, the capital of Central Java, is one of Indonesia’s top trash producers and requires more sustainable and effective waste management. …”
Get full text
Article -
649
Design and implementation of an intrusion-tolerant application server middleware
Published 2009-01-01“…An intrusion-tolerance middleware model based on the interceptor was proposed, with a component named intrusion-tolerance framework which logically divided the intrusion-tolerance functions into service providers and service management.The system analyses were designed by adapting intrusion tolerance security model and element technology, the theory of intrusion tolerance mechanism and the strategy of implementation were described, and the intrusion tolerance technology and implementation method was extracted.Finally, an intrusion-tolerance J2EE middleware was realized, built on JBoss-an open source J2EE application server platform, and was implemented through Java class load mechanism with the dynamic load of the intrusion-tolerance class.…”
Get full text
Article -
650
Software watermarking scheme with cloud computing constraints
Published 2016-09-01“…A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transform rules were embedded concurrently into these obfuscated codes.The recovery module was a recognizer to prove the watermarks when the original program was recovering.Experimental results,using Java decompliers,indicate that the code become ob-fuscated,is difficult to reverse engineering,thereby mabe the watermarks robust.…”
Get full text
Article -
651
TeiCoPhiLib: A Library of Components for the Domain of Collaborative Philology
Published 2015-09-01“…Finally, we present case studies in which some components of our library currently implemented in Java have been used.…”
Get full text
Article -
652
L’Estremo Oriente di Djemil Anik. Influssi e interpolazioni delle danze giavanesi nell’attività artistica e pedagogica
Published 2024-12-01“…Starting from the historical-critical analysis of the first solos, the paper depicts the strategies she implemented to address the cultural mutations linked to the sharpening of contemporary ethnographic consciousness, which include trips to Java for field research and a theoretical and pedagogical approach that aims at hybrid education.…”
Get full text
Article -
653
Accelerating cryptographic computation with parallel computing mechanisms in Android platform
Published 2019-02-01“…Aiming to accelerate cryptographic computation in Android platform,parallel computing method is adopted.Utilizing RenderScript framework in Android platform,big integer multiplication operation is implemented in parallel,which provides efficient and fast basic operations for cryptographic schemes such as elliptic curve.Storage structure and computing logic are designed and implemented for parallel computation of big integer multiplication.Integers are decomposed and handled as matrix elements,so that all additive and multiplicative operations can be performed simultaneously,which provides accelerated intermediate result for multiplication operations.Experiment results show that,compared to the original Java library for big integers in the Android platform,the proposed method has distinctive advantage in execution time.…”
Get full text
Article -
654
Early childhood parenting in the review of Islamic religious perspectives in Songgom Brebes
Published 2020-05-01“…Pertiwi Songgom village District Brebes of Central Java. The method used in this research is a qualitatively descriptive method. …”
Article -
655
WEB based system for analysing mathematics learning results of students
Published 2003-12-01“…The models and software were developed using statistical methods (descriptive statistics, analysis of variance, nonparametric tests and correlation analysis) and object programming technologies of webAF and webEIS for Java applets, as components of SAS AppDev Studio. …”
Get full text
Article -
656
-
657
-
658
-
659
-
660
Vitamin D Deficiency in Patients with Type 2 Diabetes Mellitus with and without Pulmonary Tuberculosis
Published 2024-11-01Get full text
Article