Search Results - (( java application customization algorithm ) OR ( based cell implication algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  2. 2

    MicroRNA regulation of human choline kinase gene expression by Ling, Few Ling

    Published 2019
    “…MiRNAs binding was predicted by several online computer programs that utilize different algorithms. Potential miRNAs were selected for the synthesis of their mimics and transfected into cancer cell lines. …”
    Get full text
    Get full text
    Article
  3. 3

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Characterization of miR-3099-mediated posttranscriptional of target genes regulation during neurogenesis in mice by Zainal Abidin, Shahidee

    Published 2019
    “…The expression of miR-3099 was further restricted to the cortical plate of the developing mouse brain between E13.5 and E17.5, coinciding with the time that the majority of the cells are committed to neuronal cell lineage. Moreover, the miR-3099 was also found to be highly expressed in differentiating P19 cell (2-fold upregulation) when comparing to the proliferating P19 cell. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Expression and association of miR-181a and miR-663 and their target genes in head and neck cancer by Masood, Yaghma

    Published 2018
    “…Two algorithms, TarBase and miRTarBase, were used to identify the validated targets of hsa-miR-181a-5p (a mature product of hsa-miR-181a) and hsa-miR-663. …”
    Get full text
    Get full text
    Thesis
  6. 6