Search Results - (( programmes _ virtualization algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    Primary care provider’s barriers to effective management of apparently resistant hypertension in Malaysian public primary health care and strategies to overcome them: a qualitative... by Rafidah, Elias, Maila, Mustapha, Juslina, Omar, Kamarudin, Kana, Sabrina, Lukas, Imam Bux, Brohi, Yu, Yu Chun, Ooi, Chor Yau

    Published 2026
    “…Theme 4: Strategies to overcome barriers (Subthemes: engaging family members and caregivers, simplifying out-of-office BP monitoring, optimising clinic appointment scheduling and virtual consultations, establishing multidisciplinary team-based care, professional capacity building, standardising referral algorithms, enhancing patient education materials and programmes, strengthening continuity of care, and improving access to FDC antihypertensive medications). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Virtual screening for potential inhibitors of human hexokinase II for the development of anti-dengue therapeutics by Tanbin, Suriyea, Ahmad Fuad, Fazia Adyani, Abdul Hamid, Azzmer Azzar

    Published 2021
    “…Of these 300 compounds, 165 were chosen for further structure-based screening, based on their similarity scores, ADME analysis, the Lipinski’s Rule of Five, and virtual toxicity test results. The selected analogues were subsequently docked against each domain of the HKII structure (PDB ID: 2NZT) using AutoDock Vina programme. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Assessing the potential of laboratory instructional tool through Synthesia AI: a case study on student learning outcome / Jacqueline Joseph by Joseph, Jacqueline

    Published 2023
    “…With its advanced machine learning algorithms, Synthesia AI can generate photorealistic video content featuring virtual actors and presenters that can be programmed to speak in multiple languages, accents, and even emotional tones. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Controller placement problem in the optimization of 5G based SDN and NFV architecture by Ibrahim, Abeer Abdalla Zakaria

    Published 2021
    “…The selected control number is picked with a higher efficiency before the rescheduling is approximately 80 % for optimized controllers up to 90 % of resource management than other comparable algorithms in such a densified network. In addition, energy savings of up to 70% are achieved compared to the proposed Dijkstra-based energy-aware algorithms.…”
    Get full text
    Get full text
    Thesis
  8. 8