Low Delay and Secure M2M Communication Mechanism for eHealthcare

Currently, the eHealthcare information management is the most critical and hot research topic. Especially with the involvement of new and promising telecommunication technologies like Machine to Machine (M2M) Communication. In M2M communication the devices interact and exchange information with each other in an autonomous manner to accomplish the required tasks. Mostly machine communicate to another machine wirelessly.

أهلاً بك في موقعي الشخصي..

Writing 122

This course is intended to help language learners produce well-organized essays on a diverse set of topics.

ملحقات المادة الدراسية

In-vitro inhibition of camel hepatic glutathione transferase

Abstract: Glutathione S-transferases (GST) are a group of multifunctional ubiquitous enzymes widely present in animals

and plants, which catalysis the conjugation of glutathione to different exogenous and endogenous electrophilic compounds.

This study was carried out to characterize the purified GST enzyme from camel liver tissues and to investigate the in-vitro

inhibitory effect of the flavonoid quercetin by measuring S-2,4-dinitrophenyl glutathione (DNP-GSH) formation from 1-

CSC 113 Computer Programming 2

Course Description:

This course continues the coverage of the fundamental concepts of Object Oriented Programming started in Programming I (CSC111). It covers more advanced concepts and topics such as relationships between classes, inheritance, polymorphism, abstract classes, error handling, interfaces, generics and data structures such as linked lists, stacks and queues, graphical user interface.

 

ملحقات المادة الدراسية

CSC 111 Computer Programming 1

Course Description:

This course aims at giving the students a broad foundation in the fundamental concepts of object-oriented programming. It presents in a very simple way the basic concepts and principles of the Object Oriented approach such as abstraction and encapsulation principles, classes, objects and the constructor concepts, information hiding principle and the accesses concept, methods, the message passing and the overloading principles. It also introduces the array data structure.

ملحقات المادة الدراسية

الصفحات

اشترك ب KSU Faculty آر.إس.إس