نتایج جستجو برای: tik tok
تعداد نتایج: 894 فیلتر نتایج به سال:
The concept of inverse problems is now a familiar one to most scientists and engineers, particularly in the field of imaging systems and computer vision. Inverse problems arise whenever we want to infer an unknown quantity f(r) which is not directly observable through a measurement system H which gives access to an observable quantity g(s). The mathematical equations linking these two quantitie...
How to cite this article: Karadeli E, Parlakgumus A, Tok S, Erbay G. Long Segment Intestinal Invagination in an Adult Case. Euroasian J Hepato-Gastroenterol 2017;7(1):99-100.
Tik Tok has been considered as an attention grabbing alternative social media platform for the millennial generation a way to convey and receive religious messages, especially Quranic messages. The use of TikTok new medium also given birth current trend learning Qur’an. This study attempts explain impact content on Tiktok Quran learning. In academic realm, this research seeks contribute discuss...
Desde el lanzamiento de Facebook, Instagram, Pinterest y posteriormente Tik Tok, por mencionar algunas las redes sociales más exitosas, la tendencia adoptar este tipo medios digitales que se ponen moda, genera una increíble atracción principalmente en generaciones jóvenes. Sin embargo, a nivel publicitario, ¿también son efectivas para marcas? O viendo otra cara moneda, los tradicionales offline...
Women Farmers Group (KWT) is a forum that provides opportunities for women to participate in advancing the agricultural sector. KWT D’Shafa as PKM activity partner Duren Sawit area of East Jakarta based on urban farming. Apart from this, also has business sector processing crops and catering. Problems with this include: minimum number members; management potential farming land not been utilized...
Purpose: This research is about the nuisances of social media application on a Wi-Fi network in university campus Ghana. The aim was to access security risk network, speed and data consumption those platforms network. Nmap Zenmap GUI 7.80 used scan various identify protocols, ports, services etc. enable accessing vulnerability Data users’ mobile devices collected analyzed.
 Methodology: An...
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack against ad hoc routing protocols that is particularly challenging to defend against. We show how an attacker can use the wormhole attack to cripple a range of ad hoc network routing protocols. In the wormhole attack, an attacker records ...
As autonomousagents’ interactions with humans become richer, we believe it will become increasingly important for some of the agents to have believable and engaging personalities. In previous papers we have described Tok, a broad agent architecture which integrates reactivity, goal-directed behavior, emotion and some memory and inference for agents in non-real-time worlds. In this paper we disc...
This observational study investigates and describes the oral health beliefs and illness behaviour in the Semai tribe of Orang Asli community. Data was obtained from a "Key informant interview" method i.e. the village Tok Halaq (Traditional healer). Information about common oral diseases and conditions were illustrated with enlarged pictures of dental caries, periodontal disease, oral cancer and...
[1] The distribution of snow and the energy flux components of snowmelt are intrinsic characteristics of the alpine water cycle controlling the location of source waters and the effect of climate on streamflow. Interannual variability of these characteristics is relevant to the effect of climate change on alpine hydrology. Our objective is to characterize the interannual variability in the spat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید