نتایج جستجو برای: harmful and dependent users
تعداد نتایج: 16926104 فیلتر نتایج به سال:
Objective: This present research aimed to determine the effectiveness of hypnotherapy on psychological distress, functional disability, and death anxiety in heroin-dependent individuals. Method: The study was semi-experimental with a pre-test and post-test design with a control group. The statistical population of the current research included all heroin users referring to an addiction treatmen...
A mobile code application can be easily integrated by using existing software components, thus it is one of the promising ways to develop software efficiently. However, using a mobile code application sometimes follows harmful effects on valuable resources of users because malicious codes in such an application can be activated. Therefore, users of mobile code applications have to identify both...
A Tor network popularly known as an anonymous network provides a way to access internet services anonymously through a series of routers without revealing users identity. A user almost remains unknown in the public networks and makes use of various facilities of his interest. Networks such as “Tor (The Onion Router)”,”Crowds” and “I2P” gained popularity in the past several years, but success of...
boron nitride semiconducting zigzag swcnt, $b_{cb}$$n_{cn}$$c_{1-cb-cn}$, as a potential candidate for making nanoelectronic devices was examined. in contrast to the previous dft calculations, wherein just one boron and nitrogen doping configuration have been considered, here for the average over all possible configurations, density of states (dos) was calculated in terms of boron and nitrogen ...
In secure multiparty computation (SMC), a group of users jointly and securely computes a mathematical function on their private inputs, such that the privacy of their private inputs will be preserved. One of the widely used applications of SMC is the secure multiparty summation which securely computes the summation value of the users’ private inputs. In this paper, we consider a secure multipar...
Molluscicidal activity of different organic solvent extracts of latex of Euphorbia pulcherima and Euphorbia hirta (Family-Euphorbiaceae) against two freshwater harmful snails Lymnaea acuminata and Indoplanorbis exustus has been reported. Both the snails are the intermediate hosts of Fasciola hepatica and Fasciola gigantica, which cause endemic fascioliasis in cattle and livestock of Eastern par...
This document explains why mass unsolicited electronic mail messages are harmful in the Internetworking community. It gives a set of guidelines for dealing with unsolicited mail for users, for system administrators, news administrators, and mailing list managers. It also makes suggestions Internet Service Providers might follow.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید