نتایج جستجو برای: tik tok
تعداد نتایج: 894 فیلتر نتایج به سال:
Ditinjau dari pelatihan menunjukan bahwa peserta didik SD NEGERI 2 SENGON terbilang sudah menguasai dasar computer adapun yang belum mengerti computer. Tujuan ini adalah meningkatkan pengetahuan sekolah dalam bidang TIK. Pelatihan dilakukan menarik perhatian dan pada saat antusias mendapatkan tantangan baru. Subjek TIK ditujukan kepada berjumlah keseluruhan 103 anak. Adapun metode digunakan mer...
In the era of globalization, education has an important role for a nation and state in face advances science technology. One effort that can be done is to integrate information communication technology-based learning. This study aims determine improvement learning outcomes by applying ICT-Based Discovery Inquiry model. The research method used qualitative description collecting literature data,...
Researchers studying autonomous agents are increasingly examining the problem of integrating multiple capabilities into single agents. The Oz project is developing technology for dramatic, interactive, simulated worlds. One requirement of such worlds is the presence of broad, though perhaps shallow, agents. To support our needs, we are developing an agent architecture, called Tok, that displays...
Die eemautische Syntax der Kommunikativen Grammatik auf EDV-ARla~en ZtueVeret~uduis der folgenden Darstelluugeu sei die Uater-scheiduug einer auBersprachlich orientierten Sema, tik yon eiaer innersprachlichen Semantik vorausgeschicktp ohne da~ der allge~eiue Problemkreis der Semaut~k er~rtert wird. AuBereprachlieh orieutierte Semautik $ubstituiert man in dem Satz: "Der J~ger fUttert den Hund" f...
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. In the wo...
Many real-time applications are designed to work in different operating modes each characterized by different functionality and resource demands. With each mode change, resource demands of applications change, and static resource reservations may not be feasible anymore. Dynamic environments where applications may be added and removed online also need to adapt their resource reservations. In su...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید