نتایج جستجو برای: after receiving this alerting message
تعداد نتایج: 6974929 فیلتر نتایج به سال:
background & aim :lack of adherence to prescribed medication is a main concern in medicine especially in chronic diseases. the aim of present study was to determine the effect of supportive text message on the adherence to treatment of depression. methods & materials : this quasi-experimental study was conducted on sixty eligible patients with diagnosis of depression who referred to a psychiatr...
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as refer...
The navigation of axons to their final destination can involve a sequence of steps that require different sets of guidance receptors. In this issue, Colak et al. show that regulated intra-axonal protein synthesis coupled to nonsense-mediated mRNA decay (NMD) controls a switch in Robo3.2 expression that is critical for navigation.
The WWW increasingly allows people to create and update content for public access. Some of this information is collaboratively owned (created and maintained), while other information is privately owned and maintained (but still publicly accessible). Whereas it is unethical to modify the former for covert communication, it is quite legitimate to do so with the latter, and this paper gives a desi...
Cyberbullying statistics are shocking, the number of affected young people is increasing dramatically with the affordability of mobile technology devices combined with a growing number of social networks. This paper proposes a framework to analyse Tweets with the goal to identify cyberharassment in social networks as an important step to protect people from cyberbullying. The proposed framework...
The WWW increasingly allows people to create and update content for public access. Some of this information is collaboratively owned (created and maintained), while other information is privately owned and maintained (but still publicly accessible). Whereas it is unethical to modify the former for covert communication, it is quite legitimate to do so with the latter, and this paper gives a desi...
Despite the fact that many IoT devices are publicly accessible to everyone on network, understanding security risks and threats posed by cyber attacks is critical; as a result, it should be safeguarded. Plain text constructed into encrypted text, before being delivered using cryptography, then reconstructed back plain after receiving response from recipient. The steganography technique can used...
in this work, a novel and fast method for direct analysis of volatile compounds (davc) of medicinal plants has been developed by holding a filament from different parts of a plant in the gc injection port. the extraction and analysis of volatile components of a small amount of plant were carried out in one-step without any sample preparation. after optimization of temperature, extraction time a...
In this paper, we introduce a model of communication in hierarchies which is driven by the cost of being interrupted when receiving a message, rather than the usual bandwidth constraints. We show that in a queueing model with a simple hierarchy, the ability to schedule periodic message transmissions in the absence of global information makes the performance of the model close to optimal.
The previous communication-induced checkpointing may considerably induce worthless forced checkpoints because each process receiving messages cannot obtain sufficient information related to non-causal Z-paths. This paper presents an enhanced sender-based message logging protocol applicable any lead a high decrease of the overhead in effective way while permitting no useless checkpoint. allows s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید