This HTML5 document contains 68 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n35http://dbkwik.webdatacommons.org/resource/Ho7PwaaQlVHsbuQDzkf8ZQ==
n20http://dbkwik.webdatacommons.org/resource/6wyZYDMYF6lRlluRubATKA==
n10http://dbkwik.webdatacommons.org/resource/KURJWFg0dZ7QwqwIYHCRNA==
n60http://dbkwik.webdatacommons.org/resource/TO81LDa4xYQ9Tespr1TXYA==
n12http://dbkwik.webdatacommons.org/resource/gCTo-d_AoWA2CPOThCh1Hg==
n2http://dbkwik.webdatacommons.org/resource/GQ4sm9Zq_iBz2ubSAjADZQ==
n29http://dbkwik.webdatacommons.org/resource/vs_lPkhEPUqctojS7VUh-Q==
n47http://dbkwik.webdatacommons.org/resource/a6gZhNV8NtpTvydeLvLTHQ==
n9http://dbkwik.webdatacommons.org/resource/IvL90akWaKASh745IkkUtQ==
n27http://dbkwik.webdatacommons.org/resource/D5C5I94pf_DGJmq_2mUPbg==
n42http://dbkwik.webdatacommons.org/resource/kQXj4bOzGBdyBnKbn8Rf0g==
n19http://dbkwik.webdatacommons.org/resource/Cw3TVQbNR8qdU69YiaWQlA==
n7http://dbkwik.webdatacommons.org/resource/IWMocbOBF5COlF48mRy5lQ==
n3http://dbkwik.webdatacommons.org/resource/Lu2EPKk3IXDz-y9CixRR7g==
n37http://dbkwik.webdatacommons.org/resource/w3ViF2rTlGotSrvzWL0sIA==
n26http://dbkwik.webdatacommons.org/resource/LGwQtZ7sy-cmWIDsuO0y6Q==
n15http://dbkwik.webdatacommons.org/resource/r3sHqWaH2fWqIsHOFe1gYQ==
dctermshttp://purl.org/dc/terms/
n11http://dbkwik.webdatacommons.org/resource/kGPfVqM--zTmEAnRavJ58A==
n58http://dbkwik.webdatacommons.org/resource/eQI9Vd1d9rddMc1pxhW6FA==
rdfshttp://www.w3.org/2000/01/rdf-schema#
n31http://dbkwik.webdatacommons.org/resource/jS2ZdHnrNnS02Kg-jH_z4g==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n32http://dbkwik.webdatacommons.org/resource/E2s22phtOcTWNDm8am1kEQ==
n62http://dbkwik.webdatacommons.org/resource/7V0TDtOC9IAXr4FTigQelQ==
n4http://dbkwik.webdatacommons.org/resource/IE5VIzCjatvXcFx-rDfVFQ==
n17http://dbkwik.webdatacommons.org/resource/8eawYds-SuJgMeTLEsyMLg==
n54http://dbkwik.webdatacommons.org/resource/HkEsRXHvHDQibMt1Bjlw6w==
xsdhhttp://www.w3.org/2001/XMLSchema#
n61http://dbkwik.webdatacommons.org/resource/fenp1wRsgEHVOP_j15F5vg==
n16http://dbkwik.webdatacommons.org/resource/11KTi0y9pGoRs6NE9LTgaQ==
n44http://dbkwik.webdatacommons.org/resource/1waMO5VUUt5lNGmxVnJ2eQ==
n13http://dbkwik.webdatacommons.org/springtimeofyouth/property/
n21http://dbkwik.webdatacommons.org/resource/duLYLrt9VFJ4pKDYEHvzWA==
n14http://dbkwik.webdatacommons.org/resource/-Au8n0mbeQ-xH5jj0yDhmg==
n36http://dbkwik.webdatacommons.org/resource/jPESpcQ20R_VmJxOm_16KA==
n52http://dbkwik.webdatacommons.org/resource/HF50kVkLYvC5SS_UCHG4mw==
n57http://dbkwik.webdatacommons.org/resource/XIy34NYyf1QnZPUqtY1FbQ==
n49http://dbkwik.webdatacommons.org/roadtoninja/property/
n45http://dbkwik.webdatacommons.org/resource/-3wWPtkZquXf49B92XZlWw==
n48http://dbkwik.webdatacommons.org/resource/yGIK8jSlwHE6WTCFZ0mNmQ==
n38http://dbkwik.webdatacommons.org/resource/m0lUAmcxg48k1K6ilsOiZg==
n46http://dbkwik.webdatacommons.org/resource/Ex1mGbMxuwioYhVX0dMesA==
n25http://dbkwik.webdatacommons.org/resource/byLwaftcaxrVLj2L68uEHg==
n51http://dbkwik.webdatacommons.org/resource/iAZRHZTxPWsyPKx5riwxhg==
n8http://dbkwik.webdatacommons.org/resource/4cG2SMWaEgr8qvwvFglrPQ==
n63http://dbkwik.webdatacommons.org/resource/aACtUOSROLrh7Z5KC-cINw==
n39http://dbkwik.webdatacommons.org/resource/TNrhrL2Oz316-um4fBCYxg==
n18http://dbkwik.webdatacommons.org/resource/YV7f7GI7QVrEw13RbzFR2g==
n40http://dbkwik.webdatacommons.org/narutofanon/property/
n59http://dbkwik.webdatacommons.org/resource/RJ5l_-t13SWemzEW11eruw==
n33http://dbkwik.webdatacommons.org/resource/Wp7I5VbOp4by2-CqPyQkSg==
n5http://dbkwik.webdatacommons.org/ontology/
n53http://dbkwik.webdatacommons.org/resource/_3eP_-NKYSQdKLgTReei2g==
n50http://dbkwik.webdatacommons.org/resource/-CNZvpIyJGRaDuAtAcVGFw==
n28http://dbkwik.webdatacommons.org/naruto/property/
n34http://dbkwik.webdatacommons.org/resource/6aQ55M0NMZdCaU8cQFmilA==
n6http://dbkwik.webdatacommons.org/resource/f7TM7MAEu8z4wvePFGX1cw==
n24http://dbkwik.webdatacommons.org/resource/iDzI0qpetgiHN95tkRNyaw==
n43http://dbkwik.webdatacommons.org/resource/piCBns61SsvznQSFM371ag==
n30http://dbkwik.webdatacommons.org/resource/8ItqO3pw66KecdliY25Nuw==
n55http://dbkwik.webdatacommons.org/resource/aGNSkTPAveLLWJP1Z7l5QA==
n56http://dbkwik.webdatacommons.org/resource/CcH1d9YRiC6i6xFeyvXeIA==
n41http://dbkwik.webdatacommons.org/resource/Zl2i0hJqtNnOTsTDq2nDyg==
Subject Item
n32:
n8:
n4:
Subject Item
n11:
n8:
n4:
Subject Item
n44:
n3:
n4:
Subject Item
n9:
n3:
n4:
Subject Item
n53:
n3:
n4:
Subject Item
n45:
n3:
n4:
Subject Item
n46:
n3:
n4:
Subject Item
n6:
n7:
n4:
Subject Item
n4:
rdf:type
n47: n58:
rdfs:label
Harem Technique
rdfs:comment
This technique is considered to be an advanced variation of the Sexy Technique, which is combined with the Shadow Clone Technique. After creating a dozen or so clones, Naruto uses this technique to transform them all into the same beautiful, nude woman (or in a bathing suit, as in some anime episodes and video games). Naruto uses this technique when he either wants a better chance of his target falling victim, or when the Sexy Technique fails to fulfil its purpose. When Naruto used this technique in a failed attempt to seduce Killer B, Naruto created the clones already transformed into nude women, instead of transforming them after they were created. is a combined technique of the Shadow Clone Technique and Sexy Technique where the technique provokes the opponent with multiple clone of the user using the Sexy Technique.
n8:
n9: n34: n38: n43: n44: n53: n54: n48: n2: n45:
dcterms:subject
n24: n33:
n20:
No
n30:
Naruto: The Cross Roads
n56:
Harem Technique
n19:
A
n27:
Ninjutsu, Clone Techniques,
n52:
No
n35:
2
n10:
No
n3:
n11: Shadow Clone Technique, Sexy Technique, n32:
n60:
Ninja Harem
n57:
2
n18:
Harem Jutsu
n55:
Ram, Snake, Tiger, Ram
n25:
Supplementary
n21:
Naruto: Konoha Ninpōchō Naruto: Ninja Council
n12:
Anime, Manga, Game
n51:
No
n42:
n6:
n28:wikiPageUsesTemplate
n29:
n40:wikiPageUsesTemplate
n41:
n49:wikiPageUsesTemplate
n50:
n13:wikiPageUsesTemplate
n14: n31: n59:
n16:
n17: Naruto Uzumaki, Konohamaru Sarutobi~anime Menma Namikaze , Naruto Uzumaki, Konohamaru Sarutobi~anime, Kintaro Uchiha, Yui Uchiha Boruto Uzumaki~manga, Naruto Uzumaki, Konohamaru Sarutobi~anime
n39:
Hāremu no Jutsu
n62:
n63:
n61:
ハーレムの術
n36:
n37:
n5:abstract
This technique is considered to be an advanced variation of the Sexy Technique, which is combined with the Shadow Clone Technique. After creating a dozen or so clones, Naruto uses this technique to transform them all into the same beautiful, nude woman (or in a bathing suit, as in some anime episodes and video games). Naruto uses this technique when he either wants a better chance of his target falling victim, or when the Sexy Technique fails to fulfil its purpose. When Naruto used this technique in a failed attempt to seduce Killer B, Naruto created the clones already transformed into nude women, instead of transforming them after they were created. is a combined technique of the Shadow Clone Technique and Sexy Technique where the technique provokes the opponent with multiple clone of the user using the Sexy Technique.
Subject Item
n26:
n7:
n4:
Subject Item
n15:
n7:
n4:
Subject Item
n2:
n3:
n4:
Subject Item
n54:
n3:
n4:
Subject Item
n43:
n3:
n4:
Subject Item
n48:
n3:
n4: