نتایج جستجو

244

نتیجه یافت شد

مرتبط ترین ها

اعمال فیلتر

به روزترین ها

اعمال فیلتر

پربازدید ترین ها

اعمال فیلتر

پر دانلودترین‌ها

اعمال فیلتر

پر استنادترین‌ها

اعمال فیلتر

تعداد صفحات

25

انتقال به صفحه



فیلترها/جستجو در نتایج    

فیلترها

سال

بانک‌ها



گروه تخصصی









متن کامل


مرکز اطلاعات علمی SID1
اطلاعات دوره: 
  • سال: 

    2021
  • دوره: 

    13
  • شماره: 

    3
  • صفحات: 

    31-38
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    184
  • دانلود: 

    192
چکیده: 

Recently, the interest in cybercrime and cybersecurity has increased dramatically both in terms of critical security issues and national economic information infrastructure and sensitive dealing policies, such as protection and data privacy. Moreover, the growing threat of cybersecurity has prompted the kingdom to pay more attention to its national cybersecurity strategy as the state embarks on a Vision 2030 plan, which aims to diversify the economy and create new jobs. Therefore, Any Computer system is always having security threats which are considered a big problem, and this includes application Codes as increasing demand. The paper aims to give detailed information about secure coding with python and present security guidelines and considerations in di erent disciplines. It focuses on giving an overview of the authentication methods used in the application (Code) and showing program security mistakes to introduce vulnerabilities (Ex. SQL Injection). We review the new user authentication techniques, making it easier for the manager to choose the appropriate techniques for his organization by understanding the way it works, its advantages, and disadvantages. The administrator can integrate these mechanisms in a manner that is appropriate for his security plan. This will be useful for programmers and users to keep their codes and applications more secure and viable for usage in sensitive environments.

آمار یکساله:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 184

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 192 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    2021
  • دوره: 

    9
  • شماره: 

    2
  • صفحات: 

    103-107
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    75
  • دانلود: 

    60
کلیدواژه: 
چکیده: 

This study reports an Ophidascaris sp. infection in the gastrointestinal tract of a python snake found at a construction site in Labone, a suburb of Accra and the capital city of Ghana. Examination of the rectal contents of the snake by the zinc sulfate centrifugal floatation method revealed helminths eggs. Besides, examining various sections of the alimentary canal revealed adult worms of the genus Ophidascaris in the anterior half of the small intestine just below the stomach's pyloric sphincter. Also, milking one of the female worms onto a microscope slide and examining the exudate by microscopy following staining with Lugol's iodine dye revealed eggs. Our findings may alert the possibility of zoonotic transmission of the parasite from pythons to humans, especially in the suburban/rural areas where people consume snake meat.

آمار یکساله:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 75

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 60 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    2024
  • دوره: 

    15
  • شماره: 

    2
  • صفحات: 

    707-730
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    0
  • دانلود: 

    0
چکیده: 

Drilling of exploratory boreholes is one of the most important and costly steps in mineral exploration, which can provide us with accurate and appropriate information to continue the mining process. There are limitations on drilling the target boreholes, such as high costs, topographical problems in installation of drilling rigs, restrictions caused by previous mining operation etc. The advances in artificial intelligence can help to solve these problems. In this research, we used python as one of the most pervasive and the most powerful programming languages in the field of data analysis and artificial intelligence. In this method mean shift algorithms have been used to cluster data, random forest to estimate clusters, and gradient boosting to estimate iron grade. Finally, in the studied area of Choghart in Central Iran, more than 91% accuracy was achieved in detection of ore blocks. Also, the results of the neural network indicate the mean square error (MSE) and mean absolute error (MAE) in the training data, respectively equal to 0.001 and 0.029,   in the test data is 0.002 and 0.03, and in the validation boreholes, we reached a maximum of 0.06 and 0.2.

آمار یکساله:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 0

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
نویسنده: 

NABINEJAD ABDOLREZA

اطلاعات دوره: 
  • سال: 

    2015
  • دوره: 

    16
تعامل: 
  • بازدید: 

    440
  • دانلود: 

    226
چکیده: 

BACKGROUND AND AIM: CURRENT REPORT GOES TO A MOUTH ROT (INFECTIOUS OR ULCERATIVE STOMATITIS) OF pythonS SNAKE WITH 742 CM LENGTH AND 75.5 KG WEIGHT, WHICH WAS A PROGRESSIVE BACTERIAL INFECTION INVOLVING THE ORAL LINING AND BEGAN WITH INCREASED SALIVATION, SALIVA BUBBLES FROM THE MOUTH. CLOSE INSPECTION OF THE ORAL LINING REVEALS TINY PINPOINT AREAS OF BLEEDING. THE ORAL LINING BECOMES INCREASINGLY INFLAMED AND PUS BEGINS TO ACCUMULATE WITHIN THE MOUTH, ESPECIALLY AMONG THE ROWS OF TEETH. AFTER 5 DAYS DISEASE PROGRESSED AND THE UNDERLYING BONE BECOMES INFECTED AND THE TEETH FALL OUT….

آمار یکساله:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 440

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 226
عنوان: 
نویسندگان: 

اطلاعات دوره: 
  • سال: 

    0
  • دوره: 

    10
  • شماره: 

    3
  • صفحات: 

    -
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    0
  • دانلود: 

    0
کلیدواژه: 
چکیده: 

آمار یکساله:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 0

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    2024
  • دوره: 

    58
  • شماره: 

    1
  • صفحات: 

    103-114
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    0
  • دانلود: 

    0
چکیده: 

The Adomian decomposition method (ADM) is a powerful mathematical technique to find closed-form solutions to nonlinear functional equations including ODEs, PDEs, differential-difference, integral, integro-differential, algebraic, and transcendental equations or systems of such equations. It features a particular infinite series for the representation of nonlinear terms of the equation under study, referred to as the Adomian polynomials. Nevertheless, the computation of such polynomials manually, devoid of any assistance from computational resources, can often be a laborious and protracted endeavor. In this paper, an innovative python code is proposed, which exploits the SymPy library to perform the involved symbolic calculus operations to generate the Adomian polynomials of any given nonlinear expressions. The use of the code would substantially facilitate the implementation of the ADM to the equations arising in various branches of science and engineering. A number of nonlinear expressions are decomposed to their relevant Adomian polynomials for the sake of demonstration.

آمار یکساله:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 0

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
اطلاعات دوره: 
  • سال: 

    1399
  • دوره: 

    10
  • شماره: 

    3
  • صفحات: 

    111-122
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    393
  • دانلود: 

    292
چکیده: 

مالتی پکتور پدیده ی ناخواسته ای است که در سیستم های رادیو فرکانسی تحت خلأ اتفاق می افتد. پیدا کردن روش مناسب برای کاهش یا از بین بردن مالتی پکتور، نکته ی کلیدی در طراحی ساختارهای میکروموجی است. از این رو دقت در پیش بینی آستانه ی مالتی پکتور ضروری است. در شبیه سازی این پدیده، مدل ضریب الکترون ثانوی در کد تجاریCST ساخته می شود. دقت در نتایج شبیه سازی مالتی پکتور به تغییرات مدل ضریب الکترون ثانوی بستگی دارد. از این رو در این مقاله، اثر تغییرات ضریب الکترون ثانوی در نتایج شبیه سازی مالتی پکتور محاسبه می شود. برای این منظور، روش چند جمله ای آشوب تعمیم یافته با استفاده از برنامه نویسی پایتون به کار گرفته می شود. این روش بر پایه ی بسط چند جمله ای های متعامد است. در اینجا مالتی پکتور در موجبر مستطیلی، کوپلر ورودی سی سر، مطالعه می شود.

آمار یکساله:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 393

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 292 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    1397
  • دوره: 

    8
  • شماره: 

    16
  • صفحات: 

    93-99
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    1035
  • دانلود: 

    813
چکیده: 

در فرایند سردسازی اپتومکانیکی کاواک، میدان اپتیکی لیزر محرک، میرایی اضافی را بر مد مکانیکی کاواک اعمال می کند و باعث برگشت آن به حالت پایه می شود. در این تحقیق، سردسازی کوانتومی یک کاواک اپتومکانیکی در تماس با یک منبع حرارتی، توسط جعبه ابزار کوانتوم برای پایتون "کیوتیپ" ، شبیه سازی شده است. نتایج شبیه سازی نشان می دهند که فرایند سردسازی کاواک، با افزایش یافتن ضریب واهلش مدهای اپتیکی و مکانیکی، به ترتیب دیرتر و زودتر اتفاق می افتد همچنین با افزایش یافتن ثابت جفت شدگی بین مدهای اپتیکی و مکانیکی کاواک، این فرایند در مدت زمان کوتاهتری انجام می شود. شبیه سازی همچنین نشان می دهد که با اضافه کردن یک کیوبیت به سامانه فرایند سردسازی کاواک نسبت به قبل، سریع تر صورت می گیرد.

آمار یکساله:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 1035

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 813 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

JAMSHIDI HAMID | GHANBARI ALI MOHAMMAD

اطلاعات دوره: 
  • سال: 

    2021
  • دوره: 

    6
  • شماره: 

    20
  • صفحات: 

    83-96
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    98
  • دانلود: 

    89
چکیده: 

The Black-Scholes model assumes that the price of the underlying asset follows a geometric Brownian motion. This assumption has two implications: first, log-returns over any horizon are normally distributed with constant volatility σ and the second, stock price evolution is continuous, therefore, there is no market gaps. These conditions are commonly violated in practice: empirical returns typically exhibit fatter tails than a normal distribution, volatility is not constant over time, and markets do sometimes gap. The existence of volatility skew will misprice options price. Derived from these flaws, a number of models have proposed. In this paper we will analyze, simulate and compare two most important models which have widespread using: jump diffusion model and stochastic volatility model. Each of the aforementioned models have programmed in MATLAB and python, then their results have been compared together in order to provide a robust understanding of each of them. Our results show that in comparison to Black-Scholes model these two models yield better performance.

آمار یکساله:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 98

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 89 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    2023
  • دوره: 

    4
  • شماره: 

    2
  • صفحات: 

    46-54
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    0
  • دانلود: 

    0
چکیده: 

In this article, an attempt has been made to model the process of double integration for different data spacing. The trapezoidal rule has been used to perform integration, whereas Newton's divided difference handles the inconsistent data points. The whole process of numerical integration has been automated in python programming language. The developed code is tested against two example problems, and the results obtained agree with the one shown in the literature.

آمار یکساله:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 0

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
litScript