Results 21 to 30 of about 41 (41)

بهبود کارایی شبکه عصبی کانولووشنال با استفاده از تابع ضرر وزن‌دار افزایشی برای مقابله با نامتوازنی دسته‌ای [PDF]

open access: yesپدافند الکترونیکی و سایبری
باتوجه ‌به اینکه بیشتر مسائل دنیای واقعی از ﻗﺒﯿﻞ تشخیص تقلب، شناسایی خطا،  ﺗﺸﺨﯿﺺ ﻧﺎﻫﻨﺠﺎری، ﺗﺸﺨﯿﺺ ﭘﺰشکی و تشخیص بدافزار نامتوازن هستند، دسته­بندی داده­ﻫﺎ در مسائل ﻧﺎمتوازن ﺑﻪ ﻋﻨﻮان یکی از ﭼﺎﻟﺶ­ﻫﺎی اصلی در حوزة داده­ﮐﺎوی، ﻣﻮرد ﺗﻮﺟﻪ ﺑﺴﻴﺎری از ﻣﺤﻘﻘﺎن و ...
نسیبه محمودی   +3 more
doaj  

إدارة الانفاق والزكاة والوقف في البنك الصغير الإسلامي بكلية الشريعة جامعة إسلامية حكومية سونان أمبيل سورابايا

open access: yesEl-Qist: Journal of Islamic Economics and Business (JIEB), 2014
هذه المقالة كتبت عن عملية الإنفاق والزكاة والوقف في البنك الصغير الإسلامي. البنك الصغير الإسلامي هو معمل لتعليم وعملية البنك في كلية الشريعة جامعة إسلامية حكومية سونان أمبيل سورابايا.
openaire   +1 more source

Conceptualizing Security with the Approach of Sustainability and Resilience of the Organization [PDF]

open access: yes
Objective: This research adopts an approach that conceptualizes security and develops a comprehensive security model using knowledge representation technologies.
Hamidzadeh, Mehrdad   +3 more
core  

Detection of DDoS Attacks in SDN Switches with Deep Learning and Swarm Intelligence Approach [PDF]

open access: yes
This paper introduces an efficient intrusion detection system for the Internet of Things, addressing the challenge of malware-infected IoT nodes acting as botnet attackers, along with issues in existing intrusion detection systems such as feature ...
Mohammadreza Mollkhalili Maybodi   +1 more
core   +1 more source

اهمية الجوانب ÙÙ‰ تعليم الكتابة العربية

open access: yesJurnal Ilmiah Didaktika: Media Ilmiah Pendidikan dan Pengajaran, 2014
Arabic writing is the most difficult of language skills. There are many problems that will be faced by Arabic language learners in terms of writing special words form from right to the left. They must understand nahw and á¹£arf. A reader can not get a true information from the text if there is wrong writing.
openaire   +1 more source

A Distributed Denial-of-Service (DDoS) Attack Detection Approach in Fog Layer Based on Distributed Blockchain Database and Machine Learning [PDF]

open access: yes
DDoS attacks make network services unavailable to users by sending fake traffic by botnets. One of the methods to deal with DDoS attacks is to use machine learning, but these methods face challenges such as high volume of IoT traffic and data imbalance ...
Mohammadreza Mollahoseini Ardakani   +1 more
core   +1 more source

تحليل نصوص كتاب العصري في تعليم اللغة العربية للصف الثاني عشر بمدرسة المحمدية العالية

open access: yesEL-FUSHA: Jurnal Bahasa Arab dan Pendidikan
The study of Arabic textbooks is very important because the content contained in them can affect the learning process and students understanding. In analyzing Arabic textbooks, it is necessary to pay attention to the context of their use, learning objectives, and the compatibility between the material and the applicable curriculum. In addition, aspects
openaire   +1 more source

Home - About - Disclaimer - Privacy