⌛عنوان دوره: «زبان برنامه نویسی R از مقدماتی تا پیشرفته؛ تحلیل حرفه ای داده با R» 🔜زمان برگزاری جلسه اول: شنبه، 17 آذر ساعت 19
🔸سرفصل جلسات: 💥هفته اول: مبانی R و نصب برنامه 💥هفته دوم: کنترل جریان برنامه، انواع شرط ها، حلقه و توابع 💥هفته سوم و چهارم: Basic Data Management 💥هفته پنجم و ششم: Basic Graph 💥 هفته هفتم و هشتم: Basic Statistics 💥هفته نهم و دهم: Regression 💥هفته یازدهم و دوازدهم: Basic Network Analysis in R
👤با حضور:
👤 دکتر علیمحمدی، مدرس جهاد دانشگاهی دانشگاه صنعتی شریف
⌛عنوان دوره: «زبان برنامه نویسی R از مقدماتی تا پیشرفته؛ تحلیل حرفه ای داده با R» 🔜زمان برگزاری جلسه اول: شنبه، 17 آذر ساعت 19
🔸سرفصل جلسات: 💥هفته اول: مبانی R و نصب برنامه 💥هفته دوم: کنترل جریان برنامه، انواع شرط ها، حلقه و توابع 💥هفته سوم و چهارم: Basic Data Management 💥هفته پنجم و ششم: Basic Graph 💥 هفته هفتم و هشتم: Basic Statistics 💥هفته نهم و دهم: Regression 💥هفته یازدهم و دوازدهم: Basic Network Analysis in R
👤با حضور:
👤 دکتر علیمحمدی، مدرس جهاد دانشگاهی دانشگاه صنعتی شریف
Telegram, which does little policing of its content, has also became a hub for Russian propaganda and misinformation. Many pro-Kremlin channels have become popular, alongside accounts of journalists and other independent observers. Friday’s performance was part of a larger shift. For the week, the Dow, S&P 500 and Nasdaq fell 2%, 2.9%, and 3.5%, respectively. "Like the bombing of the maternity ward in Mariupol," he said, "Even before it hits the news, you see the videos on the Telegram channels." Telegram has gained a reputation as the “secure” communications app in the post-Soviet states, but whenever you make choices about your digital security, it’s important to start by asking yourself, “What exactly am I securing? And who am I securing it from?” These questions should inform your decisions about whether you are using the right tool or platform for your digital security needs. Telegram is certainly not the most secure messaging app on the market right now. Its security model requires users to place a great deal of trust in Telegram’s ability to protect user data. For some users, this may be good enough for now. For others, it may be wiser to move to a different platform for certain kinds of high-risk communications. During the operations, Sebi officials seized various records and documents, including 34 mobile phones, six laptops, four desktops, four tablets, two hard drive disks and one pen drive from the custody of these persons.
from us