A note on necessary best estimator of order two

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A note on the order graph of a group

 The order graph of a group $G$, denoted by $Gamma^*(G)$, is a graph whose vertices are subgroups of $G$ and two distinct vertices $H$ and $K$ are adjacent if and only if $|H|big{|}|K|$ or $|K|big{|}|H|$. In this paper, we study the connectivity and diameter of this  graph. Also we give a relation between the order graph and prime  graph of a group.

متن کامل

A Note on the Smooth Estimator of the Quantile Function with Left-Truncated Data

This note focuses on estimating the quantile function based on the kernel smooth estimator under a truncated dependent model. The Bahadurtype representation of the kernel smooth estimator is established, and from the Bahadur representation it can be seen that this estimator is strongly consistent.

متن کامل

A Note on Order

contains a second-order generalization, in addition to the first-order generalization. What the standard notation for generalization is designed to do, and indeed excels at, is displaying propositional structure. It graphically represents how the force, scope and order components interact to make up propositions expressing generalization, and it allows us to typify these propositions in a compl...

متن کامل

a note on the order graph of a group

the order graph of a group $g$, denoted by $gamma^*(g)$, is a graph whose vertices are subgroups of $g$ and two distinct vertices $h$ and $k$ are adjacent if and only if $|h|big{|}|k|$ or $|k|big{|}|h|$. in this paper, we study the connectivity and diameter of this  graph. also we give a relation between the order graph and prime  graph of a group.

متن کامل

A note on the security of two improved RFID protocols

Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Metrika

سال: 1984

ISSN: 0026-1335,1435-926X

DOI: 10.1007/bf01915176