منابع مشابه
a new approach to credibility premium for zero-inflated poisson models for panel data
هدف اصلی از این تحقیق به دست آوردن و مقایسه حق بیمه باورمندی در مدل های شمارشی گزارش نشده برای داده های طولی می باشد. در این تحقیق حق بیمه های پبش گویی بر اساس توابع ضرر مربع خطا و نمایی محاسبه شده و با هم مقایسه می شود. تمایل به گرفتن پاداش و جایزه یکی از دلایل مهم برای گزارش ندادن تصادفات می باشد و افراد برای استفاده از تخفیف اغلب از گزارش تصادفات با هزینه پائین خودداری می کنند، در این تحقیق ...
15 صفحه اولUltra Low Power Data Aggregation for Request Oriented Sensor Networks
Request oriented sensor networks have stricter requirements than conventional event-driven or periodic report models. Therefore, in this paper we propose a minimum energy data aggregation (MEDA), which meets the requirements for request oriented sensor networks by exploiting a low power real-time scheduler, ondemand time synchronization, variable response frame structure, and adaptive retransmi...
متن کاملA Data Request Scheduling Policy for PCS Networks
20 request blocking probability and the expected waiting time of an accepted data request. Based on an analytic model, several results are observed: When the voice traac to a radio channel is less than 0.3 Erlang, the performance of LPER is not aaected by the voice traac, and the waiting times of the data requests can be ignored. Thus, a large number of voice channels should be shared with the ...
متن کامل“Available upon request”: not good enough for microbiome data!
Open data that is free and publicly available without restrictions is critical for progress in any scientific discipline and has been the cornerstone of sound and reproducible genomics research. Microbiome research is still a relatively young, thriving, active research field, with great biomedical potential. As a large data-driven research field, microbiome projects can include hundreds or even...
متن کاملTriangular fuzzy based classification of IP request to detect spoofing request in data network
In data nework data packets are normally forwarded from one router to another through networks until it gets to reach its destination node. According to the internet architecture routers in the internet do not perform any security verification of the source IP address contained in the IP packets. The lack of such a verification opens the door for variety of network security vulnerabilities like...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Geophysical Research
سال: 1912
ISSN: 0148-0227
DOI: 10.1029/te017i002p00103-02