Statistical corruption in Beijing's air quality data has likely ended in 2012
نویسندگان
چکیده
منابع مشابه
Statistical Evidences in Type-II Censored Data
In this article, we use a measure of expected true evidence for determine the required sample size in type-II censored experiments for obtaining statistical evidence in favor of one hypothesis about the exponential mean against another.
متن کاملAir quality and acute deaths in California, 2000-2012.
Many studies have shown an association between air quality and acute deaths, and such associations are widely interpreted as causal. Several factors call causation and even association into question, for example multiple testing and multiple modeling, publication bias and confirmation bias. Many published studies are difficult or impossible to reproduce because of lack of access to confidential...
متن کاملpattern recognition in maintenance data using methodologies data minitng (cade study isfahan regional power electric company)
فعالیت های نگهداری و تعمیرات اطلاعاتی را تولید می کند که می تواند در تعیین زمان های بیکاری و ارایه یک برنامه زمان بندی شده یا تعیین هشدارهای خرابی به پرسنل نگهداری و تعمیرات کمک کند. وقتی که مقدار داده های تولید شده زیاد باشند، فهم بین متغیرها بسیار مشکل می شوند. این پایان نامه به کاربردی از داده کاوی برای کاوش پایگاه های داده چندبعدی در حوزه نگهداری و تعمیرات، برای پیدا کردن خرابی هایی که موجب...
15 صفحه اولStatistical Analysis of Corruption Data and Using the Internet to Reduce Corruption
Corruption is a serious problem in Asia and elsewhere. Harrison and Vinod's (1992) confidence interval for the marginal excess burden (MEB) of taxation is used to estimates the economic harm arising from corruption. One dollar of corruption is estimated to impose a burden of $1.67, which becomes very large when compounded over time. After a brief review of economic theory, this paper uses data ...
متن کاملPassive Corruption in Statistical Multi-Party Computation
The goal of Multi-Party Computation (MPC) is to perform an arbitrary computation in a distributed, private, and fault-tolerant way. For this purpose, a fixed set of n parties runs a protocol that tolerates an adversary corrupting a subset of the parties, preserving certain security guarantees like correctness, secrecy, robustness, and fairness. Corruptions can be either passive or active: A pas...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Atmospheric Environment
سال: 2016
ISSN: 1352-2310
DOI: 10.1016/j.atmosenv.2015.12.055