نتایج جستجو برای: based on hypothesis as expected

تعداد نتایج: 11312218  

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده علوم 1393

in this thesis, structural, electronical, and optical properties of inverse pervskite(ca3pbo) in cubic phase have been investigated.the calculation have been done based on density functional theory and according to generalized gradiant approximate (gga) as correlating potential. in order to calculate the configurations, implementing in the wien2k code have been used from 2013 version. first of ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تحصیلات تکمیلی علوم پایه زنجان - دانشکده شیمی 1391

in this thesis a calibration transfer method is used to achieve bilinearity for augmented first order kinetic data. first, the proposed method is investigated using simulated data and next the concept is applied to experimental data. the experimental data consists of spectroscopic monitoring of the first order degradation reaction of carbaryl. this component is used for control of pests in frui...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید مدنی آذربایجان - دانشکده ادبیات و علوم انسانی 1391

abstractof two mcall programs introducing 100 vocabulary items through two im the researcher of the present study was intrigued to compare the effects age modalities (pictures and streaming video) with those of a conventional method (teacher instruction) in an efl context. she set out to investigate whether such multimedia environments could provide a more effective environment for vocabulary...

2010
Scott Condie Jayant Ganguli

This paper proves the existence of fully-revealing rational expectations equilibria for almost all sets of beliefs when investors are ambiguity averse and have preferences that are characterized by Choquet expected utility. The result implies that strong-form efficient equilibrium prices exist even when many investors in the market make use of information in a way that is substantially differen...

1998
Burton Hollifield Alan Kraus

We present a random variable characterization of the necessary and sufficient conditions for a shift of the distribution of rate of return on the risky asset in the two asset portfolio problem to reduce demand for all risk–averse expected utility maximizing investors. We also present a random variable characterization of the shifts that lead to both a reduction in demand and a non–increase in e...

2008
Pavlo R. Blavatskyy Wolfgang Köhler Tony Marley

April 2008 Abstract This paper presents an axiomatic model of probabilistic choice under risk. In this model, when it comes to choosing one lottery over another, each alternative has a chance of being selected, unless one lottery stochastically dominates the other. An individual behaves as if he compares lotteries to a reference lottery—a least upper bound or a greatest lower bound in terms of ...

2004
Marcelo Bianconi MORAL HAZARD

We consider the effect of alternative individual preference towards effort conditional on aggregate risk in a principal-agent relationship under moral hazard. We find that agents can explore a negative correlation between individual preference towards effort and aggregate risk to further diversify idiosyncratic risk and increase expected utility under moral hazard. The variation of individual p...

Journal: :Int. J. Approx. Reasoning 2016
Anthony Hunter Matthias Thimm

When informal arguments are presented, there may be imprecision in the language used, and so the audience may be uncertain as to the structure of the argument graph as intended by the presenter of the arguments. For a presenter of arguments, it is useful to know the audience’s argument graph, but the presenter may be uncertain as to the structure of it. To model the uncertainty as to the struct...

1996
A. Graham Peace Dennis F. Galletta

There is, perhaps, no more visible financial dilemma in the software industry today than that of software piracy. In this paper, we detail the development and empirical validation of a predictive model of software piracy behavior by computer-using professionals. The model was developed from the results of prior research in software piracy and the reference disciplines of the theory of planned b...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید