نتایج جستجو برای: progressively censoring
تعداد نتایج: 32191 فیلتر نتایج به سال:
Secret image sharing technology is a strategy for jointly protecting secret images. The (n, n) problem can be solved by conventional Boolean calculation easily. However, how to recover images with progressive steps not addressed. In this study, we proposed an XOR-based (m, t, Ti) multi-secret scheme that shares m among participants and recovers shared progressively t thresholds. partition (SIPS...
Do I or do not have the right to tell my story?
 This is question asked at 2020 talk on Creativity in Protesting Islamic Fundamentalism TedX Warwick’s within Crisis event. Ironically, censorship of ex-Muslims was itself censored by TedX, first its refusal publish due ‘political content’ and then publishing after public pressure but without any slides – addition a trigger warning: ‘Some vie...
In life history studies, interest often lies in the analysis of the interevent, or gap times and the association between event times. Gap time analyses are challenging however, even when the length of follow-up is determined independently of the event process, because associations between gap times induce dependent censoring for second and subsequent gap times. This article discusses nonparamet...
We extend the Tarone and Ware scheme of weighted log-rank tests to cover the associated weighted Mantel-Haenszel estimators of relative risk. Weighting functions previously employed are critically reviewed. The notion of an average hazard ratio is defined and its connection to the effect size measure P(Y > X) is emphasized. The connection makes estimation of P(Y > X) possible also under censori...
Complex longitudinal data are commonly analyzed using nonlinearmixed-effects NLME models with a normal distribution. However, a departure fromnormalitymay lead to invalid inference and unreasonable parameter estimates. Some covariates may be measured with substantial errors, and the response observations may also be subjected to left-censoring due to a detection limit. Inferential procedures ca...
In order to make statistical inference, that is drawing conclusions from a sample to describe a population, it is crucial to know the correct distribution of the data. This paper focused on censored data from the normal distribution. The purpose of this paper was to answer whether we can test if data comes from a censored normal distribution. This by using normality tests and tests designed for...
Splashing of splat particles is one of the most important phenomena in industrial processes such as thermal spray coating. The data relative to the degree of splashing of splats sprayed with a normal angle are commonly characterized by the Weibull distribution function. In this present study, an effort has been made to show that the Burr distribution is better than the Weibull distribution for ...
HERE WE PRESENT the likelihood function used to estimate the parameters of the demand model. The model can be thought of as a system of four “standard” equations: (i) a tobit down payment equation (with censoring at the minimum down), (ii) a probit purchase equation, (iii) a tobit repayment equation (with censoring at full payment or at the end of our sample), and (iv) a linear price negotiatio...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید