نتایج جستجو برای: correlation model

تعداد نتایج: 2426578  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده اقتصاد 1389

abstract: about 60% of total premium of insurance industry is pertained?to life policies in the world; while the life insurance total premium in iran is less than 6% of total premium in insurance industry in 2008 (sigma, no 3/2009). among the reasons that discourage the life insurance industry is the problem of adverse selection. adverse selection theory describes a situation where the inf...

2016
John Tipton Mevin Hooten Neil Pederson Martin Tingley Daniel Bishop

Reconstruction of pre-instrumental, late Holocene climate is important for understanding how climate has changed in the past and how climate might change in the future. Statistical prediction of paleoclimate from tree ring widths is challenging because tree ring widths are a one-dimensional summary of annual growth that represents a multi-dimensional set of climatic and biotic influences. We de...

2011
Lili Xu Nan Lin Baoxue Zhang Ning-Zhong Shi

1. A multivariate continuous model In this section, we provide the following concrete example that satisfies all the assumptions of Theorems 3 and 5 in our manuscript. Let yik be the response at time k for the i th subject from N(μik = β0 + xikβ1, 1), k = 1, . . . , T = 3, i = 1, . . . , n = 50. Let yi = (yi1, · · · , yiT ) . The true value of (β0, β1) is (1, -1). Covariates xik’s are iid rando...

Journal: :IEEE Trans. Speech and Audio Processing 2003
Tony Gustafsson Bhaskar D. Rao Mohan M. Trivedi

Room reverberation is typically the main obstacle for designing robust microphone-based source localization systems. The purpose of the paper is to analyze the achievable performance of acoustical source localization methods when room reverberation is present. To facilitate the analysis, we apply well known results from room acoustics to develop a simple but useful statistical model for the roo...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد گرمسار - پژوهشکده علوم انسانی و اجتماعی 1391

abstract the present study was conducted to investigate the effect of using model essays on the development of writing proficiency of iranian pre-intermediate efl learners. to fulfill the purpose of the study, 55 pre- intermediate learners of parsa language institute were chosen by means of administering proficiency test. based on the results of the pretest, two matched groups, one as the expe...

1999
Yoichi Yamashita

This paper proposes a method of predicting accuracy of keyword spotting in terms of FA count and spotting score of correct detections. A new measure F for predicting the FA count is calculated by simulation of the keyword spotting for phoneme sequences that phoneme-based language model generates. Another measure C for predicting the spotting score of correct detections is obtained from a produc...

2012
John Schoenmakers

We focus on the coupling of two existing and calibrated single currency Libor models into a joint Libor model that allows for pricing of multiple currency based structured interest rate products. Our main contribution is twofold: On the one hand we provide a method for synthesizing two local currency based correlation structures into a correctly defined joint correlation structure that describe...

2008
ROLANDO CASTRO

Statistical measures of determinism for spikes train are described and analyzed. The analysis is focused on two dynamical invariants: nonlinear forecastability and correlation dimension. Two simple, generic, biologically motivated methods for generating spikes from the system are surveyed: an integrate-and-fire model (IF) and a threshold-crossing method (TC). The effect on the statistical measu...

Journal: :CoRR 2010
S. Siti Rahayu Y. Robiah S. Shahrin M. Mohd Zaki M. A. Faizal Z. A. Zaheera

The number of crime committed based on the malware intrusion is never ending as the number of malware variants is growing tremendously and the usage of internet is expanding globally. Malicious codes easily obtained and use as one of weapon to gain their objective illegally. Hence, in this research, diverse logs from different OSI layer are explored to identify the traces left on the attacker a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید