نتایج جستجو برای: existence of hidden crime

تعداد نتایج: 21177912  

2001
Harish Chandra

In [I] we introduced the notion of transfer from a group over a local field to an associated endoscopic group, but did not prove its existence, nor do we do so in the present paper. Nonetheless we carry out what is probably an unavoidable step in any proof of existence: reduction to a local statement at the identity in the centralizer of a semisimple element, a favorite procedure of Harish Chan...

Journal: :Appl. Math. Lett. 2011
Y. H. Zhou J. Yu L. Wang

In this note, we prove the existence of Nash equilibria in infinite normal form games with compact sets of strategies and continuous payoffs by constructing Nash mappings. © 2010 Elsevier Ltd. All rights reserved.

2014
Rexy Arulanandam Bastin Tony Roy Savarimuthu Maryam Purvis

Information extraction is the task of extracting relevant information from unstructured data. This paper aims to ‘mine’ (or extract) crime information from online newspaper articles and make this information available to the public. Baring few, many countries that possess this information do not make them available to their citizens. So, this paper focuses on automatic extraction of public yet ...

Journal: :Journal of gerontology 1992
K F Ferraro R L LaGrange

The reasons why previous studies of fear of crime yield different conclusions regarding age differences are examined. Data from a national survey of adults are used to assess whether older adults manifest the highest levels of fear of crime. No significant relationship was found between age and the commonly used indicators of fear of crime in many previous studies when controlling for relevant ...

پایان نامه :0 1392

nowadays in trade and economic issues, prediction is proposed as the most important branch of science. existence of effective variables, caused various sectors of the economic and business executives to prefer having mechanisms which can be used in their decisions. in recent years, several advances have led to various challenges in the science of forecasting. economical managers in various fi...

 The purpose of this study is to investigate the effect of social damages (divorce, crime and addiction) on the effectiveness of fiscal and monetary policies. To achieve this, the literature on endogenous growth models has been used and the relationships of economic agents have been explained in the form of a dynamic stochastic general equilibrium model. In the designed DSGE model, labor produc...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند - دانشکده علوم انسانی 1389

abstract amino acids are building blocks of proteins, and play a vital role in living beings existence and their functionality. the interaction of these compounds with metal ions is of great importance to biochemists, and chemists, because their functions can be utilized as a model in understanding enzymes mechanism for transport of metal ions to tissues. among twenty essential amino acids w...

2004
Yiannis Vailakis

We prove existence of a competitive equilibrium in a version of a Ramsey model in which leisure enters the utility function. The analysis is carried out by means of a direct and technically simple approach that allows us to obtain detailed results concerning the behavior of equilibrium allocations and prices.

2011
Mohammad Reza Keyvanpour Mostafa Javideh Mohammad Reza Ebrahimi

Data mining is a way to extract knowledge out of usually large data sets; in other words it is an approach to discover hidden relationships among data by using artificial intelligence methods. The wide range of data mining applications has made it an important field of research. Criminology is one of the most important fields for applying data mining. Criminology is a process that aims to ident...

Journal: :J. Information Security 2012
K. K. Sindhu B. B. Meshram

Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has been stored in the digital devices. Various digital tools and techniques are being used to achieve this. Our paper explains forensic analysis steps in the storage media, hidden data analysis in the file system, network forensic methods and cyber crime data mining. This paper propo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید