A prediction model of urban counterterrorism based on stochastic strategy
نویسندگان
چکیده
منابع مشابه
mortality forecasting based on lee-carter model
over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...
15 صفحه اولA Stochastic Parser Based on a Structural Word Prediction Model
]in this paper, we present a stochastic language model using dependency. This model considers a sentence as a word sequence and predicts each word from left to right. The history at each step of prediction is a sequence of partial parse krees covering the preceding words. First ore: model predicts the partial parse trees which have a dependency relation with the next word among them and then pr...
متن کاملa study on insurer solvency by panel data model: the case of iranian insurance market
the aim of this thesis is an approach for assessing insurer’s solvency for iranian insurance companies. we use of economic data with both time series and cross-sectional variation, thus by using the panel data model will survey the insurer solvency.
the effectiveness of strategy-based instruction in teaching english as a second or foreign language: a meta-analysis of experimental studies
a large number of single research studies on the effects of strategy-based instruction (sbi) in teaching english as a foreign or second language has been conducted so far. however, the lack of a comprehensive meta-analysis targeting the effectiveness of english language sbi is observed. moreover, the findings of experimental studies regarding the context of the english language, proficiency lev...
study of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied Mathematics and Nonlinear Sciences
سال: 2021
ISSN: 2444-8656
DOI: 10.2478/amns.2021.2.00007