منابع مشابه
a new approach to credibility premium for zero-inflated poisson models for panel data
هدف اصلی از این تحقیق به دست آوردن و مقایسه حق بیمه باورمندی در مدل های شمارشی گزارش نشده برای داده های طولی می باشد. در این تحقیق حق بیمه های پبش گویی بر اساس توابع ضرر مربع خطا و نمایی محاسبه شده و با هم مقایسه می شود. تمایل به گرفتن پاداش و جایزه یکی از دلایل مهم برای گزارش ندادن تصادفات می باشد و افراد برای استفاده از تخفیف اغلب از گزارش تصادفات با هزینه پائین خودداری می کنند، در این تحقیق ...
15 صفحه اولEight Key Elements of Successful Self-Funding E-Learning Programs
The Greek philosopher Aristotle indicated that learning is the outcome of both teaching and practice. Clearly, learning is not confined exclusively to classroom lectures. In the past several decades, educators explored the possibilities of providing learning experiences to remote students. With improvement in technology and the growing popularity of Internet usage, e-learning caught the attenti...
متن کاملa new type-ii fuzzy logic based controller for non-linear dynamical systems with application to 3-psp parallel robot
abstract type-ii fuzzy logic has shown its superiority over traditional fuzzy logic when dealing with uncertainty. type-ii fuzzy logic controllers are however newer and more promising approaches that have been recently applied to various fields due to their significant contribution especially when the noise (as an important instance of uncertainty) emerges. during the design of type- i fuz...
15 صفحه اولO6: How to Encourage Building a New Road Traffic Culture for Children in Developing Countries
Road traffic accidents (RTA) are one of the most important causes of death and disability all over the world. In developing countries the problem is more complicated. Based on the estimation by UNICEF, rate of RTA in Iran is 20 times more than world’s average. In Iran among all unintentional fatal injuries inflicted on children under five, traffic related fatalities are the leading cause ...
متن کاملSkills and Characteristics of Successful Cybersecurity Advocates
Cybersecurity advocates attempt to counter the tsunami of cyber attacks by promoting security best practices and encouraging security technology adoption. However, little is known about the skills necessary for successful advocacy. Our study explores the motivations, characteristics, and practices of cybersecurity advocates. Preliminary analysis of 19 interviews reveals that effective advocates...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: College & Research Libraries News
سال: 1999
ISSN: 2150-6698,0099-0086
DOI: 10.5860/crln.60.11.899