نتایج جستجو برای: asymmetric verifiability
تعداد نتایج: 66461 فیلتر نتایج به سال:
The main criterion in investment decisions is to maximize the investors utility. Traditional capital asset pricing models cannot be used when asset returns do not follow a normal distribution. For this reason, we use capital asset pricing model with independent and identically asymmetric power distributed (CAPM-IIAPD) and capital asset pricing model with asymmetric independent and identically a...
We propose and demonstrate a simple method to generate ultrawideband (UWB) pulses in the optical domain using a chirped intensity modulator and an asymmetric Mach-Zehnder interferometer (AMZI). Polarity- and shape-switchable UWB Gaussian monocycle, doublet, and triplet pulses with fractional bandwidths of 158%, 134%, and 100% and center frequencies of 6.52, 9.78, and 10.1 GHz are experimentally...
asymmetric information in iran’s insurance market: case study for automobile insurance in iran insurance companythis research aims to test the presence of asymmetric information by using the dynamic information of automobile policyholders in the iran insurance company (iic). the conditional independence test is conducted by bivariate probit model, the dynamic properties which are presented for ...
The Verifiability Approach (VA) is a promising new approach for deception detection. It extends existing verbal credibility assessment tools by asking interviewees to provide statements rich in verifiable detail. Details that i) have been experienced with an identifiable person, ii) have been witnessed by an identifiable person, or iii) have been recorded through technology, are labelled as ver...
This work studies the English auction protocol, which comprises three interactive parties—the Registration Manager, the Auction Manager and the Bidder. The registration manager confirms and authenticates the identities of bidders; the auction manager issues the bidding rights and maintains order in holding the auction. The proposed scheme provides the following security features—anonymity, trac...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید