423 research outputs found

    A Note on the Characterization of Zero-Inflated Poisson Model

    Get PDF
    Zero-Inflated Poisson model has found a wide variety of applications in recent years in statistical analyses of count data, especially in count regression models. Zero-Inflated Poisson model is characterized in this paper through a linear differential equation satisfied by its probability generating function [1] [2]

    Asymptotic Comparison of Method of Moments Estimators and Maximum Likelihood Estimators of Parameters in Zero-Inflated Poisson Model

    Get PDF
    This paper discusses the estimation of parameters in the zero-inflated Poisson (ZIP) model by the method of moments. The method of moments estimators (MMEs) are analytically compared with the maximum likelihood estimators (MLEs). The results of a modest simulation study are presented

    Dysregulated TGFB Signaling in Ovarian Cancer

    Get PDF

    The Fekete-Szegö problems for a subclass of m-fold symmetric bi-univalent functions

    Get PDF
    In this paper, we investigate a new subclass Pʰ˒ᵖ Σm(λ, γ) of m-fold symmetric bi-univalent functions. Moreover, for functions of this subclass, we obtain the coefficient estimates of the Taylor-Maclaurin coefficients |am+1|, |a2m+1| and Fekete-Szegö problems. The coefficients estimates presented in this paper would generalize and improve those in related works of several earlier authors.Publisher's Versio

    Initial bounds for certain classes of bi-univalent functions defined by the (p, q)-lucas polynomials

    Get PDF
    Our present investigation is motivated essentially by the fact that, in Geometric Function Theory, one can find many interesting and fruitful usages of a wide variety of special functions and special polynomials. The main purpose of this article is to make use of the (p, q)− Lucas polynomials Lp,q,n(x) and the generating function GLp, q, n(x)(z), in order to introduce three new subclasses of the bi-univalent function class Σ. For functions belonging to the defined classes, we then derive coefficient inequalities and the Fekete-Szeg¨o inequalities. Some interesting observations of the results presented here are also discussed. We also provide relevant connections of our results with those considered in earlier investigations.Publisher's Versio

    Thermal control systems for low-temperature heat rejection on a lunar base

    Get PDF
    One of the important issues in the design of a lunar base is the thermal control system (TCS) used to reject low-temperature heat from the base. The TCS ensures that the base and the components inside are maintained within an acceptable temperature range. The temperature of the lunar surface peaks at 400 K during the 336-hour lunar day. Under these circumstances, direct dissipation of waste heat from the lunar base using passive radiators would be impractical. Thermal control systems based on thermal storage, shaded radiators, and heat pumps have been proposed. Based on proven technology, innovation, realistic complexity, reliability, and near-term applicability, a heat pump-based TCS was selected as a candidate for early missions. In this report, Rankine-cycle heat pumps and absorption heat pumps (ammonia water and lithium bromide-water) have been analyzed and optimized for a lunar base cooling load of 100 kW

    Perspective Chapter: Text Watermark Analysis - Concept, Technique, and Applications

    Get PDF
    Watermarking is a modern technology in which identifying information is embedded in a data carrier. It is not easy to notice without affecting data usage. A text watermark is an approach to inserting a watermark into text documents. This is an extremely complex undertaking, especially given the scarcity of research in this area. This process has proven to be very complex, especially since there has only been a limited amount of research done in this field. Conducting an in-depth analysis, analysis, and implementation of the evaluation, is essential for its success. The overall aim of this chapter is to develop an understanding of the theory, methods, and applications of text watermarking, with a focus on procedures for defining, embedding, and extracting watermarks, as well as requirements, approaches, and linguistic implications. Detailed examination of the new classification of text watermarks is provided in this chapter as are the integration process and related issues of attacks and language applicability. Research challenges in open and forward-looking research are also explored, with emphasis on information integrity, information accessibility, originality preservation, information security, and sensitive data protection. The topics include sensing, document conversion, cryptographic applications, and language flexibility
    • …
    corecore