Law of the iterated logarithm for nonstationary negatively associated random fields(非平稳NA随机变量域的重对数律)
利用Rosenthal型最大值不等式、Kolmogorov型指数不等式及Stein方法,邵启满、苏淳就强平稳的NA随机变量于1999年建立了重对数律.本文利用与之类似的截尾方法,在期望为0,且2+τ阶距有限的条件下,得到了非平稳的NA随机变量域的重对数律.
HUANGWei(黄炜)
doaj +1 more source
Gamma Kernel Estimators for Density and Hazard Rate of Right-Censored Data
The nonparametric estimation for the density and hazard rate functions for right-censored data using the kernel smoothing techniques is considered. The “classical” fixed symmetric kernel type estimator of these functions performs well in the interior ...
T. Bouezmarni, A. El Ghouch, M. Mesfioui
doaj +1 more source
A Survey on the Integral Means Spectrum for Conformal Mappings [PDF]
The present survey is devoted to the description of the results about estimates of the integral means in various classes of analytic functions. Great importance is given to the boundary properties of conformal mappings.
I.R. Kayumov
doaj
Integrability conditions on coboundary and transfer function for limit theorems
For a measure preserving automorphism $T$ of a probability space, we provide conditions on the tail function of $g\colon\Omega\to\mathbb R$ and $g-g\circ T$ which guarantee limit theorems among the weak invariance principle, Marcinkievicz-Zygmund strong ...
Giraudo, Davide
core +1 more source
Number theory, borderline dimension and extensive entropy in distributions of ranked data. [PDF]
Velarde C, Robledo A.
europepmc +1 more source
Multivariate spatial conditional U-quantiles: a Bahadur–Kiefer representation
Quantiles constitute a core concept in probability theory and theoretical statistics, providing an indispensable instrument in a wide array of applications.
Salim Bouzebda, Nourelhouda Taachouche
doaj +1 more source
Trial sequential analysis: novel approach for meta-analysis. [PDF]
Kang H.
europepmc +1 more source
SIMECK-T: An Ultra-Lightweight Encryption Scheme for Resource-Constrained Devices
The Internet of Things produces vast amounts of data that require specialized algorithms in order to secure them. Lightweight cryptography requires ciphers designed to work on resource-constrained devices like sensors and smart things.
Alin-Adrian Anton +3 more
doaj +1 more source
Learning by Population Genetics and Matrix Riccati Equation. [PDF]
Kozyrev S.
europepmc +1 more source
Regularity and asymptotics of densities of inverse subordinators
In this article, densities (and their derivatives) of subordinators and inverse subordinators are considered. Under minor restrictions, generally milder than the existing in the literature, employing a useful modification of the saddle point method, we ...
Giacomo Ascione +2 more
doaj +1 more source

