Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Estimation (2)
- Simulation (2)
- <p>Cyberterrorism.</p> <p>Data mining – Statistical methods.</p> <p>Data mining – Implements.</p> <p>Support vector machines.</p> <p>Decision trees.</p> <p>Machine learning.</p> <p>Neural networks (computer science) – Research.</p> (1)
- <p>Fantasy football (Game) </p> <p>Statistics<strong> -- </strong>Methodology.</p> (1)
- <p>Mathematical statistics.</p> <p>Sampling (Statistics)</p> (1)
Articles 1 - 4 of 4
Full-Text Articles in Statistical Methodology
A Predictive Model To Predict Cyberattack Using Self-Normalizing Neural Networks, Oluwapelumi Eniodunmo
A Predictive Model To Predict Cyberattack Using Self-Normalizing Neural Networks, Oluwapelumi Eniodunmo
Theses, Dissertations and Capstones
Cyberattack is a never-ending war that has greatly threatened secured information systems. The development of automated and intelligent systems provides more computing power to hackers to steal information, destroy data or system resources, and has raised global security issues. Statistical and Data mining tools have received continuous research and improvements. These tools have been adopted to create sophisticated intrusion detection systems that help information systems mitigate and defend against cyberattacks. However, the advancement in technology and accessibility of information makes more identifiable elements that can be used to gain unauthorized access to systems and resources. Data mining and classification tools …
Exploring The Variance Of The Sample Variance Through Estimation And Simulation, Christina Stradwick
Exploring The Variance Of The Sample Variance Through Estimation And Simulation, Christina Stradwick
Theses, Dissertations and Capstones
In this thesis, we examine properties of the variance of the sample variance, which we will denote V (S 2 ). We derive a formula for this variance and show that it only depends on the sample size, variance, and kurtosis of the underlying distribution. We also derive the maximum likelihood estimators for this parameter, Vˆ (S 2 ), under the normal, exponential, Bernoulli, and Poisson distributions and end the thesis with simulations demonstrating the distributions of these estimators.
A New Method For Ranking Quarterback Fantasy Performance With Assessment Using Distances Between Rankings, Evan Boyd
Theses, Dissertations and Capstones
Each year around the first week of September, NFL fans are fulfilled with the familiar emotions of watching their team compete for the ultimate prize: Fantasy League Championship. No, the NFL did not rename the Super Bowl. To some, this prize is even more personal than if your favorite childhood NFL team were to win the big game in February. To put it simply, the popularity of fantasy football has grown tremendously over time and the opportunity to best your friends, family, coworkers, whomever it may be that attempts to create the greatest fantasy football roster of all time, absolutely …
The Quotient Of The Beta-Weibull Distribution, Nonhle Channon Mdziniso
The Quotient Of The Beta-Weibull Distribution, Nonhle Channon Mdziniso
Theses, Dissertations and Capstones
A new class of distributions recently developed involves the logit of the beta distribution. Among this class of distributions are, the beta-Normal (Eugene et al. [15]); beta-Gumbel (Nadarajah and Kotz [18]); beta-Exponential (Nadarajah and Kotz [19]); beta-Weibull (Famoye et al. [6]); beta-Rayleigh (Akinsete and Lowe [3]); beta-Laplace (Kozubowshi and Nadarajah [20]); and beta-Pareto (Akinsete et al. [4]), among a few others. Many useful statistical properties arising from these distributions and their applications to real life data have been discussed in literature. One approach by which a new statistical distribution is generated is by the transformation of random variables having known …