SPSS for Intermediate Statistics: Use and Interpretation
Review of Basic Statistics With SPSS. Data Coding and Exploratory Analysis. Selecting and Interpreting Inferential Statistics. Several Measures of Reliability. Exploratory Factor Analysis and Principal Components Analysis. Multiple Linear Regression.
Подобные документы
Анализ моделирования латентных изменений с помощью SPSS. Проведение скоринга экспериментальных данных с применением прогнозных моделей в среде пакета. Суть корреляционных зависимостей в методике определения общего показателя субъект-объектных ориентаций.
статья, добавлен 26.12.2016International recommendations on Using error control coding at different network layers. The complexity of decoding in the channel with independent errors. Providing security of data in a network with the help of coding methods. Public-key cryptography.
книга, добавлен 08.03.2014A practical guide to using encryption technology to ensure confidentiality, security and integrity of your most valuable assets - its data. The analysis of the basic fundamentals of cryptography and its techniques for dealing with electronic security.
книга, добавлен 08.03.2014Меры центральной тенденции. Математическое ожидание и отклонение. Вид одномерного распределения для номинальной шкалы с совместимыми альтернативами. Показатели эксцесса, асимметрии. Построение распределений в пакете ОСА и SPSS, визуальное представление.
презентация, добавлен 09.10.2013Social network analysis as a modern theoretical approach to studying various processes of human life. Application SNA to fields of science. Application exact and approximate Shapley values in the assessment of centrality measures of nodes in networks.
дипломная работа, добавлен 02.09.2016Анализ примера применения программы SPSS для обработки полученных результатов сдачи нормативов студентов вузов. Основные положительные и отрицательные корреляционные зависимости между видами нормативов: кросс 1000 м, 100 м и прыжок в длину с места.
статья, добавлен 19.12.2017Introduce the basic principles of digital video compression,focusing on the main techniques used in various video coding standards and applies the rotation and reversion operations to increase the security of the secret images and the utilization.
книга, добавлен 08.03.2014Исследование возможных областей применения универсальной системы статистического анализа и управления данными. Изучение основных модулей и блоков компьютерной программы SPSS. Обработка больших объемов данных массового тестирования с помощью пакета SPSS.
статья, добавлен 11.03.2018The Iterative Extraction as extended approach extraction techniques in Principal Component Analysis to other additive data models. Additive models for clustering & similarity data and apply Iterative Extraction for deriving feasible clustering solutions.
учебное пособие, добавлен 08.02.2013Consideration of methods of information coding. Use of coded pages for the improvement of design objects. Study of the functional purpose of barcode and QR-code. Analysis of the engineering sequence of the artistic and graphic process of code creation.
статья, добавлен 03.07.2023Analysis of global trends and practices of Agile manifesto software development. Cultivation of agile-oriented thinking and implementation of frameworks. Maintaining a balance between the technical aspects of the project and customer-related efforts.
статья, добавлен 21.07.2024The value of cluster analysis to explain a number of phenomena. Consideration clustering algorithms computational intelligence, particularly based on neural networks and kernel-based learning. Review their application to five's real world problems.
статья, добавлен 08.02.2013Questionnaires are the tools uses in lexical typology with collect data for low-resourced languages, for which there are no large corpora or detailed dictionaries. Algorithm for automatically collect visual stimuli for lexico-typological research.
дипломная работа, добавлен 04.12.2019This article describes the main features of the design in 3D format. Demonstrated the usefulness of this method in the design and in the analysis. Presents basic examples of the practical application of data modeling functions for real design solutions.
статья, добавлен 28.09.2016The NCBI Data Model. Submitting DNA Sequences to the Databases. Genomic Mapping and Mapping Databases. Information Retrieval from Biological Databases. Creation and Analysis of Protein Multiple Sequence Alignments. Sequence Assembly, Finishing Methods.
учебное пособие, добавлен 25.11.2013Micali-Reyzin computational model. Target circuit and block cipher. Analysis of single point leakages. Towards the analysis of real constructions. Definition of security against side-channel attacks. The initialize a PRNG securely with a public seed.
статья, добавлен 15.09.2012In the article efficiency of DCT-based filters for a wide-class of images is investigated. The study is carried out for additive white Gaussian noise (AWGN) case with several intensity levels. Local DCT-based filter is used as basic denoising technique.
статья, добавлен 07.12.2016Development and implementation of new technologies in banking services. The ability to improve the existing anti-fraud model used in real banking practice. Clusters and their impact on the assessment of the existing anti-fraud model. Data Chart Analysis.
дипломная работа, добавлен 10.12.2019Grain and Trivium - hardware oriented stream ciphers. The linear sequential circuit approximation method as an effective method for the linear model determination. Outline of the analyzed ciphers. Description of Trivium. Correlation coefficient analysis.
статья, добавлен 15.09.2012A new approach to computer security. Building a unified binary analysis platform and using it to provide novel solutions. Providing an extensible architecture. Combining static and dynamic analysis in program. Properties from binary programs BitBlaze.
статья, добавлен 15.04.2014Deep learning is one of the most active research fields in machine learning community. It has gained unprecedented achievements in fields such as computer vision, natural language processing and speech recognition. Сhallenges posed by Big Data analysis.
статья, добавлен 18.02.2021Public key encryption and digital signature security definitions. Composable symbolic analysis for public key encryption. Ideal functionality formulations. Redefining ideal functionalities. Adding signatures to universally composable symbolic analysis.
учебное пособие, добавлен 15.09.2012Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.
статья, добавлен 14.01.2017Data warehouse base theory. The description of Extract Transform Load processes. Introduction into OpenStreetMap, base knowledge. Extract Transform Load process planning. Extracting and transformation data. Analysis of the developed data warehouse.
практическая работа, добавлен 13.02.2016Analysis of the extended euclidean algorithm. Analysis of operations in the residue class ring. Structure of the multiplicative group of residues mod a prime number. Symmetric and asymmetric cryptosystems. Compression functions from encryption functions.
книга, добавлен 08.03.2014