Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,355,003 papers from all fields of science
Search
Sign In
Create Free Account
Probability Sample
Known as:
Probability Samples
, Sample, Probability
, Samples, Probability
National Institutes of Health
Create Alert
Alert
Related topics
Related topics
1 relation
Broader (1)
Sampling Studies
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Secrecy performance evaluation of TAS protocol exploiting fountain codes and cooperative jamming under impact of hardware impairments
Dang The Hung
,
Tran Trung Duy
,
Do Quoc Trinh
,
Vo Nguyen Quoc Bao
2nd International Conference on Recent Advances…
2018
Corpus ID: 4570707
In this paper, we propose a transmit antenna selection (TAS) protocol exploiting Fountain codes for secure communication. In the…
Expand
2018
2018
Security versus Reliability Study for Multi-hop Cognitive M2M Networks With Joint Impact of Interference Constraint and Hardware Noises
Pham Minh Nam
,
Phan Van Ca
,
P. Tuan
,
Tran Trung Duy
,
Vo Nguyen Quoc Bao
International Conference on Autonomic and Trusted…
2018
Corpus ID: 57190772
In this paper, we study the trade-off between security and reliability for multi-hop cognitive mobile-to-mobile (M2M) networks…
Expand
2018
2018
Opportunistic Relay Selection for Physical Layer Security Enhancement in Internet of Things
Guangna Zhang
,
Yuanyuan Gao
,
Huadong Luo
,
Nan Sha
,
Shijie Wang
International Conference on Speech Technology and…
2018
Corpus ID: 57378405
Internet of Things (IoT) is playing an important role in our lives. It connects lots of embedded devices, which can deal with…
Expand
2018
2018
Security-Reliability Analysis of Power Beacon-Assisted Multi-hop Relaying Networks Exploiting Fountain Codes with Hardware Imperfection
Dang The Hung
,
Tran Trung Duy
,
D. Trinh
,
Vo Nguyen Quoc Bao
,
Tan Hanh
International Conference on Autonomic and Trusted…
2018
Corpus ID: 57191357
In this paper, we consider a multi-hop relaying protocol using beacon-assisted energy harvesting. In the proposed protocol, a…
Expand
2018
2018
Security-Reliability Analysis of Cognitive Radio Network using Harvest-to-Jam Protocol with Primary Co-Channel Interference
Pham Minh Quang
,
Tran Trung Duy
,
T. T. Thanh
International Conference on Autonomic and Trusted…
2018
Corpus ID: 57191784
This paper investigates the trade-off between reliability and security for a multi-user cognitive radio (CR) network under joint…
Expand
2017
2017
Security versus reliability study for power-limited mobile IoT devices
Esraa M. Ghourab
,
M. Azab
,
M. Rizk
,
A. Mokhtar
IEEE Annual Information Technology, Electronics…
2017
Corpus ID: 24908029
Internet of Things (IoT) depicts an intelligent future, where any IoT-based devices having a sensorial and computing capabilities…
Expand
2016
2016
Performance evaluation of underlay cognitive radio networks over Nakagami-m fading channels with energy harvesting
Pham Minh Quang
,
Tran Trung Duy
,
Vo Nguyen Quoc Bao
International Conference on Autonomic and Trusted…
2016
Corpus ID: 24676747
In this paper, we study the reliability-security tradeoff for a secondary network in an underday cognitive radio (CR) environment…
Expand
Highly Cited
2015
Highly Cited
2015
Procyclicality of Credit Rating Systems: How to Manage it
Tatiana Cesaroni
2015
Corpus ID: 12430291
This paper evaluates the characteristics of a Point in Time (PiT) rating approach for the estimation of firms’ credit risk in…
Expand
2009
2009
Credit Risk Assessment: A Nonlinear Multi-parameter Model
Jia-Lin Wu
,
Yuan Shi
International Conference on Signal Processing…
2009
Corpus ID: 14063938
Modern credit risk management aims at assess the default probability (DP) of a debtor according to his historical and current…
Expand
2008
2008
Design and performance evaluation of a MAC protocol for motorway environment under poisson and self-similar traffic
B. Qazi
,
J. Elmirghani
International Symposium on Performance Evaluation…
2008
Corpus ID: 16755062
A constantly growing interest in cellular and mobile technology has lead to a need for MAC protocols specifically designed to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE