Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,930,385 papers from all fields of science
Search
Sign In
Create Free Account
Probability Sample
Known as:
Probability Samples
, Sample, Probability
, Samples, Probability
National Institutes of Health
Create Alert
Alert
Related topics
Related topics
1 relation
Broader (1)
Sampling Studies
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Secrecy performance evaluation of TAS protocol exploiting fountain codes and cooperative jamming under impact of hardware impairments
Dang The Hung
,
Tran Trung Duy
,
Do Quoc Trinh
,
Vo Nguyen Quoc Bao
2nd International Conference on Recent Advances…
2018
Corpus ID: 4570707
In this paper, we propose a transmit antenna selection (TAS) protocol exploiting Fountain codes for secure communication. In the…
Expand
2018
2018
Security versus Reliability Study for Multi-hop Cognitive M2M Networks With Joint Impact of Interference Constraint and Hardware Noises
Pham Minh Nam
,
Phan Van Ca
,
P. Tuan
,
Tran Trung Duy
,
Vo Nguyen Quoc Bao
International Conference on Autonomic and Trusted…
2018
Corpus ID: 57190772
In this paper, we study the trade-off between security and reliability for multi-hop cognitive mobile-to-mobile (M2M) networks…
Expand
2018
2018
Opportunistic Relay Selection for Physical Layer Security Enhancement in Internet of Things
Guangna Zhang
,
Yuanyuan Gao
,
Huadong Luo
,
Nan Sha
,
Shijie Wang
International Conference on Speech Technology and…
2018
Corpus ID: 57378405
Internet of Things (IoT) is playing an important role in our lives. It connects lots of embedded devices, which can deal with…
Expand
2018
2018
Security-Reliability Analysis of Power Beacon-Assisted Multi-hop Relaying Networks Exploiting Fountain Codes with Hardware Imperfection
Dang The Hung
,
Tran Trung Duy
,
D. Trinh
,
Vo Nguyen Quoc Bao
,
Tan Hanh
International Conference on Autonomic and Trusted…
2018
Corpus ID: 57191357
In this paper, we consider a multi-hop relaying protocol using beacon-assisted energy harvesting. In the proposed protocol, a…
Expand
2018
2018
Security-Reliability Analysis of Cognitive Radio Network using Harvest-to-Jam Protocol with Primary Co-Channel Interference
Pham Minh Quang
,
Tran Trung Duy
,
T. T. Thanh
International Conference on Autonomic and Trusted…
2018
Corpus ID: 57191784
This paper investigates the trade-off between reliability and security for a multi-user cognitive radio (CR) network under joint…
Expand
2015
2015
Tennis Elbow Diagnosis Using Equivalent Uniform Voltage to Fit the Logistic and the Probit Diseased Probability Models
Tsair-Fwu Lee
,
Wei-Chun Lin
,
+6 authors
Pei-Ju Chao
BioMed Research International
2015
Corpus ID: 14669601
To develop the logistic and the probit models to analyse electromyographic (EMG) equivalent uniform voltage- (EUV-) response for…
Expand
2014
2014
Double Truncation Method for Simulation of Stochastic Chemical Reaction Networks
Soyeong Jeong
2014
Corpus ID: 123834006
We develop Double Truncation Method(DTM) to understand the stochasticity of chemical reaction network on the mesoscopic scale…
Expand
Review
2012
Review
2012
Survey on Current Status of Application of EPI Vaccines in Xiangxi Tujia and Miao Autonomous Prefecture
Mo Ying-ying
2012
Corpus ID: 75413501
Objective To investigate the current status of expansion of immunization program after launching the Expanded Programme on…
Expand
2009
2009
Credit Risk Assessment: A Nonlinear Multi-parameter Model
Jia-Lin Wu
,
Yuan Shi
International Conference on Signal Processing…
2009
Corpus ID: 14063938
Modern credit risk management aims at assess the default probability (DP) of a debtor according to his historical and current…
Expand
2008
2008
Design and performance evaluation of a MAC protocol for motorway environment under poisson and self-similar traffic
B. Qazi
,
J. Elmirghani
International Symposium on Performance Evaluation…
2008
Corpus ID: 16755062
A constantly growing interest in cellular and mobile technology has lead to a need for MAC protocols specifically designed to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE