-
841
D-Optimal Design for a Causal Structure for Completely Randomized and Random Blocked Experiments
Published 2022-01-01“…Journal of Probability and Statistics…”
Get full text
Article -
842
Bayesian and Non-Bayesian Inference for Survival Data Using Generalised Exponential Distribution
Published 2013-01-01“…Journal of Probability and Statistics…”
Get full text
Article -
843
On the Generalized Lognormal Distribution
Published 2013-01-01“…Journal of Probability and Statistics…”
Get full text
Article -
844
Balancing Treatment Allocation over Continuous Covariates: A New Imbalance Measure for Minimization
Published 2012-01-01“…Journal of Probability and Statistics…”
Get full text
Article -
845
Robust Stability Best Subset Selection for Autocorrelated Data Based on Robust Location and Dispersion Estimator
Published 2015-01-01“…Journal of Probability and Statistics…”
Get full text
Article -
846
A Class of Spherical and Elliptical Distributions with Gaussian-Like Limit Properties
Published 2012-01-01“…Journal of Probability and Statistics…”
Get full text
Article -
847
Classical and Bayesian Approach in Estimation of Scale Parameter of Nakagami Distribution
Published 2016-01-01“…Journal of Probability and Statistics…”
Get full text
Article -
848
Analytically Simple and Computationally Efficient Results for the GIX/Geo/c Queues
Published 2019-01-01“…Journal of Probability and Statistics…”
Get full text
Article -
849
The Central Limit Theorem for th-Order Nonhomogeneous Markov Information Source
Published 2013-01-01“…Journal of Probability and Statistics…”
Get full text
Article -
850
General Results for the Transmuted Family of Distributions and New Models
Published 2016-01-01“…Journal of Probability and Statistics…”
Get full text
Article -
851
A Comparison of Mean-Based and Quantile Regression Methods for Analyzing Self-Report Dietary Intake Data
Published 2019-01-01“…Journal of Probability and Statistics…”
Get full text
Article -
852
Genotype-Based Bayesian Analysis of Gene-Environment Interactions with Multiple Genetic Markers and Misclassification in Environmental Factors
Published 2012-01-01“…Journal of Probability and Statistics…”
Get full text
Article -
853
On the Alpha Power Transformed Power Lindley Distribution
Published 2019-01-01“…Journal of Probability and Statistics…”
Get full text
Article -
854
Adaptive and Sequential Methods for Clinical Trials
Published 2013-01-01“…Journal of Probability and Statistics…”
Get full text
Article -
855
Response Analysis of Projectile System Under Gaussian Noise Excitation Using Path Integral Method
Published 2024-01-01“…Based on the probabilistic responses, we analyzed the evolution of the system’s probability density function over time under Gaussian white noise excitation, as well as the changes in the stationary probability density function with air density and flight speed as bifurcation parameters. …”
Get full text
Article -
856
Generation-based linguistic steganography with controllable security
Published 2022-06-01“…Generation-based linguistic steganography hides secret information through controllable modification and mapping of words in the candidate pool.It usually consists of three parts: text generation model, candidate pool probability distribution truncation and steganographic embedding algorithm.Due to the huge difference in the probability distribution of the text generation model outputs at different times, existing algorithms usually use top-k or top-p methods to truncate the probability distribution of words in the candidate pool to reduce the low-probability generated words and improve the security of the generated text.When the probability distribution of the candidate pool output by the text generation model is over-concentrated or over-flat, the original top-k or top-p truncation method will be not enough to cope with the change of the probability distribution, and it is easy to generate low-probability words or ignore high-probability words.This will lead to abnormal security metrics of the generated text.To address these problems, a generation-based linguistic steganography with controllable security was proposed.When selecting generated words with controllability in the candidate pool according to secret information, the proposed algorithm was based on the parameter constraints of perplexity and KL divergence.The truncation of the candidate pool probability distribution made all words satisfy the parameter constraints, which improved the security of the generated text.Experiment results showed that the perplexity and KL divergence of the steganographic text generated by the proposed algorithm are controllable.Under the same KL divergence, the perplexity of the text generated by the proposed algorithm is reduced by up to 20%~30% compared with the existing algorithm.This algorithm could control the perplexity and KL divergence at the same time, and make the generated text satisfy both perplexity and KL divergence when the indicators are reasonable.When using the three text steganalysis algorithms to detect the generated steganographic text, the detection accuracy is about 50%, showing excellent statistical security.…”
Get full text
Article -
857
Statistical Analysis of the Possibility of Hail in Northern Zagros
Published 2024-12-01“…Baneh station with the maximum frequency of hail precipitation has the lowest probability (0.023%) and Pearnshahr station has the most probable days without hail (0.39%). …”
Get full text
Article -
858
Secure performance analysis of relay systems with multi-relay and multi-user selection
Published 2019-08-01“…The exact expressions for the non-zero secrecy capacity probability,secrecy outage probability of AF relay systems with transmit antenna selection and receive maximal ratio combining and its asymptotic secrecy outage probability at high signal to noise ratios over Rayleigh fading channel were derived respectively.The numerical results of the non-zero secrecy capacity probability and secrecy outage probability of AF relay systems with multi-relay and multi-user selection match well with their corresponding simulations,which proves the correctness of the above theoretical analysis.The analysis result of the asymptotic secrecy outage probability of AF relay systems with multi-relay and multi-user selection indicates that its secrecy diversity gain is the minimum value between the product of the number of transmit antennas at source,the number of receive antennas at the optimal relay node,and the number of relay nodes,and the product of the number of transmit antennas at the optimal relay node,the number of receive antennas at the optimal destination node,and the number of destination nodes,which is independent of the eavesdropper channel.…”
Get full text
Article -
859
The Influence of Communication Range on Connectivity for Resilient Wireless Sensor Networks Using a Probabilistic Approach
Published 2013-09-01“…In the former case, this work proves that, for 0 < ε < e − 1 , if the probability of the network being connected is 0.36 ε , by means of increasing communication range by constant C ( ε ) , the probability of network being connected is at least 1 − ε . …”
Get full text
Article -
860
Wear Reliability and Sensitivity Analysis of the Chain Plate in the Leaf Chain
Published 2021-11-01“…The results show that distributed parameters of different random variables have different influence on failure probability. The sliding distance has the greatest influence on the failure probability of the chain plate. …”
Get full text
Article