نتایج جستجو برای: excess path loss
تعداد نتایج: 645157 فیلتر نتایج به سال:
The purpose of the paper is to develop a method of calculating the aggregate loss distribution of excess claims based on a formula described in the book Risk Theory by Beard, Pentikainenen, and Pesonen. This formula requires that the claim frequency distribution satisfy a certain recursive relationship. The first part of the paper shows that a claim frequency distributions of excess claims deri...
This paper contains measured data and empirical models for 5.85-GHz radio propagation path loss in and around residential areas for the newly allocated U.S. National Information Infrastructure (NII) band. Three homes and two stands of trees were studied for outdoor path loss, tree loss, and house penetration loss in a narrow-band measurement campaign that included 270 local area path loss measu...
To be consistent with Extreme Value Theory the pricing of excess-of-loss reinsurance contracts should be based on Pareto type distributions. In this context, two recent Pareto type distributions are considered and compared. The state of a geometric Brownian motion after an exponentially distributed random time with log-normally distributed initial state generates a four-parameter Pareto type di...
Obesity has increased alarmingly in the United States and is increasing in many countries of the world. Because obesity is an important risk factor for type 2 diabetes and other chronic diseases, it is important to develop approaches to counter the rapid increase in adiposity. One approach is bariatric surgery, the most successful clinical intervention known for treating obesity. Surgery can re...
The present paper studies the probability of ruin of an insurer, if excess of loss reinsurance with reinstatements is applied. In the setting of the classical CramerLundberg risk model, piecewise deterministic Markov processes are used to describe the free surplus process in this more general situation. It is shown that the finite-time ruin probability is both the solution of a partial integro-...
ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. h...
In this Letter, first, we investigate the security of a continuous-variable quantum cryptographic scheme with a postselection process against individual beam splitting attack. It is shown that the scheme can be secure in the presence of the transmission loss owing to the postselection. Second, we provide a loss limit for continuous-variable quantum cryptography using coherent states taking into...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید