咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 管理学
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 1 篇 法学
    • 1 篇 政治学
    • 1 篇 马克思主义理论
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 工学
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 计算机科学与技术...
    • 1 篇 网络空间安全

主题

  • 2 篇 detection error ...
  • 1 篇 covert throughpu...
  • 1 篇 welfare loss
  • 1 篇 covert communica...
  • 1 篇 rare events
  • 1 篇 cryptocurrency
  • 1 篇 transmission ant...
  • 1 篇 ambiguity
  • 1 篇 robust portfolio...

机构

  • 1 篇 school of physic...
  • 1 篇 school of econom...
  • 1 篇 department of st...
  • 1 篇 school of econom...
  • 1 篇 department of ma...

作者

  • 1 篇 tao pang
  • 1 篇 guo hui
  • 1 篇 xiaobao xia
  • 1 篇 qiao ting
  • 1 篇 jingzhou yan
  • 1 篇 wujun lv

语言

  • 2 篇 英文
检索条件"主题词=detection error probability"
2 条 记 录,以下是1-10 订阅
排序:
Dynamic portfolio choice with uncertain rare‑events risk in stock and cryptocurrency markets
收藏 引用
Financial Innovation 2023年 第1期9卷 1967-1994页
作者: Wujun Lv Tao Pang Xiaobao Xia Jingzhou Yan Department of Statistics College of ScienceDonghua UniversityNo.2999 Renmin North RoadSongjiang DistrictShanghai 201620China Department of Mathematics North Carolina State University2311 Stinson DriveRaleighNC 27695‑8205USA School of Economics Fudan University600 Guoquan RoadShanghai 200433China School of Economics Sichuan University24 South Section 1Yihuan RoadChengdu 610065SichuanChina
In response to the unprecedented uncertain rare events of the last decade,we derive an optimal portfolio choice problem in a semi-closed form by integrating price diffusion ambiguity,volatility diffusion ambiguity,and... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Covert communication based on transmission antenna selection in the downlink communication link
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2021年 第3期28卷 20-27页
作者: Guo Hui Qiao Ting School of Physics and Electronic Information Engineering Henan Polytechnic UniversityJiaozuo 454003China
A downlink covert communication model that consists of a base station and two legitimate users was considered. In addition to the general signals shared by the two users, the base station will send the covert signals ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论