scispace - formally typeset
Search or ask a question
Institution

Drexel University

EducationPhiladelphia, Pennsylvania, United States
About: Drexel University is a education organization based out in Philadelphia, Pennsylvania, United States. It is known for research contribution in the topics: Population & Poison control. The organization has 26770 authors who have published 51438 publications receiving 1949443 citations. The organization is also known as: Drexel & Drexel Institute.


Papers
More filters
Journal ArticleDOI
TL;DR: Kowalski et al. as mentioned in this paper reported on work to increase the number of well-measured Type Ia supernovae (SNe Ia) at high redshifts.
Abstract: We report on work to increase the number of well-measured Type Ia supernovae (SNe Ia) at high redshifts. Light curves, including high signal-to-noise HST data, and spectra of six SNe Ia that were discovered during 2001 are presented. Additionally, for the two SNe with z > 1, we present groundbased J-band photometry from Gemini and the VLT. These are among the most distant SNe Ia for which ground based near-IR observations have been obtained. We add these six SNe Ia together with other data sets that have recently become available in the literature to the Union compilation (Kowalski et al. 2008). We have made a number of refinements to the Union analysis chain, the most important ones being the refitting of all light curves with the SALT2 fitter and an improved handling of systematic errors. We call this new compilation, consisting of 557 supernovae, the Union2

1,424 citations

Journal ArticleDOI
TL;DR: Trust was increased through perceived responsive relationships in the virtual community, by a general disposition to trust, and by the belief that others confide personal information.
Abstract: This study explores several downstream effects of trust in virtual communities and the antecedents of trust in this unique type of environment. The data, applying an existing scale to measure two dimensions of trust (ability and benevolence/integrity), show that trust had a downstream effect on members' intentions to both give information and get information through the virtual community. Both these apparent dimensions of trust were increased through perceived responsive relationships in the virtual community, by a general disposition to trust, and by the belief that others confide personal information.

1,418 citations

Journal ArticleDOI
TL;DR: In this article, the authors reviewed and considered the existing cognitive and behavioral accounts for the acquisition and maintenance of post-traumatic stress disorder and adapted Mowrer's two-stage theory as applied to rape victims and Vietnam veterans.

1,415 citations

Journal ArticleDOI
Lisa Bowleg1
TL;DR: The notion that social identities and social inequality based on ethnicity, sexual orientation, and sex/gender are intersectional rather than additive poses a variety of thorny methodological challenges as discussed by the authors.
Abstract: The notion that social identities and social inequality based on ethnicity, sexual orientation, and sex/gender are intersectional rather than additive poses a variety of thorny methodological challenges. Using research with Black lesbians (Bowleg, manuscripts in preparation; Bowleg et al., Journal of Lesbian Studies, 2008; Bowleg et al., Cultural Diversity & Ethnic Minority Psychology 10:229–240, 2004; Bowleg et al., Journal of Lesbian Studies, 7:87–108, 2003) as a foundation, I examine how these challenges shape measurement, analysis, and interpretation. I argue that a key dilemma for intersectionality researchers is that the additive (e.g., Black + Lesbian + Woman) versus intersectional (e.g., Black Lesbian Woman) assumption inherent in measurement and qualitative and quantitative data analyses contradicts the central tenet of intersectionality: social identities and inequality are interdependent for groups such as Black lesbians, not mutually exclusive. In light of this, interpretation becomes one of the most substantial tools in the intersectionality researcher’s methodological toolbox.

1,396 citations

Journal ArticleDOI
TL;DR: Novel system designs are proposed, consisting of the determination of relay weights and the allocation of transmit power, that maximize the achievable secrecy rate subject to a transmit power constraint, or minimize the transmit powersubject to a secrecy rate constraint.
Abstract: Physical (PHY) layer security approaches for wireless communications can prevent eavesdropping without upper layer data encryption. However, they are hampered by wireless channel conditions: absent feedback, they are typically feasible only when the source-destination channel is better than the source-eavesdropper channel. Node cooperation is a means to overcome this challenge and improve the performance of secure wireless communications. This paper addresses secure communications of one source-destination pair with the help of multiple cooperating relays in the presence of one or more eavesdroppers. Three cooperative schemes are considered: decode-and-forward (DF), amplify-and-forward (AF), and cooperative jamming (CJ). For these schemes, the relays transmit a weighted version of a reencoded noise-free message signal (for DF), a received noisy source signal (for AF), or a common jamming signal (for CJ). Novel system designs are proposed, consisting of the determination of relay weights and the allocation of transmit power, that maximize the achievable secrecy rate subject to a transmit power constraint, or, minimize the transmit power subject to a secrecy rate constraint. For DF in the presence of one eavesdropper, closed-form optimal solutions are derived for the relay weights. For other problems, since the optimal relay weights are difficult to obtain, several criteria are considered leading to suboptimal but simple solutions, i.e., the complete nulling of the message signals at all eavesdroppers (for DF and AF), or the complete nulling of jamming signal at the destination (for CJ). Based on the designed relay weights, for DF in the presence of multiple eavesdroppers, and for CJ in the presence of one eavesdropper, the optimal power allocation is obtained in closed-form; in all other cases the optimal power allocation is obtained via iterative algorithms. Numerical evaluation of the obtained secrecy rate and transmit power results show that the proposed design can significantly improve the performance of secure wireless communications.

1,385 citations


Authors

Showing all 26976 results

NameH-indexPapersCitations
John Q. Trojanowski2261467213948
Peter Libby211932182724
Virginia M.-Y. Lee194993148820
Yury Gogotsi171956144520
Dennis R. Burton16468390959
M.-Marsel Mesulam15055890772
Edward G. Lakatta14685888637
Gordon T. Richards144613110666
David Price138168793535
Joseph Sodroski13854277070
Hannu Kurki-Suonio13843399607
Jun Lu135152699767
Stephen F. Badylak13353057083
Michael E. Thase13192375995
Edna B. Foa12958873034
Network Information
Related Institutions (5)
University of Pennsylvania
257.6K papers, 14.1M citations

96% related

Columbia University
224K papers, 12.8M citations

96% related

University of Washington
305.5K papers, 17.7M citations

96% related

University of California, San Diego
204.5K papers, 12.3M citations

96% related

University of Michigan
342.3K papers, 17.6M citations

95% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202371
2022382
20212,354
20202,344
20192,235
20182,165