Results 1 to 10 of about 302,300 (168)
Covert Communications via Full-Duplex User Relaying [PDF]
In this paper, we investigate a covert communication system with a full-duplex decode-and-forward (DF) relay and introduce a user-relaying scheme that maximizes the covert rate while ensuring the covertness requirement.
Jong Yeol Ryu, Jung Hoon Lee
doaj +2 more sources
Not to be sniffed at: repurposing existing RNA-seq data to examine changes to human nasal microbiome composition in COVID-19 infection, compared to influenza and healthy controls [PDF]
Objective: The human microbiome is essential in maintaining healthy physiology; compositional changes have been implicated in numerous physical and mental diseases.
F. Wainwright, G. Misirli, P. Andras
doaj +1 more source
In most of the countries that signed the Salamanca Statement, there seems to be a gap between policy formulations and realisations of inclusive education.
Michael Kainose Mhlolo +1 more
doaj +1 more source
Exploiting Online Services to Enable Anonymous and Confidential Messaging
Messaging services are usually provided within social network platforms and allow these platforms to collect additional information about users, such as what time, for how long, with whom, and where a user communicates.
Pedro Sousa, António Pinto, Pedro Pinto
doaj +1 more source
When Different Language Groups Meet Online: Covert and Overt Focus on Form in Text-Based Chats
Focus on form has been extensively studied in text-based online dyadic chats but much less has been explored in group chats with interlocutors from different language backgrounds.
Ruiling Feng +4 more
doaj +1 more source
Objective Bullying victimisation is well known to be associated with social anxiety disorder and generalised anxiety disorder among adolescents. Study 1 reports on a systematic review to examine these relationships.
Louise Ferraz de Camargo +2 more
doaj +1 more source
Method for identifying network covert channels
The aim of this paper is to describe the created method for identifying network covert channels. Traditionally, the scheme for countering information leakage through covert channels is divided into several stages.
Konstantin G. Kogos +2 more
doaj +1 more source
No Advantage for Separating Overt and Covert Attention in Visual Search
We move our eyes roughly three times every second while searching complex scenes, but covert attention helps to guide where we allocate those overt fixations.
W. Joseph MacInnes +3 more
doaj +1 more source
Wireless Covert Communication with Polarization Dirty Constellation
Wireless covert communication is an emerging communication technique that prevents eavesdroppers. This paper presents a novel approach to wireless covert communication based on polar codes with dirty constellation polarization.
Mingyu Hu, Sen Qiao, Xiaopeng Ji
doaj +1 more source
Cueing Visual Attention to Spatial Locations With Auditory Cues
We investigated exogenous and endogenous orienting of visual attention to the spatial loca-tion of an auditory cue. In Experiment 1, significantly faster saccades were observed to vis-ual targets appearing ipsilateral, compared to contralateral, to the ...
Matthew Kean, Trevor J. Crawford
doaj +1 more source

