Results 21 to 30 of about 349,876 (317)

Covert symmetry breaking [PDF]

open access: yesJournal of High Energy Physics, 2020
Abstract Reduction from a higher-dimensional to a lower-dimensional field theory can display special features when the zero-level ground state has nontrivial dependence on the reduction coordinates. In particular, a delayed ‘covert’ form of spontaneous symmetry breaking can occur, revealing itself only at fourth order in the lower ...
C. W. Erickson   +3 more
openaire   +6 more sources

Anticounterfeit packaging technologies

open access: yesJournal of Advanced Pharmaceutical Technology & Research, 2010
Packaging is the coordinated system that encloses and protects the dosage form. Counterfeit drugs are the major cause of morbidity, mortality, and failure of public interest in the healthcare system.
Ruchir Y Shah   +2 more
doaj   +1 more source

Covert contraceptive use among women of reproductive age in Ibadan, Nigeria; Covert contraceptive in Ibadan, Nigeria

open access: yesNigerian Journal of Medicine, 2019
BACKGROUND: This study assessed the prevalence and determinants of covert contraceptive use among women of reproductive age in Ibadan, Nigeria. METHODS: A cross sectional study among women attending a family planning clinic in a maternity teaching ...
Olutosin A Awolude, Ayodele S Olagunju
doaj   +1 more source

Covert Quantum Communication [PDF]

open access: yesPhysical Review Letters, 2016
We extend covert communication to the quantum regime by showing that covert quantum communication is possible over optical channels with noise arising either from the environment or from the sender's lab. In particular, we show that sequences of qubits can be transmitted covertly by using both a single photon and a coherent state encoding. We study the
Arrazola, Juan Miguel, Scarani, Valerio
openaire   +3 more sources

Covert Communication in Intelligent Reflecting Surface-Assisted NOMA Systems: Design, Analysis, and Optimization [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2020
In this paper, we investigate covert communication in an intelligent reflecting surface (IRS)-assisted non-orthogonal multiple access (NOMA) system, where a legitimate transmitter (Alice) applies NOMA for downlink and uplink transmissions with a covert ...
Lu Lv   +5 more
semanticscholar   +1 more source

Sound change and coarticulatory variability involving English /ɹ/

open access: yesGlossa, 2019
English /ɹ/ is known to exhibit covert variability, with tongue postures ranging from bunched to retroflex, as well as various degrees of lip protrusion and compression.
Bridget J. Smith   +3 more
doaj   +2 more sources

Between overt and covert research: concealment and disclosure in an ethnographic study of commercial hospitality [PDF]

open access: yes, 2006
This article examines the ways in which problems of concealment emerged in an ethnographic study of a suburban bar and considers how disclosure of the research aims, the recruitment of informants, and elicitation of information was negotiated throughout ...
Adler, P. A.   +36 more
core   +1 more source

Covert [PDF]

open access: yesIndex on Censorship, 1999
I went to Marseille… I prowled the streets all day, feeling very strung up and ready to pounce, determined to ‘trap’ life - to preserve life in the act of living. Above all, I craved to seize the whole essence, in the confines of one single photograph, of some situation that was in the process of unrolling itself before my eyes.
openaire   +1 more source

Aerial Intelligent Reflecting Surface-Enabled Terahertz Covert Communications in Beyond-5G Internet of Things [PDF]

open access: yesIEEE Internet of Things Journal, 2021
Unmanned aerial vehicles (UAVs) are envisioned to be extensively employed for assisting wireless communications in the Internet of Things (IoT). On the other hand, terahertz (THz)-enabled intelligent reflecting surface (IRS) is expected to be one of the ...
Milad Tatar Mamaghani, Yi Hong
semanticscholar   +1 more source

A Formulation of the Potential for Communication Condition using C2KA

open access: yes, 2014
An integral part of safeguarding systems of communicating agents from covert channel communication is having the ability to identify when a covert channel may exist in a given system and which agents are more prone to covert channels than others. In this
Jaskolka, Jason, Khedri, Ridha
core   +4 more sources

Home - About - Disclaimer - Privacy