Results 61 to 70 of about 349,876 (317)

Covert Communication of STAR-RIS Aided NOMA Networks

open access: yesIEEE Transactions on Vehicular Technology
This article investigates covert communication in simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) assisted non-orthogonal multiple access (NOMA) systems, assuming for the sake of being more practical that the ...
Xingwang Li   +6 more
semanticscholar   +1 more source

Stereotactic Body Radiation Therapy for Pediatric, Adolescent, and Young Adult Patients With Osteosarcoma: Local Control Outcomes With Dosimetric Analysis

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background/Objectives Osteosarcoma is a radioresistant tumor that may benefit from stereotactic body radiation therapy (SBRT) for locoregional control in metastatic/recurrent disease. We report institutional practice patterns, outcomes, toxicity, and failures in osteosarcoma patients treated with SBRT.
Jenna Kocsis   +13 more
wiley   +1 more source

Techniques for Studying Decoding of Single Cell Dynamics

open access: yesFrontiers in Immunology, 2019
Cells must be able to interpret signals they encounter and reliably generate an appropriate response. It has long been known that the dynamics of transcription factor and kinase activation can play a crucial role in selecting an individual cell's ...
Stevan Jeknić   +6 more
doaj   +1 more source

Ethical Covert Research [PDF]

open access: yesSociology, 2011
Covert research is research which is not declared to the research participants or subjects. This is often muddled with deception, and condemned as intrinsically unethical. The basis of that condemnation is a legitimate concern with the rights of research subjects. It is, however, over-generalized. Research subjects do have rights, but they are not the
openaire   +2 more sources

Changes in Body Composition in Children and Young People Undergoing Treatment for Acute Lymphoblastic Leukemia: A Systematic Review and Meta‐Analysis

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Ongoing evidence indicates increased risk of sarcopenic obesity among children and young people (CYP) with acute lymphoblastic leukemia (ALL), often beginning early in treatment, persisting into survivorship. This review evaluates current literature on body composition in CYP with ALL during and after treatment.
Lina A. Zahed   +5 more
wiley   +1 more source

Covert Communication for Wireless Networks with Full-Duplex Multiantenna Relay

open access: yesComplexity, 2022
In this work, we investigated a covert communication method in wireless networks, which is realized by multiantenna full-duplex single relay. In the first stage, the source node sends covert messages to the relay, and the relay uses a single antenna to ...
Ling Yang   +5 more
doaj   +1 more source

Encryption of Covert Information into Multiple Statistical Distributions

open access: yes, 2006
A novel strategy to encrypt covert information (code) via unitary projections into the null spaces of ill-conditioned eigenstructures of multiple host statistical distributions, inferred from incomplete constraints, is presented.
Bennett   +15 more
core   +1 more source

Radiotherapy Delivery in Deep Inspiration for Pediatric Patients—Final Results of the Phase II Feasibility Study TEDDI

open access: yesPediatric Blood &Cancer, EarlyView.
Abstract Introduction The TEDDI trial tested the feasibility and reproducibility of deep‐inspiration breath‐hold (DIBH) in pediatric patients referred for radiotherapy. This report presents final results, including patient‐reported outcomes (PRO) and dosimetric comparison of DIBH and free‐breathing (FB).
Daniella Elisabet Østergaard   +11 more
wiley   +1 more source

A Two-Way VoLTE Covert Channel With Feedback Adaptive to Mobile Network Environment

open access: yesIEEE Access, 2019
In the existing network covert channel research, the transmission of secret messages is one-way, lacking confirmation feedback on whether the secret message is successfully accepted. However, voice over LTE (VoLTE) has real-time interactive features, and
Xiaosong Zhang   +3 more
doaj   +1 more source

Hiding Messages in Secure Connection Transmissions with Full-Duplex Overt Receiver

open access: yesSensors, 2022
This paper considers hiding messages in overt transmissions with a full-duplex receiver, which emits artificial noise to secure its transmission connection while a transmitter opportunistically sends a covert message to a covert user.
Lap Luat Nguyen   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy