Results 11 to 20 of about 163,707 (282)
Covert attention accelerates the rate of visual information processing [PDF]
Whenever we open our eyes, we are confronted with an overwhelming amount of visual information. Covert attention allows us to select visual information at a cued location, without eye movements, and to grant such information priority in processing.
M, Carrasco, B, McElree
openaire +2 more sources
Covert communications with channel inversion power control in uplink NOMA systems
Covert communications hide the very existence of wireless transmissions and thus can address privacy and security issues in non‐orthogonal multiple access (NOMA) systems.
Maochun Wang +5 more
doaj +1 more source
Glomerular filtration rate in schoolgirls with covert bacteriuria. [PDF]
Clearance of technetium-99m-labelled diethylenetriaminepenta-acetic acid was used to measure total and individual kidney glomerular filtration rates in 48 girls with covert bacteriuria. The mean (+/- SD) of the total rates of 18 girls with scarred kidneys (99 +/- 24 ml/min/1.73 m2) was significantly (0.005 greater than p greater than 0.002) lower than ...
K, Verrier Jones +5 more
openaire +2 more sources
Energy‐efficient covert communication with adaptive assist nodes group
In this paper, a joint detection strategy of Willie based on two phases observation is proposed and an energy‐efficient covert communication scheme with an adaptive assist nodes group (AANG) based on uniform jamming power (UJP) strategy is proposed to ...
Zehan Wan +4 more
doaj +1 more source
Rate Splitting Multiple Access (RSMA) has recently emerged as a promising technique to enhance the transmission rate for multiple access networks. Unlike conventional multiple access schemes, RSMA requires splitting and transmitting messages at different rates.
Nguyen Quang Hieu +5 more
openaire +3 more sources
HTTP Parameter Sorting Covert Channel Detection Method Based on Markov Model [PDF]
The network covert channel is a communication channel that establishes secret message transmission between different hosts on the network by utilizing reserved,optional or undefined fields in the network protocols.HTTP protocol,as one of the most ...
SHEN Guoliang, ZHAI Jiangtao, DAI Yuewei
doaj +1 more source
Transient covert attention and the perceived rate of flicker
Transient covert attention affects basic visual dimensions such as contrast sensitivity, spatial resolution, and temporal resolution. Two recent studies provide evidence of corresponding phenomenological changes: The increase in contrast sensitivity and spatial resolution at the attended location is associated with increased apparent contrast (M ...
Barbara, Montagna, Marisa, Carrasco
openaire +2 more sources
Covert Channel Communication as an Emerging Security Threat in 2.5D/3D Integrated Systems
In this paper, first, a broad overview of existing covert channel communication-based security attacks is provided. Such covert channels establish a communication link between two entities that are not authorized to share data. The secret data is encoded
Ivan Miketic +2 more
doaj +1 more source
A common short-term memory retrieval rate may describe many cognitive procedures [PDF]
We examine the relationship between response speed and the number of items in short-term memory (STM) in four different paradigms and find evidence for a similar high-speed processing rate of about 25–30 items per second (∼35–40 ms/item). We propose that
Baddeley +47 more
core +2 more sources
Beamforming Design and Covert Performance Analysis for Full-Duplex Multiantenna System
In this work, a wireless covert communication system with full-duplex (FD) multiantenna receiver is considered. In order to improve the convert performance of the wireless communication system in the FD mode, a scheme based on selection combining/zero ...
Ling Yang +5 more
doaj +1 more source

