Results 51 to 60 of about 163,707 (282)
Optimal Position and Target Rate for Covert Communication in UAV-Assisted Uplink RSMA Systems
With the explosive increase in demand for wireless communication, the issue of wireless communication security has also become a growing concern. In this paper, we investigate a novel covert communication for unmanned aerial vehicle (UAV)-assisted uplink
Zhengxiang Duan +3 more
doaj +1 more source
Optimal Throughput for Covert Communication Over a Classical-Quantum Channel
This paper considers the problem of communication over a memoryless classical-quantum wiretap channel subject to the constraint that the eavesdropper on the channel should not be able to learn whether the legitimate parties are using the channel to ...
Wang, Ligong
core +4 more sources
Existence detection and embedding rate estimation of blended speech in covert speech communications [PDF]
Covert speech communications may be used by terrorists to commit crimes through Internet. Steganalysis aims to detect secret information in covert communications to prevent crimes. Herein, based on the average zero crossing rate of the odd-even difference (AZCR-OED), a steganalysis algorithm for blended speech is proposed; it can detect the existence ...
Li, Lijuan, Gao, Yong
openaire +2 more sources
ABSTRACT Background Nurses are central to cancer care for children and adolescents, yet no comprehensive synthesis has defined essential core competencies for pediatric oncology nursing (PON) practice internationally, particularly in Latin America and the Caribbean (LAC).
Luís Carlos Lopes‐Júnior +7 more
wiley +1 more source
Covert communications in a compress-and-forward relay system
In this paper, we study covert communications strategies in a compress-and-forward (CF) relay system. Along with a public message to a destination node via a CF relay, a source node attempts to transmit a covert message while evading the surveillance of ...
Jihwan Moon
doaj +1 more source
Continuous noise covert transmission scheme based on QCSK
The existing embedded scheme requires far lower transmission power of the covert system than that of the host system, and thus decreasing the reliability of covert transmission.To figure out the above limitations, a continuous noise covert communication ...
Ying HUANG, Zehan WAN, Jing LEI, Ke LAI
doaj +2 more sources
ABSTRACT Background Kaposiform lymphangiomatosis (KLA) is an aggressive complex lymphatic anomaly. Patients exhibit malformed lymphatic vessels and often develop hemorrhagic effusions and elevated angiopoietin‐2 (Ang‐2) levels. A somatic NRAS p.Q61R (NRASQ61R) mutation has been associated with KLA.
C. Griffin McDaniel +3 more
wiley +1 more source
ABSTRACT Background The management of clinically apparent single lesions or oligofocal nephroblastomatosis, a facultative precursor of nephroblastoma, remains debated. Methods We retrospectively analyzed 37 patients with clinically apparent single or oligofocal nephroblastomatosis (two to three lesions per kidney) among 2347 patients registered between
Nils Welter +17 more
wiley +1 more source
Covert Communications in a Hybrid DF/AF Relay System
In this paper, we study covert communications in a hybrid decode-and-forward (DF)/ amplify-and-forward (AF) relay system. The considered relay in normal operation forwards messages from a source node to a destination node in either DF or AF mode on ...
Jihwan Moon
doaj +1 more source
The intelligent terminals deployed in hydropower IoT can quickly sense the status of hydropower equipment, thus improving the efficiency of system control and operation.
Zhenchun Le +6 more
doaj +1 more source

