The generalized Ball curves of Wang-Said type with a position parameter L not only unify the Wang-Ball curves and the Said-Ball curves, but also include several useful intermediate curves. This paper presents the dual...The generalized Ball curves of Wang-Said type with a position parameter L not only unify the Wang-Ball curves and the Said-Ball curves, but also include several useful intermediate curves. This paper presents the dual functionals for the generalized Ball basis of Wang-Said type. The relevant basis transformation formulae are also worked out.展开更多
The Global Positioning System(GPS)has become a foundation for most location-based services and navigation systems,such as autonomous vehicles,drones,ships,and wearable devices.However,it is a challenge to verify if th...The Global Positioning System(GPS)has become a foundation for most location-based services and navigation systems,such as autonomous vehicles,drones,ships,and wearable devices.However,it is a challenge to verify if the reported geographic locations are valid due to various GPS spoofing tools.Pervasive tools,such as Fake GPS,Lockito,and software-defined radio,enable ordinary users to hijack and report fake GPS coordinates and cheat the monitoring server without being detected.Furthermore,it is also a challenge to get accurate sensor readings on mobile devices because of the high noise level introduced by commercial motion sensors.To this end,we propose DeepPOSE,a deep learning model,to address the noise introduced in sensor readings and detect GPS spoofing attacks on mobile platforms.Our design uses a convolutional and recurrent neural network to reduce the noise,to recover a vehicle's real-time trajectory from multiple sensor inputs.We further propose a novel scheme to map the constructed trajectory from sensor readings onto the Google map,to smartly eliminate the accumulation of errors on the trajectory estimation.The reconstructed trajectory from sensors is then used to detect the GPS spoofing attack.Compared with the existing method,the proposed approach demonstrates a significantly higher degree of accuracy for detecting GPS spoofing attacks.展开更多
A Prioritized Medium Access Control (P-MAC) protocol is proposed for wireless routers of mesh networks with quality-of-service provisioning. The simple yet effective design of P-MAC offers strict service differentia...A Prioritized Medium Access Control (P-MAC) protocol is proposed for wireless routers of mesh networks with quality-of-service provisioning. The simple yet effective design of P-MAC offers strict service differentiation for prioritized packets. A Markov model is developed to yield important performance matrices including the packet blocking probability due to queue overflow and the packet reneging probability due to delay bound. It is further proved that the service time of P-MAC approximates exponential distribution, and can be effectively estimated. The analytic models with preemptive and non-preemptive schemes, validated via simulations, show that P-MAC can effectively support traffic differentiation and achieve very low packet dropping (both reneging and blocking) probabilities when the traffic load is below the channel capacity. When the network is overloaded, P-MAC can still maintain extremely stable and high channel throughput. Moreover, it is demonstrated that P-MAC performs superior in multihop networks, further proving the advantages of the proposed protocol.展开更多
The inelastic excitations and cluster decay of ^(13)C have been measured using the reaction,9Be(^(13)C, ^(13)C* →~9Be + α)~9Be. We observe strong excitation to the 14.3-MeV(1/2-) resonant state from the cluster-deca...The inelastic excitations and cluster decay of ^(13)C have been measured using the reaction,9Be(^(13)C, ^(13)C* →~9Be + α)~9Be. We observe strong excitation to the 14.3-MeV(1/2-) resonant state from the cluster-decay channel, leading to an enhanced monopole matrix element of(6.3 ± 0.6) fm^2. This large cluster-related monopole strength is a clear indication of the cluster-structure domination of this state and is consistent with the recent prediction of the orthogonality condition model(OCM). It would be interesting to further explore the three-center molecular rotational band that is initiated from the observed band-head.展开更多
The'island of inversion'has been known for over a quarter century,since Warburton et al.[1]proposed that nuclei with intruder ground states would constitute a 3×3 square with Z=10-12,N=20-22 in 1990.Uncov...The'island of inversion'has been known for over a quarter century,since Warburton et al.[1]proposed that nuclei with intruder ground states would constitute a 3×3 square with Z=10-12,N=20-22 in 1990.Uncovering the underlying inversion mechanism and exploring the scope of the island have attracted significant theoretical and experimental efforts in the following years.Now it is well known that the reduction of N=20 shell gap,which is likely caused by the展开更多
Cowpea protein isolate(CPI)was subjected to various dry and wet heat pretreatments followed by sequential digestion with pepsin and pancreatin;the undigested residues were isolated as the indigestible cowpea proteins(...Cowpea protein isolate(CPI)was subjected to various dry and wet heat pretreatments followed by sequential digestion with pepsin and pancreatin;the undigested residues were isolated as the indigestible cowpea proteins(ICPs).All the ICPs exhibited in vitro bile acid-binding capacity but ICP from the slow cooling-induced gelation had the highest yield(68%)and was used for rat feeding experiments to determine effect on plasma total cholesterol(TC).Groups consisting of 3 male and 3 female Sprague-Dawley rats each were fed hypercholesterolemic diets that contained casein only or casein that was partially substituted with ICP of CPI for 6 weeks.Results showed diet that contained 5%(w/w)ICP was more effective in preventing TC increase(1.8 mmol/L)when compared to increases of 9.34 and 4.15 mmol/L for CPI and casein only diets,respectively.展开更多
Physical layer security has attracted lots of attention with the expansion of wireless devices to the edge networks in recent years.Due to limited authentication mechanisms,MAC spoofing attack,also known as the identi...Physical layer security has attracted lots of attention with the expansion of wireless devices to the edge networks in recent years.Due to limited authentication mechanisms,MAC spoofing attack,also known as the identity attack,threatens wireless systems.In this paper,we study a new type of MAC spoofing attack,the virtual MAC spoofing attack,in a tight environment with strong spatial similarities,which can create multiple counterfeits entities powered by the virtualization technologies to interrupt regular services.We develop a system to effectively detect such virtual MAC spoofing attacks via the deep learning method as a countermeasure.A deep convolutional neural network is constructed to analyze signal level information extracted from Channel State Information(CSI)between the communication peers to provide additional authentication protection at the physical layer.A significant merit of the proposed detection system is that this system can distinguish two different devices even at the same location,which was not well addressed by the existing approaches.Our extensive experimental results demonstrate the effectiveness of the system with an average detection accuracy of 95%,even when devices are co-located.展开更多
基金Supported by the National Natural Science Foundation of China under Grant Nos. 10171026, 60473114,and Anhui Provincial Natural Science Foundation under Grant No. 03046102.
文摘The generalized Ball curves of Wang-Said type with a position parameter L not only unify the Wang-Ball curves and the Said-Ball curves, but also include several useful intermediate curves. This paper presents the dual functionals for the generalized Ball basis of Wang-Said type. The relevant basis transformation formulae are also worked out.
基金This work was supported in part by NSF under Grants CNS-1950704,CNS-1828593,and OAC-1829771,ONR under Grant N00014-20-1-2065,NSA under Grant H98230-21-1-0278,and the Commonwealth Cyber Initiative.
文摘The Global Positioning System(GPS)has become a foundation for most location-based services and navigation systems,such as autonomous vehicles,drones,ships,and wearable devices.However,it is a challenge to verify if the reported geographic locations are valid due to various GPS spoofing tools.Pervasive tools,such as Fake GPS,Lockito,and software-defined radio,enable ordinary users to hijack and report fake GPS coordinates and cheat the monitoring server without being detected.Furthermore,it is also a challenge to get accurate sensor readings on mobile devices because of the high noise level introduced by commercial motion sensors.To this end,we propose DeepPOSE,a deep learning model,to address the noise introduced in sensor readings and detect GPS spoofing attacks on mobile platforms.Our design uses a convolutional and recurrent neural network to reduce the noise,to recover a vehicle's real-time trajectory from multiple sensor inputs.We further propose a novel scheme to map the constructed trajectory from sensor readings onto the Google map,to smartly eliminate the accumulation of errors on the trajectory estimation.The reconstructed trajectory from sensors is then used to detect the GPS spoofing attack.Compared with the existing method,the proposed approach demonstrates a significantly higher degree of accuracy for detecting GPS spoofing attacks.
基金Supported in part by the National Science Foundation CAREER Award (No. CNS-0347686)US Department of Energy (DoE) (No. DE-FG02-04ER46136)
文摘A Prioritized Medium Access Control (P-MAC) protocol is proposed for wireless routers of mesh networks with quality-of-service provisioning. The simple yet effective design of P-MAC offers strict service differentiation for prioritized packets. A Markov model is developed to yield important performance matrices including the packet blocking probability due to queue overflow and the packet reneging probability due to delay bound. It is further proved that the service time of P-MAC approximates exponential distribution, and can be effectively estimated. The analytic models with preemptive and non-preemptive schemes, validated via simulations, show that P-MAC can effectively support traffic differentiation and achieve very low packet dropping (both reneging and blocking) probabilities when the traffic load is below the channel capacity. When the network is overloaded, P-MAC can still maintain extremely stable and high channel throughput. Moreover, it is demonstrated that P-MAC performs superior in multihop networks, further proving the advantages of the proposed protocol.
基金supported by the National Key R&D Program of China(Grant No.2018YFA0404403)the National Natural Science Foundation of China(Grant Nos.11535004,11775004,11775013,11775316,and11405005)
文摘The inelastic excitations and cluster decay of ^(13)C have been measured using the reaction,9Be(^(13)C, ^(13)C* →~9Be + α)~9Be. We observe strong excitation to the 14.3-MeV(1/2-) resonant state from the cluster-decay channel, leading to an enhanced monopole matrix element of(6.3 ± 0.6) fm^2. This large cluster-related monopole strength is a clear indication of the cluster-structure domination of this state and is consistent with the recent prediction of the orthogonality condition model(OCM). It would be interesting to further explore the three-center molecular rotational band that is initiated from the observed band-head.
基金supported by the National Natural Science Foundation of China(Grant Nos.11575006,11675003,11375017,11235001,11335002, 11375015,11320101004,and 11461141002)the China Postdoctoral Science Foundation(Grant Nos.2015M580007,and 2016T90007)the Chinese Major State Basic Research Development Program(Grant No.2013CB834400)
文摘The'island of inversion'has been known for over a quarter century,since Warburton et al.[1]proposed that nuclei with intruder ground states would constitute a 3×3 square with Z=10-12,N=20-22 in 1990.Uncovering the underlying inversion mechanism and exploring the scope of the island have attracted significant theoretical and experimental efforts in the following years.Now it is well known that the reduction of N=20 shell gap,which is likely caused by the
文摘Cowpea protein isolate(CPI)was subjected to various dry and wet heat pretreatments followed by sequential digestion with pepsin and pancreatin;the undigested residues were isolated as the indigestible cowpea proteins(ICPs).All the ICPs exhibited in vitro bile acid-binding capacity but ICP from the slow cooling-induced gelation had the highest yield(68%)and was used for rat feeding experiments to determine effect on plasma total cholesterol(TC).Groups consisting of 3 male and 3 female Sprague-Dawley rats each were fed hypercholesterolemic diets that contained casein only or casein that was partially substituted with ICP of CPI for 6 weeks.Results showed diet that contained 5%(w/w)ICP was more effective in preventing TC increase(1.8 mmol/L)when compared to increases of 9.34 and 4.15 mmol/L for CPI and casein only diets,respectively.
文摘Physical layer security has attracted lots of attention with the expansion of wireless devices to the edge networks in recent years.Due to limited authentication mechanisms,MAC spoofing attack,also known as the identity attack,threatens wireless systems.In this paper,we study a new type of MAC spoofing attack,the virtual MAC spoofing attack,in a tight environment with strong spatial similarities,which can create multiple counterfeits entities powered by the virtualization technologies to interrupt regular services.We develop a system to effectively detect such virtual MAC spoofing attacks via the deep learning method as a countermeasure.A deep convolutional neural network is constructed to analyze signal level information extracted from Channel State Information(CSI)between the communication peers to provide additional authentication protection at the physical layer.A significant merit of the proposed detection system is that this system can distinguish two different devices even at the same location,which was not well addressed by the existing approaches.Our extensive experimental results demonstrate the effectiveness of the system with an average detection accuracy of 95%,even when devices are co-located.