In static or quasi-static wireless channel environments, secret key generation(SKG) based on wireless channels is vulnerable to active attacks due to the openness and invariance of public pilot, especially man-inthe-m...In static or quasi-static wireless channel environments, secret key generation(SKG) based on wireless channels is vulnerable to active attacks due to the openness and invariance of public pilot, especially man-inthe-middle(MITM) attacks, where attacker acts as a transparent relay to manipulate channel measurements and derive the generated keys. In order to fight against this attack, a dynamic private pilot is designed, where both private pilot and secret key are derived from the characteristics of wireless channels and private to third party. In static or quasi-static environments, we use singular value decomposition techniques to reconstitute the wireless channels to improve the randomness of the wireless channels. Private pilot can encrypt and authenticate the wireless channels, which can make channel state information intercepted by MITM attacker reduced to zero and the SKG rate close to that without attacks. Results of analysis and simulation show the proposed SKG scheme can withdraw the MITM attacks.展开更多
In recent years, there has been an increasing interest in wood properties, because wood is a commonly used and advanced building material. In this paper, the effect of anatomical characters on the transverse fracture ...In recent years, there has been an increasing interest in wood properties, because wood is a commonly used and advanced building material. In this paper, the effect of anatomical characters on the transverse fracture properties of green wood was investigated. The specific fracture energy (Gf J/m2) of ash (Fraxinus excelsior), cherry (Prunus avium) and birch (Betula pendula) was evaluated using double edge notched tensile tests. The tests were performed on both earlywood (EW) and latewood (LW) zones in both the radial-tangential (RT) and the tangential-radial (TR) crack propagation systems. Wood anatomy and the failure patterns of each species were also investigated using environmental scanning electron microscopy (ESEM) and light microscopy (LMC). The results showed that the Gfof RT fracture systems was around 1.5 times greater than in the TR one, whereas there were no significant differences between EW and LW zones. ESEM micrographs showed that the RT fracture system had a rougher fracture surface, while the TR had a nearly smooth and fiat fracture surface. In particular, the wood ofF. excelsior was the toughest, because of its greater percentage of rays and homogenous distribution of ray cells, while P. avium and B. pendula showed a lower Gf due to their smaller percentage of rays with a distinctive arrangement of ray cells.展开更多
The observed images of the asteroid and the asteroid reference images are used to obtain the probe-to-asteroid direction and the location of the limb features of the asteroid in the inertial coordinate. These informa-...The observed images of the asteroid and the asteroid reference images are used to obtain the probe-to-asteroid direction and the location of the limb features of the asteroid in the inertial coordinate. These informa-tion in combination with the shape model of the asteroid and attitude information of the probe are utilized to ob-tain the position of the probe. The position information is then input to the UKF which determines the real-timeorbit of the probe. Finally, the autonomous orbit determination algorithm is validated using digital simulation.The determination of orbit using UKF is compared with that using extended Kalman filter (EKF), and the resultshows that UKF is superior to EKF.展开更多
基金supported in part by National Natural Science Foundation of China under Grants No.61601514, 61401510, 61379006Project funded by China Postdoctoral Science Foundation: 2016M592990
文摘In static or quasi-static wireless channel environments, secret key generation(SKG) based on wireless channels is vulnerable to active attacks due to the openness and invariance of public pilot, especially man-inthe-middle(MITM) attacks, where attacker acts as a transparent relay to manipulate channel measurements and derive the generated keys. In order to fight against this attack, a dynamic private pilot is designed, where both private pilot and secret key are derived from the characteristics of wireless channels and private to third party. In static or quasi-static environments, we use singular value decomposition techniques to reconstitute the wireless channels to improve the randomness of the wireless channels. Private pilot can encrypt and authenticate the wireless channels, which can make channel state information intercepted by MITM attacker reduced to zero and the SKG rate close to that without attacks. Results of analysis and simulation show the proposed SKG scheme can withdraw the MITM attacks.
文摘In recent years, there has been an increasing interest in wood properties, because wood is a commonly used and advanced building material. In this paper, the effect of anatomical characters on the transverse fracture properties of green wood was investigated. The specific fracture energy (Gf J/m2) of ash (Fraxinus excelsior), cherry (Prunus avium) and birch (Betula pendula) was evaluated using double edge notched tensile tests. The tests were performed on both earlywood (EW) and latewood (LW) zones in both the radial-tangential (RT) and the tangential-radial (TR) crack propagation systems. Wood anatomy and the failure patterns of each species were also investigated using environmental scanning electron microscopy (ESEM) and light microscopy (LMC). The results showed that the Gfof RT fracture systems was around 1.5 times greater than in the TR one, whereas there were no significant differences between EW and LW zones. ESEM micrographs showed that the RT fracture system had a rougher fracture surface, while the TR had a nearly smooth and fiat fracture surface. In particular, the wood ofF. excelsior was the toughest, because of its greater percentage of rays and homogenous distribution of ray cells, while P. avium and B. pendula showed a lower Gf due to their smaller percentage of rays with a distinctive arrangement of ray cells.
文摘The observed images of the asteroid and the asteroid reference images are used to obtain the probe-to-asteroid direction and the location of the limb features of the asteroid in the inertial coordinate. These informa-tion in combination with the shape model of the asteroid and attitude information of the probe are utilized to ob-tain the position of the probe. The position information is then input to the UKF which determines the real-timeorbit of the probe. Finally, the autonomous orbit determination algorithm is validated using digital simulation.The determination of orbit using UKF is compared with that using extended Kalman filter (EKF), and the resultshows that UKF is superior to EKF.