-
Investigation of $^{31}$P levels near the proton threshold by Nuclear Resonance Fluorescence and the impact on the $^{30}$Si(p,$γ$)$^{31}$P thermonuclear rate
Authors:
David Gribble,
Christian Iliadis,
Robert V. F. Janssens,
Udo Friman-Gayer,
Akaa D. Ayangeakaa,
Art Champagne,
Emily Churchman,
William Fox,
Steven Frye,
Xavier K. -H. James,
Samantha R. Johnson,
Richard Longland,
Antonella Saracino,
Nirupama Sensharma,
Kaixin Song,
Clay Wegner
Abstract:
We investigated the nuclear structure of $^{31}$P near the proton threshold using Nuclear Resonance Fluorescence (NRF) to refine the properties of key resonances in the $^{30}$Si(p,$γ$)$^{31}$P reaction, which is critical for nucleosynthesis in stellar environments. Excitation energies and spin-parities were determined for several states, including two unobserved resonances at $E_r$ $=$ $18.7$~keV…
▽ More
We investigated the nuclear structure of $^{31}$P near the proton threshold using Nuclear Resonance Fluorescence (NRF) to refine the properties of key resonances in the $^{30}$Si(p,$γ$)$^{31}$P reaction, which is critical for nucleosynthesis in stellar environments. Excitation energies and spin-parities were determined for several states, including two unobserved resonances at $E_r$ $=$ $18.7$~keV and $E_r$ $=$ $50.5$~keV. The angular correlation analysis enabled the first unambiguous determination of the orbital angular momentum transfer for these states. These results provide a significant update to the $^{30}$Si(p,$γ$)$^{31}$P thermonuclear reaction rate, with direct implications for models of nucleosynthesis in globular clusters and other astrophysical sites. The revised rate is substantially lower than previous estimates at temperatures below $200$~MK, affecting predictions for silicon isotopic abundances in stellar environments. Our work demonstrates the power of NRF in constraining nuclear properties, and provides a framework for future studies of low-energy resonances relevant to astrophysical reaction rates.
△ Less
Submitted 5 June, 2025;
originally announced June 2025.
-
Contextualizing Security and Privacy of Software-Defined Vehicles: State of the Art and Industry Perspectives
Authors:
Marco De Vincenzi,
Mert D. Pesé,
Chiara Bodei,
Ilaria Matteucci,
Richard R. Brooks,
Monowar Hasan,
Andrea Saracino,
Mohammad Hamad,
Sebastian Steinhorst
Abstract:
The growing reliance on software in vehicles has given rise to the concept of Software-Defined Vehicles (SDVs), fundamentally reshaping the vehicles and the automotive industry. This survey explores the cybersecurity and privacy challenges posed by SDVs, which increasingly integrate features like Over-the-Air (OTA) updates and Vehicle-to-Everything (V2X) communication. While these advancements enh…
▽ More
The growing reliance on software in vehicles has given rise to the concept of Software-Defined Vehicles (SDVs), fundamentally reshaping the vehicles and the automotive industry. This survey explores the cybersecurity and privacy challenges posed by SDVs, which increasingly integrate features like Over-the-Air (OTA) updates and Vehicle-to-Everything (V2X) communication. While these advancements enhance vehicle capabilities and flexibility, they also come with a flip side: increased exposure to security risks including API vulnerabilities, third-party software risks, and supply-chain threats. The transition to SDVs also raises significant privacy concerns, with vehicles collecting vast amounts of sensitive data, such as location and driver behavior, that could be exploited using inference attacks. This work aims to provide a detailed overview of security threats, mitigation strategies, and privacy risks in SDVs, primarily through a literature review, enriched with insights from a targeted questionnaire with industry experts. Key topics include defining SDVs, comparing them to Connected Vehicles (CVs) and Autonomous Vehicles (AVs), discussing the security challenges associated with OTA updates and the impact of SDV features on data privacy. Our findings highlight the need for robust security frameworks, standardized communication protocols, and privacy-preserving techniques to address the issues of SDVs. This work ultimately emphasizes the importance of a multi-layered defense strategy,integrating both in-vehicle and cloud-based security solutions, to safeguard future SDVs and increase user trust.
△ Less
Submitted 22 December, 2024; v1 submitted 15 November, 2024;
originally announced November 2024.
-
Concise Thoughts: Impact of Output Length on LLM Reasoning and Cost
Authors:
Sania Nayab,
Giulio Rossolini,
Marco Simoni,
Andrea Saracino,
Giorgio Buttazzo,
Nicolamaria Manes,
Fabrizio Giacomelli
Abstract:
Today's large language models (LLMs) can solve challenging question-answering tasks, and prompt engineering techniques, such as chain-of-thought (CoT), have gained attention for enhancing the explanation and correctness of outputs. However, many models and techniques tend to produce excessively verbose and lengthy answers, leading to issues with both conciseness and generation time. To address thi…
▽ More
Today's large language models (LLMs) can solve challenging question-answering tasks, and prompt engineering techniques, such as chain-of-thought (CoT), have gained attention for enhancing the explanation and correctness of outputs. However, many models and techniques tend to produce excessively verbose and lengthy answers, leading to issues with both conciseness and generation time. To address this, this paper analyzes the impact of output lengths on LLM inference pipelines by introducing and proposing novel metrics to evaluate the \textit{correct conciseness} of a model and related prompting techniques. Then, we examine the impact of controlling output length through a refined prompt engineering strategy, Constrained-CoT (CCoT), which encourages the model to produce more concise outputs. To better understand the effects of such a prompt, we also introduce two additional scores for analyzing the conciseness, measured in terms of redundancy and information flow in generated answers. Experiments on pretrained LLMs and multiple datasets demonstrate the benefits of the proposed metrics and the effectiveness of CCoT across different models.
△ Less
Submitted 23 January, 2025; v1 submitted 29 July, 2024;
originally announced July 2024.
-
MoRSE: Bridging the Gap in Cybersecurity Expertise with Retrieval Augmented Generation
Authors:
Marco Simoni,
Andrea Saracino,
Vinod P.,
Mauro Conti
Abstract:
In this paper, we introduce MoRSE (Mixture of RAGs Security Experts), the first specialised AI chatbot for cybersecurity. MoRSE aims to provide comprehensive and complete knowledge about cybersecurity. MoRSE uses two RAG (Retrieval Augmented Generation) systems designed to retrieve and organize information from multidimensional cybersecurity contexts. MoRSE differs from traditional RAGs by using p…
▽ More
In this paper, we introduce MoRSE (Mixture of RAGs Security Experts), the first specialised AI chatbot for cybersecurity. MoRSE aims to provide comprehensive and complete knowledge about cybersecurity. MoRSE uses two RAG (Retrieval Augmented Generation) systems designed to retrieve and organize information from multidimensional cybersecurity contexts. MoRSE differs from traditional RAGs by using parallel retrievers that work together to retrieve semantically related information in different formats and structures. Unlike traditional Large Language Models (LLMs) that rely on Parametric Knowledge Bases, MoRSE retrieves relevant documents from Non-Parametric Knowledge Bases in response to user queries. Subsequently, MoRSE uses this information to generate accurate answers. In addition, MoRSE benefits from real-time updates to its knowledge bases, enabling continuous knowledge enrichment without retraining. We have evaluated the effectiveness of MoRSE against other state-of-the-art LLMs, evaluating the system on 600 cybersecurity specific questions. The experimental evaluation has shown that the improvement in terms of relevance and correctness of the answer is more than 10\% compared to known solutions such as GPT-4 and Mixtral 7x8.
△ Less
Submitted 22 July, 2024;
originally announced July 2024.
-
Evolution of chirality from transverse wobbling in $^{135}$Pr
Authors:
N. Sensharma,
U. Garg,
Q. B. Chen,
S. Frauendorf,
S. Zhu,
J. Arroyo,
A. D. Ayangeakaa,
D. P. Burdette,
M. P. Carpenter,
P. Copp,
J. L. Cozzi,
S. S. Ghugre,
D. J. Hartley,
K. B. Howard,
R. V. F. Janssens,
F. G. Kondev,
T. Lauritsen,
J. Li,
R. Palit,
A. Saracino,
D. Seweryniak,
S. Weyhmiller,
J. Wu
Abstract:
Chirality is a distinct signature that characterizes triaxial shapes in nuclei. We report the first observation of chirality in the nucleus $^{135}$Pr using a high-statistics Gammasphere experiment with the $^{123}$Sb($^{16}$O,4n)$^{135}$Pr reaction. Two chiral-partner bands with the configuration $π(1h_{11/2})^1\otimes ν(1h_{11/2})^{-2}$ have been identified in this nucleus. Angular distribution…
▽ More
Chirality is a distinct signature that characterizes triaxial shapes in nuclei. We report the first observation of chirality in the nucleus $^{135}$Pr using a high-statistics Gammasphere experiment with the $^{123}$Sb($^{16}$O,4n)$^{135}$Pr reaction. Two chiral-partner bands with the configuration $π(1h_{11/2})^1\otimes ν(1h_{11/2})^{-2}$ have been identified in this nucleus. Angular distribution analyses of the $ΔI = 1$ connecting transitions between the two chiral partners have revealed a dominant dipole character. Quasiparticle triaxial rotor model calculations are in good agreement with the experiment. This is the first time that both signatures of triaxiality--chirality and wobbling--have been observed in the same nucleus.
△ Less
Submitted 15 March, 2024;
originally announced March 2024.
-
Practical Location Validation in Participatory Sensing Through Mobile WiFi Hotspots
Authors:
Francesco Restuccia,
Andrea Saracino,
Fabio Martinelli
Abstract:
The reliability of information in participatory sensing (PS) systems largely depends on the accuracy of the location of the participating users. However, existing PS applications are not able to efficiently validate the position of users in large-scale outdoor environments. In this paper, we present an efficient and scalable Location Validation System (LVS) to secure PS systems from location-spoof…
▽ More
The reliability of information in participatory sensing (PS) systems largely depends on the accuracy of the location of the participating users. However, existing PS applications are not able to efficiently validate the position of users in large-scale outdoor environments. In this paper, we present an efficient and scalable Location Validation System (LVS) to secure PS systems from location-spoofing attacks. In particular, the user location is verified with the help of mobile WiFi hot spots (MHSs), which are users activating the WiFi hotspot capability of their smartphones and accepting connections from nearby users, thereby validating their position inside the sensing area. The system also comprises a novel verification technique called Chains of Sight, which tackles collusion-based attacks effectively. LVS also includes a reputation-based algorithm that rules out sensing reports of location-spoofing users. The feasibility and efficiency of the WiFi-based approach of LVS is demonstrated by a set of indoor and outdoor experiments conducted using off-the-shelf smartphones, while the energy-efficiency of LVS is demonstrated by experiments using the Power Monitor energy tool. Finally, the security properties of LVS are analyzed by simulation experiments. Results indicate that the proposed LVS system is energy-efficient, applicable to most of the practical PS scenarios, and efficiently secures existing PS systems from location-spoofing attacks.
△ Less
Submitted 19 May, 2018;
originally announced May 2018.
-
Cell List Algorithms for Nonequilibrium Molecular Dynamics
Authors:
Matthew Dobson,
Ian Fox,
Alexandra Saracino
Abstract:
We present two modifications of the standard cell list algorithm for nonequilibrium molecular dynamics simulations of homogeneous, linear flows. When such a flow is modeled with periodic boundary conditions, the simulation box deforms with the flow, and recent progress has been made developing boundary conditions suitable for general 3D flows of this type. For the typical case of short-ranged, pai…
▽ More
We present two modifications of the standard cell list algorithm for nonequilibrium molecular dynamics simulations of homogeneous, linear flows. When such a flow is modeled with periodic boundary conditions, the simulation box deforms with the flow, and recent progress has been made developing boundary conditions suitable for general 3D flows of this type. For the typical case of short-ranged, pairwise interactions, the cell list algorithm reduces computational complexity of the force computation from O($N^2$) to O($N$), where $N$ is the total number of particles in the simulation box. The new versions of the cell list algorithm handle the dynamic, deforming simulation geometry. We include a comparison of the complexity and efficiency of the two proposed modifications of the standard algorithm.
△ Less
Submitted 11 December, 2014;
originally announced December 2014.