14 results on '"Han, Jiajia"'
Search Results
2. Laser beam imaging technique for atmospheric detection
- Author
-
Zongming Tao, Dong Liu, Han Jiajia, Huihui Shan, Zhenzhu Wang, Hui Zhang, Ma Xiaomin, Shenhao Wang, and Yingjian Wang
- Subjects
Materials science ,business.industry ,Image plane ,Aerosol ,law.invention ,Lens (optics) ,Optics ,Lidar ,law ,Atmospherics ,Charge-coupled device ,business ,Image resolution ,Physics::Atmospheric and Oceanic Physics ,Beam divergence - Abstract
Atmospheric detection is the basis of air pollution control, lidar is a powerful tool for atmospheric detection. Because of blind area and transition area, lidar cannot get complete echo signals in the near range. Laser beam imaging technique based on charge coupled device (CCD) can solve the above difficulties caused by lidar effectively. Laser beam imaging technique is studied from theoretical analysis and simulation experiment, including imaging characteristics, the angle relationship between CCD image plane and lens plane, the influence of laser beam divergence angle on detecting spatial resolution. The comparison experiments show that laser beam imaging technique in detecting atmospherics is reliable and feasible. Furthermore, the application cases are given in detecting aerosol backscattering coefficient, aerosol extinction coefficient, aerosol phase function and PM2.5 mass concentration
- Published
- 2021
3. Research on Microservice Application Testing Based on Mock Technology
- Author
-
Fang Liping, Sun Changhua, Han Jiajia, Tang Qingzhao, Zhang Xiaohui, and Du Lin
- Subjects
Scheme (programming language) ,Unit testing ,Software deployment ,Computer science ,Integration testing ,Stub (distributed computing) ,Systems engineering ,Intelligent decision support system ,Virtual reality ,computer ,computer.programming_language ,Test (assessment) - Abstract
In order to overcome the problems existing in the use of the micro-service application system and improve the work efficiency of the micro-service application system, this paper proposes a novel construction method of the micro-service application system based on Mock technology. The construction method uses mock technology, and analyses and studies mock technology and stub technology. In addition, the construction method also deeply analyzes the requirements of unit test integration test, and then formulates a test scheme that meets the requirements of micro-service application system. Based on this, the construction method also studies and develops supporting test tools for the developed test scheme, and determines the deployment mode of test tools. The results of this study show that this construction method can better solve the problems existing in the use of the current micro-service application system, and can fundamentally improve the accuracy of testing the micro-service application system.
- Published
- 2020
4. Thermodynamic Assessment of Co-Nb-W System
- Author
-
Guo Yihui, Liu Xingjun, Chen Yuechao, Niu Zeming, Lu Yong, Wang Cuiping, and Han Jiajia
- Subjects
Ternary numeral system ,Materials science ,Phase (matter) ,General Engineering ,Thermodynamics ,Model parameters ,Binary system ,CALPHAD ,Isothermal process - Abstract
The thermodynamic assessment of the Co-Nb-W ternary system has been carried out by applying the CALPHAD method. A slight modification of the Co-W binary system has been performed to unify the model of μ phase in Co-Nb-W system. The three published isothermal sections at 1273, 1373 and 1473 K have been critically examined and used to optimize the model parameters. The solution phases, including αCo and bcc were modeled as substitutional solutions; the λ, χ, and Co3Nb phases have been assessed using two-sublattice models. The Co7W6 and Co7Nb6 phases were described as (Co, Nb)1(Co, Nb, W)2(Co, Nb, W)4(Co)6. Calculated isothermal sections and vertical sections agreed well with the experimental data.
- Published
- 2018
5. Network threat detection based on correlation analysis of multi-platform multi-source alert data
- Author
-
Jing Ou, Xindai Lu, Li Jiyuan, Han Jiajia, Qianbo Ren, and Dai Hua
- Subjects
Sequence ,Computer Networks and Communications ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,Construct (python library) ,computer.software_genre ,Set (abstract data type) ,ALARM ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,Attack patterns ,020201 artificial intelligence & image processing ,Data mining ,Cluster analysis ,computer ,Software ,Multi-source - Abstract
It is difficult for security administrators to detect attacks well when they are faced with large amounts of multi-platform multi-source alert data. However, most attack events are not isolated and has a certain number of steps. With the help of alert correlation, attacks can be revealed well. In our paper, we propose a PMASP (Purpose-oriented Maximum Attack Sequence Patterns) algorithm for threat detection based on alert correlation. Firstly, we format alarm records and reduce redundant alarms. Then, with the help of attack classification, we generate initial attack sequences through clustering. Later, PMASP is employed to dig out frequent sequences set. Finally, we use xml language to construct rules for detection. These rules represent some attack patterns which are helpful for security administrators. We simulate several attacks and use some rules to detect. The detection rate shows that the rule is reasonable and effectively.
- Published
- 2018
6. The Numerical Simulation for the Heat Transfer Enhancement Experiments of the HCCB-TBM First Wall
- Author
-
Bo Shi, Desheng Cheng, Haifei Deng, Han Jiajia, Hui Wang, Weihua Wang, and Jinhong Yang
- Subjects
Nuclear and High Energy Physics ,Materials science ,Computer simulation ,Heat transfer enhancement ,Nuclear engineering ,chemistry.chemical_element ,Blanket ,Condensed Matter Physics ,01 natural sciences ,010305 fluids & plasmas ,Coolant ,chemistry ,Heat flux ,0103 physical sciences ,Heat transfer ,Deposition (phase transition) ,010306 general physics ,Helium - Abstract
The first wall (FW) of helium gas-cooled ceramic breeder test blanket module for ITER need bears the loads like high-power density heat flux from plasma, nuclear heat from neutron deposition on the structure, and the transient high heat loads like plasma disruption. To enhance the helium gas cooling efficiency and security in FW, heat transfer enhancement technology should be used to improve and optimize the design scheme of helium flow channel for meeting the functional requirements of FW. Based on this objective, the filling–evacuating high-pressure helium-cooled loop (HPHCL) was built to test and prove the heat transfer enhancement schemes of helium gas cooling FW. In this paper, the design scheme of the filling–evacuating HPHCL was presented, and the key issues of engineering manufacture and the test cases are calculated and analyzed. Numerical simulation results are compared to acquire optimizational heat transfer enhancement schemes like placing transversal ribs and V-shaped ribs in the flow channel of front wall of FW. The helium gas turbulence intensity and the heat transfer area are improved through optimizing the distance and angle between V-shaped ribs and other coefficients to enhance heat transfer. The calculation results are used as reference for the verification experiments, which the 8–10-MPa high pressure helium gas will be selected as coolant.
- Published
- 2018
7. A Study of Communication Strategy in Pilot’s Interview for Abroad Training From the Perspective of SAT
- Author
-
Han Jiajia
- Subjects
Medical education ,Perspective (graphical) ,Sociology ,Training (civil) - Published
- 2019
8. Full Time Discharge Simulation and Plasma Profile Control for CFETR
- Author
-
Bo Shi, Han Jiajia, Weihua Wang, Jinhong Yang, and Rongfei Wang
- Subjects
Nuclear and High Energy Physics ,Materials science ,Tokamak ,Divertor ,Nuclear engineering ,Plasma ,Radius ,01 natural sciences ,010305 fluids & plasmas ,law.invention ,Nuclear Energy and Engineering ,Physics::Plasma Physics ,law ,Control system ,0103 physical sciences ,Limiter ,Waveform ,Nuclear fusion ,010306 general physics - Abstract
Tokamak Simulation Code (TSC) is a numerical model of an axisymmetric free boundary tokamak plasma and the associated control systems. The time dependence of ohmic discharges of China Fusion Engineering Test Reactor (CFETR) has been simulated using TSC in this work. According to the CFETR design requirements, the poloidal field coils current waveforms are designed. The ramp up, flat top in single-null configuration ohmic discharge plasma current are simulated by the CS and PF coils current waveforms. Displacement feedback system and current feedback system are used to control the plasma from the limiter shape to the divertor shape. Major radius, minor radius, triangle deformation, elongation, plasma configuration and volt-second consumption are obtained. The calculation results can be beneficial to provide the references for CFETR physics design and components design.
- Published
- 2016
9. An Active Android Application Repacking Detection Approach
- Author
-
Hua Dai, Sun Xin, Han Jiajia, and Li Qinyuan
- Subjects
business.industry ,Computer science ,020207 software engineering ,0102 computer and information sciences ,02 engineering and technology ,Encryption ,01 natural sciences ,010201 computation theory & mathematics ,Android malware ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,Android application ,Android (operating system) ,business ,Digital watermarking - Abstract
Repackaging applications as the main carrier of Android malware have caused huge losses to users. In addition, the third-party application market that Android applications rely on is characterized by missing audits and lax supervision, which further encourages the distribution of repackaged applications. Most of the traditional repackaging detection approaches need to rely on a third-party detection platform to passively determine whether or not the Android application is repackaged, which has a high false negative rate. In order to solve the problem, this paper proposes an active detection approach for Android code repacking. The approach embeds code watermarking with the detection code into the appropriate conditional branch code block by means of dynamic loading to achieve the hidden purpose. Then, the active detection approach compares the consistency of the runtime application signature and the original code watermarking signature to realize the code repackaging recognition. Finally, this work takes eight different types of Android applications from Github on three different mobile phones to verify the validity of the approach. Experimental results show that an Android application containing a self-detecting code watermarking can effectively perform repackaging detection without relying on third parties.
- Published
- 2018
10. Secure Edge Electricity Data Aggregation Scheme for Low Voltage Transformer Areas
- Author
-
Zhou Ziqiang, Han Jiajia, Zixiang Wang, and Zhoubin Liu
- Subjects
Data aggregator ,History ,business.industry ,Computer science ,law ,Electrical engineering ,Electricity ,business ,Transformer ,Low voltage ,Computer Science Applications ,Education ,law.invention - Abstract
The smart grid system is the physical power infrastructure integrated with many intelligent electronic devices. It supports the two-way flow of energy as well as information. The smart meters are important intelligent devices, which account for the largest portion among all terminals in the smart grid. In many application scenarios, the master station need high frequency total electricity consumption information of each low voltage transformer area. It requires frequent data interchange between smart meters and master station. However, the electric communication network cannot provide enough bandwidth resource to support such high frequency data interchange. Edge Computing Nodes (ECNs), which can be deployed at different low voltage transformer areas, can achieve the electricity data aggregation at the edge side. The communication resource can be saved since only aggregated electricity data will be uploaded to the master station. Traditional data aggregation scheme requires the plaintext from smart meters. From the viewpoint of security and privacy-preserving, it is not safe to implement the data decryption operation at edge side. Therefore, the data aggregation scheme with ciphertext is required at the edge side. In this paper, we propose a secure edge electricity data aggregation scheme based on homomorphic public key encryption techniques. The ECNs will implement the electricity data aggregation with the ciphertext from different smart meters, and the aggregated data will be transmitted to the master station through communication network. The mater station can use its public key to obtain the total electricity consumption of each low voltage transformer area.
- Published
- 2019
11. Mimic Defense System Security Analysis Model
- Author
-
Li Qinyuan, Sun Xin, Han Jiajia, Zhang Bo, and Qin Junning
- Subjects
Related factors ,History ,Security analysis ,Computer science ,Distributed computing ,Information system ,Redundancy (engineering) ,Probabilistic analysis of algorithms ,Security assessment ,Dynamic feature ,Computer Science Applications ,Education - Abstract
In this article, the mimic defense technology based on dynamic heterogeneous redundancy architecture is studied, and the mimic defense system is described formally to improve the proactive defense capability of information systems and key equipment in the network. A method integrating dynamic feature, heterogeneous feature and redundant feature that carries out security analysis of mimic defense system by probabilistic analysis is proposed for the lack of effective security assessment method about mimic defense system. Vali-dated by simulation experiments simulating the attacker and the mimic defense system, this model can calculate the safety of the mimic defense system according to the attack factor, heterogeneity degree, dynamic transformation and other related factors. According to the research results, the proposed model is of certain guiding significance for helping designers to construct mimic defense system.
- Published
- 2019
12. Plasma ohmic discharge simulation of CFETR
- Author
-
Jinhong Yang, Bo Shi, Rongfei Wang, Weihua Wang, and Han Jiajia
- Subjects
Engineering ,Tokamak ,business.industry ,Plasma parameters ,Divertor ,Plasma ,Mechanics ,Radius ,law.invention ,Physics::Plasma Physics ,law ,Limiter ,Waveform ,business ,Ohmic contact ,Simulation - Abstract
Tokamak Simulation Code (TSC) is a numerical model of an axisymmetric free boundary tokamak plasma and the associated control systems. The time dependence of ohmic discharges of China Fusion Engineering Test Reactor (CFETR) has been simulated using TSC in this work. The TSC numerical model, CFETR device and plasma parameters are presented. According to the CFETR design requirements, the poloidal field coils current waveforms are designed. The ramp up, flat top, ramp down in double-null configuration ohmic discharge plasma current are simulated by the poloidal field coils current waveforms and NBI heating. Displacement feedback system and current feedback system are used to control the plasma from the limiter shape to the divertor shape. Major radius, minor radius, triangle deformation, elongation, plasma configuration are obtained. The calculation results can be beneficial to provide the references for CFETR physics design and components design.
- Published
- 2015
13. Thoughts on The Marketing Mode of Le TV & Super TV
- Author
-
Li Aimin and Han Jiajia
- Subjects
Engineering ,business.industry ,Mode (statistics) ,Advertising ,Maturity (finance) ,LeTV ,lcsh:TA1-2040 ,Order (business) ,CP2C ,Smart TV ,Marketing ,lcsh:Engineering (General). Civil engineering (General) ,business ,Interactive television - Abstract
Motivated by the nation’s policy of Tri-networks integration, the maturity of technology platform, and the user’s demand, more and more enterprises start to launch the research of smart TV. In order to offer the reference to other smart TV enterprisers, the status of the smart TV industry is presented in this thesis. The mode of operation and profitable of Le TV·super TV, is also discussed , as well as the underlying problems during its development.
- Published
- 2017
14. Arbitrary polarized beams generated and detected by one phase-only LC-SLM
- Author
-
Chen Yu, Zhang Qianghua, Guohua Gu, Han Jiajia, Weihua Wang, Qi Junli, Chu Delin, Dong Chen, Deng Haifei, Sugui Zhao, and Rongfei Wang
- Subjects
Physics ,Optics ,Spatial light modulator ,business.industry ,Cylindrical vector beam ,Liquid crystal ,Optical intensity ,Physics::Accelerator Physics ,Multi wavelength ,Liquid crystal spatial light modulator ,Elliptical polarization ,business ,Polarization (waves) - Abstract
Arbitrary polarized beams, including homogeneously polarized beams and cylindrical vector beams, have been generated by an experimental setup with one phase-only liquid crystal spatial light modulator, and a four-path method was demonstrated to measure the polarization degree of detected beams. Besides, another method was proposed to measure the polarization directions of cylindrical vector beams. The polarized states can be calculated by controlling the spatial light modulator and optical intensity obtained from a CCD. The generation setup and detection methods have simple structure and low cost, and they are available for multi wavelength input beams, and the detection methods can realize real-time and on-line measurement.
- Published
- 2014
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.