Search results for: Jiqiang Liu
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4

Search results for: Jiqiang Liu

4 A Compressor Map Optimizing Tool for Prediction of Compressor Off-Design Performance

Authors: Zhongzhi Hu, Jie Shen, Jiqiang Wang

Abstract:

A high precision aeroengine model is needed when developing the engine control system. Compared with other main components, the axial compressor is the most challenging component to simulate. In this paper, a compressor map optimizing tool based on the introduction of a modifiable β function is developed for FWorks (FADEC Works). Three parameters (d density, f fitting coefficient, k₀ slope of the line β=0) are introduced to the β function to make it modifiable. The comparison of the traditional β function and the modifiable β function is carried out for a certain type of compressor. The interpolation errors show that both methods meet the modeling requirements, while the modifiable β function can predict compressor performance more accurately for some areas of the compressor map where the users are interested in.

Keywords: beta function, compressor map, interpolation error, map optimization tool

Procedia PDF Downloads 236
3 Hierarchical Filtering Method of Threat Alerts Based on Correlation Analysis

Authors: Xudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, Shaohua Lv

Abstract:

Nowadays, the threats of the internet are enormous and increasing; however, the classification of huge alert messages generated in this environment is relatively monotonous. It affects the accuracy of the network situation assessment, and also brings inconvenience to the security managers to deal with the emergency. In order to deal with potential network threats effectively and provide more effective data to improve the network situation awareness. It is essential to build a hierarchical filtering method to prevent the threats. In this paper, it establishes a model for data monitoring, which can filter systematically from the original data to get the grade of threats and be stored for using again. Firstly, it filters the vulnerable resources, open ports of host devices and services. Then use the entropy theory to calculate the performance changes of the host devices at the time of the threat occurring and filter again. At last, sort the changes of the performance value at the time of threat occurring. Use the alerts and performance data collected in the real network environment to evaluate and analyze. The comparative experimental analysis shows that the threat filtering method can effectively filter the threat alerts effectively.

Keywords: correlation analysis, hierarchical filtering, multisource data, network security

Procedia PDF Downloads 176
2 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes

Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv

Abstract:

As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.

Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment

Procedia PDF Downloads 183
1 Thermomechanical Deformation Response in Cold Sprayed SiCp/Al Composites: Strengthening, Microstructure Characterization, and Thermomechanical Properties

Authors: L. Gyansah, Yanfang Shen, Jiqiang Wang, Tianying Xiong

Abstract:

SiCₚ/ pure Al composites with different SiC fractions (20 wt %, 30 wt %, and 40 wt %) were precisely cold sprayed, followed by hot axial-compression tests at deformation temperatures of 473 K to 673 K, leading to failure of specimens through routine crack propagation in their multiphase. The plastic deformation behaviour with respect to the SiCₚ contents and the deformation temperatures were studied at strain rate 1s-1.As-sprayed and post-failure specimens were analyzed by X-ray computed tomography (XCT), transmission electron microscopy (TEM), and scanning electron microscopy (SEM). Quasi-static thermomechanical testing results revealed that compressive strength (UTS = 228 MPa and 30.4 %) was the highest in the composites that was thermomechanically compressed at 473 K compared to those of the as-sprayed, while the as-sprayed exhibited a compressive strength of 182.8 MPa related to the increment in SiC fraction. Strength—plasticity synergy was promoted by dynamic recrystallization (DRX) through strengthening and refinement of the grains. The DRX degree depends relevantly on retainment of the uniformly ultrafine SiCₚ particulates, the pinning effects of the interfaces promoted by the ultrafine grain structures (UFG), and the higher deformation temperature. Reconstructed X-ray computed tomography data revealed different crack propagation mechanisms. A single-plane shear crack with multi-laminates fracture morphology yields relatively through the as-sprayed and as-deformed at 473 K deposits, while a multiphase plane shear cracks preeminently existed in high temperature deformed deposits resulting in multiphase-interface delaminations. Three pertinent strengthening mechanisms, videlicet, SiCp dispersed strengthening, refined grain strengthening, and dislocation strengthening, existed in the gradient microstructure, and their detailed contributions to the thermomechanical properties were discussed.

Keywords: cold spraying, hot deformation, deformation temperature, thermomechancal properties, SiC/Al composite

Procedia PDF Downloads 71