In recent years, the research on deep-sea mining has become more and more popular, especially in the interaction between the harvesting system and seabed to estimate and minimize seabed disturbance. In this paper, an ...
详细信息
ISBN:
(数字)9781665412919
ISBN:
(纸本)9781665448215
In recent years, the research on deep-sea mining has become more and more popular, especially in the interaction between the harvesting system and seabed to estimate and minimize seabed disturbance. In this paper, an inclined plane is adopted to simplify the front of the nodule harvester, and a solver for simulating turbulent sediment transport and fluid-structure interaction is developed based on the drift-flux model in the OpenFOAM. The volume of fluid (VOF) algorithm is used to simulate the diffusion and sedimentation process of sediment in the water, and the kOmegaSST model is used to calculate the turbulent diffusion coefficient of the mixed solution. Two different dynamic mesh strategies, overset and arbitrarily coupled mesh interface (ACMI) methods, are used to simulate the movement of the tilting push plate. This paper compares the simulation results of two different strategies. The results show that under the same simulation accuracy, ACMI method is more reliable and efficient than overset method.
Network security has been a major issue long time ago. Confidentiality, integrity and availability of data are the primary concerns of any network administrator. Recently, several attacks have resulted in huge losses ...
详细信息
Network security has been a major issue long time ago. Confidentiality, integrity and availability of data are the primary concerns of any network administrator. Recently, several attacks have resulted in huge losses of resources and of data availability. For example, in May 2017, medical entities in the United Kingdom have been paralyzed due to WannaCry ransomware world-wide cyber-attack. Thus, the main objective of this paper is to propose a more secured network architecture that will be designed for the case of the PACS - Picture Archiving and Communication system - that is used for storing and transmitting radiography images and reports through the hospital internal network. This paper presents an off-the-shelf solution based on the concept of one-way link data diode and open source softwares to assure safety and security in a cost effective manner. The novelty of this approach is in the design of a data diode that limits the physical connection to two network interfaces, and eliminates the need for a third network connection needed to provide a carrier signal for the transmitter. This system has shown some latency in data transfer but has increased the safety and the security of files transferred between the PACS network and the external network.
作者:
Fiege, LudgerGärtner, Felix C.Kasten, OliverZeidler, Andreas
Department of Computer Science Databases Distributed System Group D-64283 Darmstadt Germany
School of Computer and Communication Sciences Distributed Programming Laboratory CH-1015 Lausanne Switzerland
Department of Computer Science Distributed Systems Group CH-8092 Zurich Switzerland
Publish/subscribe (pub/sub) is considered a valuable middleware architecture that proliferates loose coupling and leverages reconfigurability and evolution. Up to now, existing pub/sub middleware was optimized for sta...
详细信息
The paper presents a spatial logic, called PISL-2D, and an implementation of its inference engine, called SpInE. The approach can be used to represent spatial knowledge in a 2-dimensional space using a set of qualitat...
详细信息
The paper presents a spatial logic, called PISL-2D, and an implementation of its inference engine, called SpInE. The approach can be used to represent spatial knowledge in a 2-dimensional space using a set of qualitative spatial relations. The formalism is based on a point-interval logic and a graphical representation, called Point Graphs. The graph representation is used by SpInE to verify and infer spatial knowledge.
In this paper, we describe various data caching scenarios test implementation and lessons learned. In particular, we show how local data caches may be configured, deployed, and tested. In our studies, we are using xCa...
详细信息
The next phase of LHC Operations-High Luminosity LHC (HL-LHC), which is aimed at ten-fold increase in the luminosity of proton-proton collisions at the energy of 14 TeV, is expected to start operation in 2027-2028 and...
详细信息
This paper conducts highly-refined numerical simulations to study the wake dynamics of the propeller, with and without duct, with a vertical wall. The arbitrary mesh interfaces (AMI) method and delayed detached-eddy s...
详细信息
A substantial data volume growth will appear with the start of the HL-LHC era. It is not well covered by the current LHC computing model, even taking into account the hardware evolution. The WLCG DOMA project was esta...
详细信息
The evolution of the computing facilities and the way storage will be organized and consolidated will play a key role in how this possible shortage of resources will be addressed by the LHC experiments. The need for a...
详细信息
暂无评论