Practical experience in deploying and controlling the data sharing interoperability layer at the U.K. Land Open Systems Architecture (LOSA) field trials in October 2012

2013 ◽  
Author(s):  
Flavio Bergamaschi ◽  
Dave Conway-Jones ◽  
Gavin Pearson
2012 ◽  
Vol 233 ◽  
pp. 224-227 ◽  
Author(s):  
Tao Yong Zhou ◽  
Bin Hu ◽  
Xue Jun Wang ◽  
Bo Yan

Railway ballast tamping operations is an important work in the line maintenance and repair operations, the selection of tamping parameter is usually dependent on field trials and practical experience, for the mechanical properties of railway ballast is difficult to measure and describe. This paper creates discrete element analysis model of railway ballast using the discrete element method, the numerical simulations are carried out to study the mechanical properties of railway ballast during tamping process. We focus on the influence of amplitude during tamping process; an optimal amplitude of the simulation analysis is obtained and compared with the recommended amplitude of Plasser & Theurer Company, it is found that the two amplitudes accord. This result verifies the correct validity of the discrete element analysis model of railway ballast during tamping process.


1997 ◽  
Vol 20 (2) ◽  
pp. 135-147 ◽  
Author(s):  
M Holocher ◽  
R Michalski ◽  
D Solte ◽  
F Vicuña

Signals ◽  
2021 ◽  
Vol 2 (4) ◽  
pp. 619-636
Author(s):  
Giovanni Pecoraro ◽  
Mario D’Amico ◽  
Simon Pietro Romano

Nowadays, time, scope and cost constraints along with knowledge requirements and personnel training constitute blocking restrictions for effective Offensive Cyberspace Operations (OCO). This paper presents RedHerd, an open-source, collaborative and serverless orchestration framework that overcomes these limitations. RedHerd leverages the ‘as a Service’ paradigm in order to seamlessly deploy a ready-to-use infrastructure that can be also adopted for effective simulation and training purposes, by reliably reproducing a real-world cyberspace battlefield in which red and blue teams can challenge each other. We discuss both the design and implementation of the proposed solution, by focusing on its main functionality, as well as by highlighting how it perfectly fits the Open Systems Architecture design pattern, thanks to the adoption of both open standards and wide-spread open-source software components. The paper also presents a complete OCO simulation based on the usage of RedHerd to perform a fictitious attack and fully compromise an imaginary enterprise following the Cyber Kill Chain (CKC) phases.


Sign in / Sign up

Export Citation Format

Share Document