首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
基于RANS方程,结合不同湍流模型与空化模型对粘性流中二维NACA66012模型水翼附近流场进行数值计算与模拟.计算得到固定攻角、固定来流速度时升力系数和阻力系数随空化数的变化规律以及固定空化数时升力系数随攻角的变化规律,并对相应流场进行分析.在二维水翼空化流动的准稳态模拟中,重点对比分析了不同湍流模型、空化模型对空化流动模拟结果的影响,并将计算结果与实验数据进行比较.研究结果表明,在二维水翼附近空化流动的数值模拟中,采用k-ω湍流模型和均相流空化模型计算得到的结果与实验数据吻合较好.最后,采用分离涡模型对不稳定的空化流动进行了瞬态模拟,并得到空化流动的变化规律.  相似文献   

2.
运用Zwart-Gerber-Belamri空化模型,采用动网格和复合网格技术,提出复杂外形潜射导弹出水过程中空化流数值计算方法。对头肩部、舵面及突起物的空化生成、演化及影响因素进行分析。仿真结果表明:出水过程初期空化数降低使附体空泡迅速扩大,随后对空泡脱落与振荡的影响将更为显著;肩部以15 m/s的速度出水时产生空化并随速度上升而迅速增长,5°~10°攻角时肩空化非对称性显现;舵面空化受出水速度影响较小,攻角小于等于5°时空化面积小于全舵面积的10%,但攻角大于5°后空化面积迅速增长至50%以上;减小突起物尺寸有利于避免空化产生,突起物空化受攻角影响较小,但在高速下可诱导临近弹体产生空化。  相似文献   

3.
基于Zwart-Gerber-Belamri空化模型,采用动网格和复合网格技术,提出了一种复杂外形潜射导弹出水过程中空化流数值计算方法。对头肩部、舵面及突起物的空化生成、演化及影响因素进行了分析。结果表明,出水过程初期空化数降低使附体空泡迅速扩大,随后空泡脱落与振荡的影响将更为显著;肩部在15m/s出水时产生空化并随速度上升而迅速增长, - 攻角时肩空化非对称性显现;舵面空化受出水速度影响较小, 攻角以下时空化面积小于全舵面积的10%,但攻角超过 后空化面积迅速增长至50%以上;减小突起物尺寸有利于避免空化产生,突起物空化受攻角影响较小,但在高速下可诱导临近弹体产生空化。  相似文献   

4.
采用有限体积法、RNGκ-ε湍流模式对二维及三维水翼近水面航行水动力进行了数值模拟,并与模型试验结果进行了比较分析.结果表明:当水翼浸深与弦长之比大于1时,数值计算方法与试验结果一致,且三维计算精度略高于二维.初步研究了NACA2410水翼在粘性流中近水面航行时升力、阻力特性随攻角、浸深、速度变化的规律,指出该型水翼以...  相似文献   

5.
首先对潜射导弹出水过程进行动力学和运动学建模,随后基于Zwart-Gerber-Belamri空化模型,对带空泡的潜射导弹水动力学特性进行了数值计算研究。最后,依据以上动力学和运动学模型,对波浪扰动作用下,潜射导弹带空泡出水弹道及弹体姿态进行了数值仿真。结果显示,零攻角出水时,导弹轴向力系数随弹体空化扩大显著增加,压心后移;有攻角出水时,弹体法向力系数增量随攻角增加呈现先增大后减小的趋势。空化使潜射导弹出水速度降低约10%,出水时间延长约12%,导弹受波浪扰动程度增加约6%~7%。  相似文献   

6.
为了掌握舱门开启状态下UUV小攻角水动力特性,首先基于风洞模型实验验证了所用数值计算方法的准确性与有效性,进而采用该方法对舱门开启状态UUV阻力、升力及力矩特性进行了数值模拟研究,分析了舱门开启后载荷舱及舱门对UUV表面压力分布的影响.计算结果表明,载荷舱前后端面形成的较大压力差,导致舱门开启状态UUV阻力显著提升,且阻力关于零攻角表现为不对称性,主要原因在于负攻角条件下载荷舱粘压阻力随攻角绝对值的增大而增大;由于载荷舱的流体阻滞作用,零攻角工况下舱门下表面平均压力高于上表面,UUV零攻角升力为正,零升力攻角约为-3.,且零攻角力矩为正力矩,零力矩攻角约为-1°.  相似文献   

7.
高速射弹超空泡的形态特性   总被引:1,自引:0,他引:1  
为了掌握高速射弹超空泡的形态特性,利用某口径火炮进行了射击试验,射弹最大初速达900m/s。获得了射弹超空泡形态的高速影像;分析了射弹超空泡形态演变过程及超空泡形态参量(长度、直径、长细比等)随空化数变化的规律。研究结果表明:空泡直径变化分为快速扩张阶段、缓变阶段和快速收缩阶段,三个阶段耗时比约为7∶12∶6;空泡的扩张过程与收缩过程耗时比约为2∶1;空泡无量纲长度、无量纲直径和长细比均随着空化数的增大而减小。  相似文献   

8.
针对SSG/LRR-ω雷诺应力模型,选取NASA湍流资源网站上的四个典型算例,即湍流平板边界层流动、带凸起管道流动、翼型尾迹区流动和NACA0012不同攻角绕流,开展初步的验证与确认工作,将部分结果和CFL3D进行对比。对于NACA0012翼型绕流,对比雷诺应力模型和SA模型的升力系数,结果表明:在失速攻角附近,雷诺应力模型明显优于SA模型。在此基础上,将该模型应用于DLR-F6翼身组合体的数值模拟,计算得到的机翼表面典型站位压力分布和实验值吻合良好,同时该模型捕捉到翼身交汇位置的小范围分离。  相似文献   

9.
以不同头型回转体模型为研究对象,探究头型和肩部连接方式对初生空化数及空腔形态的影响.通过选取圆形、锥形及椭圆形系列头型的回转体模型,在不同空化数的工况下,对不同头部回转头部体空化流场进行数值模拟.结果表明:由于各系列头型的头部长度和肩部连接方式不同,其初生空化数和空化腔形态不同;圆形和椭圆形系列回转体头部越长,锥形系列...  相似文献   

10.
轴对称物体空泡流动的数值计算   总被引:5,自引:2,他引:3  
基于势流理论和边界元方法,对水下运动的回转体的空泡流进行了数值模拟.将半经验空泡封闭模型由平面流动推广至轴对称流动.对头部为圆锥的圆柱体空泡流动进行了数值计算.分析了空化数、半锥角、空泡长度间的关系.计算与实验结果符合较好.  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
16.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

17.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

18.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

19.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号