首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
基于火箭(导弹)级间螺栓法兰连接结构,简化设计并制作了一组原理性实验件,设计准静载加载实验测试系统,进行了两次准静载失效实验,并利用ABAQUS软件建立对应的有限元模型。实验中设计了螺栓力响应信号采集传感器,获得了螺栓力响应数据、加载力与加载位移等多组关键数据。根据实验效果和实测数据,分析了连接结构在准静载荷载作用下的失效机理,并对比验证了有限元模型数值模拟效果和精度与实验吻合较好。研究结论可为箭(弹)级间连接结构承载能力和失效实验设计提供参考。  相似文献   

2.
级间螺栓法兰连接是导弹(火箭)常见的连接方式,但破坏了整体结构连续性,且承载能力薄弱,在外荷载作用下易发生失效而使整弹(箭)结构强度丧失。根据实际导弹(火箭)连接结构特点,简化设计并制作了一组原理性实验件,设计了准静载加载实验测试系统和螺栓响应信号传感器,进行了两次准静载失效实验,并利用ABAQUS软件建立了对应的有限元仿真模型。根据实验效果和实测数据,分析了连接结构在准静载荷载作用下的失效机理,并对比验证发现有限元模型数值模拟效果和精度与实验吻合较好。研究结论可为弹(箭)体级间连接结构承载能力和失效实验设计提供参考。  相似文献   

3.
本文针对舰用主锅炉管子根部存在早期烟灰腐蚀问题,就应用刷镀技术将管子根部施镀防护层进行了多方面研究。为了能在实舰锅炉上试验与应用,我们通过一系列的实验室试验,对其镀层进行优化、检验,并结合某舰进厂中修对其主锅炉最容易产生腐蚀穿孔失效的部分管子实施刷镀,安装后使用近一年的情况表明:效果良好。  相似文献   

4.
基于火箭(导弹)级间螺栓法兰连接结构,简化设计并制作了一组原理性实验件,利用ABAQUS软件建立有限元模型,设计并进行了多次落锤冲击失效实验,其中包括轴向和横向两种工况,考虑了螺栓均布与非均布、螺栓直径和螺栓-栓孔间隙等不同结构特点。实验过程中采集了螺栓力时程响应数据、柱段关键点应变时程响应数据、锤头冲击力和冲击速度及连接界面开缝位移等多组数据。根据实验效果和实测数据,分析了连接结构冲击失效机理,并对比验证发现有限元模型数值模拟效果和精度与实验结果吻合较好。研究结论可为箭(弹)级间连接结构抗冲击设计提供参考。  相似文献   

5.
参数化建模的螺栓法兰连接刚度分析   总被引:1,自引:1,他引:0       下载免费PDF全文
为分析几何参数对螺栓法兰连接刚度的影响,用MSC.Patran软件的二次开发工具PCL(Patran Command Language)建立了螺栓法兰连接的参数化模型。研究了螺栓法兰连接刚度随连接结构几何参数的变化规律并进行了灵敏度分析。经分析可知,连接结构刚度对开孔位置比例参数最敏感,其次是上法兰厚度。当上部段长度大于某一数值时,连接结构刚度对上部段长度参数不敏感,这一结论能为连接结构动力学简化建模提供一定理论参考。  相似文献   

6.
对容器设备泄漏源的模式进行了分类,分别从泄漏物物态、泄漏面积、小孔泄漏孔形、内部压力、液面高度、泄漏物密度六方面对容器设备破裂泄漏的危险性进行了分析,并提出了避免破裂泄漏的防范措施,具有一定实用意义。  相似文献   

7.
元器件发生致命的失效、参数严重超差或出现重复失效,且失效原因不明时,应做失效分析(FA),失效分析后应找出失效原因,失效分析的目的在于从设计、工艺或质量管理上加以改进。本文阐述了继电器失效分析结果在某型鱼雷产品改进电路设计工作上取得成功的案例,为产品设计工作提供了帮助。  相似文献   

8.
成品油管线在运营过程中会发生泄漏,主要原因为管线腐蚀、外力撞击、打孔盗油及水击等,泄漏后油品蒸发扩散形成的爆炸性区域具有很大的危险.通过小孔泄漏模型和大面积泄漏模型对地面管线发生泄漏事故形成的油品蒸气扩散情况进行了分析计算,获得了油品泄漏后距泄漏点的安全距离,计算数据可对管线的抢修提供参考.  相似文献   

9.
通过对自行火炮油液泄漏故障形式和原因分析,综合考虑系统的工作压力、温度和混入空气量影响,建立了自行火炮油液泄漏量的数学模型。该模型指出了自行火炮液压系统内泄漏量主要取决于系统的温度、压力、液压油的动力粘度、油液的体积模量和热膨胀系数,揭示了泄漏量随工作参数峰值变化的规律,可为自行火炮的油液泄漏检测与定位提供参考。  相似文献   

10.
简要分析了单兵云爆火箭弹的结构及其各元部件功能,介绍了失效树分析(FTA)、失效模式影响和危害性分析(FMECA)、失效模式机理和影响分析(FMMEA)法等常用的贮存失效分析方法。利用FTA、FMECA、FMMEA分别对单兵云爆火箭弹进行失效分析,找出其中最容易失效的"薄弱环节",并提出了相应的建议。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
和谐律、守恒律、方向律是自然辩证法中自然观的三大规律,它们贯穿、融合并体现于各具体学科的研究领域中。本文主要以自然辨证规律在控制与系统科学中的体现为依托,系统阐述物理学中控制系统理论与信息理论及其应用中自然观三大规律的具体表现。  相似文献   

14.
This article details two largely unreported atrocities by British forces operating against Arab rebels during the Arab revolt, 1936–9, at the Palestinian villages of al-Bassa and Halhul. It then examines the military-legal system that underpinned and authorised British military forces operating in aid of the civil power, suggesting that the law in place at the time allowed for a level of reprisals and punitive actions, such as happened at al-Bassa and Halhul. The article does not conclude that the law allowed for atrocities but it does argue that it gave a basic form and understanding to an operational method that was brutal and could lead to atrocities. It thus tests the idea in much of the literature on counterinsurgency that the British were restrained and used minimum force when compared to other colonial and neo-colonial powers fighting insurgents.  相似文献   

15.
From the recipients’ perspective, arms transfers have, through the use of offsets, technology transfers, and industrial participation, become an opportunity to receive not only advanced weapons, but also technologies not otherwise available. How important are friendly relations for securing a military export order? To what extent do buyers demand advanced military or commercial technology and how are these demands accepted by the supplier? How does this influence smaller producers in relation to major producers? These questions are addressed by studying (a) the Joint Strike Fighter/F-35 by Lockheed Martin, USA, and the JAS-39 Gripen aircraft by Saab, Sweden, (b) the Medium Multi-Role Combat Aircraft competition in India for 126 combat aircraft, and (c) the Indian offset policy. In the final section, some long-term consequences are discussed.  相似文献   

16.
Abstract

A crisis is emerging in the Nile Basin, where some 300 million people in Egypt, Sudan, Ethiopia, Uganda, the Democratic Republic of Congo, Rwanda, Kenya, Tanzania and Burundi rely on the Nile directly or indirectly. Egypt and Sudan wish to preserve a regime based on treaties drawn up during the colonial era that allocated the vast majority of the Nile's water to them. Countries upstream are determined to challenge this. In 1999 the countries using the river formed the Nile Basin Initiative to try to resolve these differences. More than a decade of negotiations failed to break the impasse. In May Ethiopia, Kenya, Rwanda, Tanzania and Uganda decided to wait no longer and signed a new treaty, without the consent of Egypt and Sudan. The signatories have given the other Nile Basin countries one year to join the pact. For Egypt, which relies on the Nile for 95 per cent of its water, this is a question of life or death. Egypt has, in the past, indicated it will go to war if its share of the Nile is reduced. Talks continue, but the impasse is driving the region towards a crisis to which there is no easy resolution.  相似文献   

17.
为了研究爆炸冲击波对武器装备的损伤,建立了炸药爆炸冲击靶板的有限元模型,对不同厚度靶板在确定爆炸冲击环境下的损伤进行了仿真试验。不同于传统的宏观破口尺寸损伤表征参数,引入了等效塑性应变来精确描述靶板损伤,并提出了一种基于主成分分析理论对靶板损伤进行评估的方法。结果表明:利用该方法所得到的计算结果与理论分析结果完全一致。这说明基于多元统计分析的靶板损伤评估方法是切实可行的,可以进一步应用于装备爆炸损伤评估与易损性研究中。  相似文献   

18.
静电放电抗扰度试验中辐射场若干特性的试验研究   总被引:1,自引:0,他引:1  
国际标准IEc61000-4—2中对静电放电抗扰度试验方法和试验布局进行了规定,但是对间接静电放电(ESD)产生的辐射场没有进行描述。根据标准IEc61000—4—2,首先对水平耦合板和垂直耦合板放电时垂直耦合板上的场分布进行了分析,然后对几种医疗设备进行静电放电抗扰度试验。试验得出:1)对两种耦合板放电时,水平耦合板上电场强度和磁场强度随测试距离的变化趋势不同;2)试验结果对ESD模拟器的种类有着依赖关系。这些结果为研究电子设备静电放电抗扰度试验新方法、新标准和新的试验平台及诊断评估方法提供了参考依据。  相似文献   

19.
分析了超声波颗粒监测中探头聚焦的必要性,并介绍了与聚焦探头有关的聚焦参数(Fz,Bw)的理论确定方法。  相似文献   

20.
通过对现有多级安全数据库体系结构和策略模型的研究,分析它们各自存在的不足,给出了一个基于核心化体系结构的MLS-DBMS体系结构,并在现有策略模型的基础上,提出了一个基于扩展安全级的安全模型.该安全模型增加了策略模型的灵活性,提高了数据库系统的安全性和可用性.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号