首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 359 毫秒
1.
SPH算法在高速侵彻问题中的应用   总被引:1,自引:0,他引:1       下载免费PDF全文
采用光滑粒子流体动力学方法,数值模拟了弹丸高速侵彻靶板的过程。用黎曼问题中速度和压力的解代替基本粒子与近邻粒子速度和压力的平均值来描述粒子之间的相互作用,无需引入传统的人为粘性方法来处理冲击波过渡层。初步分析表明该数值模拟结果是合理的,因而所用数值方法对于冲击动力学问题的模拟是可行的。  相似文献   

2.
根据复变函数理论 ,首次提出了一种可对任何复杂空 /海域进行管理的简洁算法 ,解决了以往系统中不能解决或很难解决的复连通区域和凹多边形区域的管理问题  相似文献   

3.
证明了一个新的锐角原理,在不使用连续性条件的情况下,给出了在一致光滑Banach空间中一类非线性算子方程的可解性定理。  相似文献   

4.
在一致光滑的Banach空间,证明了满足不等式‖Tx≤C ‖x‖的一类非线性强增生算子的Mann迭代序列强收敛于Tx=f的唯一解。  相似文献   

5.
SPH数值模拟中固壁边界的一种处理方法   总被引:4,自引:1,他引:4       下载免费PDF全文
在光滑粒子流体动力学 (SPH)数值模拟中尝试了一种处理固壁边界的边界力方法 ,给出了一种新的边界力形式。利用SPH方法及边界力方法对水坝坍塌和涌波进入静止水塘这两个自由表面流动问题作了数值模拟。数值模拟结果表明 ,在SPH计算中使用本文所给边界力处理固壁是行之有效的  相似文献   

6.
为了优化WENO格式计算性能,在对Jiang和Shu的经典WENO格式(记为WENO-JS)加权方法分析的基础上,通过引入间接光滑指数,构造出一种新的WENO格式——WENO-E格式,取得减小间断区耗散的效果。理论分析表明,该格式与WENO-JS格式计算效率基本相同,可达到相同阶的计算精度;但在相同网格下,较之WENO-JS格式,该格式对光滑区域的求解有更小的截断误差,对间断的捕捉有更高的分辨率。与WENO-JS格式相比,采用WENO-E格式进行线性迁移方程、非线性Burgers方程、欧拉方程等相关问题的数值实验,均能取得更好的数值结果。  相似文献   

7.
针对光滑粒子动力学(SPH)主要计算量是近邻粒子搜索这一特点,提出了一种基于粒子分解的SPH并行计算方案。利用该方案可以方便的将任意串行SPH代码并行计算,而且每一个时间步内的信息传递量只和粒子总数有关,而和粒子的分布无关,因而特别适合于自由表面流动等大变形问题的并行数值模拟。对一个粒子总数为40万的三维溃坝问题的模拟结果表明,此方案能达到的最大加速比约为16,这一结果可能比空间分解方案(不考虑动态负载均衡)更优。  相似文献   

8.
针对光滑粒子动力学主要计算量是近邻粒子搜索这一特点,提出了一种基于粒子分解的光滑粒子动力学并行计算方案。利用该方案可以方便地将任意串行光滑粒子动力学代码并行计算,而且每一个时间步内的信息传递量只和粒子总数有关,而和粒子的分布无关,因而特别适合于自由表面流动等大变形问题的并行数值模拟。对一个粒子总数为40万的三维溃坝问题的模拟结果表明:此方案能达到的最大加速比约为16,这一结果可能比空间分解方案(不考虑动态负载均衡)更优。  相似文献   

9.
研究以Beta为基函数的一类修正的和积分型算子,利用统一光滑模。ω^2φ^λ(f,t)(0≤λ≤1),得到该算子点态逼近的等价定理.  相似文献   

10.
指出选择函数变换来提高模型精度主要与三个方面的因素有关:提高数据序列的光滑比、调整数据序列的级比和确保凸凹性。在调整级比方面,扩充了级比压缩变换的相关定理,并讨论了几种常用的函数变换在上述三个方面的关系。最后结合实例提出,对于变换后的数据序列若不满足这三方面的要求可以再进行函数变换以达到提高模型精度的目的。  相似文献   

11.
面向监督学习的稀疏平滑岭回归方法   总被引:2,自引:0,他引:2       下载免费PDF全文
岭回归是监督学习中的一个重要方法,被广泛用于多目标分类和识别。岭回归中一个重要的步骤是定义一个特殊的多变量标签矩阵,以实现对多类别样本的编码。通过将岭回归看作是一种基于图的监督学习方法,拓展了标签矩阵的构造方法。在岭回归的基础之上,进一步考虑投影中维度的平滑性和投影矩阵的稀疏性,提出稀疏平滑岭回归方法。对比一系列经典的监督线性分类算法,发现稀疏平滑岭回归在多个数据集上有着更好的表现。另外,实验表明新的标签矩阵构造方法不会降低原始岭回归方法的表现,同时还可以进一步提升稀疏平滑岭回归方法的性能。  相似文献   

12.
一种基于AMDF和ACF的基音周期提取算法研究   总被引:1,自引:0,他引:1  
文中提出一种基于短时平均幅度差分函数(AMDF)和短时自相关函数(ACF)的基音周期提取算法。首先,将每帧语音信号通过AMDF算法进行计算,然后把得到的AMDF数值再通过ACF算法进行计算,得出每帧信号的基音周期,最后运用动态平滑技术计算出最终语音信号的基音周期。通过仿真实现该算法,并同基于MAMDF和ACF的基音周期提取算法进行比较。  相似文献   

13.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

14.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

15.
针对组合模型的构建问题,从子模型的操作系统、开发平台、表现形式、硬件环境等4方面分析了采用经验公式仿真元模型的必要性;在均匀试验基础上,提出了基于遗传算法的经验公式仿真元模型构建方法,并研究了其中的关键问题,包括经验公式基本形态的编码方式、目标函数与适应度函数、交叉算子、选择算子、变异算子;最后采用经验公式仿真元模型研...  相似文献   

16.
泛系理论是一种侧重泛系或者广泛联系的一种多层网络型的跨学科新研究,探索数理·逻辑·科学思维、系统思维、哲理·辩证思维、美学·诗化思维的某些结合(联四维)。泛系理论专门开发了网联不同领域多种专题的泛系相对论、供求因缘悖感分析与泛系悖论。本文论述有关的理法与释例,包括数理工医文社史哲许多相对性、悖论与供求因缘悖憾的泛系理悟,可以简化强化为:“泛系悖论=泛系相对论+泛系供求论”。具体内容涉及:泛系理论框架784e,泛系相对论·泛系辩证·泛系悖论的8题16模式百例29说。  相似文献   

17.
India and China both have powerful spy networks; completely different in their approaches to espionage; both effective against their perceived enemies. China focuses first on internal threats, on Taiwan and Hong Kong, and then the US and Japan. India’s defense policy focuses on Pakistan and internal terrorist threats, and then on China. In reality, however, when it comes to spying on each other, both China and India suffer from incompetence and apathy – which endangers both their own security and regional stability. This article looks at how they spy on each other, and asks why and how they need to improve. The narrative also touches upon some of the individuals who are waging the spy war, from India’s wily spymaster Ajit Doval down to junior Chinese agents such as Wang Qing and Pema Tsering. The two countries are not friends. They have the largest territorial dispute in the world on their hands, covering an area the size of North Korea, and they have large armies facing each other along 4000 kilometers of frontier. But they also lay claim to the world’s two oldest and richest civilizations, with a rich history of exchange, and now with a combined population of 2.6 billion people and more than a quarter of the world’s economic output. If they cooperated, they could solve many of the world’s problems; but if they lurch into conflict, the potential consequences are terrifying to contemplate. Unfortunately, despite their geographical closeness, they do not know much about each other. They have few cultural interchanges, little diplomacy, few trade missions. They do not watch each other’s films, read each other’s books or listen to each other’s music. Chinese tourists would rather fly to New Zealand for their holidays than cross the border to India, and Indian students would rather study in Europe than China. China and India are neighbors that barely talk to each other. Most significantly, they do not spy on each competently. For countries that do not interact socially, defensive understanding is important for security – but China prefers the glamor of facing up to its Pacific and other maritime rivals such as the US and Japan. India, for its part, does talk a great deal about the China threat, but its resources and expertise are wrapped up in controlling its security threat from Pakistan and the Islamic world. When China and India do try to spy on each other, it is often without the benefit of a long-term focus or understanding. India has some very skilled operatives within the Research and Analysis Wing, but few that specialize in China. China has an enormous pool of resources spread across several government departments, including the Ministry of Public Security, and also has extensive facilities and manpower in the Joint Staff Department of the Central Military Commission (the JSD) and the new Strategic Support Force (the SSF). However, China’s intelligence services generally behave as if India is not worth spying on. Given that the two countries do not have the cultural or political machinery in place to understand each other, espionage and intelligence gathering is vital to ensure that miscalculations do not take place. This has been apparent over the last few years in stand-offs in the Himalaya, as well as top-level suspicions on each side about a variety of subjects including terrorism, covert operations in Sri Lanka and Burma, and the two countries’ nuclear weapons programs. Both countries do occasionally make efforts in espionage against each other, especially during sensitive periods such as the mountain stand-offs of 2014 and 2013 and during policy developments in nuclear warfare. In this article the author looks at actual spying incidents between the two countries, their methodologies, their staff, their technical capabilities, and how the act of spying, which is usually viewed as intrinsically adversarial, can be a force for good. The article relies on interviews with actual participants in intelligence from both countries as well as extensive use of contemporary online sources, and secondary analysis by both military and academic experts from China, India and NATO countries.  相似文献   

18.
Abstract

A crisis is emerging in the Nile Basin, where some 300 million people in Egypt, Sudan, Ethiopia, Uganda, the Democratic Republic of Congo, Rwanda, Kenya, Tanzania and Burundi rely on the Nile directly or indirectly. Egypt and Sudan wish to preserve a regime based on treaties drawn up during the colonial era that allocated the vast majority of the Nile's water to them. Countries upstream are determined to challenge this. In 1999 the countries using the river formed the Nile Basin Initiative to try to resolve these differences. More than a decade of negotiations failed to break the impasse. In May Ethiopia, Kenya, Rwanda, Tanzania and Uganda decided to wait no longer and signed a new treaty, without the consent of Egypt and Sudan. The signatories have given the other Nile Basin countries one year to join the pact. For Egypt, which relies on the Nile for 95 per cent of its water, this is a question of life or death. Egypt has, in the past, indicated it will go to war if its share of the Nile is reduced. Talks continue, but the impasse is driving the region towards a crisis to which there is no easy resolution.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号