首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
为了研究柔性长鳍扭波推进机理,设计了一套模仿背鳍扭波运动的试验装置,并测试了背鳍扭波推进系统在循环水槽中的水动力。测试过程中,主要研究了背鳍推进系统在不同来流速中改变鳍条摆动频率时表现的推力特性。实验结果表明:相同频率扭动下的背鳍,在低速来流时产生的推力要大于高速来流时的推力;来流给定时,背鳍产生的推力与鳍条频率的平方成正比。  相似文献   

2.
由于背鳍扭波推进运动方式不同于鳗鲡模式鱼体横波运动,细长体理论不能直接运用于尼罗河魔鬼鱼(GNF)的长背鳍扭波推进水动力性能的计算.为此,建立了计算鳍面与流体相互作用力的附加质量方法和附加转动惯量方法.对于背鳍扭波鳍条的摆动方式,首先提出计算附加质量的分离泡模型;其次,用偏心率e接近l的扁椭圆柱代替鳍条,运用势流理论计...  相似文献   

3.
为研究长鳍扭波推进的水动力性能,在对尼罗河魔鬼鱼形体构造、游动模式研究的基础上,研制了一种仿生长鳍扭波推进航行器.该推进器能逼真地模仿尼罗河魔鬼鱼长背鳍的扭波运动模式,产生强劲的水动力.在水池中开展扭波推进模型航行试验,得到了航行速度与扭波频率的关系曲线.该曲线表明:扭波推进模型的航行速度与扭波频率成正比.提出了一种测量机器鱼鱼鳍推水功率的实验方法,实验结果表明:扭波长鳍的推水功率与扭波频率的3次方成正比.  相似文献   

4.
柔性长鳍波动推进试验及分析   总被引:3,自引:0,他引:3       下载免费PDF全文
以依靠长背鳍推进的“尼罗河魔鬼”为研究对象,对柔性长鳍波动推进模式的运动学进行了研究。介绍了“尼罗河魔鬼”巡航游动试验的实验原理及方法,通过试验揭示了波动柔性长背鳍的形态学特征、运动特性及运动参数间的相关性,定性描述了“尼罗河魔鬼”正、逆向行进时背鳍产生波形的差异,在此基础上建立了柔性长鳍波动的运动学简化模型,利用细长体理论估算样本巡航游动时的水动力学效率大于83.12%。  相似文献   

5.
柔性长鳍仿生装置波动控制技术   总被引:2,自引:0,他引:2       下载免费PDF全文
以“尼罗河魔鬼”柔性长鳍的波动运动为背景,主要研究了柔性长鳍仿生装置的波动控制技术。首先研究了柔性长鳍推进波产生原理及其技术实现方案;其次,针对仿生装置的实际系统建立了鳍面运动学模型,从中提取了能够实现柔性长鳍多种波动模式的波动控制参数,并对柔性长鳍几种特定波动模式的实现方法进行了仿真研究;进一步,根据仿生装置的物理约束条件提出了控制参数的合法性判据;最后,研究了柔性长鳍仿生装置的波动控制策略及其控制流程。研究结果表明柔性长鳍仿生装置通过合理设置控制参数能够模拟仿生对象的多种波动运动模式,并实现推进波的多参数控制,能够满足柔性长鳍多种波动参数下的非定常流体动力学测试的需要。  相似文献   

6.
“尼罗河魔鬼”柔性长鳍运动曲面建模与仿真   总被引:6,自引:1,他引:5       下载免费PDF全文
以"尼罗河魔鬼"柔性长背鳍的波动运动为研究对象,综合考虑影响柔性长鳍运动建模的诸因素,建立了描述柔性长鳍波动运动时动态曲面的数学模型,并根据试验观测获得的仿生对象相关数据及对运动学模型中相关要素的简化假设,对仿生对象鱼体及柔性长鳍动态曲面进行仿真计算,通过与试验观测获得的照片进行对比,表明建立的柔性长鳍运动曲面模型通过合理设置各种参数,能够较好地描述柔性长鳍的波动运动,具有较强的适应性和通用性.柔性长鳍运动学模型的建立为其动力学研究及其基于有限元方法的仿真计算奠定了数学基础.  相似文献   

7.
“尼罗河魔鬼”长背鳍波动包络线的提取算法   总被引:5,自引:1,他引:4       下载免费PDF全文
"尼罗河魔鬼"采用长背鳍波动推进方式,属于典型的奇鳍/对鳍推进鱼类.在已有的理论模型中,细长体理论(Elongated-body theory)较为适合于分析该类游动方式的推进性能.长背鳍的波动包络线方程是细长体理论的必要参数.拍摄实验样本(MPC-I)的自由游动视频,从中选取多组平稳运动图像序列,经旋转校正、零点配准、尺度归一、小波去噪等预处理后,提取了柔性长背鳍波动推进时的顶端边缘轮廓样本曲线簇,进而给出了波动包络曲线的多项式拟合方程.实验结果表明长背鳍波动包络线提取算法是有效的,根据算法所提取的长背鳍波动包络线方程为后续的推进力及推进效率的分析奠定了基础.  相似文献   

8.
行波推进仿生机器鱼   总被引:4,自引:3,他引:1  
介绍5种常见的鱼类游动模式,分析讨论仿生机器鱼的生物学原型。基于对裸臀鱼属(gymnarchus niloticus)与裸背鳗属(gymnotus carapo)活体鱼的实验研究,建立了长背鳍扭转行波动态曲面的数学模型。依靠长鳍行波实现推进与控制的新型仿生机器鱼,其基本结构是"刚性身体"与"柔性背鳍"的组合,这有利于改善现有摆动式机器鱼的技术性能。裸臀鱼属与裸背鳗属鱼类可作为发展特种机器鱼潜艇的生物学原型,以提高现行水下航行器的效率和机动性能。  相似文献   

9.
对依靠长背鳍扭波推进的尼罗河魔鬼鱼(GNF)进行循环水槽实验研究,录制各种游动模式的DV图像,分析研究GNF的游动参数,得到了扭波频率、波长与游速的定量关系,以及斯特罗哈数与雷诺数的关系曲线。当特征游速U≤1.3时,游速与扭波频率成正比,特征波长λ≈0.31,斯特罗哈数St≈0.41;当特征游速U1.3时,扭波频率ν不再增大(约5.5~6 Hz),GNF采用变波长模式游动,平均特征波长λ最大增加到0.38,斯特罗哈数St则减小,最小为0.31,与BCF模式St值相同。  相似文献   

10.
采用液压驱动的模拟鱼柔性长背鳍波动运动的水下仿生推进器,当改变液压系统的流量和阀的控制参数时,其运动学参数能够迅速地做相应调整,实现平稳、流畅、连续的仿生运动。建立了阀控液压摆动关节的动力学模型,根据动力学模型得到系统传递函数,并绘制了Bode图。根据传递函数分析了阀控液压摆动关节的稳定特性、动态位置刚度特性和动态响应特性。结果表明阀控液压摆动关节具有一定的自稳定性,其工作频率与影响位置刚度的负载变化频率重叠,动态响应速度可以通过优化结构参数来调整。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

16.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
19.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号