首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
在液体储罐泄漏过程中,罐内压力是随泄漏时间变化的量,泄漏强度也随罐内压力而变化,但在已有对液体流泄漏数学模型的建构中,在后果计算时没有全面考虑罐内压力以及罐内液体闪蒸导致空间的物质量,获得的结果用于后果评价,就必然与实际情况存在偏差.应用数学方法,对液体泄漏模型进行改进,改进后模型把罐内压力以及罐内空间的物质量作为变量,可较真实模拟出泄漏时泄漏强度、储罐内气体压力及泄漏量随时间变化的大小情况,并模拟了孔洞液体泄漏,得出不太可能发生灾难性事故的结论.  相似文献   

2.
对模拟油罐内油气混合物爆炸冲击波特性进行了研究.在直径为1 m的模拟油罐中进行了油气混合物爆炸模拟实验,建立了模拟油罐油气混合物爆炸的数值仿真模型,并借助大型商业软件Fluent6.2完成了数值仿真研究.数值仿真结果与实验值较为吻合.模拟实验和数值仿真研究的结果表明:油气体积分数、罐内初始温度等决定模拟油罐油气混合物爆炸压力的大小.油罐内爆炸压力波的振荡特性对金属油罐结构来说是有害的.  相似文献   

3.
基于对油罐惰气置换原理的分析,建立了油气惰化置换过程的紊流模型,采用压力和速度耦合场的PISO算法,完成了油罐惰气置换过程的数值模拟研究。用原型实验数据对模型进行了验证,经验证对比表明模型与实验结果吻合较好。进一步研究表明,对于3 000 m^3的油罐,约整个置换过程的前9 600 s,罐内气体处于爆炸燃烧范围,置换约9 600 s后油罐已处于安全状态;"置换死角"出现在靠近燃惰气进口两侧的中央偏下位置;罐内各气体组分除在靠近燃惰气进口一侧的较小空间内对流扩散速度较大外,其他大部分位置各气体组分对流扩散速度较小。这些结论将为油气惰化置换过程的进一步优化提供一定的参考依据。  相似文献   

4.
针对地下储油复杂组合空间,采用大涡模拟的方法构建了油气扩散蔓延三维数值模拟模型,完成了油气扩散蔓延区域的空间离散和三维数值模拟求解优化,并进行了数值计算与分析。结果表明,在地下复杂组合受限空间油料泄漏后,罐室内的油气填充顺序为由边缘到出口、由底部到上部,油气不能达到100%的充满状态,罐室拱形顶部油气体积分数低于其爆炸下限的20%;罐室内油气的产生和蔓延十分迅速,从泄漏至到达罐室口仅需10 s,进入坑道仅需1 min;油气在流出罐室进入坑道后,具有迅速向四周扩散蔓延,流向一切可能注入的空间的特性。研究结果为地下储油工程的施工建设、安全管理、危险源监控等提供了有益参考。  相似文献   

5.
针对油罐拱顶与罐壁上部容易出现失稳变形的实际问题,基于ANSYS建立了油罐有限元模型,对油罐结构稳定性进行数值模拟,探讨加载关联性和结构关联性对均匀外压作用下油罐稳定性的影响。结果表明:分析油罐结构稳定性时,对于给定尺寸的油罐,失稳发生在结构较薄弱部位;拱顶和罐壁可独立加载求解临界载荷,取较小值作为油罐的临界载荷;油罐的失稳分析要考虑拱顶与罐壁间相互作用对总体临界载荷的影响。研究结果可为基于有限元法的油罐稳定性设计和分析提供一定参考。  相似文献   

6.
管内高压气体冲击静态液柱的CFD模拟   总被引:1,自引:0,他引:1  
为可视化内部流场,采用Fluent软件对警用脉冲防暴水炮炮管内高压气体冲击静态液柱的过程进行了三维数值模拟,得到了重力作用和无重力时的三维气液界面形状,分析了不同时刻管内的速度和压力变化情况,将压力模拟值与理论计算值进行了比较分析.从模拟结果可以看出,重力对于界面形状影响较大,液柱加速过程开始呈线性增加,当t>0.01...  相似文献   

7.
为了研究受限空间油气泄漏的运动规律,及时有效地查明事故隐患,预报和预防各类事故的发生,以挽救人民的生命财产,基于对油气泄漏的分析,建立了油气泄漏的仿真模型.采用压力和速度耦合场的SIMPLE算法,完成了地下坑道油气泄漏过程的数值模拟研究,数值模拟结果与实验结果吻合较好.研究发现,地下坑道的油气泄漏可分为4个阶段:孕育阶...  相似文献   

8.
油罐是油品储运的重要设备,罐底最易出现穿孔渗漏油现象,致使罐基内部油气质量分数高于正常值。以油库中柴油覆土罐群为例,研究并试验了根据罐基油气质量分数识别罐底渗漏的方法:分析罐基探漏孔位置分布并钻孔;多次探测罐基油气质量分数,根据探测数据识别各罐有无底部渗漏;为了便于以后检测油库时识别各罐有无渗漏,为各罐建立状态监测表,并将无渗漏的罐基油气质量分数最高值暂定为该类罐的安全值,低于该安全值的油罐可直接判定为无渗漏。实践结果证明,这种不开罐检测罐底渗漏油的方法可及时发现故障并采取措施,对储油安全具有重要意义。  相似文献   

9.
罐顶板的缺陷检测对于评估立式拱顶罐的使用状况有着重要的意义,它的应用有助于更好地掌握立式拱顶罐的安全状况与可靠程度。将声发射法应用于罐顶板材料的检测,并对相关的设备仪器及操作流程进行介绍。为了给检测结果提供对照和参考,利用有限元分析法对拱顶瓜皮板的稳定最不利点进行了初步分析和定位。分析结果表明:顶板中上部肋板围成的区域可能会产生稳定最不利点,该部位应作为检测时重点关注的区域。  相似文献   

10.
为提高油库安全防护能力、实现油气实时监测与及时控制,研究了油气监测与分级预警系统。采用非分光红外技术研制了油气浓度传感器,重点设计了大空间、高精度的红外气体吸收室;设计了8路抽气系统,研制了气路转换控制单元,实现了气体预抽和气路切换的智能、精准控制;应用CAN总线通信,使现场检测设备与控制系统之间实现开放式、数字化、多节点的通讯;开发了专门的分级预警软件,具备数据处理量大、触屏操控简单、实时监控、远程控制、预警阀值自设定和预测油气浓度趋势等功能;应用该系统进行了模拟库区油气浓度的监测与预警实验,结果表明系统测量准确,预警及时。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号