首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
不同边界条件下水下爆炸气泡的数值模拟   总被引:2,自引:0,他引:2  
采用有限元程序MSC.Dytran对不同边界条件下水下爆炸气泡的脉动过程进行了数值模拟。对数值模拟中的一些重要问题,如炸药药包的建模、网格密度、状态方程和静压力场的设定等问题进行了探讨。对无限水域中的水下爆炸气泡以及自由面边界、水平刚性面边界和垂直刚性面边界三种边界条件下的水下爆炸气泡进行了数值模拟,分析了水下爆炸气泡的半径、外形变化、气泡脉动压力、流场中的速度分布,结果发现边界的存在对气泡外形的影响较大,刚性边界面会使气泡脉动压力增大较多,而自由面边界对气泡脉动压力的影响较小。将数值模拟的结果与理论模型、经验公式和试验结果进行了比较分析,结果吻合较好。  相似文献   

2.
本文中研究了水下爆炸数值仿真参量设置对冲击波与气泡载荷计算结果的影响。构建一维楔形网格,研究了flow-out、transmit和none三种边界条件对气泡脉动特性的影响,表明应建立足够大的水域来模拟无限水域从而消除边界对气泡脉动的影响;构建不同水域尺寸的仿真模型,结果表明所述装药条件下合适的水域半径为1 200倍装药半径;网格密度影响水下爆炸冲击波压力峰值,基于计算结果拟合得到了5%误差和10%误差下网格尺寸最小取值的计算公式。研究结果为水下爆炸载荷高精度计算提供重要参考。  相似文献   

3.
在数值模拟中,有限元网格的数量对计算结果和计算成本都有较大的影响。采用MSC.Patran建立了弹体侵彻金属靶板的计算模型,并利用MSC.Dytran对所建模型进行了计算;结合相关的理论,对不同网格密度划分的有限元模型的计算结果进行了分析,并和实验进行了对比,得到了数值模拟弹体侵彻金属装甲中靶板的最佳网格数量。当网格无因次量μ=0.10时,所得到的数值模拟结果与实际吻合得较好:当厚度方向的网格数取为12个时,文中所采用的模型能较好地模拟弹体对靶板的侵彻效果。  相似文献   

4.
针对滑行表面数值预报结果中船底出现异常水气分布的问题,基于三种常用CFD软件FLUENT、CFX及STAR-CCM+研究了VOF界面插值格式、网格类型及数目等因素对滑行表面性能数值预报的影响,并提出相应改善数值计算模拟的具体措施。研究表明:基于相同的结构化网格及计算设置时,采用几何重构界面插值格式预报滑行块的阻力及底部水气分布上最为准确,CICSAM格式次之,修正HRIC格式最弱。通过选择合理的网格类型及网格数目也可以改善滑行船体性能预报精度。CFX采用四面体网格,STAR-CCM+采用多面体网格可以较为准确预报滑行艇体的流场和阻力。建议在滑行艇的阻力及流场预报中采用几何重构的VOF界面插值方式,选择合理的网格类型并进行适当的网格加密可以提高水气界面捕捉的精度,减小阻力预报的误差。  相似文献   

5.
借助于计算流体力学软件,生成了2组不同网格数量和壁面Y+值的网格模型,并对潜艇周围流场进行了数值模拟,得到了不同航速下的潜艇阻力,然后结合试验数据进行了对比分析。研究发现:一阶精度离散格式的阻力计算结果误差过大不可信,而对于不同的离散格式,网格的细化都能提高计算精度;当网格模型壁面Y+值控制在200以内且采用二阶精度离散格式计算时,较稀的网格模型也能得到误差小于3%的计算结果。  相似文献   

6.
在水下爆炸载荷作用下的舰船局部结构塑性变形计算中,往往只考虑冲击波载荷的影响而忽略气泡载荷的影响。为研究气泡载荷在舰船局部结构塑性变形中所占的比例,利用通用有限元软件Abaqus,对舰船局部结构典型形式加筋板模型在水下爆炸载荷作用下的动态响应进行了数值仿真。其中,载荷计算采用了Geers-Hunter模型,材料本构采用了Johnson-Cook模型。分析仿真结果发现,模型中点变形挠度明显分为两个阶段,很容易区分冲击波载荷引起的变形和气泡载荷引起的变形。将最终变形挠度仿真计算结果与试验结果进行对比,两者吻合较好。计算结果表明:由气泡载荷引起的加筋板塑性变形挠度超过总变形挠度的30%,所以在计算中气泡载荷的影响不容忽视。  相似文献   

7.
为精确得到船模阻力及流场,研究了网格划分、湍流模型及船模姿态对预报结果的影响。首先,采用切割体网格技术及棱柱层网格技术划分了多套网格,研究网格尺寸大小及棱柱层参数对阻力、兴波及伴流场的影响;然后,比较了三种不同湍流模型在船模阻力及伴流场预报中的差异;最后,基于合理的网格划分及湍流模型,采用DFBI的方法预报了船模在不同航速下的姿态及阻力。计算结果表明:当Fr0.25时,不考虑航行姿态时阻力计算误差可达到18.3%。考虑航行姿态变化后,阻力计算误差小于3%;升沉和纵倾的计算值和试验值吻合较好。由此证明:采用DFBI方法考虑船体航行姿态的变化避免了网格变形或者重构,具有较好的收敛性和计算精度。  相似文献   

8.
自由变形技术在RAE2822翼型优化设计中的应用   总被引:2,自引:0,他引:2       下载免费PDF全文
采用自由变形技术实现对RAE2822跨声速翼型表面的参数化,采用试验设计方法对设计参数进行计算流体力学数值模拟样本训练,最后采用Kriging代理模型和MIGA、NLPQL优化算法进行优化分析,将得到的优化变量进一步进行计算流体力学分析获得最后的优化结果。计算结果显示,自由变形参数化方法简单易行,可实现直接对网格的变形;优化的结果相比于原始翼型,升阻比增加了57. 2%,从而证明了本文方法的可行性和有效性。  相似文献   

9.
为突破传统排水型两栖车辆“阻力墙”现象,提高两栖车辆水上航速,从蛇怪蜥蜴高速踏水机理出发,设计一种新型轮一叶复合式水上仿生推进装置,采用滑移网格和动网格方法对不同转速下的推进装置三维模型的动力学特性进行数值计算,并对仿真结果进行对比和分析.结果表明:滑移网格和动网格方法在计算结果上获得比较一致的结果,动网格方法更能反映模型的真实运动情况,而滑移网格方法在计算过程中表现出较好的稳定性,同时显著减少计算时间  相似文献   

10.
为充分了解潜艇周围的粘性流场特征,基于STAR-CCM+仿真软件对SUBOFF全附体模型的尾流场进行了数值模拟。通过将数值模拟结果与试验结果进行比较,系统分析了棱柱层网格的划分与湍流模型的选取对计算结果的影响。结果表明:SSTk-ω模型较适合应用在潜艇模型尾流场计算中,并且棱柱层的总厚度不能小于15mm,第一层计算网格节点到表面的无因次距离y+应在25到170之间。在此基础上,应用滑移网格技术对潜艇尾流场进行数值模拟,通过加密网格和减小时间步长使得轴向伴流分数与整体定常计算值吻合较好。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

15.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

16.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

17.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

18.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

19.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号