首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
膨胀波火炮利用弹丸在膛内运行到一定位置时提前开闩的方法,实现了在不降低弹丸初速的前提下大幅度减小火炮后坐的目的。根据膨胀波火炮的工作原理,主要针对膨胀波火炮2种不同开闩方式分别进行讨论,着重对最新设计研制的双门式炮闩膨胀波火炮进行内弹道建模与仿真,并且计算膨胀波速度和行程,进而获得最佳开闩时机。  相似文献   

2.
建立了某大口径自行加榴炮回转部分有限元模型,对动力学模型中的边界条件如反后坐装置力、布尔顿力加载等进行了研究.利用有限元模型仿真了膛内时期火炮的动态响应,得到了弹丸运动的加速度、速度、位移和弹丸运动姿态以及导转力矩、弹丸定心部力、炮口点的扭转角速度和扭转角度、炮口点的横向振动线位移、角位移、速度和角速度等变化规律,分析...  相似文献   

3.
身管柔性化对火炮动力后坐试验的影响研究   总被引:1,自引:0,他引:1  
为研究火炮动力后坐试验过程中身管变形对火炮后坐复进运动的影响,以某自行火炮火力部分作为研究对象,基于多体动力学和有限元方法,构建了考虑身管柔性化的火力部分刚柔耦合动力学模型。该模型中,炮膛合力以样条函数的形式直接作用在炮口前端。通过仿真,对比火炮后坐部分最大后坐速度、最大后坐位移以及最大后坐速度时的后坐位移和时间的仿真值与实弹射击过程中的试验值,结果表明,采用冲击的方式进行火炮后坐模拟试验时,身管柔性特征对火炮后坐复进特性影响较小,也证明冲击式火炮后坐试验装置的研制可行性。  相似文献   

4.
制退机是反后坐装置的重要组成部分,它性能的好坏直接关系到火炮战斗力的发挥,为了研究制退机发生故障对火炮后坐运动产生的影响,对制退机故障进行了分析,运用计算流体力学理论和协同仿真技术,建立了制退机MATLAB/FLUENT协同仿真模型,解决了传统火炮后坐计算模型的局限性,与传统计算模型相比,提高了计算精度,得到了制退机内部瞬态流场参数。通过对节制环磨损典型故障进行仿真研究,分析了节制环在不同磨损程度下对火炮后坐运动的影响规律,并对节制环局部压力分布情况进行了简要解析,为进一步对制退机性能退化规律分析研究提供了有效途径。  相似文献   

5.
合理调整制退机节制杆结构尺寸的变化范围,既可以调整火炮的最大后坐阻力和后坐长度,又能缩小它们的波动范围。为了达到上述目的,建立了能够充分考虑坡膛和膛线对炮膛合力影响的节制杆优化模型。提出了一种不仅可以给出设计变量公差带和优化目标变化范围,还能充分考虑设计变量在公差带内分布情况的现代稳健优化设计方法。最后通过某火炮制退机节制杆的稳健优化设计,实现了对上述方法的验证。  相似文献   

6.
为了简单准确地求出膨胀波火炮的内弹道参数,建立了符合MacCormack格式的膨胀波火炮一维均相流内弹道模型,通过MacCormack法进行求解,得到开闩和不开闩状态下的膨胀波火炮的压力、速度曲线,并给出了经典内弹道在开闩和不开闩条件下的压力、速度曲线.通过结果对比,证明了MacCormack内弹道模型的正确性,MacCormack法求得开闩下的弹丸初速比平均压力法求得的更准确.计算出膨胀波火炮膛内压力、速度、密度、温度等内弹道参数的分布规律,真实地再现了膨胀波在膛内的流动过程.本次计算结果可作为膨胀波火炮的结构设计和后坐效率的基础.  相似文献   

7.
车载火炮射击稳定性作为车炮匹配性评价重要指标,是车炮匹配性定量化评估与系统优化研究的必要环节。基于SolidWorks建立实体模型,结合Fortran语言编制用户自定义程序,在ADAMS环境中建立了车载火炮发射虚拟样机模型。通过应用变量设计方法对火线高等参数进行参数化设计,可以实现虚拟样机仿真的迅捷化,分析了火线高等结构参数对车载火炮后坐稳定性的影响规律。引入灵敏度分析方法,研究了各结构参数对稳定性影响的显著程度,解决了因参数量纲不同无法比较的难题,获得了火线高、支撑间距、后坐部分质量等备选优化参数序列集。进而对车载火炮的射击稳定性进行了优化,为车炮匹配性总体优化奠定基础。最后,展望了下一步研究的工作重点。  相似文献   

8.
根据水弹试射原理及水弹试射实践经验,应用火炮内弹道学理论,建立火炮水弹试射内弹道学模型,分析水弹试射的影响因素,并以某炮水弹试射为例进行仿真计算和膛压测试,计算结果与试验结果基本相符,为新型火炮水弹试射的参数获取提供理论依据.  相似文献   

9.
膨胀波火炮利用发射过程中精确打开炮闩的方法实现了在不降低弹丸初速的前提下,大幅度减小火炮后坐的目的.采用经典内弹道理论对膨胀波火炮发射过程进行了建模与仿真,计算并分析了药室容积、装药量、弹丸质量等装填参数对膨胀波火炮有效功率、炮膛工作容积利用率和火药相对燃烧结束位置等弹道设计评价标准的影响规律,为膨胀波火炮弹药系统设计及实际应用提供了理论参考.  相似文献   

10.
火炮内弹道参数直接影响其计算结果,内弹道参数优化设计是内弹道分析计算的重要环节。基于经典内弹道计算模型,以火药内弹道计算中最为敏感的燃速指数及其燃速系数为设计参量,以最大膛压及弹丸初速的计算值与测试值一致性为目标,对差分进化算法群体的初始化、变异因子及变异模式进行了改进,对某型火炮的内弹道参数进行了优化计算。优化设计结果表明改进后的差分进化算法满足内弹道设计工程实践要求,为内弹道参数优化设计提供了一种有效的算法。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

16.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

17.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

18.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

19.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号