排序方式: 共有31条查询结果,搜索用时 0 毫秒
1.
基于EASY5软件平台,利用模块化的建模手段,建立了履带车辆动力传动系统动力学模型,并进行了加速过程仿真.通过实车试验验证了模型的有效性和仿真结果的正确性.结果表明,该建模手段可有效的应用于车辆性能分析及预测. 相似文献
2.
介绍运用多体动力学仿真软件ADAMS和多学科动态系统仿真软件EASY5实现联合仿真的一般方法,并对模型进行仿真,结果表明:在车辆正常行驶情况下制动时输出液压力比发动机熄火情况下输出液压力要大,仿真结果符合实际情况. 相似文献
3.
区块链技术来源于数字货币,是一种具有去中心化、自信任、公开透明、数据不可篡改、隐私保护等特点的分布式数据账本。在国防与军队建设领域,区块链技术由于其技术理念的先进性而具有相当广阔的应用前景,它将导致思维理念、作战方式与管理方式的全方位创新,但是区块链技术在应用过程中,也存在一定缺陷。由于具备高传输速率、低网络时延、超强连接能力以及更灵活的业务部署能力,5G技术成为弥补区块链技术不足的首选。本文首先分别介绍了5G技术和区块链技术的主要军事应用前景和存在的困难;其次,分析了5G与区块链之间的互补影响及两种技术融合发展的可能性;最后,从军事供应链、智慧军营和无人作战平台等方面深入探讨了5G与区块链典型军事应用中可能面临的挑战。 相似文献
4.
中尺度数值预报模式是进行中尺度天气预报的有效手段。中尺度模式MM5是国际上应用最广泛的中尺度预报模式之一。数值天气预报的巨大计算量和实效性要求必须通过高性能分布式并行计算来实现。分析了MM5串行算法的特点,研究了其并行算法的实现,讨论了算法的一些改进,给出了MM5模式在分布式并行巨型计算机上的测试结果。 相似文献
5.
针对辐射源运动方程和观测方程的强非线性,提出基于高斯和框架与5阶容积Kalman滤波(5CKF)的跟踪算法GS-5CKF。该方法将起始时刻的时差观测量所确定的位于地球表面的时差线按经度等间隔划分,初始化多个并行的5CKF,线性组合各滤波器的输出获得辐射源运动状态的估计。针对5CKF,提出新的非线性测度并引入滤波器分裂与合并,从而提高了跟踪精度,同时保持GS-5CKF算法复杂度基本不变。仿真表明,相对仅使用单个5CKF和基于高斯和框架但使用3阶容积Kalman滤波器的GS-3CKF等方法,提出的算法具有更高的估计精度。 相似文献
6.
7.
8.
Li-xiaosong Du Shao-hua Jin Qing-hai Shu Li-jie Li Kun Chen Ming-lei Chen Jun-feng Wang 《防务技术》2022,18(1):72-80
3-nitro-1,2,4-triazol-5-one (NTO) is the main component of insensitive munitions (IM) formulation because of its outstanding insensitive properties.In this paper,a series of NTO/HMX-based composite explosives were prepared and characterized.The study focuses on the effect of NTO on the performance of the formulations,especially the safety performance.The results revealed that the mechanical sensi-tivity of formulations was associated with NTO content,as well as the thermal conductivity,specific heat capacity and Arrhenius parameters.Then,the high amount of NTO using in formulation was proved to be helpful for NTO/HMX-based formulation to exhibit good thermal safety.Besides,by accelerating rate calorimeter (ARC) and a modified cook-offequipment,the pressure and pressure rise rate were proved as the important indicator for judging the thermal safety performance in confined spaces.Finally,the numerical simulation was used as a credible method for predicting the respond temperature of cook-off experiment. 相似文献
9.
目前在网络中,基于仿冒IP的攻击非常普遍,在IPv4中源地址验证比较困难,而在IPv6中,地址位较长,使得基于地址本身验证IP是否合法成为可能。Hash运算具有计算的单向性、寻找相同散列值的明文消息的困难性和对初值的敏感性,利用Hash运算生成IPv6地址,增加了伪造的难度,有效地防止了基于仿冒IP的攻击。 相似文献
10.
Ammonium nitrate and fuel oil (ANFO) based explosive is a classic example of non-ideal high explosives. Its detonation is characterized by a strong dependence of detonation parameters on explosive charge diameter, presence and characteristics of confinement, as well as incomplete consumption of explosive at the sonic point.In this work we propose a detonation model based on the Wood-Kirkwood (WK) theory coupled with the thermochemical code EXPLO5 and supplemented with reaction rate models. Our objective is to analyze the validity of the model for highly non-ideal ANFO explosives, with emphasis on effect of reaction rate models.It was found that both single-step and two-step pressure-based models can be calibrated to reproduce experimental detonation velocity-charge radius data of ANFO at radii significantly above the failure radius (i.e. for D/Did > ∼0.6). Single-step pressure-based model, with the pressure exponent equal to 1.4, proved to be the most accurate, even in the vicinity of the failure radius. The impact of the rate models is most evident on temporal (and spatial) distribution of flow parameters in detonation driving zone, especially when it comes to the conversion and width of detonation driving zone. 相似文献