首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11篇
  免费   1篇
测绘学   1篇
地质学   2篇
海洋学   5篇
综合类   4篇
  2022年   1篇
  2017年   2篇
  2013年   2篇
  2010年   1篇
  2006年   1篇
  2004年   2篇
  2003年   2篇
  1998年   1篇
排序方式: 共有12条查询结果,搜索用时 15 毫秒
1.
在一定来流条件下,张力腿平台(tension leg platform,简称TLP)的立柱后缘出现周期性的交替旋涡脱落,致使立柱受到垂直于来流方向的升力和平行于来流方向的阻力作用,导致TLP产生大幅度往复运动,显著增加平台结构和系泊系统的负载。目前,关于单柱、多柱结构绕流问题的研究较多,但对于TLP绕流特性的研究较少,机理尚存不明确的地方。为研究TLP的绕流力变化情况和流场特征,开展了数值模拟分析。利用计算流体动力学数值模拟软件,基于雷诺平均(RANS)法和分离涡模拟(DES)法对TLP绕流场进行仿真分析,揭示了TLP的绕流特性。结果表明,在3种来流角度和多个折合速度Vr下,TLP绕流的流体力系数存在明显差异,升力系数时域曲线呈现脉动性。TLP的上、下游立柱间存在明显的相互作用,影响了旋涡的形成与发展。TLP的旋涡脱落大多集中在平台固有频率附近,且在Vr=7,来流角度为0°时,升力系数频谱峰值最大,旋涡脱落集中。  相似文献   
2.
分组密码是数据通讯中最常用的数据加密方式,以DES为例分析现有分组加密算法的安全隐患,并提出了可变密钥加密和变长密文输出两个新思路,可应用于所有现有分组加密算法以提高安全性,并就该方法的安全性、效率、具体应用做出了分析。  相似文献   
3.
介绍网络加密技术和DES(对称密钥体制)加密算法,分析了选用DES数据加密标准对网络数据流加密的可行性和优越性,研究了JAVA安全结构和在B/S模式下APPLET与SERVLET之间的通信机制,最后基于该模式给出了一个在四川省图书馆综合管理系统中的应用实例。  相似文献   
4.
DES体制加密系统在网络中的应用   总被引:1,自引:0,他引:1  
本文讨论了DES密码体制的基本概念和工作原理,并详细阐述了利用DES原理进行数据加密的软件系统的具体实现方法及该软件系统的基本功能  相似文献   
5.
Numerical benchmark studies on drag and lift coefficients of a marine riser have been organized by the 27th ITTC Ocean Engineering Committee. The purpose of the studies was to benchmark the capabilities of CFD methods through quantitative comparisons and validation studies against the model test results of a circular cylinder by MARIN. Studies were focused on the drag crisis phenomenon for the stationary smooth cylinder in the critical Reynolds number regime. Eight organizations have participated in the studies by using RANS, DES and LES methods. An overview of the model test results, test cases, submissions and comparison results are presented in this paper. Conclusions and recommendations are made for future studies.  相似文献   
6.
When fluid flow passes a cylinder, the drag crisis phenomenon occurs between the sub-critical and the super-critical Reynolds numbers. The focus of the present studies was on the numerical prediction of the drag crisis based on CFD methods. In this work, block structured meshes with refined grids near the cylinder surface and in the downstream were employed. Both 2D and 3D simulations were performed using various turbulence models, including the SST k  ω model, the k  ϵ model, the SST with LCTM, the DES model, and the LES model. In the convergence studies, the effects of the grid size, the time step, the first grid size and the aspect ratio (for 3D simulations) on the solutions were examined. The errors due to spatial and time discretizations were quantified according to a V&V procedure. Validation studies were carried out for various Reynolds numbers between Re = 6.31 × 104 and 7.57 × 105. The averaged drag force, the RMS of lift force and the Strouhal number were compared with experimental data. The studies indicated that standard 2D and 3D RANS methods were inadequate to capture the drag crisis phenomenon. The LES method however has the potential to address the problem.  相似文献   
7.
A numerical study on the acoustic radiation of a propeller interacting with non-uniform inflow has been conducted. Real geometry of a marine propeller DTMB 4118 is used in the calculation, and sliding mesh technique is adopted to deal with the rotational motion of the propeller. The performance of the DES (Detached Eddy Simulation) approach at capturing the unsteady forces and moments on the propeller is compared with experiment. Far-field sound radiation is predicted by the formation 1A developed by Farassat, an integral solution of FW-H (Ffowcs Williams-Hawkings) equation in time domain. The sound pressure and directivity patterns of the propeller operating in two specific velocity distributions are discussed.  相似文献   
8.
随着非接触智能卡的广泛应用,其安全问题也越来越突出。研究了一种非接触智能卡DES密码算法的侧信道安全攻击方法,设计了非接触智能卡密码的侧信道安全攻击流程,研究了信号的采集和处理方法,并对处理后的最终信号进行安全攻击。论文设计了3种信号处理过程,并分别对这3种处理后的曲线进行了攻击操作。最终攻击结果证明了提出的非接触智能卡安全攻击方法是可行的,同时也表明信号处理在非接触智能卡安全攻击中的重要性。  相似文献   
9.
DES(DirectShow Editing Services)是基于DirectShow的视频编辑编程接口,通过建立时间线模型进行多媒体编辑,其自带的XML Parser组件可以用来保存和恢复时间线编辑信息。开发1种时间线构建系统,直接通过编辑XML文件建立时间线模型,将复杂的时间线接口调用转化为简单的XML文档编辑任务,使基于此的系统扩展更加简便。使用Delphi的TXML Document组件读取、写入XML文档,使用树状模型显示及修改,并通过输出引擎得到预览画面及视频文件。  相似文献   
10.
针对网上教学系统关键技术,提出了一种采用CPLD来实现三重DES加密算法的设计方法.最后用一片Altera的MAX7128S实现了该算法.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号