Unsteady Fluid–Structure–Jet Interactions of Agile High-Speed Vehicles
نویسندگان
چکیده
منابع مشابه
Control of High-Speed Underwater Vehicles
I (GB) was fortunate that early in my career I had the opportunity to work with Keith Glover. Keith had just begun his obsession with golf. A simple game where a ball stands still and the player advances it from different parts of the landscape into a hole. During a golf outing, Keith vigorously struck a ball off the fairway. It drove through a water hazard and miraculously ended up a few feet ...
متن کاملStability measurement of high-speed vehicles
Vehicle rollover represents a significant percentage of single-vehicle accidents and accounts for over 9000 fatalities and over 200,000 non-fatal injuries each year. Previous research has yielded rollover stability control systems that are effective in on-road conditions.Accident statistics show, however, that over 90% of rollovers involve road departure, during which a vehicle may encounter sl...
متن کاملUnsteady effects in dense, high speed, particle laden flows
0301-9322/$ see front matter 2014 Elsevier Ltd. All rights reserved. http://dx.doi.org/10.1016/j.ijmultiphaseflow.2013.12.007 ⇑ Corresponding author. Tel.: +1 515 294 1614; fax: +1 515 294 3262. E-mail addresses: [email protected] (J.D. Regele), jason.rabinovitch@caltech. edu (J. Rabinovitch), [email protected] (T. Colonius), [email protected] (G. Blanquart). J.D. Regele a,⇑, J. Rabi...
متن کاملFlux Limited Dissipation Schemes for High Speed Unsteady Flows
Within the framework of the Local Extremum Diminishing (LED) or Essentially Local Extremum Diminishing (ELED) principle, efficient approaches to obtain a class of non-oscillatory high resolution schemes are presented. The LED principle requires that local maxima should not increase and local minima should not decrease to produce a monotonicity preserving scheme for scalar hyperbolic conservatio...
متن کاملMultiply-Agile Encryption in High Speed Communication Networks
Different applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. Encryption hardware, designed for use in high-speed communications networks; can satis& a wide variety of security requirements if that hardware is key-agile, robustness-agile and algorithm-agile. Hence, multiply-agile e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Spacecraft and Rockets
سال: 2018
ISSN: 0022-4650,1533-6794
DOI: 10.2514/1.a34092