共查询到20条相似文献,搜索用时 437 毫秒
1.
2.
3.
4.
5.
6.
以3,6-对(3,5-二甲基吡唑)-1,2,4,5-四嗪(BT)为起始物,经取代反应合成了3,6-二氨基-1,2,4,5-四嚷(DATZ),产率95.3%,再经过氧蚁酸氧化得到四嗪类高氮低感度炸药——3,6-二氨基-1,2,4,5-四嗪-1,4-二氧化物(DATZO2),产率60.2%;利用IR、NMR、MS、元素分析和DSC等对其结构进行了表征和确认,并对合成反应条件进行了初步探讨,认为最佳反应条件为DATZ1.12g(0.01mol),甲酸20ml,双氧水4ml,25℃反应1h。 相似文献
7.
制备了1-磺酸丙基-3-甲基咪唑硫酸氢盐[MIMPS][HSO4]离子液体,以[MIMPS][HSO4]作为催化剂,应用于N2O5/有机溶剂硝化2,6-二乙酰氨基吡嗪-1-氧化物合成2,6-二氨基-3,5-二硝基吡嗪-1-氧化物(LLM-105).通过1 H NMR,IR和MS对LLM-105及其中间体的结构进行了表征.研究了在[MIMPS][HSO4]催化条件下,反应溶剂、催化剂用量、反应温度和反应时间对LLM-105收率的影响,结果表明最佳反应条件为:采用CH3NO2为反应溶剂,反应温度为55 ℃,反应时间为6h,LLM-105的收率为72.2%.研究了[MIMPS][HSO4]的循环使用性能.结果表明,平行实验5次,平均收率71.7%,具有较好的可再生利用性. 相似文献
8.
9.
以2,6-二乙酰氨基吡啶-1-氧化物(DAPO)为原料,在Ⅳ,Ⅳ,Ⅳ-三甲基-N-丙磺酸基-硫酸氢铵(TMPSHSO4)催化条件下,采用N2O5/有机溶剂硝化2,6-二乙酰氨基毗啶制得2,6-二氨基-3,5-二硝基吡啶-1-氧化物(ANPyO)。考察了在TMPSHSO4催化条件下反应溶剂、温度和时间对ANPyO产率的影响,结果表明最佳反应条件为:反应溶剂为CH3NO2,反应温度为60℃,反应时间为5h,ANPyO产率为92.5%。用^1HNMR,IR和MS对ANPyO的结构进行了表征。 相似文献
10.
11.
Tetraacetyldibenzylhitane (TADBIW) was subjected to debenzylation by nitrosating with inorganic materials available commercially to synthesize tetraacetyldinitrosohexaazaisowurtzitane (TADNSIW). TADNSIW was purified, and its structure was determined by FTIR, 1H NMR, MS and element analysis. The debenzylation reaction of TADBIW gave quantitative benzaldehyde as a by-product. This indicates that the reaction produces an imine cation as an intermediate. Hexanitrohexaazaisowurtzitane (HNIW) was prepared from unpurified TADNSIW with the yield over 96.0 % and the purity more than 98.0 %. And the mechanism of the reaction from TADNSIW to HNIW is proposed to be oxidation of nitroso and nitration of acetyl on the molecule of TADNSIW, This reaction system involved is simple, and the reaction can complete within a short time and under mild conditions. The product can be easily to separate and the waste disposed readily. 相似文献
12.
For measuring velocity and impacting position of single fragment of warhead, a non-contact measuring method is proposed, in which a six-light-screen array, a position indicator, a multi-channel chronograph and a computer are used.The principle of measurement is described. The key device of the system is a light screen array sensor which consists of six light screens allocated with certain geometrical parameters. When the fragment flies through the light screen array, the time of passing through each of the screens is recorded by the multi-channel chronograph. According to the time data and the geometrical parameters of the array, the velocity vector and the location of the fragment can be calculated immediately. The presented method can be used to locate the fragment and to measure the real velocity on its flying direction. It can also be used to measure the velocity of a fragment swarm after the system is engineered further. 相似文献
13.
The technique of watermarking has been introduced into 2D vector maps for many potential applications such as protecting the copyright of important GIS (geographical information system) data and tracing the data source of military maps. In most previous works, although the validity of the map data could be preserved during the embedding procedure, the shape-distortions of the map elements are usually neglected which would tend to degrade the invisibility of the watermarking schemes. A shape-preserving algorithm for watermarking 2D vector maps is presented in this paper. A 1D distance sequence extracted from the original map is adopted as the cover data instead of 2D coordinates. A watermark bit is represented by changing the distributions of the cover data. The embedding procedure induces lower shape-distortions than in former works. Experimental results indicate better invisibility of the proposed scheme, as well as its robustness to certain attacks such as map simplification, interpolation, additive noise and most geometric transforms. 相似文献
14.
阐述了数码电子雷管中,点火药剂细结晶三硝基间苯二酚铅(LTNR)的制备工艺;从点火药剂的种类、加入黏合剂的质量分数、桥丝直径、点火头的电阻值、防潮漆的蘸涂等方面对点火头性能的影响因素进行了探讨;通过震动试验、并联起爆试验、延期精度检测与考核,试验结果表明:一次性合成的细结晶LTNR是制造数码电子雷管点火头较为理想的点火药剂,按技术要求生产的点火头性能指标能够满足行业标准要求。 相似文献
15.
The stability under illumination of transmission-mode GaAs photocathode sealed in the third generation intensifier is investigated by use of spectral response testing instruments. The variations of spectral response with the illumination times under weak and intense illumination are compared. The variations of photoemission performance parameters are also characterized. The results show that during initial several weak illuminations photocathode behaves no evident decay and a maximum sensitivity is achieved, while under intense illumination the sensitivity of photocathode begin to decrease largely at the first illumination. The calculated performance parameters show that the variation of surface escape probability with illumination times is a direct cause of instability of photocathode. It is also found that under intense illumination peak wavelength is moved towards short-wave and peak response is decreased, which shows that the ability of long-wave response of photocathode is decreased. 相似文献
16.
Open rule-setting method advanced in this paper concentrates on providing designers of engines with a convenient way to express their design innovations and develop the expected prototypes in the early CAD stage, and constitute effective models for the following analysis process of CAE and CAPP. The problems arisen in the process of conceptual design with the traditional experience-based development method are analyzed. Based on those analyses, open rule-setting method is presented and some associated technical problems are discussed. The functional framework of open rule-setting system was built as software engineering methods. The speciality of the engine product as a kind of complex product and the requirement of the engine product based on its structural particularity to rule-setting system are considered carefully. A demonstration is supplied to illustrate how the open rule-setting method enhances the efficiency and quality of the engine conceptual design. 相似文献
17.
The implementation of a missile's visual simulation system is explained that is developed with OpenGL(open graphic library) and the flight path and flight carriage in different stages of the missile are displayed. The establishment problems of the 3D scene are circumstantiated including the construction and redeployment of the model, creation of the virtual scene, setting of the multi-viewports and multi-windows etc. The missile's data driver, system flow, the modules and their mutual relations of the missile visual simulation system are discussed. The missile flight simulation results and effect of the scenes are given. 相似文献
18.
By analyzing the working principle of Linux network device driver, discussing the Linux network driver structure and its key technologies, the general network driver structure and its design methodologies in Linux system are summarized. Through modifying the network device driver of Linux device driver 3rd version snull, c and improving the COW technology, the Zero-Copy technology in Linux (kernel version 2.6.11 ) is implemented. In the end, the success test tells us that the thorough analysis of network device driver is the foundation of many applications, and it also provides a certain improvement to a lot of real applications, even to military application development. 相似文献
19.
By analyzing the influencing factors of part quality making of sheet alloy of titanium by vibra cutter, the shape of upper reamer is set as cylinder and wedge-shaped form, and the lower reamer as plain and hemicycle form, and its main structural parameters are defined as well. Then it is validated further that such improved vibra cutter reamer can be used to process curve-edged parts of titanium alloy sheet. The experimental result shows that the titanium alloy sheet parts processed by above equipment have no sharpen angles for convex parts and evident crevasse of concave-edged part. In summary, such improvement can eliminate the free-waved edge and improve the manufacture quality of titanium alloy sheet parts greatly. 相似文献
20.
A new dynamic encryption application in ad-hoc networks is proposed. The advantages of this method are its being able to use the previous ciphertext as a seed of a new encryption process, rendering the encryption process effective in all communication process by continuous dynamic key generation together with synchronization, and its capability to cut back on system bandages to a greater extent, which is valuable for the ad-hoc circumstance. In addition, the rationality and effectiveness of this novel encryption method have been verified by the test results. 相似文献