Numerical investigation of subsonic flow over bodies of revolution and a typical missile forebody
Marvin, Ronald E.
Platzer, Max F.
MetadataShow full item record
It was the objective of this investigation to study the subsonic flow over a missile forebody. To this end, the NASA Ames developed OVERFLOW, three dimensional, Navier-Stokes Code was applied and detailed results were obtained for the missile forebody. The flow conditions were set at a Mach Number of 0.3 and Reynolds Number of two million for each angle of attack at 0, 2, 6, 10, and 14 degrees. These viscous flow solutions were compared with three inviscid flow solutions, namely Slender Body Theory, von Karman's Method, and the NASA Ames Panel Code called PMARC. As expected, the OVERFLOW and PMARC solutions were in good agreement at zero and small angles of attack. As the angle of attack was increased, the OVERFLOW solution showed the development of the vortical flow separation on the leeward side of the body.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Keener, Lawrence (Monterey, California: Naval Postgraduate School, 2015);We consider a recently proposed information disclosure vulnerability called blind return-oriented programming (BROP). Under certain conditions, this attack allows a return-oriented programming attack against previously ...
Rogers, Alexis L.; Sowers, Ryan (Monterey, CA; Naval Postgraduate School, 2019-09);Buffer overflow and heap overflow injection attacks have been studied for some time. Recent techniques to prevent execution of payloads inserted into memory have been successful by using stack canaries, non-executable ...
Julian, Donald P. (Monterey, California. Naval Postgraduate School, 2002-09);Modern intrusion detection systems have become highly reliable in identifying a malicious user on a computer system. Their limitations, though, are increasing the need for an intelligent response to an intrusion. In contrast, ...