Design of Control Law of Post Stall Maneuver under Unsteady Aerodynamics Based on Improved Dynamic Inverse Method
نویسندگان
چکیده
منابع مشابه
An Output-Based Dynamic Order Refinement Strategy for Unsteady Aerodynamics
An output-based dynamic order re nement strategy is presented for unsteady simulations using the discontinuous Galerkin nite element method in space and time. A discrete unsteady adjoint solution provides scalar output error estimates and drives adaptive re nement of the space-time mesh. Space-time anisotropy is measured using projection of the adjoint onto semi-re ned spaces and is used to all...
متن کاملAdjoint-based Unsteady Airfoil Design Optimization with Application to Dynamic Stall
This paper presents the development and application of an adjoint-based optimization method to designing airfoils with the objective of alleviating dynamic stall effects in helicopter rotor blades. The unsteady flow problem is simulated using the NSU2D code, which is a two-dimensional unsteady, viscous, turbulent Reynolds averaged Navier-Stokes (RANS) finite-volume solver. The corresponding adj...
متن کاملImproved Constrained PID Control Design based on Connvex-Concave Optimization
In this paper, an algorithm is proposed to improve the design of constrained PID controller based on convex-concave optimization. This design method is based on the optimization of a performance cost function, taking into account the stability and efficiency constraints with frequency domain analysis in which the concepts of sensitivity and complementary sensitivity has been used. It is shown, ...
متن کاملSynthesis of Robust Nonlinear Control Law Unsteady Dynamic Objects
Abstract: An adaptive identifier for neuro-fuzzy control system nonlinear dynamic object operating in conditions of uncertainty intrinsic properties and the environment. The algorithms of structural and parametric identification in real time are a combination of an identification algorithm coefficients of linear management and methods of the theory of interactive adaptation. Adaptive neuro-fuzz...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University
سال: 2019
ISSN: 1000-2758,2609-7125
DOI: 10.1051/jnwpu/20193730523