scispace - formally typeset
Search or ask a question
Author

Rushi Savale

Bio: Rushi Savale is an academic researcher. The author has contributed to research in topics: Lift-to-drag ratio & Aerodynamics. The author has an hindex of 1, co-authored 1 publications receiving 2 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: In this article , a winglet design inspired by birds with slotted wings is presented to improve the maneuverability and aerodynamic characteristics of a bionic UAV with better endurance and roll control.

Cited by
More filters
01 May 2007
TL;DR: In this article, the aerodynamic interference effects on tiltrotor performance in cruise were investigated using comprehensive calculations, to better understand the physics and to quantify the effects on the aircraft design.
Abstract: Abstract : The aerodynamic interference effects on tiltrotor performance in cruise are investigated using comprehensive calculations, to better understand the physics and to quantify the effects on the aircraft design. Performance calculations were conducted for 146,600-lb conventional and quad tiltrotors, which are to cruise at 300 knots at 4000 ft/95 deg F condition. A parametric study was conducted to understand the effects of design parameters on the performance of the aircraft. Aerodynamic interference improves the aircraft lift-to-drag ratio of the baseline conventional tiltrotor. However, interference degrades the aircraft performance of the baseline quad tiltrotor, due mostly to the unfavorable effects from the front wing to the rear wing. A reduction of rotor tip speed increased the aircraft lift-to-drag ratio the most among the design parameters investigated.

5 citations

Journal ArticleDOI
TL;DR: In this paper , the authors derived the application of bionic technology and the integration of green energy innovation through systematic innovation theory, designing the operation of UAVs using this research method.
Abstract: This study aims to improve the two major problems faced by UAVs, short battery life and difficulty detecting hovering, respectively. For the problems mentioned above, this study derives the application of bionic technology and the integration of green energy innovation through systematic innovation theory, designing the operation of UAVs using this research method. The scope includes research on bionic technology, systematic innovation, innovation of unmanned aerial vehicles, and conduct fluid analysis for the output results, watching to confirm the hovering state, and analyzing the battery life to ensure the improvement of power supply, the output, and verification of this research can significantly improve the future development and application of UAVs.

1 citations

Journal ArticleDOI
TL;DR: In this article , a winglet design inspired by birds with slotted wings is presented to improve the maneuverability and aerodynamic characteristics of a bionic UAV with better endurance and roll control.
TL;DR: In this paper , the authors investigate various types of assaults and different types of security mechanisms that might be applied based on the network's needs and architecture to defend against network security threats.
Abstract: - Security is an important aspect of computing and networking technology. The first and most important aspect of any network design, planning, construction, and operation is the significance of a solid security strategy. Network security is becoming increasingly critical to personal computer users, businesses, and the military. With the introduction of the internet, security has become a big problem. Many security threats were made possible by the internet's structure. Because of the ease with which intellectual property can be obtained via the internet, network security is becoming increasingly important. When an attack is sent via a network, it can take several forms. Knowing the attack mechanisms enables adequate security to evolve. Many businesses protect themselves from the internet by using of Firewalls and encryption methods are examples of security measures. On global networking infrastructures, there is a vast number of personal, commercial, military, and government information, all of which necessitates different security procedures. In this research, we attempt to investigate numerous types of assaults as well as various types of security mechanisms that might be applied based on the network's needs and architecture.