Author
Sagar Sahu
Bio: Sagar Sahu is an academic researcher. The author has contributed to research in topics: Albatross & Wingtip vortices. The author has an hindex of 1, co-authored 1 publications receiving 2 citations.
Topics: Albatross, Wingtip vortices
Papers
More filters
5 citations
Cited by
More filters
01 May 2007
TL;DR: In this article, the aerodynamic interference effects on tiltrotor performance in cruise were investigated using comprehensive calculations, to better understand the physics and to quantify the effects on the aircraft design.
Abstract: Abstract : The aerodynamic interference effects on tiltrotor performance in cruise are investigated using comprehensive calculations, to better understand the physics and to quantify the effects on the aircraft design. Performance calculations were conducted for 146,600-lb conventional and quad tiltrotors, which are to cruise at 300 knots at 4000 ft/95 deg F condition. A parametric study was conducted to understand the effects of design parameters on the performance of the aircraft. Aerodynamic interference improves the aircraft lift-to-drag ratio of the baseline conventional tiltrotor. However, interference degrades the aircraft performance of the baseline quad tiltrotor, due mostly to the unfavorable effects from the front wing to the rear wing. A reduction of rotor tip speed increased the aircraft lift-to-drag ratio the most among the design parameters investigated.
5 citations
06 Apr 2018
2 citations
TL;DR: In this paper , the authors derived the application of bionic technology and the integration of green energy innovation through systematic innovation theory, designing the operation of UAVs using this research method.
Abstract: This study aims to improve the two major problems faced by UAVs, short battery life and difficulty detecting hovering, respectively. For the problems mentioned above, this study derives the application of bionic technology and the integration of green energy innovation through systematic innovation theory, designing the operation of UAVs using this research method. The scope includes research on bionic technology, systematic innovation, innovation of unmanned aerial vehicles, and conduct fluid analysis for the output results, watching to confirm the hovering state, and analyzing the battery life to ensure the improvement of power supply, the output, and verification of this research can significantly improve the future development and application of UAVs.
1 citations
TL;DR: In this article , a winglet design inspired by birds with slotted wings is presented to improve the maneuverability and aerodynamic characteristics of a bionic UAV with better endurance and roll control.
Abstract: The work concerned represents a winglet design inspired by birds with slotted wings. Slotted wings are known to exhibit optimum characteristics in terms of reducing the generation of vortices, enhancing roll stability, countering induced drag, and enhancing lift and stall characteristics. Light is shed on these parameters while designing the model. Key aerodynamic parameters are also highlighted. The model is further simulated to obtain the change in the characteristics of multiple aerodynamic parameters, concerned with wingtips and winglets. The main area of concern is the reduction in the values of drag, specifically the induced drag, as it is a major contributing factor in a subsonic aircraft’s overall drag generation. The work included in this paper is a study on an albatross wing to improve its maneuverability and its aerodynamic characteristics so that it can be used in a bionic UAV with better endurance and roll control. These slots can later be made to actuate at different angles. This study acts as a base for further research.
TL;DR: In this paper , the authors investigate various types of assaults and different types of security mechanisms that might be applied based on the network's needs and architecture to defend against network security threats.
Abstract: - Security is an important aspect of computing and networking technology. The first and most important aspect of any network design, planning, construction, and operation is the significance of a solid security strategy. Network security is becoming increasingly critical to personal computer users, businesses, and the military. With the introduction of the internet, security has become a big problem. Many security threats were made possible by the internet's structure. Because of the ease with which intellectual property can be obtained via the internet, network security is becoming increasingly important. When an attack is sent via a network, it can take several forms. Knowing the attack mechanisms enables adequate security to evolve. Many businesses protect themselves from the internet by using of Firewalls and encryption methods are examples of security measures. On global networking infrastructures, there is a vast number of personal, commercial, military, and government information, all of which necessitates different security procedures. In this research, we attempt to investigate numerous types of assaults as well as various types of security mechanisms that might be applied based on the network's needs and architecture.