Hostname: page-component-8448b6f56d-dnltx Total loading time: 0 Render date: 2024-04-25T05:45:11.419Z Has data issue: false hasContentIssue false

Subcritical instability on the attachment-line of an infinite swept wing

Published online by Cambridge University Press:  01 April 2005

T. K. SENGUPTA
Affiliation:
Department of Aerospace Engineering, IIT Kanpur 208 016, India
A. DIPANKAR
Affiliation:
Department of Aerospace Engineering, IIT Kanpur 208 016, India

Abstract

The leading-edge contamination (LEC) problem of an infinite swept wing is shown here as vortex-induced instability. The governing equation for receptivity is presented for LEC in terms of disturbance energy based on the Navier–Stokes equation. The unperturbed shear layer given by the swept Hiemenz boundary-layer solution is two-dimensional and an exact solution of incompressible the Navier–Stokes equation. Thus, the LEC problem is solved numerically by solving the full two-dimensional Navier–Stokes equation. The contamination at the attachment-line is shown by solving a receptivity to a convecting vortex moving outside the attachment-line boundary layer, which triggers subcritical spatio-temporal instability.

The mechanism of LEC is shown to be due essentially to a convecting counter-clockwise rotating vortex, whereas a clockwise rotating vortex displays much weaker receptivity. These results are consistent with experimental results for the bypass mechanism.

The role of linear and nonlinear mechanisms in the contamination problem is discussed as interactions between vorticity and velocity terms of the developed receptivity equation. The computed temporal growth rates reveal pattern formation during such instabilities. Proper orthogonal decomposition (POD) of the numerical solution shows the structure of the leading eigenvector as the coherent eddy excited during the bypass transition.

Type
Papers
Copyright
© 2005 Cambridge University Press

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)