Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Two-dimensional thermal invisible cloak processing method based on inverse identification and thermal invisible cloak

A processing method and cloak technology, applied in electrical digital data processing, special data processing applications, instruments, etc., can solve a large number of complex mathematical analysis, inability to apply thermal cloak and other problems, to avoid anisotropy, avoid mathematical analysis , the effect of reducing workload

Active Publication Date: 2019-10-11
XI AN JIAOTONG UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the coordinate change method requires a large number of complex mathematical analysis when designing a thermal cloak, so it cannot be applied to the design of thermal cloaks with complex structures.
At the same time, the thermal cloak designed by the coordinate change method requires the physical parameters to have non-uniform anisotropy, and even singularity in some positions, which brings great difficulties to the actual production of the thermal cloak

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-dimensional thermal invisible cloak processing method based on inverse identification and thermal invisible cloak
  • Two-dimensional thermal invisible cloak processing method based on inverse identification and thermal invisible cloak
  • Two-dimensional thermal invisible cloak processing method based on inverse identification and thermal invisible cloak

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Specific embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. Although specific embodiments of the invention are shown in the drawings, it should be understood that the invention may be embodied in various forms and is not limited to the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present invention and to fully convey the scope of the present invention to those skilled in the art.

[0038] It should be noted that certain terms are used in the specification and claims to refer to specific components. Those skilled in the art should understand that they may use different terms to refer to the same component. The specification and claims do not use differences in nouns as a way of distinguishing components, but use differences in functions of components as a criterion for distinguishing. "Includes" or "comprises" mentioned throughout the spe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a two-dimensional thermal invisible cloak processing method based on inverse identification and a thermal invisible cloak. The method comprises the following steps: establishing a two-dimensional coordinate system x-y and determining that an area enclosed by the two-dimensional coordinate system is a design area of a two-dimensional heat stealth cloak; solving a dimensionless temperature field control equation based on boundary conditions to obtain a dimensionless background temperature field of the design area; solving a control equation of the direct problem based onboundary conditions to obtain a dimensionless temperature field of the direct problem of the regional Z3 heat conductivity coefficient; solving an accompanying problem of the heat conductivity coefficient of the region Z3 to obtain a Lagrange multiplier; calculating a derivative and a conjugate coefficient of a target function of the heat conductivity coefficient of the region Z3 and an iterativedirection coefficient of the heat conductivity coefficient of the region Z3; solving the sensitivity problem of the heat conductivity coefficient of the region Z3, calculating the iteration step length of the heat conductivity coefficient of the region Z3, updating the heat conductivity coefficient of the region Z3, calculating the target function, if the value is small enough to meet the user requirement, finishing processing the heat conductivity coefficient of the region Z3, otherwise, returning to the third step.

Description

technical field [0001] The invention belongs to the field of thermal invisibility cloaks, in particular to a method for processing a two-dimensional thermal invisibility cloak and a thermal invisibility cloak based on reverse identification. Background technique [0002] The problem of heat flow stealth is another emerging field after the rapid development of electromagnetic wave and sound wave stealth. Since the heat conduction equation and Maxwell's equation also have form invariance, inspired by the electromagnetic cloak, the coordinate transformation method was extended to the field of heat transfer, and a thermal cloak based on metamaterials was developed through the design of physical parameters. A thermal invisibility cloak generally consists of two parts: the hidden area and the cloak area. After placing the thermal invisibility cloak in the temperature field, the temperature field outside the cloak will not have any disturbance due to the existence of the thermal i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/50
CPCG06F2119/08G06F30/20
Inventor 屈治国郭君
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products