NOVEL METHOD SOLVING NUMERICAL INSTABILITIES IN TOPOLOGY OPTIMIZATION

来源 :机械工程学报 | 被引量 : 0次 | 上传用户:imimim2
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Numerical instabilities are often encountered in FE solution of continuum topology optimization. The essence of the numerical instabilities is given from the inverse partial differential equation (PDE) point of view. On the basis of the strict mathematical theory, a novel method, named as window filter and multi-grid method, which solves the numerical instabilities, is proposed. Convergent analyses and a numerical example are presented.
其他文献
The spectrum of harmonics generated and propagated in ionized noble gas has been analyzed using one-dimensional wave propagation equation.The result shows that
The correlation of flare's location on solar disc with the value of sudden increase of total electron content is analyzed with flare's parameters observed by GO
期刊
Three calculational models, statistical associating fluid theory (SAFT), modified SAFT, and Boublík-Alder-Chen-Kreglewshi (BACK) are compared for supercritical
Research on a single cell Multi-gap Resistive Plate Chamber (MR PC)was carried out for the Time Of Flight detector (TOF) R and D of the STAR experi-ment. The pr
在太阳核心的条件下,7Be原子被完全电离. 所以,重新计算的7Be和8B太阳中微子流强分别约为4.00×109cm-2*s-1和6.18 ×106cm-2*s-1, 而标准太阳模型预言的7Be和8B太阳中微子流
Let K be a field of characteristic p>0. We prove that the derivative algebra of K[x1,…,xn] is a proer subring of the ring of differential operators of K[x1,…,
Proviral DNA was extracted from donkey leukocyte infected with Chinese donkey leukocyte attenuated equine infectious anemia virus(DLA-EIAV), and peripheral bloo
Colloidal gas aphrons (CGAs) are micron-sized gas bubbles produced by stirring surfactant solutions at high speed. A single CGA dispersed in water is composed o
In this paper, various precise iteration equalities and inequalities of Morse indices for the closed geodesics are established. As applications of these formula
RSA public key crypto system is a relatively safe technology, which is widely used in today’s secure electronic communication. In this paper, a new implementa