Les prediction for acoustic noise of airfoil at high angle of attack

Aya Aihara, Anders Goude, Hans Bernhoff

Research output: Chapter in Book/Report/Conference proceedingConference contribution


This paper presents computations for prediction of the acoustic sound generated from an airfoil using the Large Eddy Simulations. To validate our calculations, a NACA 0012 airfoil with the angle of attack 15.6 placed in a freestream flow is studied where the Reynolds number based on the chord length is 5 ×105 and the Mach number is 0.2. This study employs the hybrid method that the aerodynamic flow fields in the near region around the sound source is solved by CFD and then the sound propagation is obtained by the wave equation. The finite volume method is used to solve the three dimensional incompressible Navier-Stokes equations, and the sound propagation is predicted using the Curle’s acoustic analogy. The predicted acoustic pressure is compared with measurement data reported by Brooks et al.. The effective angle of attack in the measurement has to be known for validation and is also discussed in this paper. The results show that the predicted frequency of a primary peak in the SPL spectrum is in good agreement with the measurement data. However, the simulated span length is 10% of the actual one and the sound source outside the computational domain needs to be corrected properly for more precise sound prediction.

Original languageEnglish
Title of host publicationAIAA Scitech 2020 Forum
PublisherAmerican Institute of Aeronautics and Astronautics Inc, AIAA
Number of pages12
ISBN (Print)9781624105951
Publication statusPublished - 2020
Externally publishedYes
EventAIAA Scitech Forum, 2020 - Orlando, United States
Duration: 2020 Jan 62020 Jan 10

Publication series

NameAIAA Scitech 2020 Forum
Volume1 PartF


ConferenceAIAA Scitech Forum, 2020
Country/TerritoryUnited States

ASJC Scopus subject areas

  • Aerospace Engineering


Dive into the research topics of 'Les prediction for acoustic noise of airfoil at high angle of attack'. Together they form a unique fingerprint.

Cite this