43 research outputs found

    ์ „์‚ฐ์œ ์ฒด์—ญํ•™์„ ์ด์šฉํ•œ ๋‚œ๋ฅ˜ ์œ ๋™์˜ ์บ๋น„ํ…Œ์ด์…˜ ์นจ์‹ ์ถ”์ •์„ ์œ„ํ•œ ์‹ค์šฉ์ ์ธ ๋ฐฉ๋ฒ• ๊ฐœ๋ฐœ

    No full text
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ์‚ฐ์—…ยท์กฐ์„ ๊ณตํ•™๋ถ€, 2013. 2. ์ด์‹ ํ˜•.Cavitation erosion can be observed on hydraulic mechanical devices and has long been studies, yet a difficult research subject for many years. In the present study, a practical method to predict cavitation erosion, which caused a critical damage on hydraulic machineries, was developed. Impact and critical velocities were defined to develop a practical method for the prediction of cavitation erosion. When the impact velocity was larger than the critical velocity, it was predicted that cavitation erosion could be observed. To close the practical method, the computational fluid dynamics (CFD) was introduced. To simulate cavitating flows using CFD, pressure-based incompressible and isothermal compressible flow solvers based on a cell-centered finite volume method were developed using the open source libraries, respectively. Time derivative terms were discretized using the first-order accurate backward implicit scheme Second order accurate discretized scheme was applied it to the convection and diffusion terms. To validate the developed solvers, incompressible and isothermal compressible cavitating flows were studied carefully and validated against existing experimental data. An incompressible flow with sheet, super, and cloud cavitations were simulated. A sheet cavitating flow around a hemispherical head-form body was simulated, and selected cavitation and turbulence models. A sheet cavitating flow around a modified NACA66 section (Brockett, 1966) was simulated and tested for various condensation and evaporation model constants. From the simulation of sheet cavitation, model constants were selected carefully. A super-cavitating flow behind a wedge-shaped cavitator was simulated. The computed cavity lengths on the body were compared with an analytic solution and numerical results using a potential flow solver. Fairly good agreement was observed in the three-way comparison. And then, a super cavitating flow around a body equipped with a cavitator was simulated and validated by comparisons with existing experimental data. A cloud cavitating flow around a three-dimensional twisted hydrofoil (Foeth, 2008) was simulated, and the cavity shedding dynamics by a re-entrant jet and a side entrant jet were investigated in terms of the cavity shedding cycles. The computed lift force and Strouhal number were compared against existing experimental data. From the results, the developed solver predicted well the incompressible cavitating flows. An isothermal compressible sheet cavitating flow around a hemispherical head-form body was simulated. The cavity shedding behavior, length of a re-entrant jet, drag history, and Strouhal number were investigated. Based on the results, it was confirmed that computations of the cavitating flow including compressibility effects improved the reproduction of cavitation dynamics. Thus, the isothermal compressible cavitating flow solver was selected to simulate the flow with cavitation erosion. To close the practical method for the prediction of cavitation erosion, cavitating flows with erosion in a converging-diverging nozzle (Keil et al., 2011) and around a hydrofoil (Dular and Coutier-Delgosha, 2009) were simulated by developed and validated code. From the simulations, the cavitation erosion coefficients were calculated. Based on the CFD results, the cavitation erosion coefficient was derived by a metamodeling and curve fitting methods. A kriging metamodel, which had an advantage in a non-linear problem, was selected. The cavitation erosion coefficient surface, which consisted of the cavitation and Reynolds numbers, was introduced by the kriging metamodel. In a curve fitting method, the cavitation erosion coefficient was formulated as the function of the cavitation and Reynolds numbers. A function of the cavitation number was formulated as an exponential function, while, a function of the Reynolds number was formulated as a log function for a slight change at high Reynolds number. A cavitating flow in an axisymmetric nozzle followed by radial divergence (Franc, 2009) was simulated to validate the developed practical method. Predicted damage extent showed acceptable agreement with the existing experimental data. For the application to a propeller, a cavitating flow around a propeller was simulated. Predicted damage extent showed similar with damaged full-scale propeller blade. The developed practical method helps predict cavitation erosion observed on the blades of pumps, turbines, and propellers. The prediction method including a bubble cavitation, fatigue of a material, high Reynolds number, and cavity shedding cycle is needed.Chapter 1 Introduction 1.1 Background 1.2 Literature review 1.2.1 Cavitation 1.2.2 Cavitation erosion 1.3 Objectives Chapter 2 Development of Practical Method 2.1 Impact velocity 2.2 Critical velocity Chapter 3 Code Development 3.1 Incompressible flow solver 3.1.1 Mathematical modeling 3.1.2 Pressure-correction equation 3.2 Isothermal compressible flow solver 3.2.1 Mathematical modeling 3.2.2 Pressure-correction equation 3.3 Numerical methods Chapter 4 Code Validation 4.1 Incompressible flow 4.1.1 Sheet cavitation 4.1.2 Super cavitation 4.1.3 Cloud cavitation 4.2 Isothermal compressible flow Chapter 5 Cavitation Erosion Coefficient 5.1 Converging-diverging nozzle 5.2 Hydrofoil 5.3 Determination of cavitation erosion coefficient 5.3.1 Kriging metamodeling method 5.3.2 Curve fitting method Chapter 6 Validation and Application 6.1 Validation 6.2 Application Chapter 7 Conclusions Chapter 8 Future Works References Appendix Abstract (Korean) 176Docto

    ๆ—ฃๆˆๅธ‚่ก—ๅœฐ ๅŸบๆบ–ๅฎน็ฉ๏ฅก ่จญๅฎšๆ–นๆณ•์— ๊ด€ํ•œ ็ก็ฉถ : ์„œ์šธ์‹œ ์ƒ์„ธ๊ณ„ํš ๊ตฌ์—ญ์„ ์ค‘์‹ฌ์œผ๋กœ

    No full text
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ)--์„œ์šธ๋Œ€ํ•™๊ต ํ™˜๊ฒฝ๋Œ€ํ•™์› :ํ™˜๊ฒฝ์กฐ๊ฒฝํ•™๊ณผ,1999.Maste

    A Sequential Rao-Blackwellized Particle Filter-Based Speech Enhancement Algorithm

    No full text
    Maste

    ํ™”์ƒ๋ฐฉ ๋ฐฉํ˜ธ์‹œ์„ค์˜ ํ–‰๋™ ์ ˆ์ฐจ ๋ถ„์„์„ ํ†ตํ•œ ์ง„์ž… ์†Œ์š”์‹œ๊ฐ„ ์˜ˆ์ธก ์‹œ๋ฎฌ๋ ˆ์ด์…˜

    No full text
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๊ฑด์ถ•ํ•™๊ณผ, 2015. 2. ์ดํ˜„์ˆ˜.As Chemical, Biological, and Radiological (CBR) attack increases, the importance of CBR protective facility is being emphasized. When CBR warfare emerges, a task force team, who exists outside of CBR protective facility, should enter the CBR protective facility through neutralizing process in Contamination Control Area (CCA) and Toxic Free Area (TFA). If a bottleneck occurs in the process or zones, the task force team cannot enter the CBR protective facility efficiently and may cause inefficiency in its operation performance or result in casualties. The current design criteria of the CBR protective facility is only limited to ventilation system and it does not consider how much time it takes to enter the facility. Therefore, this research aims to propose the entering time estimation model with discrete event simulation. To make the simulation model, the procedures performed through CCA and TFA are defined and segmented. The actual time of the procedures are measured and adapted for the simulation model. After running the simulation model, variables effecting the entering time are selected for experiments with adjustments. This entering time estimation model for CBR protective facility is expected to help take time into consideration during the designing phase of CBR protective facility and help CBR protective facility managers to plan facility operation in a more realistic approach.Chapter 1 Introduction 1 1.1 Research Background and Problem Statement 1 1.2 Research Objective 2 1.3 Research Scope and Process 3 Chapter 2 Preliminary Study 5 2.1 CBR Warfare 5 2.2 CBR Agents 7 2.3 CBR Protective Facility 10 2.4 Entering Procedures of CBR Protective Facility 12 2.5 Literature Reviews on CBR Protective Facility 14 2.6 Discrete Event Simulation 17 2.7 Summary 19 Chapter 3 Entering Time Estimating Simulation Model 20 3.1 Analysis of Entering Process 20 3.2 Simulation Model Development 23 3.3 Simulation Result 28 3.4 Summary 31 Chapter 4 Simulation Model Experiment 32 4.1 Experiment Plans of Simulation Model 32 4.2 Simulation Results of Experiment 33 4.3 Summary 39 Chapter 5 Conclusion 40 5.1 Research Result 40 5.2 Contribution 42 5.3 Limitation and Future Study 43 Appendices 44 Appendix A. Terms 45 Appendix B. Simulation Report 48 References 53 Abstract (Korean) 56Maste

    A Study on the Perception of Mutuality through Multi-Layered Narrative Structure

    No full text
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต๋Œ€ํ•™์› : ๋ฏธ์ˆ ๋Œ€ํ•™ ์„œ์–‘ํ™”๊ณผ, 2022. 8. ์˜ค์ธํ™˜.๋ณธ ๋…ผ๋ฌธ์€ ์‚ฌํšŒ ์†์— ๊ทœ์ •๋œ ๋ฌธํ™”์  ๊ธฐํ‘œ๋ฅผ ๋ฏธ์ˆ ์„ ํ†ตํ•ด ๋‹ค์ธต์ ์œผ๋กœ ์žฌ๋งฅ๋ฝํ™”ํ•˜๊ณ , ๋‹ค์ธต์  ์„œ์ˆ  ๊ตฌ์กฐ์™€ ์‹œ์  ์ด๋™์„ ํ†ตํ•œ ์ธ์‹์˜ ์ƒํ˜ธ์„ฑ์„ ๊ตฌํ˜„ํ•˜๋Š” ๋ณธ์ธ์˜ ์ž‘ํ’ˆ์„ ๋ถ„์„ํ•œ๋‹ค. ๋‚ด๊ฐ€ ํŠน๋ณ„ํžˆ ์ฃผ๋ชฉํ•˜๋Š” ๋ฌธํ™”์  ๊ธฐํ‘œ๋Š” ๋ฏธ๋””์–ด๋ฅผ ํ†ตํ•ด ์ „๋‹ฌ๋˜๊ฑฐ๋‚˜ ์‚ถ ์†์—์„œ ์‰ฝ๊ฒŒ ์ ‘ํ•  ์ˆ˜ ์žˆ๋Š” ํ…์ŠคํŠธ์™€ ์ด๋ฏธ์ง€๋ฅผ ํ†ตํ•ด ๋“œ๋Ÿฌ๋‚œ๋‹ค. ๋ฌธํ™”์  ๊ธฐํ‘œ๋Š” ์‚ฌํšŒ์˜ ๊ทœ๋ฒ”๊ณผ ๊ฐ€์น˜ ์ฒด๊ณ„๊ฐ€ ๋ฐ˜์˜๋œ ๊ฒƒ์œผ๋กœ ํ•œ ์‚ฌํšŒ์—์„œ ํ†ต์šฉ๋˜๋Š” ๋ณดํŽธํ™”๋œ ๋ฉ”์‹œ์ง€์™€ ๊ด€์ ์„ ์ „๋‹ฌํ•˜๋ฉฐ ๋ฌธํ™”์˜ ์ˆ˜์šฉ๊ณผ ์—ฐ๊ฒฐ๋œ๋‹ค. ๋ณธ์ธ์€ 1990๋…„๋Œ€์— ํƒœ์–ด๋‚˜ ์ธํ„ฐ๋„ท๊ณผ ๋ฏธ๋””์–ด๋ฅผ ํ†ตํ•ด ๋‹ค์–‘ํ•œ ์ •๋ณด, ์ด๋ฏธ์ง€ ๊ทธ๋ฆฌ๊ณ  ์ด์•ผ๊ธฐ๋ฅผ ์ ‘ํ•˜๊ณ  ์ด๋ฅผ ์‚ถ์˜ ์ผ๋ถ€๋กœ ์ž์—ฐ์Šค๋Ÿฝ๊ฒŒ ๋ฐ›์•„๋“ค์˜€๋‹ค. ํ•œํŽธ, ๋””์ง€ํ„ธ ๋ฏธ๋””์–ด ํ™˜๊ฒฝ์—์„œ ์œ ํ†ต๋˜๋Š” ์ด์•ผ๊ธฐ์™€ ์ด๋ฏธ์ง€๋Š” ๋ฏธ์‹œ์‚ฌ๋ฅผ ์ถฉ๋ถ„ํžˆ ํฌํ•จํ•˜์ง€ ์•Š๋Š”๋‹ค๊ณ  ๋Š๋‚€๋‹ค. ๋ณธ์ธ์€ ๋ˆ„๊ตฐ๊ฐ€์˜ ์ด์•ผ๊ธฐ๋Š” ๋ณดํŽธ ์—ญ์‚ฌ์— ๊ธฐ๋ก๋˜๊ณ , ๋ˆ„๊ตฐ๊ฐ€์˜ ์ด์•ผ๊ธฐ๋Š” ๊ธฐ๋ก๋˜์ง€ ์•Š๋Š” ํ˜„์ƒ๊ณผ ๋ฌธํ™”๊ฐ€ ์ด ๊ฐ™์€ ์ฐจ์ด๋ฅผ ์ˆ˜์šฉํ•ด์˜จ ๊ณผ์ •์— ์˜๋ฌธ์„ ๊ฐ€์ง„๋‹ค. ์•ž์„  ๋ฌธ์ œ์˜์‹์„ ํ† ๋Œ€๋กœ ๋ณธ์ธ์€ ์ž‘ํ’ˆ ์ œ์ž‘์„ ํ†ตํ•ด ์ถฉ๋ถ„ํžˆ ๊ธฐ๋ก๋˜์ง€ ์•Š์€ ์ด์•ผ๊ธฐ๋ฅผ ๋ฐœ๊ตดํ•˜๊ณ  ์ž‘ํ’ˆ์— ํฌํ•จํ–ˆ๋‹ค. ๋‚˜์˜ ์ž‘ํ’ˆ์€ ์ด๋Ÿฌํ•œ ๊ณผ์ •์„ ํ†ตํ•ด ์ผ๋ฐฉํ–ฅ์ ์ธ ์—ญ์‚ฌ ์„œ์ˆ ์ธ ๋ณดํŽธ ์„œ์‚ฌ๊ฐ€ ์•„๋‹Œ ๋‹ค์ธต์ ์ด๊ณ  ๋ฏธ์‹œ์  ๊ด€์ ์„ ์ œ์‹œํ•˜๋Š” ์ด์•ผ๊ธฐ๋ฅผ ๋‚ด์„ธ์šด๋‹ค. ์ž‘ํ’ˆ์€ ๊ธฐ์กด์˜ ๋ฌธํ™” ์ƒ์‚ฐ๋ฌผ๊ณผ ์žŠํžˆ๊ฑฐ๋‚˜ ์ถฉ๋ถ„ํžˆ ๊ธฐ๋ก๋˜์ง€ ์•Š์€ ์ž๋ฃŒ๋ฅผ ๋’ค์„ž๊ธฐ ์œ„ํ•ด ๋‘ ๊ฐ€์ง€ ํŽธ์ง‘ ๋ฐฉ์‹์„ ํ™œ์šฉํ•œ๋‹ค. ํŽธ์ง‘์„ ํ†ตํ•ด ์ œ์ž‘ํ•œ ์ž‘ํ’ˆ์€ ๋ณดํŽธ ์„œ์‚ฌ์— ๋Œ€ํ•ญํ•˜๋Š” ์„ฑ๊ฒฉ์„ ๊ฐ€์ง€๋ฉฐ ์ธํ„ฐ๋„ท ๊ธฐ๋ฐ˜์˜ ์†Œ์…œ๋ฏธ๋””์–ด์—์„œ ์œ ํ†ต๋˜๋Š” ์ด๋ฏธ์ง€์˜ ์ฒจ๋‹จ ์†Œ๋น„ ๋ฐฉ์‹๊ณผ ๋Œ€๋น„๋˜๋Š” ์„ฑ์งˆ์„ ๋ค๋‹ค. ์ด ๊ฐ™์€ ์ œ์ž‘ ๋ฐฉ์‹์€ ๊ธฐ์กด์˜ ์—ญ์‚ฌ ์„œ์ˆ ์„ ๋ถ€์ •ํ•˜๋Š” ๊ฒƒ์ด ์•„๋‹ˆ๋ผ ๊ธฐ์กด ์—ญ์‚ฌ์™€์˜ ๊ณต์กด์„ ๋„๋ชจํ•˜๊ณ  ๋‹ค์–‘ํ•œ ์‹œ์ ์„ ํ™œ์šฉํ•œ ๋‹ค์ธต์  ์„œ์ˆ ์„ ์ œ์•ˆํ•˜๊ธฐ ์œ„ํ•œ ๋‚˜์˜ ์ „๋žต์ด๋‹ค. ๋˜ํ•œ ์ž‘ํ’ˆ์€ ๋ณดํŽธ ์„œ์‚ฌ์™€ ๋Œ€์•ˆ ์„œ์‚ฌ์˜ ์ฐจ์ด๋ฅผ ๋“œ๋Ÿฌ๋‚ด๋ฉฐ ๋‘ ์„œ์ˆ  ์‚ฌ์ด ์ธ์‹์˜ ์ƒํ˜ธ์„ฑ์„ ๊ตฌํ˜„ํ•œ๋‹ค. ์ด์ฒ˜๋Ÿผ ๋‚˜์˜ ์ž‘ํ’ˆ์€ ์‚ฌํšŒ ์†์—์„œ ๊ธฐ๋ก๋˜์–ด์•ผ ๋งˆ๋•…ํ•  ์ด์•ผ๊ธฐ๋ฅผ ๋ณด์กดํ•˜๋Š” ๋˜ ๋‹ค๋ฅธ ๋ฌธํ™”์  ์ƒ์‚ฐ๋ฌผ์ด ๋˜๋ฉฐ ์‚ฌํšŒ ์†์— ์†ํ•˜์ง€ ๋ชปํ•œ ๊ฒƒ๋“ค์˜ ์ƒˆ๋กœ์šด ๊ธฐ์–ต์„ ๊ตฌ์ถ•ํ•œ๋‹ค. ๋‚˜์˜ ์ž‘ํ’ˆ์€ ์ด ๊ฐ™์€ ๋ฐฉ์‹์„ ํ†ตํ•ด ๋‚˜์™€ ๋‹ค๋ฅธ ์—ฌ์„ฑ ๊ทธ๋ฆฌ๊ณ  ๋ชจ๋“  ํƒ€์ž์™€์˜ ๊ณต๊ฐ ๊ฒฝํ—˜์„ ์ œ๊ณตํ•˜๊ณ , ๋ฏธ์ˆ ๊ณผ ์‚ถ์˜ ์ƒํ˜ธ์  ์ธ์‹์„ ๋„๋ชจํ•  ๊ฒƒ์ด๋‹ค.This study analyzes my work, which recontextualizes the cultural signifiers defined in society in multiple layers through art and embodies the perception of mutuality through a multi-layered narrative structure and perspective shift. The cultural signifiers I pay special attention to are revealed through texts and images conveyed through media or easily encountered in life. Cultural signifiers reflect the norms and value systems of society, convey universal messages and perspectives commonly used in a society, and are connected with the acceptance of culture. I was born in the 1990s, and I came across various information, images, and stories through the Internet and the media. I naturally accepted them as a part of my life. On the other hand, I feel that the stories and images circulated in the digital media environment do not sufficiently contain the microhistory. I have doubts about the phenomenon of someone's story being recorded in the universal history while someone else's story is not recorded, and the process by which culture has accepted this difference. Based on this problem, I discovered stories that were not sufficiently recorded through the production of works and included them in the works. Through this process, my work presents a story with a multi-layered and microscopic perspective rather than a universal narrative that is a one-way historical narrative. The work utilizes two editorial methods to intermix existing cultural products with forgotten or under-recorded materials. The work produced through editing has a character that opposes the universal narrative and contrasts with the cutting-edge consumption method of images circulated on internet-based social media. This production method is not intended to deny the existing historical narrative but is my strategy for promoting coexistence with the existing history and presenting a multi-layered narrative utilizing various viewpoints. Furthermore, the work reveals the difference between the universal narrative and the alternative narrative, embodying the perception of mutuality between the two. In this way, my work becomes another cultural product that preserves the stories that should be recorded in society and builds new memories of things that do not belong to society. Accordingly, my work will provide an experience of empathy with myself, other women, and all the Others, and promote mutual awareness of art and life.I. ์„œ๋ก  1 II. ์ฒดํ—˜๊ณผ ์ด๋ฏธ์ง€ ์‚ฌ์ด์˜ ๊ฐ„๊ทน 6 1. ์–ด๊ธ‹๋‚˜๋Š” ์ด๋ฏธ์ง€์™€ ํ…์ŠคํŠธ 6 2. ๋ฌธํ™”์  ๊ธฐํ‘œ๋กœ์„œ์˜ ์ด๋ฏธ์ง€ 12 III. ๋ฆฌ์„œ์น˜์˜ ๋Œ€ํ•ญ์  ๊ฐ€๋Šฅ์„ฑ ๋ฐœ๊ฒฌ 17 1. ํฌ์ŠคํŠธ ํ”„๋กœ๋•์…˜์˜ ํ™œ์šฉ 17 2. ์ด๋ฏธ์ง€์™€ ์ด์•ผ๊ธฐ ์ž๋ฃŒ ์ˆ˜์ง‘ 25 1) ๋‚˜๋กœ๋ถ€ํ„ฐ ๋น„๋กฏํ•˜์ง€ ์•Š์€ ์ž๋ฃŒ 25 2) ๋‚˜๋กœ๋ถ€ํ„ฐ ๋น„๋กฏํ•œ ์ž๋ฃŒ 31 IV. ๋‹ค์ธต์  ์„œ์ˆ  ๊ตฌ์กฐ๋ฅผ ํ†ตํ•œ ์‹œ์ ์˜ ์ „ํ™˜ 35 1. ์‚ฌ์ ์ธ ์ด์•ผ๊ธฐ๋ฅผ ๋” ์‚ฌ์ ์œผ๋กœ 35 2. ์‚ฌ์ ์ธ ์ด์•ผ๊ธฐ๋ฅผ ๊ณต์ ์ธ ๋งฅ๋ฝ์œผ๋กœ 37 V. ๊ฒฐ๋ก  50 ์ฐธ๊ณ ๋ฌธํ—Œ 53 Abstract 55์„

    ๊ณ ๋ฐœ์—ด ์ „์ž์žฅ๋น„ ๋ƒ‰๊ฐ์„ ์œ„ํ•œ ์ด์ƒํ•ฉ๊ธˆ ์—ด์ ‘์ด‰ ๋ฌผ์งˆ

    No full text
    Thesis (master`s)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :๊ธฐ๊ณ„ํ•ญ๊ณต๊ณตํ•™๋ถ€,2002.Maste

    DESIGN OF WIND TURBINE BLADES USING FINITE ELEMENT MODEL

    No full text
    DoctorThe objective of this work was to design a 750kW wind turbine blade (IEC type class IA) using the finite element method (FEM). Only 3D finite element blade model was used during the whole detailed design procedure. The blade model is 24.1m long and consists of glass-epoxy laminate. The blade structure comprises multi-axial sandwich shells with two main UD glass tape spar caps and a UD reinforced trailing edge as well as a tri-axial (3AX) glass fabric in the blade root to transfer loads into the blade connection. 11,160 4-node shell elements and over 5,000 element groups were generated to model the composite blade of various stacking sequence. I-DEAS, commercial FEM code was applied in drawing and meshing, and ABAQUS in analysis. Four extreme cases which cover all design load cases specified in the GL guideline were defined and applied for structural analyses. The static and fatigue load carrying capacity, tip deflections and modal characteristics were evaluated to satisfy the strength and stability requirements. From calculations, it was verified that the designed rotor blade achieved the sufficient static and fatigue safety margins (S.F. or R.S.F > 1.0) in spite of increased natural frequencies. According to the final results of structural design, the prototype of the rotor blade was manufactured by the resin injection molding (RIM) method and passed all full-scale proof tests for certification, natural frequency test and static test. During the tests, any fracture, wrinkle or buckling of the blade did not occur and measurement results were in agreement with FE calculations within deviations of GL guideline. As a result, the design process of wind turbine blade using FEM was confirmed and established as reliable one
    corecore