Investigation of the floating IEA Wind 15 MW RWT using vortex methods Part I: Flow regimes and wake recovery

نویسندگان

چکیده

Floating wind turbines have the potential to enable global exploitation of offshore energy, but there is a need further understand complex aerodynamic phenomena they can encounter due floater induced rotor motion. Aerodynamic models traditionally used in energy sector, like Blade Element Momentum (BEM) theory, may not be capable capturing dynamic that occur when moves and out its own wake. In present paper, we therefore compare an industry standard BEM-based code state art vortex solver, investigate detail clarify capabilities limitations both methods. An initial benchmark two codes using IEA Wind 15 MW RWT mounted on WindCrete spar-buoy carried out. Three different scenarios are taken into account: bottom-fixed, floating case, case subject regular waves. Growing discrepancies between been observed with increasing complexity simulations. Moreover, large differences wake generated by bottom fixed turbine observed, latter one experiencing faster recovery. To explore behaviors affect performance wake, systematic investigation mean tilt angle influence development has Further, account for oscillatory motion turbine, parametric study where prescribed pitch surge degrees freedom (DoF) designed. The covers variety scenarios; wide range relevant frequencies amplitudes under above-rated conditions. A total more than 28 unique cases defined simulated fidelity models. results include downstream evolution recovery intensity turbulent disturbances rotor. generic nature allows characterize flow effects enables subsequent generalization designs given natural frequency amplitude. It found BEM LL predictions maximum loading blade root tower quite well, except oscillation above rated conditions, method under-predicts loads. use solver makes it possible look depth characteristics, which bottom-fixed non-turbulent inflow amplitude oscillations strong impact link short time intervals FA tip displacements break down Finally shown fast transition states, including non-conventional propeller ring identified characterized.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Numerical Simulation of the Wake Flow Behind an Ellipse using Random Vortex Method (RESEARCH NOTE)

Direct numerical simulation of the wake flow around and behind a planar ellipse using a random vortex method is presented. Fluid is considered incompressible and the aspect ratios of ellipse and the angles of attacks are varied. This geometry can be a logical prelude to the more complex geometries, but less time dependent experimental measurements are available to validate the numerical results...

متن کامل

Direct Numerical Simulation of the Wake Flow Behind a Cylinder Using Random Vortex Method in Medium to High Reynolds Numbers

Direct numerical simulation of turbulent flow behind a cylinder, wake flow, using the random vortex method for an incompressible fluid in two dimensions is presented. In the random vortex method, the primary variable is vorticity of the flow field. After generation on the cylinder wall, it is followed in two fractional time step in a Lagrangian system of coordinates, namely convection and diffu...

متن کامل

Vortex shedding in cylinder flow of shear-thinning fluids I. Identification and demarcation of flow regimes

An experimental study on the flow of non-Newtonian fluids around a cylinder was undertaken to identify and delimit the various shedding flow regimes as a function of adequate non-dimensional numbers. The measurements of vortex shedding frequency and formation length (lf ) were carried out by laser-Doppler anemometry in Newtonian fluids and in aqueous polymer solutions of CMC and tylose. These w...

متن کامل

investigation of single-user and multi-user detection methods in mc-cdma systems and comparison of their performances

در این پایان نامه به بررسی روش های آشکارسازی در سیستم های mc-cdma می پردازیم. با توجه به ماهیت آشکارسازی در این سیستم ها، تکنیک های آشکارسازی را می توان به دو دسته ی اصلی تقسیم نمود: آشکارسازی سیگنال ارسالی یک کاربر مطلوب بدون در نظر گرفتن اطلاعاتی در مورد سایر کاربران تداخل کننده که از آن ها به عنوان آشکارساز های تک کاربره یاد می شود و همچنین آشکارسازی سیگنال ارسالی همه ی کاربران فعال موجود در...

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wind Energy

سال: 2021

ISSN: ['1095-4244', '1099-1824']

DOI: https://doi.org/10.1002/we.2682