Development of a vulnerability map of wind turbine power converters

K Tartt, A Kazemi-Amiri, A R Nejad, A McDonald, J Carroll

Research output: Contribution to journalConference articlepeer-review

10 Downloads (Pure)

Abstract

Abstract: With the amount of turbines that are already installed and that are planned to be installed in order to meet all the carbon emission objectives set by Governments worldwide, a means of producing a way to determine and highlight weak links or components that are more likely to fail would be extremely beneficial. One way to do this is via vulnerability maps. This paper looks at producing a vulnerability map for the power converter of a wind turbine using maintenance reports. The vulnerability map is a useful means to identify which sub-systems/components to consider when determining lifetime extension of wind turbine drivetrains. All the components that were either replaced or repaired are grouped together to determine their failure rates. Their rates are then ranked from highest to lowest and each component that makes up a typical power converter diagram coloured according to its failure rate, from red for the highest, through to orange, yellow and green for the lowest. The results show that there are three clear components that failed more often than the rest. An additional analysis looks at whether the location of the turbines alter the vulnerability map and this is confirmed. Although the same three components have the highest failure rates, their values change according to which country they are installed.
Original languageEnglish
Article number032052
Number of pages11
JournalJournal of Physics: Conference Series
Volume2265
Issue number3
DOIs
Publication statusPublished - 1 May 2022
EventThe Science of Making Torque from Wind - TU Delft, Delft, Netherlands
Duration: 1 Jun 20223 Jun 2022
Conference number: 9th
https://www.torque2022.eu/

Keywords

  • development
  • vulnerability map
  • wind turbine
  • power converters

Fingerprint

Dive into the research topics of 'Development of a vulnerability map of wind turbine power converters'. Together they form a unique fingerprint.

Cite this