Next Article in Journal
Robust Lane Detection and Tracking Algorithm for Steering Assist Systems
Next Article in Special Issue
Numerical Simulation of the Lightning Leader Development and Upward Leader Initiation for Rotating Wind Turbine
Previous Article in Journal
Optimizing the Sharpening Process of Hybrid-Bonded Diamond Grinding Wheels by Means of a Process Model
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Study on Improvement of Lightning Damage Detection Model for Wind Turbine Blade

1
Department of Electrical and Electronics Engineering, Chubu University, Kasugai 486-0931, Japan
2
Artificial Intelligence Research Center (AIRC), National Institute of Advanced Industrial Science and Technology (AIST), Tokyo 135-0064, Japan
*
Author to whom correspondence should be addressed.
Machines 2022, 10(1), 9; https://doi.org/10.3390/machines10010009
Submission received: 14 November 2021 / Revised: 1 December 2021 / Accepted: 10 December 2021 / Published: 22 December 2021
(This article belongs to the Special Issue Advances in Wind and Solar Energy Generation)

Abstract

:
There have been many reports of damage to wind turbine blades caused by lightning strikes in Japan. In some of these cases, the blades struck by lightning continue to rotate, causing more serious secondary damage. To prevent such accidents, it is a requirement that a lightning detection system is installed on the wind turbine in areas where winter lightning occurs in Japan. This immediately stops the wind turbine if the system detects a lightning strike. Normally, these wind turbines are restarted after confirming soundness of the blade through visual inspection. However, it is often difficult to confirm the soundness of the blade visually for reasons such as bad weather. This process prolongs the time taken to restart, and it is one of the causes that reduces the availability of the wind turbines. In this research, we constructed a damage detection model for wind turbine blades using machine learning based on SCADA system data and, thereby, considered whether the technology automatically confirms the soundness of wind turbine blades.

1. Introduction

The efforts to realize a low-carbon society are being promoted against the background of global environmental issues, which are of increasing interest around the world. As one of the attempts to reduce carbon production, countries are expanding the use of renewable energy such as wind power generation, solar power generation, and geothermal power generation. Among them, wind power generation including offshore is attracting attention as a cost-effective power generation method, and it is under extensive development around the world.
However, many wind turbines in Japan have received serious damage caused by lightning strikes, and it is regarded as a problem. The wind turbines in Japan are under conditions that are vulnerable to lightning strikes, because a quarter of the wind turbines are built on the Sea of Japan coast where large lightning strikes are likely to occur and wind turbines are getting bigger. The wind turbine blades receiving lightning strikes are often catastrophically damaged with cracks. Accidents have been reported in which the rotating blade received such damage and the damage gradually expanded due to centrifugal force, leading to more serious secondary damage [1,2,3]. Research on lightning protection measures to prevent such lightning damage is being actively conducted [4,5,6,7,8,9].
The Japanese ministry of economy, trade and industry partially revised its interpretation of technical standards for wind power generation equipment to prevent such accidents. It was decided in the revision to install an emergency stop device so that the wind turbine can be stopped immediately if the lightning strike hits the wind turbine in the winter lightning area of the Sea of Japan coast [10]. By this revision, the wind turbines must be emergency stopped if the lightning detection system (LDS) installed on the wind turbine detects a lightning strike, and it can no longer be restarted until it is confirmed to be sound. Normally, the soundness of the wind turbine is confirmed by visual inspection by workers, but it often takes a long time to restart because quick visual inspection becomes difficult due to bad weather. Such a prolonged downtime is a factor that reduces availability of wind turbine. One wind farm could not be restarted immediately after a lightning strike on a wind turbine due to weather or other reasons, and the availability dropped by 2.23% over the year [11]. If the soundness of the wind turbine is impaired by a lightning strike, it is necessary to grasp the situation and restart after repair. However, if the soundness of the wind turbine is maintained despite the lightning strike hitting the wind turbine, it is necessary to restart as quickly as possible and improve the availability.
We propose that a lightning damage detection model for wind turbine can be constructed using supervisory control and data acquisition system data (SCADA data) as a feature of the machine learning model. It is expected that the operation will be restated quickly after a lightning strike is detected because it does not require visual inspection by workers if the soundness of the blade can be confirmed based on SCADA data, and that the availability will be improved accordingly. Furthermore, the anomaly detection models using SCADA data have the advantage of not requiring additional equipment while the existing blade damage detection method [12,13] requires additional equipment such as vibration sensors. The SCADA system is installed on all wind turbines and the system can collect data of the wind turbine remotely. Therefore, the soundness of the blade can be confirmed remotely in real time with the existing equipment if the SCADA system is used for anomaly detection.
A study on an anomaly detection method for wind turbines based on SCADA data is being constructed [14,15,16]. Among them, it was clarified that it can detected anomalies of the wind turbine by a machine learning model that has features such as power curve and rotational speed of wind turbine. However, this method aims to predict failure due to deterioration over time from months to weeks in advance, and it is not applicable to sudden damage such as lightning damage. Therefore, our research group proposed the method that can immediately detect blade anomalies caused by a sudden event such as a lightning strike [17]. Accordingly, it is necessary to continue to consider the optimal anomaly detection model and effective features based on this result.
In this paper, we describe a lightning damage detection model for wind turbine blades using a Gaussian mixture model (GMM). Additionally, we report the method that can detect blade anomalies due to lightning strikes automatically and results of examination about the method to improve detection accuracy. This paper consists of the following four sections. Section 2 describes the feature extraction method, learning method, and assessment method of the lightning damage detection model for wind turbine blade. In Section 3, we will examine the anomaly detection accuracy and reliability of this model using SCADA data of a wind turbine whose blades have been damaged by a lightning strike. In Section 4, we compare the anomaly detection accuracy of multiple models and examine the accuracy improvement. Finally, we conclude the paper in Section 5. In addition, Table 1 lists symbols, acronyms and abbreviations used in this paper.

2. Construction of Lightning Damage Detection Model for Wind Turbine Blades

2.1. Process of Training and Assessment for the Model

In this study, the lightning damage detection model for wind turbine blades was trained and assessed using SCADA data of the wind turbines. This wind turbine was reported blade damage accident caused by a lightning strike. Figure 1 shows the process of training and assessment for the model.
In the training process of the model, GMM is trained using the data on normal operation of the wind turbine. It is possible to calculate the degree of deviation from normal value as anomaly score by modeling the data on normal operation. Additionally, the threshold of the anomaly score is determined using anomaly score on normal operation calculated by the trained GMM.
In the assessment process, the anomaly detection accuracy of the trained GMM is assessed using the data at the accident. First, the anomaly score at the accident is calculated using the trained GMM, and hence, normal or abnormal are discriminated by the threshold. The data at the accident are labeled in advance as normal immediately before the lightning strike and abnormal immediately after the lightning strike. Accordingly, this is used as the true label and compared with the anomaly detection result to assess the accuracy.

2.2. Extraction of Feature

2.2.1. SCADA System

SCADA systems are used to remotely monitor the current status of wind turbines such as wind speed, wind direction, rotational speed, power, and component temperatures. The system installed on most modern wind turbines can collect data every second, but many business operators store only data averaged to 1 min or 10 min because the amount of the data would be too large otherwise.

2.2.2. SCADA Data of Wind Turbine at the Accident Due to Lightning Strike

It was clarified in previous research [17] that, if a wind turbine blade is damaged by a lightning strike, the outliers will occur frequently and continuously in wind speed rotational speed characteristic, wind speed power characteristic, and wind speed pitch degree characteristis of SCADA data. Based on this result, anomaly detection is performed using the wind speed rotational speed characteristic, which show the most outliers.
Figure 2 shows wind speed-rotational speed characteristic of 1 min averaged SCADA data collected from the wind turbine. This wind turbine blade have been damaged by a lightning strike. Table 2 shows the data acquisition period of Figure 2. In the graphs, the blue dots represent the data immediately before the lightning strike, the red dots represent the data immediately after the lightning strike, and the green dots represent the data on normal operation. Additionally, data that deviate from the overall tendency (outliers) are surrounded by a black frame.
As shown in Figure 2, most data immediately after the lightning strike are outliers. However, outliers also occur in data on normal operation, and hence, the data immediately after the lightning strike and the data on normal operation are not linearly separable. Therefore, anomaly detection using threshold is difficult, and it is considered that the method based on machine learning model is effective.
It is necessary to clarify the difference between the outliers that occur immediately after a lightning strike and the outliers that occur during normal operation by confirming the time characteristics of the rotational speed. Figure 3 shows time characteristics of rotational speed on normal operation. Figure 4 shows time characteristics of rotational speed before and after the lightning strike.
In comparing Figure 3 and Figure 4, the outliers that occur on normal operation are not consecutive three times or more. By contrast, the outliers that occur immediately after the lightning strike are continuous for several minutes. Therefore, it is considered that the abnormal data immediately after the lightning strike can be detected by reflecting the frequency of outliers in the feature of the anomaly detection model.

2.2.3. Extraction Method for Features Using Moving Average

According to study result in Section 2.2.2, it is necessary to consider the time characteristics, rather than simply using wind speed and rotational speed as features. Therefore, we select multiple moving averages of wind speed and rotational speed as features. It is considered that temporal characteristics can be included in the features by using the moving average because the moving average is calculated using the data for a few minutes.
In this study, we used a simple moving average, a weighted moving average, an exponential moving average, and a sine weighted moving average. Each moving average is shown in Equations (1) to (4). In these Equations, xi means the i-th data. Here, MMA = 5, α = 0.1.
SMA n = 1 M MA i = n M MA + 1 n x i
WMA n = 2 M MA ( M MA + 1 ) i = n M MA + 1 n i   x i
EMA n = EMA n 1 + α ( x i EMA n 1 )
SWMA n = i = n M MA + 1 n x i sin ( i M MA + 1 π ) i = n M MA + 1 n sin ( i M MA + 1 π )
The wind speed and rotational speed were converted into features using the Equations (1) to (4). Consequently, features are 2 × 5 dimensions. As shown in Equations (1), (2) and (4), feature includes information of the data for MMA minutes. Additionally, as shown in Equation (3), feature includes information of all past data.

2.2.4. Pre-Processing for Features

In this study, the feature is 0–1 normalized so that the maximum value is 1 and the minimum value is 0, as shown in Equation (5).
x n = x n min x max x min x
The data when rotational speed is 0 rpm is removed from training data and assessment data, because wind speed will be the only effective feature in this anomaly detection model when the blade is stopped. In this case, the anomaly detection for wind speed is performed, but the anomaly detection for wind turbines is not performed properly. For this reason, it is not appropriate that to use the data when the blade is stopped for this model.

2.3. Anomaly Detection Model Using GMM

2.3.1. Theoretical Explanation of GMM

In this study, the lightning damage detection model for wind turbine blades is constructed using GMM. GMM can estimate the probabilistic model based on data density of normal data and discriminates areas with low data density as abnormal [18]. As is clear from the study results in Section 2.2.2, the data density is low in the area where outliers occur. Hence, it is considered that anomaly detection by GMM is effective. Furthermore, GMM can be trained using only normal data, and hence, does not require abnormal data for training. Therefore, GMM is appropriate method for detecting lightning damage because the data when the blade is damaged by lightning strike are scarce.
The basic equations of GMM are shown in Equations (6) to (9).
p ( x | Θ ) = k = 1 K π k N ( x | μ k , Σ k )
N   ( x | μ k , Σ k ) = exp ( 1 2 ( x μ k ) T Σ k 1 ( x μ k ) ) ( 2 π | Σ k | ) d 2
0 π k 1
k = 1 K π k = 1
As shown in Equations (6) and (7), GMM is represented by sum of weighted Gaussian distributions. GMM can estimate the probabilistic model that d-dimensional data x follows, where πk is the weighting coefficient of the Gaussian distribution k, besides, μk and Σk are the mean vector and the general covariance matrix of the Gaussian distribution k. Θ is represented as the set of these three parameters πk, μk, Σk for each Gaussian distribution. K means the total number of Gaussian distributions, and it is a hyperparameter of the GMM. p ( x | Θ ) estimated by GMM can be treated as probability density function, because sum of weighting coefficient π is limited to 1 as shown in equations (8) and (9). Therefore, it becomes 1 when the p ( x | Θ ) is integrated over the entire interval of x.
GMM parameter Θ can be optimized by maximizing log-likelihood probability defined by Equation (10), where N is total number of the data.
L ( Θ ) = ln i = 0 N p ( x i | Θ )
The expectation-maximization algorithm (EM algorithm) [19] is used to maximize the log-likelihood probability of Equation (10). For the calculation of the EM algorithm, posterior probability γ calculated by Equation (11) and renewal formula shown in Equations (12) to (14) are used. First, we randomly decide the initial values of πk, μk, and Σk, and thus, calculate the posterior probability γ by Equation (11). Second, we update πk, μk, and Σk using Equations (12) to (14). Note that the μk in Equation (14) is updated one. This posterior probability calculation and parameter update are repeated until the parameters converge, so that the log-likelihood probability can be maximized.
γ n k = π k N ( x n | μ k , Σ k ) k = 1 K π k N ( x n | μ k , Σ k )
π k = n = 1 N γ n k   N
μ k = n = 1 N γ n k   x n n = 1 N γ n k
Σ k = n = 1 N γ n k   ( x n μ k ) ( x n μ k ) T n = 1 N γ n k  

2.3.2. Anomaly Detection by GMM

It is necessary to define anomaly score based on probability density for performing anomaly detection using GMM. The predicted distribution p(x|Θ) of the normal data will be obtained if only normal data are modeled by GMM. Using this predicted distribution, the probability density p(x(n)|Θ) of arbitrary data x(n) can be calculated. p(x(n)|Θ) will low if x(n) is abnormal data since abnormal data is unlikely to occur. The anomaly score is defined by Equation (15) below utilizing this property. Equation (15) is the negative logarithm of the probability density, and thus the anomaly score will increase if the probability of occurrence is low such as abnormal data.
s c o r e = ln p ( x ( n ) | Θ )
It is possible to discriminate between normal data and abnormal data if a threshold is set for the anomaly score calculated by Equation (15).

2.3.3. Selection of Hyperparameter K of GMM

The number of mixture components K must be determined in advance to train GMM. In this study, we compared the following two selection methods and examined the imsprovement of anomaly detection accuracy.
Normally, the Bayesian information criterion (BIC) [19] shown in Equation (16) is used to select K. where kp is number of features. As shown in Equation (16), BIC becomes smaller as the probability distribution fits the data. In this study, we used a method that automatically selects the K with the lowest BIC between 2 and 256.
  BIC = 2 ln p ( x | Θ ) + k p ln ( N )
On the other hand, when using GMM as an anomaly detection method, it is also effective as a method of selecting the most accurate K by comparing anomaly detection accuracy on multiple K. BIC is an evaluation standard proposed to select the appropriate model for the cluster analysis method. Therefore it is effective for data divided into multiple classes [18]. However, GMM is used as a method for estimating the predicted distribution of data in this study, thus the BIC of the best model for anomaly detection is not always low. Accordingly, there is a high possibility that the anomaly detection accuracy can be improved by selecting a model based on the anomaly detection accuracy itself, rather than based on BIC. In this study, we set K to 64, 128 and 256 to compare these anomaly detection accuracies.

2.3.4. Assessment for Anomaly Detection Accuracy

In this study, anomaly detection accuracy of the model is assessed using confusion matrix and the receiver operating characteristic curve (ROC curve). Below is a brief description of the confusion matrix and ROC curve.
The confusion matrix shown in Table 3 summarizes true positive, false positive, true negative, and false negative [20]. Normally, anomaly detection accuracy cannot be sufficiently assessed by simply calculating the correct answer rate because the ratio of abnormal assessment data for the anomaly detection model is extremely small. It is possible to consider the bias of the data by using confusion matrix because normal data and abnormal data can be represented separately.
The ROC curve shows the locus of the false positive rate-true positive rate characteristic when the threshold is changed [20]. True positive rate and false positive rate can be calculated by the following Equations (17) and (18). The area surrounded by a straight line with false positive rate = 1, a straight line with true positive rate = 0, and the ROC curve is called Area Under the Curve (AUC). As is clear from the definition of the ROC curve, the AUC expands as the anomaly detection accuracy increases. Thereby, the AUC is assessment standard for performance of the model. Note that the range of AUC is 0 to 1.
True   positive   rate = T P T P + F N
False   positive   rate = F P F P + T N

3. Result of Anomaly Detection and Performance Assessment

3.1. The Model in Which the Number of Mixture Components K Was Determined Based on BIC

This model automatically selected the K with the lowest BIC between 2 and 256 and performed anomaly detection. Besides, the 99th percentile value of the anomaly score calculated from the data during normal operation was used as the threshold. It should be noted the selected K was 29.
Figure 5 shows the assessment result of this model. In Figure 5a,b, the blue dots represent the data immediately before the lightning strike, and the red dots represent the data immediately after the lightning strike. In the Figure 5c,d, the blue dots represent the data that the model predicted to be normal, and the red dots represent the data that the model predicted to be abnormal. Additionally, X is plotted against the data that were poorly predicted. Figure 5e shows the time characteristics of the anomaly score and its threshold.
This result is assessed by the confusion matrix and the ROC curve. Table 4 shows the confusion matrix, and Figure 6 shows the ROC curve.
Next, Figure 7 shows the training data of this model. In Figure 7a,b, the red dots represent the data that exceed the threshold. Figure 7c shows the time characteristics of the anomaly score and its threshold.
As is clear from Figure 5, anomaly score increases immediately after the lightning strike and exceeds the threshold. Consequently, the data immediately after the lightning strike is properly detected as abnormal. As shown in ROC curve of Figure 6, AUC is more than 0.9, indicating that anomaly detection was performed appropriately. Additionally, Table 4 indicates that six false negatives occurred. These six data are for 6 minutes after a lightning strike, and, hence, it is considered that there is a time delay before the abnormal data is detected. As shown in Figure 7, an increase in the anomaly score is seen even data on normal operation, thereby false positives are likely to occur.

3.2. The Model in Which the Number of Mixture Components K Was 64

This model performed anomaly detection with K set to 64. The 100th percentile value of the anomaly score calculated from the data during normal operation was used as the threshold.
Figure 8 shows the assessment result of this model. Note that, the layout and the types of plots of the Figure 8 are the same as in Figure 5.
This result is assessed by the confusion matrix and the ROC curve. Table 5 shows the confusion matrix, and Figure 9 shows the ROC curve.
Next, Figure 10 shows the training data of this model. Note that, the layout and the types of plots of the Figure 10 are the same as in Figure 7.
As is clear from Figure 8, anomaly score increases immediately after the lightning strike and exceeds the threshold. Consequently, the data immediately after the lightning strike are properly detected as abnormal. However, the anomaly score after the lightning strike decreased temporarily and fell below the threshold so that the false negative occurred. As shown in ROC curve of Figure 9, AUC is more than 0.99, indicating that anomaly detection was performed appropriately. Additionally, Table 5 indicates that 10 false negatives occurred. These 10 data are due to the time delay of anomaly detection and the decrease in the anomaly score after a lightning strike. As shown in training data of Figure 10, the anomaly score during normal operation is stable and there is no sharp rise like immediately after a lightning strike, and hence, it is considered that the false positives are unlikely to occur.

3.3. The Model in Which the Number of Mixture Components K Was 128

This model performed anomaly detection with K set to 128. The 100th percentile’s value for the anomaly score calculated from the data during normal operation was used as the threshold.
Figure 11 shows the assessment result of this model. Note that, the layout and the types of plots of the Figure 11 are the same as in the assessment result of the other models.
This result is assessed by the confusion matrix and the ROC curve. Table 6 shows the confusion matrix, and Figure 12 shows the ROC curve.
Next, Figure 13 shows the training data of this model. Note that the layout and the types of plots of the Figure 13 are the same as in the training data of the other models.
As is clear from Figure 11, anomaly score increases immediately after the lightning strike and exceeds the threshold. Consequently, the data immediately after the lightning strike are properly detected as abnormal. Additionally, as shown in ROC curve of Figure 12, AUC is more than 0.99, indicating that anomaly detection was performed appropriately. Table 6 indicates that only four false negatives occurred. These four data are due to the time delay of anomaly detection. As shown in training data of Figure 13, the anomaly score during normal operation is stable and there is no sharp rise like immediately after a lightning strike, and hence, it is considered that the false positives are unlikely to occur.

3.4. The Model in Which the Number of Mixture Components K Was 256

This model performed anomaly detection with K set to 256. The 100th percentile’s value for the anomaly score calculated from the data during normal operation was used as the threshold.
Figure 14 shows the assessment result of this model. Note that, the layout and the types of plots of the Figure 14 are the same as in the assessment result of the other models.
This result is assessed by the confusion matrix and the ROC curve. Table 7 shows the confusion matrix, and Figure 15 shows the ROC curve.
Next, Figure 16 shows the training data of this model. Note that, the layout and the types of plots of the Figure 16 are the same as in the training data of the other models.
As is clear from Figure 14, anomaly score increases immediately after the lightning strike and exceeds the threshold. Consequently, the data immediately after the lightning strike are properly detected as abnormal. However, the anomaly score exceeded the threshold before the lightning so that a false positive occurred. As shown by the ROC curve of Figure 15, AUC is more than 0.99, indicating that anomaly detection was performed appropriately. Additionally, Table 7 indicates that two false negatives and two false positives occurred. Furthermore, as shown in training data of Figure 16, the anomaly score during normal operation is stable and there is no sharp rise like immediately after a lightning strike. The false positives occur in the assessment data but the anomaly score of the training data is stable. Therefore, the model overfits the training data and most likely is not robust for unknown data.

4. Discussion

In this section, we compare anomaly detection accuracy of each model based on the results of Section 3 and examine improvement of accuracy. Since the threshold differs for each model, the comparison is performed based on the AUC of the ROC curve, which is an assessment method that does not depend on the threshold.
Table 8 summarizes AUC of each model.
As is clear as Table 8, AUC of the model with K = 128 is the highest, and it can be seen that it is the optimum model. Nevertheless, the model with K based on BIC selected 29 as K. Therefore, it became clear that the BIC does not decrease even with the optimum model for anomaly detection.
As shown in the AUC of the model with K = 256, it is considered that the anomaly detection accuracy does not improve by simply increasing K. The GMM will approximate predicted model in more detail if K is large, whereas the anomaly score of unknown data will increase because the model depends on training data. It is considered that this overfitting lowered the AUC of the model with K = 256.
From the above consideration, it can be seen that the method of automatically selecting K based on BIC used in normal GMMs is not effective for anomaly detection methods. If GMM is used as the anomaly detection method, the anomaly detection accuracy can be improved by setting K appropriately by comparing the accuracy and selecting the optimal model.
It became clear that a model with sufficient anomaly detection accuracy can be constructed using at least one month’s worth of training data. In this study, normal data for about 33 days were used as the training data, and, as shown in Table 8, high anomaly detection accuracy was confirmed in all models.

5. Conclusions

In this study, we constructed a lightning damage detection model for wind turbine blades using GMM based on SCADA data, and examined the method to improve the anomaly detection accuracy of the model. Wind speed and rotational speed were selected as features based on a previous study. Moreover, 0-1 standardization and moving average were performed as preprocessing. There are two methods for selecting hyperparameter K of GMM: one is automatic selection based on BIC and the other is manual selection of appropriate values. Anomaly detection with these two methods was performed and the accuracy was compared. As a result, it becomes clear that the model manually selected at K = 128 had the highest AUC and was the most suitable model. Hence, it was clarified that the performance of the model can be improved by using the method of manually selecting multiple K and selecting the model with the highest anomaly detection accuracy.

Author Contributions

Data curation, K.Y.; formal analysis, T.M.; methodology, T.M. and J.O.; supervision, K.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research is based on results obtained from a project, JPNP07015 and JPNP13010 subsidized by the New Energy and Industrial Technology Development Organization (NEDO).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

This paper is based on results obtained from a project commissioned by the New Energy and Industrial Technology Development Organization (NEDO).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Takada, Y. Wind Farm and Lightning: The Influence and Measures; Seizandou Shoten: Tokyo, Japan, 2015; pp. 72–84. [Google Scholar]
  2. Lightning risk management technology research committee for wind power generation systems. In Recent Trends Suggestions Lightning Risk Manage Wind Power System; Technical Report for the Institute of Electrical Engineers of Japan Number 1422; IEEJ Electronic Library: Tokyo, Japan, 2019; pp. 4–8.
  3. Ministry of Economy, Trade and Industry. New Energy Power Generation Facility Accident Response and Structural Strength Working Group. Available online: https://www.meti.go.jp/shingikai/sankoshin/hoan_shohi/denryoku_anzen/newenergy_hatsuden_wg/index.html (accessed on 20 December 2021).
  4. Kose, M.; Tanaka, S.; Yamamoto, K.; Sekioka, S.; Baba, Y.; Nagaoka, N. Effective Length of Counterpoises Connected to Wind Turbine Foundation. IEEE Trans. Power Deliv. 2021, 36, 3956–3963. [Google Scholar] [CrossRef]
  5. Triruttanapiruk, N.; Yamamoto, K.; Sumi, S.; Yokoyama, S.; Obayashi, K. Practical Use of Detection Techniques for Down Conductor Disconnections in Wind Turbine Blades. Electr. Power Syst. Res. 2020, 187, 106516. [Google Scholar] [CrossRef]
  6. Yamamoto, K.; Honjyo, N.; Yokoyama, S.; Yasuda, Y.; Sekioka, S.; Yamabuki, K. Technologies Developed to Operate Wind Turbines Reliably and Safely in a Lightning-Prone Environment; CIGRE Session 2020, C4-319; CIGRE: Ishikawa, Japan, 2020. [Google Scholar]
  7. Alipio, R.; de Barros, M.T.C.; Schroeder, M.A.O.; Yamamoto, K. Analysis of the Lightning Impulse and Low-frequency Performance of Wind Farm Grounding Systems. Electr. Power Syst. Res. 2020, 180, 106068. [Google Scholar] [CrossRef]
  8. Piantini, A. Lightning Interaction with Power Systems (Energy Engineering); IET (The Institution of Engineering and Technology): Stevenage, UK, 2020; ISBN 978-1785613913. [Google Scholar]
  9. Yamamoto, K.; Honjyo, N. Latest trends in technologies for sound operation of wind turbines against lightning. Electr. Eng. Jpn. 2018, 205, 3–7. [Google Scholar] [CrossRef]
  10. Ministry of Economy. Trade and Industry, Rules to Revise Part of Interpretation of Technical Standards for Wind Power Generation Facilities. Available online: https://www.meti.go.jp/policy/safety_security/industrial_safety/law/files/fuugikaishakukaisetsu.pdf (accessed on 20 December 2021).
  11. Hiroaki, K.; Kazuo, Y.; Shin’ichi, S. Influence of Lightning Detections and Damages on Availability of Wind Turbine Generation Systems; HV19076; The Institute of Electrical Engineers of Japan: Tokyo, Japan, 2019. [Google Scholar]
  12. Yamamoto, K.; Kashima, N.; Ueda, T.; Baba, S.; Sasaki, H.; Kanai, D. Noncontact Method to Diagnose Down-Conductor Disconnections in a Wind Turbine Blade Using X-ray Apparatuses; The Papers of Technical Meeting on High Voltage Engineering, IEE Japan, HV-17-26; Electric Institute: Tokyo, Japan, 2017; pp. 29–34. [Google Scholar]
  13. Eologix, Ice Detection and Temperature Measurement on Rotor Blades of Wind Turbines. Available online: https://www.eologix.com/en/solutions/windenergy/ (accessed on 20 December 2021).
  14. Yasuda, A.; Ogata, J.; Furusawa, Y.; Narusue, Y.; Murakawa, M.; Morikawa, H.; Iida, M. Wind Turbine Degradation Assessment Based on Condition Monitoring Model. Jpn. Wind Energy Assoc. 2018, 42, 53–62. [Google Scholar] [CrossRef]
  15. Pandit, R.K.; Infield, D. SCADA Based Wind Turbine Anomaly Detection Using Gaussian Process (GP) Models for Wind Turbine Condition Monitoring Purposes; IET (The Institution of Engineering and Technology): Stevenage, UK, 2018. [Google Scholar] [CrossRef] [Green Version]
  16. Cui, Y.; Bangalore, P.; Tjernberg, L.B. An Anomaly Detection Approach Based on Machine Learning and SCADA Data for Condition Monitoring of Wind Turbines. IET Renew. Power Gener. 2018, 12, 1249–1255. [Google Scholar] [CrossRef]
  17. Matsui, T.; Yamamoto, K.; Sumi, S.; Triruttanapiruk, N. Detection of lightning damage on wind turbine blades using the SCADA system. IEEE Trans. Power Deliv. 2021, 36, 777–784. [Google Scholar] [CrossRef]
  18. Svensén, M.; Bishop, C.M. Pattern Recognition and Machine Learning; Springer: Berlin/Heidelberg, Germany, 2007. [Google Scholar]
  19. Fraley, C.; Raftery, A.E. How many clusters? Which clustering method? Answers via model-based cluster analysis. Comput. J. 1998, 41, 578–588. [Google Scholar] [CrossRef]
  20. Hirai, Y. The First Pattern Recognition; Morikita: Tokyo, Japan, 2012; pp. 30–35. [Google Scholar]
Figure 1. Process of training and assessment.
Figure 1. Process of training and assessment.
Machines 10 00009 g001
Figure 2. Wind speed rotational speed characteristic.
Figure 2. Wind speed rotational speed characteristic.
Machines 10 00009 g002
Figure 3. Time characteristic of rotational speed in normal operation: (a) rotational speed on normal operation; (b) rotational speed on normal operation (partial expansion).
Figure 3. Time characteristic of rotational speed in normal operation: (a) rotational speed on normal operation; (b) rotational speed on normal operation (partial expansion).
Machines 10 00009 g003
Figure 4. Time characteristic of rotational speed at the accident.
Figure 4. Time characteristic of rotational speed at the accident.
Machines 10 00009 g004
Figure 5. True label and assessment result of the model in which the number of mixture components K was determined based on BIC (K = 29, threshold is 99th percentile’s value): (a) wind speed-rotational speed characteristic with true label; (b) time characteristics of rotational speed with true label; (c) wind speed rotational speed characteristic with predicted label; (d) time characteristics of rotational speed with predicted label; (e) time characteristics of anomaly score.
Figure 5. True label and assessment result of the model in which the number of mixture components K was determined based on BIC (K = 29, threshold is 99th percentile’s value): (a) wind speed-rotational speed characteristic with true label; (b) time characteristics of rotational speed with true label; (c) wind speed rotational speed characteristic with predicted label; (d) time characteristics of rotational speed with predicted label; (e) time characteristics of anomaly score.
Machines 10 00009 g005
Figure 6. ROC curve of the model in which the number of mixture components K was determined based on BIC (K = 29, the threshold is the 99th percentile’s value).
Figure 6. ROC curve of the model in which the number of mixture components K was determined based on BIC (K = 29, the threshold is the 99th percentile’s value).
Machines 10 00009 g006
Figure 7. Training data of the model in which the number of mixture components K was determined based on BIC (K = 29, the threshold is the 99th percentile’s value): (a) wind speed rotational speed characteristic; (b) time characteristics of rotational speed; (c) time characteristics of anomaly score.
Figure 7. Training data of the model in which the number of mixture components K was determined based on BIC (K = 29, the threshold is the 99th percentile’s value): (a) wind speed rotational speed characteristic; (b) time characteristics of rotational speed; (c) time characteristics of anomaly score.
Machines 10 00009 g007
Figure 8. True label and assessment result of the model in which the number of mixture components K was 64 (threshold is the 100th percentile’s value): (a) wind speed rotational speed characteristic with true label; (b) time characteristics of rotational speed with true label; (c) wind speed rotational speed characteristic with predicted label; (d) time characteristics of rotational speed with predicted label; (e) time characteristics of anomaly score.
Figure 8. True label and assessment result of the model in which the number of mixture components K was 64 (threshold is the 100th percentile’s value): (a) wind speed rotational speed characteristic with true label; (b) time characteristics of rotational speed with true label; (c) wind speed rotational speed characteristic with predicted label; (d) time characteristics of rotational speed with predicted label; (e) time characteristics of anomaly score.
Machines 10 00009 g008
Figure 9. ROC curve of the model in which the number of mixture components K was 64 (the threshold is the 100th percentile’s value).
Figure 9. ROC curve of the model in which the number of mixture components K was 64 (the threshold is the 100th percentile’s value).
Machines 10 00009 g009
Figure 10. Training data of the model in which the number of mixture components K was 64 (the threshold is 100th percentile’s value): (a) wind speed rotational speed characteristic; (b) time characteristics of rotational speed; (c) time characteristics of anomaly score.
Figure 10. Training data of the model in which the number of mixture components K was 64 (the threshold is 100th percentile’s value): (a) wind speed rotational speed characteristic; (b) time characteristics of rotational speed; (c) time characteristics of anomaly score.
Machines 10 00009 g010
Figure 11. True label and assessment result of the model in which the number of mixture components K was 128 (the threshold is the 100th percentile’s value): (a) wind speed rotational speed characteristic with true label; (b) time characteristics of rotational speed with true label; (c) wind speed-rotational speed characteristic with predicted label; (d) time characteristics of rotational speed with predicted label; (e) time characteristics of anomaly score.
Figure 11. True label and assessment result of the model in which the number of mixture components K was 128 (the threshold is the 100th percentile’s value): (a) wind speed rotational speed characteristic with true label; (b) time characteristics of rotational speed with true label; (c) wind speed-rotational speed characteristic with predicted label; (d) time characteristics of rotational speed with predicted label; (e) time characteristics of anomaly score.
Machines 10 00009 g011
Figure 12. ROC curve of the model in which the number of mixture components K was 128 (threshold is 100th percentile’s value).
Figure 12. ROC curve of the model in which the number of mixture components K was 128 (threshold is 100th percentile’s value).
Machines 10 00009 g012
Figure 13. Training data of the model in which the number of mixture components K was 128 (threshold is 100th percentile’s value): (a) wind speed rotational speed characteristic; (b) time characteristics of rotational speed; (c) time characteristics of anomaly score.
Figure 13. Training data of the model in which the number of mixture components K was 128 (threshold is 100th percentile’s value): (a) wind speed rotational speed characteristic; (b) time characteristics of rotational speed; (c) time characteristics of anomaly score.
Machines 10 00009 g013
Figure 14. True label and assessment result of the model in which the number of mixture components K was 256 (threshold is 100th percentile’s value): (a) wind speed rotational speed characteristic with true label; (b) time characteristics of rotational speed with true label; (c) wind speed rotational speed characteristic with predicted label; (d) time characteristics of rotational speed with predicted label; (e) time characteristics of anomaly score.
Figure 14. True label and assessment result of the model in which the number of mixture components K was 256 (threshold is 100th percentile’s value): (a) wind speed rotational speed characteristic with true label; (b) time characteristics of rotational speed with true label; (c) wind speed rotational speed characteristic with predicted label; (d) time characteristics of rotational speed with predicted label; (e) time characteristics of anomaly score.
Machines 10 00009 g014
Figure 15. ROC curve of the model in which the number of mixture components K was 256 (threshold is 100th percentile’s value).
Figure 15. ROC curve of the model in which the number of mixture components K was 256 (threshold is 100th percentile’s value).
Machines 10 00009 g015
Figure 16. Training data of the model in which the number of mixture components K was 256 (threshold is 100th percentile’s value): (a) wind speed rotational speed characteristic; (b) time characteristics of rotational speed; (c) time characteristics of anomaly score.
Figure 16. Training data of the model in which the number of mixture components K was 256 (threshold is 100th percentile’s value): (a) wind speed rotational speed characteristic; (b) time characteristics of rotational speed; (c) time characteristics of anomaly score.
Machines 10 00009 g016
Table 1. List of symbols, acronyms and abbreviations.
Table 1. List of symbols, acronyms and abbreviations.
LDSLightning Detection System
SCADASupervisory control and data acquisition
GMMGaussian mixture model
BICBayesian information criterion
ROCReceiver operating characteristic
AUCArea under the curve
SMASimple moving average
WMAWeighted moving average
EMAExponential moving average
SWMASine weighted moving average
MMASize of window
αWeight factor of exponential moving average
nNumber of the data
xData
  N   ( x | μ k , Σ k ) Gaussian distribution k
p ( x | Θ ) Gaussian mixture model
πkWeighting coefficient of the Gaussian distribution k
μkMean vector of the Gaussian distribution k
ΣkGeneral covariance matrix of the Gaussian distribution k
ΘSet of three parameters πk, μk, Σk
KTotal number of Gaussian distributions
  L ( Θ ) Log-likelihood probability on Θ
γPosterior probability
scoreAnomaly score
TPTrue positive
FPFalse positive
TNTrue negative
FNFalse negative
Table 2. Data acquisition period of SCADA data.
Table 2. Data acquisition period of SCADA data.
Type of SCADA DataData Period
at the Accidenton Normal Operation
1 min average data170 minThe data after repair for about 33 days
Table 3. Confusion matrix.
Table 3. Confusion matrix.
Predicted
AbnormalNormal
TrueAbnormalTrue positive (TP)False negative (FN)
NormalFalse positive (FP)True negative (TN)
Table 4. Confusion matrix of the model in which the number of mixture components K was determined based on BIC (K = 29, the threshold is the 99th percentile’s value).
Table 4. Confusion matrix of the model in which the number of mixture components K was determined based on BIC (K = 29, the threshold is the 99th percentile’s value).
Predicted
AbnormalNormal
TrueAbnormal176
Normal0135
Table 5. Confusion matrix of the model in which the number of mixture components K was 64 (the threshold is the 100th percentile’s value).
Table 5. Confusion matrix of the model in which the number of mixture components K was 64 (the threshold is the 100th percentile’s value).
Predicted
AbnormalNormal
TrueAbnormal1310
Normal0135
Table 6. Confusion matrix of the model in which the number of mixture components K was 128 (threshold is 100th percentile’s value).
Table 6. Confusion matrix of the model in which the number of mixture components K was 128 (threshold is 100th percentile’s value).
Predicted
AbnormalNormal
TrueAbnormal194
Normal0135
Table 7. Confusion matrix of the model in which the number of mixture components K was 256 (threshold is 100th percentile’s value).
Table 7. Confusion matrix of the model in which the number of mixture components K was 256 (threshold is 100th percentile’s value).
Predicted
AbnormalNormal
TrueAbnormal212
Normal2133
Table 8. AUC of each model.
Table 8. AUC of each model.
ModelAUC
K based on BIC (K = 29)0.989
K = 640.994
K = 1280.999
K = 2560.996
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Matsui, T.; Yamamoto, K.; Ogata, J. Study on Improvement of Lightning Damage Detection Model for Wind Turbine Blade. Machines 2022, 10, 9. https://doi.org/10.3390/machines10010009

AMA Style

Matsui T, Yamamoto K, Ogata J. Study on Improvement of Lightning Damage Detection Model for Wind Turbine Blade. Machines. 2022; 10(1):9. https://doi.org/10.3390/machines10010009

Chicago/Turabian Style

Matsui, Takuto, Kazuo Yamamoto, and Jun Ogata. 2022. "Study on Improvement of Lightning Damage Detection Model for Wind Turbine Blade" Machines 10, no. 1: 9. https://doi.org/10.3390/machines10010009

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop