Anomaly detection in wind turbine SCADA data for power curve cleaning

Rory Morrison, Xiaolei Liu*, Zi Lin

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

71 Citations (Scopus)
70 Downloads (Pure)

Abstract

Wind turbine power curve cleaning, by way of removing curtailment, stoppage, and other anomalies, is an essential step in making raw data useable for further analysis, such as determining turbine performance, site characteristics, or improving forecasting models. Typically, data comes as SCADA (Supervisory Control and Data Acquisition) data, so contains not only environmental and turbine performance data but also the control action imposed on the turbine by the operator. Many different anomaly detection (AD) methods have been proposed to clean power curves; however, few papers have explored filtering explicit and obvious anomalies from the SCADA prior to running AD. This paper actively explores this filtering impact by comparing the performances of 4 different AD methods with/without filtering. These are: iForest, Local Outlier Factor, Gaussian Mixture Models, and k-Nearest Neighbours. Each approach is evaluated in terms of prediction error, data removal rates, and ability to maintain the underlying wind statistical characteristics. The results show the effectiveness of filtering with every technique showing improvement compared to its unfiltered counterpart. Furthermore, Gaussian Mixture Models are shown to provide favourable accuracy whilst maintaining wind variability, however, with the wide range of performances of methods, a user's choice may be different depending on their needs.

Original languageEnglish
Pages (from-to)473-486
Number of pages14
JournalRenewable Energy
Volume184
Early online date2 Dec 2021
DOIs
Publication statusPublished - 1 Jan 2022

Keywords

  • Anomaly detection
  • Data cleaning
  • Power curve
  • Wind turbine

Fingerprint

Dive into the research topics of 'Anomaly detection in wind turbine SCADA data for power curve cleaning'. Together they form a unique fingerprint.

Cite this