Advanced modelling of doubly fed induction generator wind turbine under network disturbance

S. Seman, Florin Iov, J. Niiranen, A. Arkkio

Research output: Contribution to conference without publisher/journalPaper without publisher/journalResearch

Abstract

This paper presents a variable speed wind turbine simulator. The simulator is used for a 2 MW wind turbine transient behavior study during a short-term symmetrical network disturbance. The mechanical part of wind turbine model consists of the rotor aerodynamic model, the wind turbine control and the drive train model. The Doubly Fed Induction Generator (DFIG) is represented by an analytical two-axis model with constant lumped parameters and by Finite Element Method (FEM) based model. The model of the DFIG is coupled with the model of the passive crowbar protected and DTC controlled frequency converter, the model of the main transformer and a simple model of the grid. The simulation results obtained by means of the detailed wind turbine model are compared with the results obtained from a simplified simulator with an analytical model and FEM model of DFIG. The comparison of the results shows the influence of the different modeling approaches on the short-term transient simulation accuracy.
Original languageEnglish
Publication date2005
Number of pages10
Publication statusPublished - 2005
Event5. International workshop on large-scale integration of wind power and transmission networks for offshore wind farms - Glasgow, United Kingdom
Duration: 7 Apr 20058 Apr 2005
Conference number: 5

Conference

Conference5. International workshop on large-scale integration of wind power and transmission networks for offshore wind farms
Number5
CountryUnited Kingdom
CityGlasgow
Period07/04/200508/04/2005

Keywords

  • Variable speed wind turbine
  • Wind power
  • Doubly fed induction generator
  • Direct Torque Control
  • Crowbar
  • Modeling
  • Short-term transient

Fingerprint Dive into the research topics of 'Advanced modelling of doubly fed induction generator wind turbine under network disturbance'. Together they form a unique fingerprint.

Cite this