Power Transformer Life Analysis Based on Risk Assessment

Article Preview

Abstract:

In order to grasp the state of full life cycle of the power transformer, A new method for power transformer life analysis based on risk assessment is proposed in this paper. Firstly power transformer risk assessment is conducted and fault tree is established accordingly to make the complex transformer faults system subdivide into various kinds of basic types directly; Secondly, the Fuzzy Analytical Hierarchy Process (FAHP) is designed to analyze the fault tree, so the complex system of transformer can be quantitatively described and the reliability of transformer can be obtained; Finally, transformer aging model is established to research the change rules of the transformer runnung state and determine the duration that the transformer stays in each stages of life. In addition, the application result shows the feasibility and effectiveness of the method above.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1151-1154

Citation:

Online since:

October 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] N. Liu, G.D. Liang, L.F. Wang, W. Li, W.S. Gao and K.X. Tan: High Voltage Engineering (in Chinese) Vol. 29 (2003), p.3.

Google Scholar

[2] M.D. Fischer, S.S. Tenbohlen, M.T. Schafer and R.C. Haug: IEEE Transactions on Dielectrics and Electrical Insulation Vol. 18 (2011), pp.1789-1798.

DOI: 10.1109/tdei.2011.6032851

Google Scholar

[3] R.Q. Liu, L.Q. Tang and W.N. Lin: Electric Power Automation Equipment(in Chinese) Vol. 33 (2013), pp.104-108.

Google Scholar

[4] S.S. Agarwal and M.L. Kansal: Fuzzy fault tree analysis of a power transformer (International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering, Sichuan, China, 2012).

DOI: 10.1109/icqr2mse.2012.6246393

Google Scholar

[5] Y.C. Dong, W.C. Hong, Y.F. Xu, and S. Yu: IEEE Transactions on Fuzzy Systems  Vol. 19 (2011), p.13.

Google Scholar

[6] A.M. Mahdy, H.I. Anis and M.D. James: IEEE Transactions on Dependable and Secure Computing, Vol. 7 (2010), pp.128-143.

Google Scholar