Posters
Siblings:
ProgrammeSpeakersPostersPresenters’ dashboardContent PartnersMarkets TheatrePowering the Future stageStudent programmeWorkshops and Round TablesProgramme Committee & abstracts reviewersCome meet the poster presenters to ask them questions and discuss their work
We would like to invite you to come and see the posters at our upcoming conference. The posters will showcase a diverse range of research topics, and will give delegates an opportunity to engage with the authors and learn more about their work. Whether you are a seasoned researcher or simply curious about the latest developments in your field, we believe that the posters will offer something of interest to everyone. So please join us at the conference and take advantage of this opportunity to learn and engage with your peers in industry and the academic community.
PO193: From Early Warning to Targeted Inspections: A Before–During–After Framework for Lightning Risk Management in Wind O&M
Stéphane SCHMITT, Lightning Application Expert, Meteorage
Abstract
Lightning is a primary cause of blade damage, safety incidents and production losses in wind operations. Evidence from European fleets shows 4–8% of turbines incur lightning‑strike damage annually; lightning is the most common cause of fires in wind assets and ~60% of operational losses relate to blade strikes. These facts call for turning high‑level guidance into data‑driven O&M procedures. We present an applied before–during–after framework that operationalises lightning risk management across three phases: * Before: tiered early warnings from lightning‑location systems (LLS) routinely achieve ≥ 20‑minute lead times in Western Europe, enabling safe suspension of high‑risk tasks. * During: thunderstorm cell tracking provides real‑time direction and speed, while severity is quantified via a lightning‑jump proxy. * After: operators trigger targeted inspections using rules that combine proximity (turbine‑scale neighbourhood), peak‑current and contextual cues (Scada alarms, work status, historical vulnerability,...) as promoted in maintenance best practice.
No recording available for this poster.
