SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
101seminartopics.com


ABSTRACT


               Science and technology with all its miraculous advancements has
fascinated human life to a great extent that imagining a world without these
innovations is hardly possible. While technology is on the raising slope, we
should also note the increasing immoral activities. With a technical view, “Power
Theft” is a non-ignorable crime that is highly prevalent, and at the same time it
directly affects the economy of a nation. Data collected over Tirunelveli District,
Bhel Trichy proves the necessity of this project.
                Detecting and eradicating such crimes with the assistance of the
developing scientific field is the “Need of the Hour”. With these views was this
paper conceived and designed. Our paper provides a complete and comprehensive
tool to prevent power theft which is very simple to understand and easy to
implement(Accepted by T.N.E.B officials). It includes four sections – transmitting,
receiving, counter display and processing sections.
DESCRIPTION OF OUR IMPLEMENTATION IDEAS:

               The disc revolutions are sensed into pulses by optical slot sensor.
These pulses are shaped and given as control signal to the CMOS switch which
bypasses carrier wave generated by PLL provides as input to receiving section
where transmitted signal is selected by the Intermediate frequency transformer. For
each lock a pulse is sent out. The counter section is designed to send out pulse for
every six input pulse from the receiver section. This count is parallely distributed
in a 7-segmentdisplay and then to µc for further processing. µc performs the
function of indication and identification. Pindetails, features, connections and software
employed for µc89c51 are described in detail.
               We believe our implementation ideas is a boon to the electricity
board offering them a chance to detect accurately the location and amount of
power theft. Logical view for a digital meter is also included in our presentation.
101seminartopics.com




INTRODUCTION:
       “TODAY’S TECHNICIANS ARE SO FOCUSSED ON THE TREES OF TECHNOLOGICAL
       CHANGE THAT THEY FAIL TO SEE THE FOREST; THE UNDERLYING ECONOMIC
       FORCES THAT DETERMINE SUCCESS AND FAILURE…”
                “TECHNOLOGY CHANGES ECONOMY LAWS DO NOT”

              Electricity is the modern man’s most convenient and useful form of
energy without which the present social infrastructure would not be feasible. The
increase in per capita production is the reflection of the increase in the living
standard of people. When importance of electricity is on the increasing side, then
how much should theft of this energy or illegal consumption of power from the
transmission lines be averted? Power theft has become a great challenge to the
electricity board. The dailies report that Electricity Board suffers a total loss of
8 % in revenue due to power theft every year, which has to controlled. Our paper
identifies the Power theft and indicates it to the Electricity board through Power
line. We had also dealt about the remote monitoring of an energy meter.
MICROCONTROLLER BASED AUTOMATION:
              Embedded systems - a combination of software, hardware and
additional mechanical parts that together forms a component of a larger system, to
perform a specific function. It’s a technology, characterized by high reliability,
restricted memory footprint and real time operation associated with a narrowly
defined group of functions. Automation has made the art of living comfortable and
easy. Embedded systems have made the process of automation a most successful
one. Here, we have focused on automotive, an area of embedded controllers, in
which we have dealt with the Power theft identification and also about the remote
monitoring of an energy meter.

          “Technology have taken the world by storm
          performance ratings and exceptionally value for money prices”


The microcontroller chip is preprogrammed to perform a dedicated or a narrow
range of functions as a part of a larger system, usually with minimal end user or
101seminartopics.com

operator intervention. Our paper throws light on automated monitoring of theft
identification, which is an application of embedded controllers.




MODES OF THEFT:
                 It has been seen that there are 4 common methods of power
theft as given below :-
                          Bogus seals and tampering of seals.
                          Meter tampering, meter tilting, meter interface and
                          meter bypassing.
                          Changing connection.
                          Direct tapping from line.
              Due to introduction of modern electronic metering equipments, power
thieves are utilizing more technological methods. Recent cases of power theft
discovered by British inspectors included customers tunneling out to roadside
mains cables and splicing into the supply, a garage taking its night time power
supply from the nearest lamp post and domestic customers drilling holes into
meter boxes and attempting to stop the counter wheels from turning. Another
method of Power theft is by keeping a strong magnet in front of the disc in
the energy meter and thus arresting the rotation of the disc, connecting the load
directly to the power line bypassing the energy meter. But, it can be avoided
easily by providing a non magnetic enclosure.
MODERN DETECTING TOOLS:
             There are many modern tools that assist in power theft identification.
Some of them are :-
                             Tamper proof seals and labels.
                             Meter leaders.
                             Tamper resistant screws / locks.
                             Check meter and remote meter readers.
                             Tamper alarms and sensors.
              This paper undertakes the Check meter and remote meter readers for
power theft identification. In our case, the consumption recurred by the check
101seminartopics.com

meter is compared with the revenue meters consumption. If there is a difference,
then it indicates either there is a theft or revenue meter malfunction . The check
meter can also be used to monitor the energy used on the secondary of a
distribution transformer serving several customer and compared to the sum of all
the meter usage. Besides spotting out the line where power theft is suspected to
occur, it also detects the amount of energy stolen. Compact size, lightweight for
quick and high accuracy make the system more effective.
BLOCK DIAGRAM:
              Power theft identification, in this paper, is done by converting the
disc revolutions of each consumer’s energy meter and distribution transformer into
pulses. These pulses are frequency division multiplexed and transmitted through
power line. These signals are individually picked and counted at the receiver end.
If the difference of the sum of the consumer’s readings and that of distribution
transformer exceeds the preset value, which is set by considering transmission loss,
the power theft is said to occur.
              The project can be categorized into 4 modules :-
                           Transmitting section
                           Receiving section
                           Processing section
                           Counter section
              The transmitted signal is selected at the receiving end by the inter-
mediate frequency transformer.
DESIGN LAYOUT:                                                           7 segment led disp
                                                                                      DISPLAY



                                        To tap the signal individually                  ALARM



                                                         RECEIVER
                                                         SECTION
                                                                                      MICRO
                                                                                      CONTROLLER


                                                                             µc-processing section
 P

 N
                                                                               CONSUMER
                                                                               NO:1
                        DISTRIBUTION           ENERGY
                        TRANSFORMER            METER
101seminartopics.com



                                                                       CONSUMER
                                                                       NO:2
                            TRANSMITTER
                            SECTION



                            Provide with slot sensor



TRANSMITTING SECTION:
              The first and foremost requirements for a transmitter section are the
                            The sensing unit
                            Phase locked loop
                            CMOS analog switch
                            Buffer
                            Intermediate Frequency Transformer
              In this section, the disc revolutions of the rotating non-magnetic disc
of the electro magnetic energy meter are sensed by opto coupler slot sensor. This
slot sensor employs an infrared light source and a photo detector. For each
revolution of the disc, the sensing unit has to produce pulses which are shaped
and given as control signal to the analog CMOS switch. The analog switch
employed in the circuit is IC 4066 which is a quad bilateral switch intended for
the transmission of analog or digital signals. It offers a very low on state
resistance and bypasses carrier wave generated by Phase Locked Loop to the next
part of the circuit. Here, PLL acts as a carrier signal generator, which produces
carrier signals of high frequency of band 300 kHz. The IC 567, that has an internal
voltage-controlled oscillator is used. The output carrier signal is passed on to
CMOS switch. From there, the modulated high frequency carrier signal is passed
through a buffer circuit in order to have sufficient drive current and for isolation
purpose.


                              Analog.sw


                   PLL                    BUF          IFT
                                          FER

                                                P.SUPPLY
101seminartopics.com




                               ENERGY
                                           Transmitter
                               METER

                                                            230 V , AC 50HZ

                The buffer used in the module is IC 4049 which act as current
amplifiers. Then an IFT is placed which is a step down transformer. It provides
current gain and impedance matching. The carrier wave is current amplified, FM
modulated and sent through power line. Selected signal at the receiving end is
clipped off to a desired value and is demodulated by Phase Locked Loop. For
every lock condition of the Phase Locked Loop, a pulse is sent out of the
receiver end.
RECEIVING SECTION:
                The FM signal that are transmitted from the transmitter section
travels through the power line and reaches the receiving section, where these
signals are tapped individually. The basic components in the receiver section are :-
                             Intermediate Frequency Transformer
                             Clipper
                             Phase locked loop
                The IFT used in this section is of the same type as that of that
transmitter. The frequency range is between 100 – 300 KHz as that used in radios.
The IFT is externally tuned to the same value as that of the transmitter so that
only signals of tuned value enters into the receiver circuit. The signal is sent to a
simple diode clipper which clips off it to a value of about 0.7 V. Two diodes
IN 4148 are connected back to back so that clipping is done at both positive and
negative levels. This clipped signal is then given us an input signal of PLL which
is a closed loop feedback system. Its function is to lock the output frequency and
phase to the frequency and face of an input signal and it acts as a tone detector.
The output of PLL is low whenever it goes into ‘lock’ state. This low state will
open circuit a transistor whereby a pulse of +8 V is obtained as its output.
                                                            Receiver


                                                         DISPLAY
101seminartopics.com



                                   p.supply
                                                                           7 Seg.Decoder


                                                                                  12-bit Ripple
                                        IFT        PLL           Buffer           counter
230V,AC 50HZ
LINE
                      The pulses due to the locking of PLL is of +8 V but micro
  controller requires only +5 V. For this purpose an opto coupler is used which acts
  as an isolator circuit between receiver and micro controller.




  COUNTER CUM DISPLAY SECTION:
                      The energy meter disc rotates faster or slower depending on the
  amount of electrical energy being consumed. Whenever a carrier signal is detected
  at the receiver, a pulse is passed on to a counter. It counts six pulses and gives an
  output for every unit consumed. The output of this counter is fed to a decimal
  counter cum display unit. Four numbers of IC 4033 decade counters are connected
  in cascade to count as well as to drive the four digit seven segment LED
  display. The display enable pin 3 of this IC is tied to Vcc. A reset push button is
  provided to reset the decade counters and thereby the display. In IC4026 the
  carryout pin 5 is connected to clock input pin 1 of the next stage for cascading.


                                                                                           GND
               47K                            IC             1              3
   FROM                        IC4093         4040       7   2
                                                                  IC4081            4 SEVEN SEGMENT DISPLAY
   RECEIVER                                   CP         6



               .1µF




  During power out the last reading of the display can be retained in the decade
  counters by providing a 3 V battery backup through a diode to the Vdd pin.
  PROCESSING SECTION:
                      This section being the final and the most important part, performs
  all necessary manipulation and processing work. This processing work is done by
101seminartopics.com

micro controller, which performs the final identification and indication by
connecting an alarm. The use of micro controller resulted in a giant leap in the
processing field. Our paper takes up the help of the micro controller to obtain
quick, swift and accurate responses. The entire processing work is done by micro
controller, which performs the final identification and indication .
THE NEED FOR MICRO CONTROLLER:
                The necessity of using micro controller arise from the fact that, for
a product design which requires only a simple system, the use of microprocessor
is undesirable. The micro controller identifies all the function needed to make up
a simple microprocessor system and puts as many as possible in a single IC. The
micro controller used in this project is AT 8951, which is a 40 pin dip IC. It
helps in scanning, debouncing, matrix decoding and serial transmission circuits etc.
IC 89c51 is second generation 8-bit micro controller. Parallel counting of energy
meter reading and simultaneous comparison of these readings are performed by
the IC. The use of microcontroller has made the entire system more effective and
accurate.


AN OVERVIEW OF 89c51:
                The microcontroller 89c51 is a 40 pin dip IC
                  EPROM
                   It includes EPROM of 4 kilobytes. This space is for storing
                   codes. It can be programmed electrically. All instruction fetches
                   are taken from the program memory space.
                  RAM of 128 bytes
                   The data memory space is read-write memory space. The
                   processor can read data from memory space and can write into
                   it. All variables and their values are stored in this memory.
                  Input output ports
                   The I/O ports of 8951 are full duplex serial in nature which
                   carries 8 bit information to and fro simultaneously. It consists of
                   four ports P0, P1, P2 and P3, which are used for different
                   purposes. An external memory is connected to IC 8951 addressed
                   by port 0 and 2. Port 0 is used to exchange data with this
101seminartopics.com

                  memory with the help of multiplexed address data bus. Port 3 is
                  used to perform external data memory WRITE and READ
                  functions.
              The entire programming in the controller is looked after by the
instruction set. The IC 8951 instruction set has 50 instructions, which can be
summarized as data transfer instructions, multiplication, division, call, jump etc.
Comparing the instruction set of a general purpose 8-bit microprocessor, it’s
obvious that in some ways it has more power or in other words the micro
controller has some real imitations. The major demerit is the availability of
limited stack which can be extended by connecting external memory to it.
Power saving modes:
              It is designed when static logic for operation down to zero
frequency and supports two software selectable power saving modes,
      IDLE mode stops the CPU while allowing the RAM, the timer/counter,
         serial port and Interrupt system to continue functioning.
      POWER DOWN mode saves the RAM contents but freezes the oscillator,
         disabling all other functions until the next hardware reset.




     PIN DIAGRAM OF IC 89C51:
101seminartopics.com




                                                     PORT 1 & 3 (1-8,10-17)
                                                              A 8-BIT BI-DIRECTIONAL I/O
                                                     PORT WITH INTERNAL PULL-UPS. IT
                                                     RECEIVES LOWER ORDER ADDRESS

                                                     BYTES DURING FLASH PROGRAMMING.

                                                     PORT O (32-39)
                                                              A 8-BIT BI-DIRECTIONAL I/O
                                                     PORT. IT IS CONFIGURED TO BE THE
                                                     MULTIPLEXED LOW ORDER
                                                     ADDRESS/DATA BUS DURING ACCESSES
                                                     TO EXTERNAL PROGRAM AND DATA
                                                     MEMORY.
                                                     PORT 2 (21-28)
                                                              IT PERFORMS THE SAME
                                                     FUNCTION AS THE PORT 1 INADDITION
                                                     IT RECEIVES SOME CONTROL SIGNALS
                                                     DURING FLASH PROGRAMMING AND

OPERATION OF MICRO CONTROLLER:
                    The different connections are shown in the design layout. The
set value can be given through port P1 by means of DIP switches. The possible
values can be set by it.
                     The pulses from each energy meter after being received is
given as input individually to pin 12 & 13 and 16 of port 3.
                    The frequency of operation of the controller can be varied by
choosing crystal of desired value. The ceramic crystal is connected across 18th and
19th pin of the IC 8951. High frequency of about 8 MHz is chosen.
                    Power theft identification is done by means of an alarm,
which is connected to the 39th pin of IC. Once the alarm is set on, the resetting
of the controller can be done by connecting a push button to pin 9.
                    It can be noted that the other pins of the ICs are unused
and hence no connection are given to them. As the program written occupies
space less than is 4 kbytes, no external memory is used hence 31st pin is made
high.
                     The program is written and is down loaded to the IC 8751
by means of PC. The program is written so as to assign the function of each pin.
101seminartopics.com

Also it initials continuous counting of units and simultaneous comparison. If error
is predicted the buzzer is made to give alarm signal.


SOFTWARE DESCRIPTION FOR IC 89C51:
The program for 89c51 is shown in this section. We present it in the form of
several blocks to make it more clear and easily readable.
101seminartopics.com


  INITIALISING THE PARAMETERS                CHECKING THE SEVENTH CONDITION


  0016 75DOE7          MOV PSW,#0E7H
                                            0079 7C24         CK.FOR.7
  0019 7581FS          MOV SO,#SFH
                                            007B 020086       MOV KEY.SET.REG,#036D
  001C 758000          MOV P0,#00H
                                            007E BC0705       JMP CHECK.DIFF
  001F 7590FF          MOV P1,$OFFH
                                            0081    7C2A    CJNE KEY.SET.REG,#007H,CHE
  0022 75A000          MOV P2,#00H
  0025 75B0FF          MOV P3,#00FH



  INITIALISING THE PULSE REGISTERS          CHECK DIFFERENCE FOLLOWED BY ALARM
                                            0083     020086     CK.DIFF
  0028 7800       MOV PULSE.1.REG,#00H      0086                 MOV KEY.SET.REG,#420

  002A 7900       MOV PULSE.2.REG,#00H      0086     EB          JMP CHECK.DIFF
  002C 7A00     MOV PULSE.3.REG,#00H        0087     C3          MOV R,RES.REG
  002E D288     SETB IT0                    0088     9C          CLR C
  0030   D28A SETB IT1                      0089     5110        SUBB AMKEY.SET.REG
                                            008B     8BAO        JNC SET.ALARM


  EXECUTION OF CHECKING CONDITON
  (CHECKING FIRST CONDITION)
  0047   98         SUBB A,PULSE.1.REG      FREQUENT LOOPING OF AN ALARM CKT

  0048   FB         MOV RES.REG,A
  0049   E590       MOV A,P1PULSE.1.REG      008D    80AF         MOV P2,RES.REG

  004B   54OF       ANL A,#00001111B         008F                 JMP X1

  004D   FC         MOV KEY.SET.REG,A        008F C2A8            CLR EXO

  004E BC0105 CJNE KEY.SET.REG,#001H,CHE     0091    08           INC PULSE.1.REG
                                             0092    D2A8         SETB EXO
                                             0094    32           RET1
                                             0095    C2AA
  EXECUTION OF SECOND CHECKING
                                             0097 D2              INC
  CONDITON
                                             0098 AA             SETB
  0051   7C06       CK.FOR.2
                                             009A                 RETI
  0053   020086     MOV KEY.SET.REG,#006H
  0056              JMP CHECK.DIFF
  0056 BC0205CJNE KEY.SET.REG,#002H,CHE
101seminartopics.com


   EXECUTION OF THIRD CHECKING CONDITION                OPCODE TO DIRECT AN ALARM


   0059   7COC     CH.FOR.3                             009B   8BAO       MOV P2,RES.REG
   005B   020086   MOV KEY.SET.REG,#012                 009D   D280       SETB ALARM.PIN
   005E            CHECK.DIFF                           009F   C2A8        CLR EX0
   005E   BC0305 CJNE KEY.SET.REG,#003H,CHE             00A1   C2AA       CLR EX1
                                                        00A3   80F6        JMP SET.ALARM



The execution of first three and last conditions are shown here. Other conditions
are executed in a similar way.

The process will be executed and the µ c enables simple, cost effective ,accurate
and much more reliable system. It’s high frequency enables all the pulses without
missing any.
MONITORING MEASURES:
      The display need not be kept always on, and can be powered up using a
          push switch whenever required to note down the reading.
      Protection against high voltage on the transmitter or receiver is possible
          by the usage of special high voltage suppressers like gas discharge tubes
          provided with a coupling point with fuses to disconnect the respective
          transmitter or receiver.
      Distance coverage is an important limitation which can be overcome by
          providing the repeaters at regular intervals when applied in a large scale.
      The display need not be kept always on, and can be powered up using a
          push switch whenever required to note down the reading.
      Effects of PF improvement capacitors on the line and distribution
          transformers may interfere with the message signal or the effect of
          atmospheric noises is to be analyzed before implementing in a large scale.
MERITS:
                       Due to the availability of digital energy meter, this
                       implementation can be easily performed for power theft
                       identification.
                       Highly accurate, low loss and economical one.
101seminartopics.com

                     Our implementation may gives a big hand to vigilance squad
                     to control theft quickly and easily
                     Using this same logic, instead of micro controller we can
                     adapt computer for more number of uses
                     In day-to-day conventional methods, it’s possible to identify
                     the theft but the extent of theft cannot be identified but it’s
                     possible with our Check meter and remote meter readers.
                     Compact size, Reliability, lightweight for quick operation and
                     high accuracy makes the system more effective.
                     Maintenance – holds more value than construction. In our case,
                     cost is very less, it involves the planned serving of equipment
                     at regular interval. Emergency maintenance is the case when
                     the maintenance crew due to repair of any sections can be
                     succeeded by,
                            A rational spare parts policy.
                            A maintenance staff of highly skilled, highly trained
                            personnel.
CONCLUDING LINES:
      “When you don’t have a thing to worry about, those signs of
         age will stay away. It’s just dumping obsolete technology
                        with no peace of mind”

              This paper is designed for industrial purpose, but it can be extended
to domestic purposes also. It gives a big hand to vigilance squad to control theft
quickly and easily. With its usage, the crime of stealing power may be brought to
an end and thereby a new bloom may be expected in the economy of our
motherland. The prime limitation of the system in the present form is the distance
coverage. To overcome this when applied in a large scale, repeaters can be
employed at suitable intervals. To certain extent the power level of the transmitter
may be improved. Our paper not only indicates the place of power theft but also
the amount of energy being stolen that is, it gives the best of the expected results.
The use of this technique gives a new hope and accuracy for the satisfaction to
complete the work.
101seminartopics.com




               TAMIL NADU ELECTRICITY BOARD
                        Tirunelveli urban division

                     Lt line loss study for the period form 5.2.2002 to 20.2.2002
SI.NO     NAME OF THE       NAME OF DIST.    CONSUMPTION     CONSUMPTION     LOSS IN      LOSS
          SECTION           TRANSFORMER      AT THE          AT THE          UNITS        IN
                                             TRANSFORMER     CONSUMER
                                             END             END
                                                                                            %

   1.     JUNCTION          TAMILNADU          3116 UNITS      2975 UNITS    141 UNITS    4.5%
                            HOTEL SS
   2.     MAHARAJANAGAR     SAVAI ILLAM SS     4010 UNITS      3599 UNITS    411 UNITS    10.24
                                                                                          %
   3.     MELAPALAYAM       KALIAMMANKOIL      8936 UNITS      8086 UNITS    850 UNITS    9.5%
                            SS
   4.     PALAYAPETTAI      ABISEKAPATTI       1840 UNITS      1538 UNITS    302 UNITS    16.41
                            63KVA                                                         %
   5.     PETTAI            MALAYALAMEDU       11552 UNITS     9520 UNITS    2032 UNITS   17.5%

   6.     THACHANALLUR      KATTUDIYAR         291 UNITS       5942 UNITS    METER
                            KUDIRUPPU                                        DEFECT
   7.     V.M.CHATRAM       TNHB SS V100       4583 UNITS      4450 UNITS    133 UNITS    2.9%

   8.     SAMATHANAPURAM    MADIKONDU SS       6841 UNITS      6674 UNITS    167 UNITS    2.44%
                            100 KVA
   9.     VANNARPETTAI      MURUGANKURICHI     8678 UNITS      8402 UNITS    271 UNITS    3.12%
                            33 III 100KVA
101seminartopics.com

`
                  TRANSFORMER LOSS FOR DT’s:




     LOSS IN DT’s=(TOTAL COPPER LOSS+TOTAL IRON LOSS)/1000




    STATEMENT SHOWING THE TRANSFORMER LOSS FOR VARIOUS OF DISTRIBUTION
                          TRANSFORMERS
                   DISTRIBUTION          MAX. IRON        MAX. COPPER
      SI.NO        TRANSFORMER          LOSS(WATTS)       LOSS(WATTS)

      1.              63KVA/11KV          180               1235

      2.              63KVA/22KV          210               1300

      3.              100KVA/11KV         260               1760

Más contenido relacionado

La actualidad más candente

FAULT DETECTION ON OVERHEAD TRANSMISSION LINE USING ARTIFICIAL NEURAL NET...
 FAULT DETECTION ON OVERHEAD TRANSMISSION LINE  USING ARTIFICIAL NEURAL NET... FAULT DETECTION ON OVERHEAD TRANSMISSION LINE  USING ARTIFICIAL NEURAL NET...
FAULT DETECTION ON OVERHEAD TRANSMISSION LINE USING ARTIFICIAL NEURAL NET...Politeknik Negeri Ujung Pandang
 
Wireless power theft monitoring
Wireless power theft monitoring Wireless power theft monitoring
Wireless power theft monitoring Naqeeb Ullah Kakar
 
Seminar presentation on Smart Energy Meter
Seminar presentation on Smart Energy MeterSeminar presentation on Smart Energy Meter
Seminar presentation on Smart Energy Metersudhanshurj
 
Power Theft Detection
Power Theft DetectionPower Theft Detection
Power Theft DetectionLis Maria Roy
 
Wireless power-theft-monitering-ppt
Wireless power-theft-monitering-pptWireless power-theft-monitering-ppt
Wireless power-theft-monitering-pptArjit Rajwal
 
Power theft detection
Power theft detectionPower theft detection
Power theft detectionbishow kandel
 
Automatic Power Factor Corrector Using Arduino report
Automatic Power Factor Corrector Using Arduino reportAutomatic Power Factor Corrector Using Arduino report
Automatic Power Factor Corrector Using Arduino reportSelf-employed
 
Smart energy meter ppt
Smart energy meter   pptSmart energy meter   ppt
Smart energy meter pptRitam Giri
 
WIRELESS POWER TRANSMISSION TECHNOLOGY
WIRELESS POWER TRANSMISSION TECHNOLOGYWIRELESS POWER TRANSMISSION TECHNOLOGY
WIRELESS POWER TRANSMISSION TECHNOLOGYKSunitha5
 
Intelligent Substation & its applications
Intelligent Substation & its applicationsIntelligent Substation & its applications
Intelligent Substation & its applicationsGowtham MG
 
3 phase Transmission Line fault detector edit 1-3.pptx
3 phase Transmission Line fault detector edit 1-3.pptx3 phase Transmission Line fault detector edit 1-3.pptx
3 phase Transmission Line fault detector edit 1-3.pptxKrishna2017
 
Automatic meter reading
Automatic meter readingAutomatic meter reading
Automatic meter readingSajan Sahu
 
FAULT DETECTION AND CLASSIFICATION ON TRANSMISSION OVERHEAD LINE USING BPP...
FAULT DETECTION AND CLASSIFICATION ON TRANSMISSION OVERHEAD LINE  USING BPP...FAULT DETECTION AND CLASSIFICATION ON TRANSMISSION OVERHEAD LINE  USING BPP...
FAULT DETECTION AND CLASSIFICATION ON TRANSMISSION OVERHEAD LINE USING BPP...Politeknik Negeri Ujung Pandang
 
Power Theft Identification and Monitoring using GSM module
Power Theft Identification and Monitoring using GSM modulePower Theft Identification and Monitoring using GSM module
Power Theft Identification and Monitoring using GSM moduleAshishPanchdhar1
 
Wireless power transmission new and improved
Wireless power transmission new and improvedWireless power transmission new and improved
Wireless power transmission new and improvedHimanshuSirohi6
 

La actualidad más candente (20)

FAULT DETECTION ON OVERHEAD TRANSMISSION LINE USING ARTIFICIAL NEURAL NET...
 FAULT DETECTION ON OVERHEAD TRANSMISSION LINE  USING ARTIFICIAL NEURAL NET... FAULT DETECTION ON OVERHEAD TRANSMISSION LINE  USING ARTIFICIAL NEURAL NET...
FAULT DETECTION ON OVERHEAD TRANSMISSION LINE USING ARTIFICIAL NEURAL NET...
 
Tech seminar
Tech seminarTech seminar
Tech seminar
 
Power theft
Power theftPower theft
Power theft
 
Wireless power theft monitoring
Wireless power theft monitoring Wireless power theft monitoring
Wireless power theft monitoring
 
Seminar presentation on Smart Energy Meter
Seminar presentation on Smart Energy MeterSeminar presentation on Smart Energy Meter
Seminar presentation on Smart Energy Meter
 
Power Theft Detection
Power Theft DetectionPower Theft Detection
Power Theft Detection
 
Wireless power-theft-monitering-ppt
Wireless power-theft-monitering-pptWireless power-theft-monitering-ppt
Wireless power-theft-monitering-ppt
 
Power theft detection
Power theft detectionPower theft detection
Power theft detection
 
Automatic Power Factor Corrector Using Arduino report
Automatic Power Factor Corrector Using Arduino reportAutomatic Power Factor Corrector Using Arduino report
Automatic Power Factor Corrector Using Arduino report
 
Smart energy meter ppt
Smart energy meter   pptSmart energy meter   ppt
Smart energy meter ppt
 
WIRELESS POWER TRANSMISSION TECHNOLOGY
WIRELESS POWER TRANSMISSION TECHNOLOGYWIRELESS POWER TRANSMISSION TECHNOLOGY
WIRELESS POWER TRANSMISSION TECHNOLOGY
 
Intelligent Substation & its applications
Intelligent Substation & its applicationsIntelligent Substation & its applications
Intelligent Substation & its applications
 
ppt on Smart Grid
ppt on Smart Gridppt on Smart Grid
ppt on Smart Grid
 
Power quality
Power qualityPower quality
Power quality
 
3 phase Transmission Line fault detector edit 1-3.pptx
3 phase Transmission Line fault detector edit 1-3.pptx3 phase Transmission Line fault detector edit 1-3.pptx
3 phase Transmission Line fault detector edit 1-3.pptx
 
Witricity
Witricity Witricity
Witricity
 
Automatic meter reading
Automatic meter readingAutomatic meter reading
Automatic meter reading
 
FAULT DETECTION AND CLASSIFICATION ON TRANSMISSION OVERHEAD LINE USING BPP...
FAULT DETECTION AND CLASSIFICATION ON TRANSMISSION OVERHEAD LINE  USING BPP...FAULT DETECTION AND CLASSIFICATION ON TRANSMISSION OVERHEAD LINE  USING BPP...
FAULT DETECTION AND CLASSIFICATION ON TRANSMISSION OVERHEAD LINE USING BPP...
 
Power Theft Identification and Monitoring using GSM module
Power Theft Identification and Monitoring using GSM modulePower Theft Identification and Monitoring using GSM module
Power Theft Identification and Monitoring using GSM module
 
Wireless power transmission new and improved
Wireless power transmission new and improvedWireless power transmission new and improved
Wireless power transmission new and improved
 

Destacado

Electricity theft (1)
Electricity theft (1)Electricity theft (1)
Electricity theft (1)sharique_64
 
Power theft detection via plc
Power theft detection via plcPower theft detection via plc
Power theft detection via plcbbshashanka
 
energy theft detection
energy theft detectionenergy theft detection
energy theft detectionabdulsuboor235
 
Intelligent Electric Power Management Using Zigbee with Advanced Metering Inf...
Intelligent Electric Power Management Using Zigbee with Advanced Metering Inf...Intelligent Electric Power Management Using Zigbee with Advanced Metering Inf...
Intelligent Electric Power Management Using Zigbee with Advanced Metering Inf...Akbar Badusha
 
PLC and Sensors Based Protection and Fault Detection of Induction Motors
PLC and Sensors Based Protection and Fault Detection of Induction MotorsPLC and Sensors Based Protection and Fault Detection of Induction Motors
PLC and Sensors Based Protection and Fault Detection of Induction MotorsMathankumar S
 
Microcontroller based-substation-monitoring-and-controlling-system
Microcontroller based-substation-monitoring-and-controlling-systemMicrocontroller based-substation-monitoring-and-controlling-system
Microcontroller based-substation-monitoring-and-controlling-systemMahmud Hasan Uday
 
(Aliv) Multiple Transformers Oil Temperature Monitoring with Automatic Circui...
(Aliv) Multiple Transformers Oil Temperature Monitoring with Automatic Circui...(Aliv) Multiple Transformers Oil Temperature Monitoring with Automatic Circui...
(Aliv) Multiple Transformers Oil Temperature Monitoring with Automatic Circui...Md Abu Jauad Khan Aliv
 
SINGLE PHASING, PHASE REVERSAL, OVERVOLTAGE, UNDER VOLTAGE AND OVERHEATING PR...
SINGLE PHASING, PHASE REVERSAL, OVERVOLTAGE, UNDER VOLTAGE AND OVERHEATING PR...SINGLE PHASING, PHASE REVERSAL, OVERVOLTAGE, UNDER VOLTAGE AND OVERHEATING PR...
SINGLE PHASING, PHASE REVERSAL, OVERVOLTAGE, UNDER VOLTAGE AND OVERHEATING PR...Michael George
 
GSM BASED PREPAID ENERGY METER BILLING VIA SMS
GSM BASED PREPAID ENERGY METER BILLING VIA SMSGSM BASED PREPAID ENERGY METER BILLING VIA SMS
GSM BASED PREPAID ENERGY METER BILLING VIA SMSSRINIVAS REDDY
 
Microcontroller Programming Assignment
Microcontroller Programming AssignmentMicrocontroller Programming Assignment
Microcontroller Programming Assignmentbabak danyal
 
Connecting your building's meters to energy management software
Connecting your building's meters to energy management softwareConnecting your building's meters to energy management software
Connecting your building's meters to energy management softwarePulse Energy
 
Project paper
Project paperProject paper
Project paperchigongo
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 

Destacado (19)

Electricity theft (1)
Electricity theft (1)Electricity theft (1)
Electricity theft (1)
 
Power theft detection via plc
Power theft detection via plcPower theft detection via plc
Power theft detection via plc
 
energy theft detection
energy theft detectionenergy theft detection
energy theft detection
 
Intelligent Electric Power Management Using Zigbee with Advanced Metering Inf...
Intelligent Electric Power Management Using Zigbee with Advanced Metering Inf...Intelligent Electric Power Management Using Zigbee with Advanced Metering Inf...
Intelligent Electric Power Management Using Zigbee with Advanced Metering Inf...
 
PLC and Sensors Based Protection and Fault Detection of Induction Motors
PLC and Sensors Based Protection and Fault Detection of Induction MotorsPLC and Sensors Based Protection and Fault Detection of Induction Motors
PLC and Sensors Based Protection and Fault Detection of Induction Motors
 
Microcontroller based-substation-monitoring-and-controlling-system
Microcontroller based-substation-monitoring-and-controlling-systemMicrocontroller based-substation-monitoring-and-controlling-system
Microcontroller based-substation-monitoring-and-controlling-system
 
(Aliv) Multiple Transformers Oil Temperature Monitoring with Automatic Circui...
(Aliv) Multiple Transformers Oil Temperature Monitoring with Automatic Circui...(Aliv) Multiple Transformers Oil Temperature Monitoring with Automatic Circui...
(Aliv) Multiple Transformers Oil Temperature Monitoring with Automatic Circui...
 
SINGLE PHASING, PHASE REVERSAL, OVERVOLTAGE, UNDER VOLTAGE AND OVERHEATING PR...
SINGLE PHASING, PHASE REVERSAL, OVERVOLTAGE, UNDER VOLTAGE AND OVERHEATING PR...SINGLE PHASING, PHASE REVERSAL, OVERVOLTAGE, UNDER VOLTAGE AND OVERHEATING PR...
SINGLE PHASING, PHASE REVERSAL, OVERVOLTAGE, UNDER VOLTAGE AND OVERHEATING PR...
 
final_report
final_reportfinal_report
final_report
 
GSM BASED PREPAID ENERGY METER BILLING VIA SMS
GSM BASED PREPAID ENERGY METER BILLING VIA SMSGSM BASED PREPAID ENERGY METER BILLING VIA SMS
GSM BASED PREPAID ENERGY METER BILLING VIA SMS
 
Microcontroller Programming Assignment
Microcontroller Programming AssignmentMicrocontroller Programming Assignment
Microcontroller Programming Assignment
 
Connecting your building's meters to energy management software
Connecting your building's meters to energy management softwareConnecting your building's meters to energy management software
Connecting your building's meters to energy management software
 
Project paper
Project paperProject paper
Project paper
 
Synopsis
SynopsisSynopsis
Synopsis
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
AMI-Presentation
AMI-PresentationAMI-Presentation
AMI-Presentation
 
Report File On RedTacton
Report File On RedTactonReport File On RedTacton
Report File On RedTacton
 
Dc–Dc converters
Dc–Dc convertersDc–Dc converters
Dc–Dc converters
 
Solar tree
Solar treeSolar tree
Solar tree
 

Similar a Micro controller-based-power-theft-identification

Sample Database For Rfid Automatic Vehicle Identification
Sample Database For Rfid Automatic Vehicle IdentificationSample Database For Rfid Automatic Vehicle Identification
Sample Database For Rfid Automatic Vehicle IdentificationAlicia Johnson
 
IRJET- Wireless Power Theft Monitoring System using Zigbee
IRJET- Wireless Power Theft Monitoring System using ZigbeeIRJET- Wireless Power Theft Monitoring System using Zigbee
IRJET- Wireless Power Theft Monitoring System using ZigbeeIRJET Journal
 
A Smart Handheld Measuring and Testing Electronic Device with Touch Screen
A Smart Handheld Measuring and Testing Electronic Device with Touch ScreenA Smart Handheld Measuring and Testing Electronic Device with Touch Screen
A Smart Handheld Measuring and Testing Electronic Device with Touch ScreenIJTET Journal
 
IRJET- Electricity Theft Monitoring and its Consumption Savings
IRJET- Electricity Theft Monitoring and its Consumption SavingsIRJET- Electricity Theft Monitoring and its Consumption Savings
IRJET- Electricity Theft Monitoring and its Consumption SavingsIRJET Journal
 
Tracking and breaking system for vehicles
Tracking and breaking system for vehiclesTracking and breaking system for vehicles
Tracking and breaking system for vehicleskakanikings
 
4 Way traffic controll new
4 Way traffic controll new4 Way traffic controll new
4 Way traffic controll newMainak Nandi
 
GSM BASED GAS ESCAPE BURST AND FIRE SAFETY PROJECT
GSM BASED GAS ESCAPE BURST AND FIRE SAFETY PROJECTGSM BASED GAS ESCAPE BURST AND FIRE SAFETY PROJECT
GSM BASED GAS ESCAPE BURST AND FIRE SAFETY PROJECTThrinadh Komatipalli
 
Wirelesspowertheftmonitoringoriginalbyrupalipatra 121126043543-phpapp02
Wirelesspowertheftmonitoringoriginalbyrupalipatra 121126043543-phpapp02Wirelesspowertheftmonitoringoriginalbyrupalipatra 121126043543-phpapp02
Wirelesspowertheftmonitoringoriginalbyrupalipatra 121126043543-phpapp02ratnmani mukesh
 
Sensors-and-Actuators-working principle and types of sensors
Sensors-and-Actuators-working principle and types of sensorsSensors-and-Actuators-working principle and types of sensors
Sensors-and-Actuators-working principle and types of sensorsRameshBabu920476
 
WIRELESS POWER THEFT MONITORING SYSTEM
WIRELESS POWER THEFT MONITORING SYSTEMWIRELESS POWER THEFT MONITORING SYSTEM
WIRELESS POWER THEFT MONITORING SYSTEMvivatechijri
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...researchinventy
 
KAGITHALA YASASWINI
KAGITHALA YASASWINIKAGITHALA YASASWINI
KAGITHALA YASASWINIMAHESH294
 
fault detection of transformer using GSM,,,,by YASASWINI.KAGITHALA
fault detection of transformer using GSM,,,,by YASASWINI.KAGITHALAfault detection of transformer using GSM,,,,by YASASWINI.KAGITHALA
fault detection of transformer using GSM,,,,by YASASWINI.KAGITHALAMAHESH294
 
VEHICLE DENSITY CONTROLLED AUTOMATIC TRAFFIC LIGHT from KMP Engineering college
VEHICLE  DENSITY CONTROLLED AUTOMATIC TRAFFIC LIGHT from KMP Engineering collegeVEHICLE  DENSITY CONTROLLED AUTOMATIC TRAFFIC LIGHT from KMP Engineering college
VEHICLE DENSITY CONTROLLED AUTOMATIC TRAFFIC LIGHT from KMP Engineering collegeHIGHVOLTEEE
 
Applications of microcontroller
Applications of microcontrollerApplications of microcontroller
Applications of microcontrollerbabak danyal
 
Wind Turbine programme
Wind Turbine programmeWind Turbine programme
Wind Turbine programmeMinka Grdesic
 
APPLIANCE CONTROL USING INTELLIGENT SWITCH
APPLIANCE CONTROL USING INTELLIGENT SWITCHAPPLIANCE CONTROL USING INTELLIGENT SWITCH
APPLIANCE CONTROL USING INTELLIGENT SWITCHAmresh Nayak
 

Similar a Micro controller-based-power-theft-identification (20)

great adc
great adcgreat adc
great adc
 
Sample Database For Rfid Automatic Vehicle Identification
Sample Database For Rfid Automatic Vehicle IdentificationSample Database For Rfid Automatic Vehicle Identification
Sample Database For Rfid Automatic Vehicle Identification
 
IRJET- Wireless Power Theft Monitoring System using Zigbee
IRJET- Wireless Power Theft Monitoring System using ZigbeeIRJET- Wireless Power Theft Monitoring System using Zigbee
IRJET- Wireless Power Theft Monitoring System using Zigbee
 
A Smart Handheld Measuring and Testing Electronic Device with Touch Screen
A Smart Handheld Measuring and Testing Electronic Device with Touch ScreenA Smart Handheld Measuring and Testing Electronic Device with Touch Screen
A Smart Handheld Measuring and Testing Electronic Device with Touch Screen
 
24. deepti semwal.pptx
24. deepti semwal.pptx24. deepti semwal.pptx
24. deepti semwal.pptx
 
Smart power saver
Smart power saverSmart power saver
Smart power saver
 
IRJET- Electricity Theft Monitoring and its Consumption Savings
IRJET- Electricity Theft Monitoring and its Consumption SavingsIRJET- Electricity Theft Monitoring and its Consumption Savings
IRJET- Electricity Theft Monitoring and its Consumption Savings
 
Tracking and breaking system for vehicles
Tracking and breaking system for vehiclesTracking and breaking system for vehicles
Tracking and breaking system for vehicles
 
4 Way traffic controll new
4 Way traffic controll new4 Way traffic controll new
4 Way traffic controll new
 
GSM BASED GAS ESCAPE BURST AND FIRE SAFETY PROJECT
GSM BASED GAS ESCAPE BURST AND FIRE SAFETY PROJECTGSM BASED GAS ESCAPE BURST AND FIRE SAFETY PROJECT
GSM BASED GAS ESCAPE BURST AND FIRE SAFETY PROJECT
 
Wirelesspowertheftmonitoringoriginalbyrupalipatra 121126043543-phpapp02
Wirelesspowertheftmonitoringoriginalbyrupalipatra 121126043543-phpapp02Wirelesspowertheftmonitoringoriginalbyrupalipatra 121126043543-phpapp02
Wirelesspowertheftmonitoringoriginalbyrupalipatra 121126043543-phpapp02
 
Sensors-and-Actuators-working principle and types of sensors
Sensors-and-Actuators-working principle and types of sensorsSensors-and-Actuators-working principle and types of sensors
Sensors-and-Actuators-working principle and types of sensors
 
WIRELESS POWER THEFT MONITORING SYSTEM
WIRELESS POWER THEFT MONITORING SYSTEMWIRELESS POWER THEFT MONITORING SYSTEM
WIRELESS POWER THEFT MONITORING SYSTEM
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
 
KAGITHALA YASASWINI
KAGITHALA YASASWINIKAGITHALA YASASWINI
KAGITHALA YASASWINI
 
fault detection of transformer using GSM,,,,by YASASWINI.KAGITHALA
fault detection of transformer using GSM,,,,by YASASWINI.KAGITHALAfault detection of transformer using GSM,,,,by YASASWINI.KAGITHALA
fault detection of transformer using GSM,,,,by YASASWINI.KAGITHALA
 
VEHICLE DENSITY CONTROLLED AUTOMATIC TRAFFIC LIGHT from KMP Engineering college
VEHICLE  DENSITY CONTROLLED AUTOMATIC TRAFFIC LIGHT from KMP Engineering collegeVEHICLE  DENSITY CONTROLLED AUTOMATIC TRAFFIC LIGHT from KMP Engineering college
VEHICLE DENSITY CONTROLLED AUTOMATIC TRAFFIC LIGHT from KMP Engineering college
 
Applications of microcontroller
Applications of microcontrollerApplications of microcontroller
Applications of microcontroller
 
Wind Turbine programme
Wind Turbine programmeWind Turbine programme
Wind Turbine programme
 
APPLIANCE CONTROL USING INTELLIGENT SWITCH
APPLIANCE CONTROL USING INTELLIGENT SWITCHAPPLIANCE CONTROL USING INTELLIGENT SWITCH
APPLIANCE CONTROL USING INTELLIGENT SWITCH
 

Último

UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesCeline George
 
Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationMJDuyan
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice documentXsasf Sfdfasd
 
Patterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptxPatterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptxMYDA ANGELICA SUAN
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfTechSoup
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICESayali Powar
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17Celine George
 
M-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxM-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxDr. Santhosh Kumar. N
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxAditiChauhan701637
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxEduSkills OECD
 
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptxClinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptxraviapr7
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfMohonDas
 
Human-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesHuman-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesMohammad Hassany
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17Celine George
 
How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17Celine George
 
How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17Celine George
 
CAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptxCAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptxSaurabhParmar42
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxraviapr7
 
Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxKatherine Villaluna
 

Último (20)

UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 Sales
 
Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive Education
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice document
 
Patterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptxPatterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptx
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICE
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17
 
M-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxM-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptx
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptx
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
 
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptxClinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdf
 
Human-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesHuman-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming Classes
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17
 
How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17
 
How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17
 
CAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptxCAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptx
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptx
 
Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptx
 

Micro controller-based-power-theft-identification

  • 1. 101seminartopics.com ABSTRACT Science and technology with all its miraculous advancements has fascinated human life to a great extent that imagining a world without these innovations is hardly possible. While technology is on the raising slope, we should also note the increasing immoral activities. With a technical view, “Power Theft” is a non-ignorable crime that is highly prevalent, and at the same time it directly affects the economy of a nation. Data collected over Tirunelveli District, Bhel Trichy proves the necessity of this project. Detecting and eradicating such crimes with the assistance of the developing scientific field is the “Need of the Hour”. With these views was this paper conceived and designed. Our paper provides a complete and comprehensive tool to prevent power theft which is very simple to understand and easy to implement(Accepted by T.N.E.B officials). It includes four sections – transmitting, receiving, counter display and processing sections. DESCRIPTION OF OUR IMPLEMENTATION IDEAS: The disc revolutions are sensed into pulses by optical slot sensor. These pulses are shaped and given as control signal to the CMOS switch which bypasses carrier wave generated by PLL provides as input to receiving section where transmitted signal is selected by the Intermediate frequency transformer. For each lock a pulse is sent out. The counter section is designed to send out pulse for every six input pulse from the receiver section. This count is parallely distributed in a 7-segmentdisplay and then to µc for further processing. µc performs the function of indication and identification. Pindetails, features, connections and software employed for µc89c51 are described in detail. We believe our implementation ideas is a boon to the electricity board offering them a chance to detect accurately the location and amount of power theft. Logical view for a digital meter is also included in our presentation.
  • 2. 101seminartopics.com INTRODUCTION: “TODAY’S TECHNICIANS ARE SO FOCUSSED ON THE TREES OF TECHNOLOGICAL CHANGE THAT THEY FAIL TO SEE THE FOREST; THE UNDERLYING ECONOMIC FORCES THAT DETERMINE SUCCESS AND FAILURE…” “TECHNOLOGY CHANGES ECONOMY LAWS DO NOT” Electricity is the modern man’s most convenient and useful form of energy without which the present social infrastructure would not be feasible. The increase in per capita production is the reflection of the increase in the living standard of people. When importance of electricity is on the increasing side, then how much should theft of this energy or illegal consumption of power from the transmission lines be averted? Power theft has become a great challenge to the electricity board. The dailies report that Electricity Board suffers a total loss of 8 % in revenue due to power theft every year, which has to controlled. Our paper identifies the Power theft and indicates it to the Electricity board through Power line. We had also dealt about the remote monitoring of an energy meter. MICROCONTROLLER BASED AUTOMATION: Embedded systems - a combination of software, hardware and additional mechanical parts that together forms a component of a larger system, to perform a specific function. It’s a technology, characterized by high reliability, restricted memory footprint and real time operation associated with a narrowly defined group of functions. Automation has made the art of living comfortable and easy. Embedded systems have made the process of automation a most successful one. Here, we have focused on automotive, an area of embedded controllers, in which we have dealt with the Power theft identification and also about the remote monitoring of an energy meter. “Technology have taken the world by storm performance ratings and exceptionally value for money prices” The microcontroller chip is preprogrammed to perform a dedicated or a narrow range of functions as a part of a larger system, usually with minimal end user or
  • 3. 101seminartopics.com operator intervention. Our paper throws light on automated monitoring of theft identification, which is an application of embedded controllers. MODES OF THEFT: It has been seen that there are 4 common methods of power theft as given below :- Bogus seals and tampering of seals. Meter tampering, meter tilting, meter interface and meter bypassing. Changing connection. Direct tapping from line. Due to introduction of modern electronic metering equipments, power thieves are utilizing more technological methods. Recent cases of power theft discovered by British inspectors included customers tunneling out to roadside mains cables and splicing into the supply, a garage taking its night time power supply from the nearest lamp post and domestic customers drilling holes into meter boxes and attempting to stop the counter wheels from turning. Another method of Power theft is by keeping a strong magnet in front of the disc in the energy meter and thus arresting the rotation of the disc, connecting the load directly to the power line bypassing the energy meter. But, it can be avoided easily by providing a non magnetic enclosure. MODERN DETECTING TOOLS: There are many modern tools that assist in power theft identification. Some of them are :-  Tamper proof seals and labels.  Meter leaders.  Tamper resistant screws / locks.  Check meter and remote meter readers.  Tamper alarms and sensors. This paper undertakes the Check meter and remote meter readers for power theft identification. In our case, the consumption recurred by the check
  • 4. 101seminartopics.com meter is compared with the revenue meters consumption. If there is a difference, then it indicates either there is a theft or revenue meter malfunction . The check meter can also be used to monitor the energy used on the secondary of a distribution transformer serving several customer and compared to the sum of all the meter usage. Besides spotting out the line where power theft is suspected to occur, it also detects the amount of energy stolen. Compact size, lightweight for quick and high accuracy make the system more effective. BLOCK DIAGRAM: Power theft identification, in this paper, is done by converting the disc revolutions of each consumer’s energy meter and distribution transformer into pulses. These pulses are frequency division multiplexed and transmitted through power line. These signals are individually picked and counted at the receiver end. If the difference of the sum of the consumer’s readings and that of distribution transformer exceeds the preset value, which is set by considering transmission loss, the power theft is said to occur. The project can be categorized into 4 modules :-  Transmitting section  Receiving section  Processing section  Counter section The transmitted signal is selected at the receiving end by the inter- mediate frequency transformer. DESIGN LAYOUT: 7 segment led disp DISPLAY To tap the signal individually ALARM RECEIVER SECTION MICRO CONTROLLER µc-processing section P N CONSUMER NO:1 DISTRIBUTION ENERGY TRANSFORMER METER
  • 5. 101seminartopics.com CONSUMER NO:2 TRANSMITTER SECTION Provide with slot sensor TRANSMITTING SECTION: The first and foremost requirements for a transmitter section are the The sensing unit Phase locked loop CMOS analog switch Buffer Intermediate Frequency Transformer In this section, the disc revolutions of the rotating non-magnetic disc of the electro magnetic energy meter are sensed by opto coupler slot sensor. This slot sensor employs an infrared light source and a photo detector. For each revolution of the disc, the sensing unit has to produce pulses which are shaped and given as control signal to the analog CMOS switch. The analog switch employed in the circuit is IC 4066 which is a quad bilateral switch intended for the transmission of analog or digital signals. It offers a very low on state resistance and bypasses carrier wave generated by Phase Locked Loop to the next part of the circuit. Here, PLL acts as a carrier signal generator, which produces carrier signals of high frequency of band 300 kHz. The IC 567, that has an internal voltage-controlled oscillator is used. The output carrier signal is passed on to CMOS switch. From there, the modulated high frequency carrier signal is passed through a buffer circuit in order to have sufficient drive current and for isolation purpose. Analog.sw PLL BUF IFT FER P.SUPPLY
  • 6. 101seminartopics.com ENERGY Transmitter METER 230 V , AC 50HZ The buffer used in the module is IC 4049 which act as current amplifiers. Then an IFT is placed which is a step down transformer. It provides current gain and impedance matching. The carrier wave is current amplified, FM modulated and sent through power line. Selected signal at the receiving end is clipped off to a desired value and is demodulated by Phase Locked Loop. For every lock condition of the Phase Locked Loop, a pulse is sent out of the receiver end. RECEIVING SECTION: The FM signal that are transmitted from the transmitter section travels through the power line and reaches the receiving section, where these signals are tapped individually. The basic components in the receiver section are :- Intermediate Frequency Transformer Clipper Phase locked loop The IFT used in this section is of the same type as that of that transmitter. The frequency range is between 100 – 300 KHz as that used in radios. The IFT is externally tuned to the same value as that of the transmitter so that only signals of tuned value enters into the receiver circuit. The signal is sent to a simple diode clipper which clips off it to a value of about 0.7 V. Two diodes IN 4148 are connected back to back so that clipping is done at both positive and negative levels. This clipped signal is then given us an input signal of PLL which is a closed loop feedback system. Its function is to lock the output frequency and phase to the frequency and face of an input signal and it acts as a tone detector. The output of PLL is low whenever it goes into ‘lock’ state. This low state will open circuit a transistor whereby a pulse of +8 V is obtained as its output. Receiver DISPLAY
  • 7. 101seminartopics.com p.supply 7 Seg.Decoder 12-bit Ripple IFT PLL Buffer counter 230V,AC 50HZ LINE The pulses due to the locking of PLL is of +8 V but micro controller requires only +5 V. For this purpose an opto coupler is used which acts as an isolator circuit between receiver and micro controller. COUNTER CUM DISPLAY SECTION: The energy meter disc rotates faster or slower depending on the amount of electrical energy being consumed. Whenever a carrier signal is detected at the receiver, a pulse is passed on to a counter. It counts six pulses and gives an output for every unit consumed. The output of this counter is fed to a decimal counter cum display unit. Four numbers of IC 4033 decade counters are connected in cascade to count as well as to drive the four digit seven segment LED display. The display enable pin 3 of this IC is tied to Vcc. A reset push button is provided to reset the decade counters and thereby the display. In IC4026 the carryout pin 5 is connected to clock input pin 1 of the next stage for cascading. GND 47K IC 1 3 FROM IC4093 4040 7 2 IC4081 4 SEVEN SEGMENT DISPLAY RECEIVER CP 6 .1µF During power out the last reading of the display can be retained in the decade counters by providing a 3 V battery backup through a diode to the Vdd pin. PROCESSING SECTION: This section being the final and the most important part, performs all necessary manipulation and processing work. This processing work is done by
  • 8. 101seminartopics.com micro controller, which performs the final identification and indication by connecting an alarm. The use of micro controller resulted in a giant leap in the processing field. Our paper takes up the help of the micro controller to obtain quick, swift and accurate responses. The entire processing work is done by micro controller, which performs the final identification and indication . THE NEED FOR MICRO CONTROLLER: The necessity of using micro controller arise from the fact that, for a product design which requires only a simple system, the use of microprocessor is undesirable. The micro controller identifies all the function needed to make up a simple microprocessor system and puts as many as possible in a single IC. The micro controller used in this project is AT 8951, which is a 40 pin dip IC. It helps in scanning, debouncing, matrix decoding and serial transmission circuits etc. IC 89c51 is second generation 8-bit micro controller. Parallel counting of energy meter reading and simultaneous comparison of these readings are performed by the IC. The use of microcontroller has made the entire system more effective and accurate. AN OVERVIEW OF 89c51: The microcontroller 89c51 is a 40 pin dip IC  EPROM It includes EPROM of 4 kilobytes. This space is for storing codes. It can be programmed electrically. All instruction fetches are taken from the program memory space.  RAM of 128 bytes The data memory space is read-write memory space. The processor can read data from memory space and can write into it. All variables and their values are stored in this memory.  Input output ports The I/O ports of 8951 are full duplex serial in nature which carries 8 bit information to and fro simultaneously. It consists of four ports P0, P1, P2 and P3, which are used for different purposes. An external memory is connected to IC 8951 addressed by port 0 and 2. Port 0 is used to exchange data with this
  • 9. 101seminartopics.com memory with the help of multiplexed address data bus. Port 3 is used to perform external data memory WRITE and READ functions. The entire programming in the controller is looked after by the instruction set. The IC 8951 instruction set has 50 instructions, which can be summarized as data transfer instructions, multiplication, division, call, jump etc. Comparing the instruction set of a general purpose 8-bit microprocessor, it’s obvious that in some ways it has more power or in other words the micro controller has some real imitations. The major demerit is the availability of limited stack which can be extended by connecting external memory to it. Power saving modes: It is designed when static logic for operation down to zero frequency and supports two software selectable power saving modes,  IDLE mode stops the CPU while allowing the RAM, the timer/counter, serial port and Interrupt system to continue functioning.  POWER DOWN mode saves the RAM contents but freezes the oscillator, disabling all other functions until the next hardware reset. PIN DIAGRAM OF IC 89C51:
  • 10. 101seminartopics.com PORT 1 & 3 (1-8,10-17) A 8-BIT BI-DIRECTIONAL I/O PORT WITH INTERNAL PULL-UPS. IT RECEIVES LOWER ORDER ADDRESS BYTES DURING FLASH PROGRAMMING. PORT O (32-39) A 8-BIT BI-DIRECTIONAL I/O PORT. IT IS CONFIGURED TO BE THE MULTIPLEXED LOW ORDER ADDRESS/DATA BUS DURING ACCESSES TO EXTERNAL PROGRAM AND DATA MEMORY. PORT 2 (21-28) IT PERFORMS THE SAME FUNCTION AS THE PORT 1 INADDITION IT RECEIVES SOME CONTROL SIGNALS DURING FLASH PROGRAMMING AND OPERATION OF MICRO CONTROLLER: The different connections are shown in the design layout. The set value can be given through port P1 by means of DIP switches. The possible values can be set by it. The pulses from each energy meter after being received is given as input individually to pin 12 & 13 and 16 of port 3. The frequency of operation of the controller can be varied by choosing crystal of desired value. The ceramic crystal is connected across 18th and 19th pin of the IC 8951. High frequency of about 8 MHz is chosen. Power theft identification is done by means of an alarm, which is connected to the 39th pin of IC. Once the alarm is set on, the resetting of the controller can be done by connecting a push button to pin 9. It can be noted that the other pins of the ICs are unused and hence no connection are given to them. As the program written occupies space less than is 4 kbytes, no external memory is used hence 31st pin is made high. The program is written and is down loaded to the IC 8751 by means of PC. The program is written so as to assign the function of each pin.
  • 11. 101seminartopics.com Also it initials continuous counting of units and simultaneous comparison. If error is predicted the buzzer is made to give alarm signal. SOFTWARE DESCRIPTION FOR IC 89C51: The program for 89c51 is shown in this section. We present it in the form of several blocks to make it more clear and easily readable.
  • 12. 101seminartopics.com INITIALISING THE PARAMETERS CHECKING THE SEVENTH CONDITION 0016 75DOE7 MOV PSW,#0E7H 0079 7C24 CK.FOR.7 0019 7581FS MOV SO,#SFH 007B 020086 MOV KEY.SET.REG,#036D 001C 758000 MOV P0,#00H 007E BC0705 JMP CHECK.DIFF 001F 7590FF MOV P1,$OFFH 0081 7C2A CJNE KEY.SET.REG,#007H,CHE 0022 75A000 MOV P2,#00H 0025 75B0FF MOV P3,#00FH INITIALISING THE PULSE REGISTERS CHECK DIFFERENCE FOLLOWED BY ALARM 0083 020086 CK.DIFF 0028 7800 MOV PULSE.1.REG,#00H 0086 MOV KEY.SET.REG,#420 002A 7900 MOV PULSE.2.REG,#00H 0086 EB JMP CHECK.DIFF 002C 7A00 MOV PULSE.3.REG,#00H 0087 C3 MOV R,RES.REG 002E D288 SETB IT0 0088 9C CLR C 0030 D28A SETB IT1 0089 5110 SUBB AMKEY.SET.REG 008B 8BAO JNC SET.ALARM EXECUTION OF CHECKING CONDITON (CHECKING FIRST CONDITION) 0047 98 SUBB A,PULSE.1.REG FREQUENT LOOPING OF AN ALARM CKT 0048 FB MOV RES.REG,A 0049 E590 MOV A,P1PULSE.1.REG 008D 80AF MOV P2,RES.REG 004B 54OF ANL A,#00001111B 008F JMP X1 004D FC MOV KEY.SET.REG,A 008F C2A8 CLR EXO 004E BC0105 CJNE KEY.SET.REG,#001H,CHE 0091 08 INC PULSE.1.REG 0092 D2A8 SETB EXO 0094 32 RET1 0095 C2AA EXECUTION OF SECOND CHECKING 0097 D2 INC CONDITON 0098 AA SETB 0051 7C06 CK.FOR.2 009A RETI 0053 020086 MOV KEY.SET.REG,#006H 0056 JMP CHECK.DIFF 0056 BC0205CJNE KEY.SET.REG,#002H,CHE
  • 13. 101seminartopics.com EXECUTION OF THIRD CHECKING CONDITION OPCODE TO DIRECT AN ALARM 0059 7COC CH.FOR.3 009B 8BAO MOV P2,RES.REG 005B 020086 MOV KEY.SET.REG,#012 009D D280 SETB ALARM.PIN 005E CHECK.DIFF 009F C2A8 CLR EX0 005E BC0305 CJNE KEY.SET.REG,#003H,CHE 00A1 C2AA CLR EX1 00A3 80F6 JMP SET.ALARM The execution of first three and last conditions are shown here. Other conditions are executed in a similar way. The process will be executed and the µ c enables simple, cost effective ,accurate and much more reliable system. It’s high frequency enables all the pulses without missing any. MONITORING MEASURES:  The display need not be kept always on, and can be powered up using a push switch whenever required to note down the reading.  Protection against high voltage on the transmitter or receiver is possible by the usage of special high voltage suppressers like gas discharge tubes provided with a coupling point with fuses to disconnect the respective transmitter or receiver.  Distance coverage is an important limitation which can be overcome by providing the repeaters at regular intervals when applied in a large scale.  The display need not be kept always on, and can be powered up using a push switch whenever required to note down the reading.  Effects of PF improvement capacitors on the line and distribution transformers may interfere with the message signal or the effect of atmospheric noises is to be analyzed before implementing in a large scale. MERITS: Due to the availability of digital energy meter, this implementation can be easily performed for power theft identification. Highly accurate, low loss and economical one.
  • 14. 101seminartopics.com Our implementation may gives a big hand to vigilance squad to control theft quickly and easily Using this same logic, instead of micro controller we can adapt computer for more number of uses In day-to-day conventional methods, it’s possible to identify the theft but the extent of theft cannot be identified but it’s possible with our Check meter and remote meter readers. Compact size, Reliability, lightweight for quick operation and high accuracy makes the system more effective. Maintenance – holds more value than construction. In our case, cost is very less, it involves the planned serving of equipment at regular interval. Emergency maintenance is the case when the maintenance crew due to repair of any sections can be succeeded by, A rational spare parts policy. A maintenance staff of highly skilled, highly trained personnel. CONCLUDING LINES: “When you don’t have a thing to worry about, those signs of age will stay away. It’s just dumping obsolete technology with no peace of mind” This paper is designed for industrial purpose, but it can be extended to domestic purposes also. It gives a big hand to vigilance squad to control theft quickly and easily. With its usage, the crime of stealing power may be brought to an end and thereby a new bloom may be expected in the economy of our motherland. The prime limitation of the system in the present form is the distance coverage. To overcome this when applied in a large scale, repeaters can be employed at suitable intervals. To certain extent the power level of the transmitter may be improved. Our paper not only indicates the place of power theft but also the amount of energy being stolen that is, it gives the best of the expected results. The use of this technique gives a new hope and accuracy for the satisfaction to complete the work.
  • 15. 101seminartopics.com TAMIL NADU ELECTRICITY BOARD Tirunelveli urban division Lt line loss study for the period form 5.2.2002 to 20.2.2002 SI.NO NAME OF THE NAME OF DIST. CONSUMPTION CONSUMPTION LOSS IN LOSS SECTION TRANSFORMER AT THE AT THE UNITS IN TRANSFORMER CONSUMER END END % 1. JUNCTION TAMILNADU 3116 UNITS 2975 UNITS 141 UNITS 4.5% HOTEL SS 2. MAHARAJANAGAR SAVAI ILLAM SS 4010 UNITS 3599 UNITS 411 UNITS 10.24 % 3. MELAPALAYAM KALIAMMANKOIL 8936 UNITS 8086 UNITS 850 UNITS 9.5% SS 4. PALAYAPETTAI ABISEKAPATTI 1840 UNITS 1538 UNITS 302 UNITS 16.41 63KVA % 5. PETTAI MALAYALAMEDU 11552 UNITS 9520 UNITS 2032 UNITS 17.5% 6. THACHANALLUR KATTUDIYAR 291 UNITS 5942 UNITS METER KUDIRUPPU DEFECT 7. V.M.CHATRAM TNHB SS V100 4583 UNITS 4450 UNITS 133 UNITS 2.9% 8. SAMATHANAPURAM MADIKONDU SS 6841 UNITS 6674 UNITS 167 UNITS 2.44% 100 KVA 9. VANNARPETTAI MURUGANKURICHI 8678 UNITS 8402 UNITS 271 UNITS 3.12% 33 III 100KVA
  • 16. 101seminartopics.com ` TRANSFORMER LOSS FOR DT’s: LOSS IN DT’s=(TOTAL COPPER LOSS+TOTAL IRON LOSS)/1000 STATEMENT SHOWING THE TRANSFORMER LOSS FOR VARIOUS OF DISTRIBUTION TRANSFORMERS DISTRIBUTION MAX. IRON MAX. COPPER SI.NO TRANSFORMER LOSS(WATTS) LOSS(WATTS) 1. 63KVA/11KV 180 1235 2. 63KVA/22KV 210 1300 3. 100KVA/11KV 260 1760