SlideShare una empresa de Scribd logo
1 de 25
1
POWER THEFT
DETECTION
Presented By : Aravind Shaji
Roll N0 : 03
Reg No : 13035127
EEE - E5 ,GPTC Nattakom
INTRODUCTION
2
India, the largest democracy with an
estimated population of about 1.04 billion, is
on a road to rapid growth in economy.
Energy, particularly electricity, is a key input
for accelerating economic growth.
The theft of electricity is a criminal offence
and power utilities are losing billions of
rupees in this account.
The following sections will describe the
proposed detection and control system for
illegal electricity usage using the power lines.
WHAT IS POWER THEFT….???
.
• It is the use of electrical power without a contract with a
supplier with total or partial bypassing metering system, or
• Interfering this system in the way to adulterate its
measurements.
.
• Power theft includes *Direct hooking from line
*Bypassing the energy meter *Injecting foreign element
into the energy meter *Physical obstruction etc..
.
• World loses US$89.3 billion annually to electricity theft. The
highest losses were in India ($16.2 billion), followed
by Brazil ($10.5 billion) and Russia ($5.1 billion).
3
THEFT OCCURS WHEN:
 An illegal consumer(not a registered customer) steals
directly from the distribution lines or from another legal
customer.
 A legal customer(registered customer) steals either
bypassing the meter (connecting around the meter to a live
cable on the company side of the meter) or tampering with the
meter to make it read less or no consumption.
 There is a collusion between the customer and a
company employee to reduce the amount paid to the
company (with lower side payments to the employee in
return).
4
POWER THEFT METHODS
 Meters:
• Tampering with meters and seals
• By-passing the meters
• Damaging or removing meters
 Wires/ Cables:
• Illegal tapping to bare wires or underground cables
 Transformers:
• Illegal terminal taps of overhead lines on the low side of the
transformer
 Billing irregularities made by meter readers.
 Unpaid bills by individuals, government institutions and “untouchable”
VIPs.
5
FEW OTHER WAYS OF POWER THEFT
Use of single phase supply from three phase supply.
Disconnected neutral from both the ends.
Used earth/separate neutral for return circuit.
Connecting phase voltage to neutral of used single phase
supply. Potential difference w.r.t. neutral of used single
phase supply is zero. Hence power product of voltage and
current, will be zero.
Isolating neutral from both ends.
6
.
7
 HOW CAN ELECTRICITY THEFT BE REDUCED
NON TECHNICAL SOLUTIONS
 Financial rewards:
Utility companies encourage consumers to report electricity theft
‡
 Periodic checks:
Electricity theft frequently takes place after service has been
disconnected. Some utility companies periodically check
disconnected meters if the customer has not contacted them to
reconnect service.
 Enforcement of law:
Fines should be imposed by the government for stealing electricity.
TECHNICAL SOLUTIONS
Electronic tamper detection meter
Pre payment meters
Plastic meter encasements
Anti theft cable
Using GSM
Using PLCs
9
Plastic Meter Encasements
Hard plastic encasements are a
type of a meter seal. These
transparent plastic covers serve as a
warning and therefore reduce
electricity theft.
10
Pre-Payment Meters
 Credit added to the meter on a
keypad.
 Credit is purchased on a
rechargeable token or a card and
entered into the meter with
disconnection ability
 It help in the reduction of non
paid bills and meter reading
iregularities
11
Electronic Tamper Detection Meters
 High performance Electronic Tamper
Detection Meter reference design that integrates an ultra low-
power tilt sensor used for electronic tamper detection.
Automatic detection of :
Meter tamper
Meter Bypass
Meter disconnection
12
13
Programmable Logic Controller(PLC)
PLC Presents an interesting and economical solution for
automatic meter reading (AMR).
If an AMR system via PLC is set in a power delivery
system, a detection system for illegal electricity usage
may be easily added in the existing PLC network.
 In the detection system, the second digitally energy
meter chip is used and the value of energy is stored. The
recorded energy is compared with the value at the main
kilowatt-hour meter.
 In the case of difference between two recorded energy
data, in error signal is generated and transmitted via PLC
network.
14
Programming of PLC
Early PLC’s were
programmed by
using specific
purpose programming
terminals.
Recently PLC’s are
programmed
using application
software's on personal
computers.
15
INSTALLTION OF PLC
Power meters with PLC modules will be installed near the
top of the power polls.
Meters installed in high places will send data of the used
amount to each household through power lines.
Homeowners can then check the amount used on the
displays installed in each house.
This means that the measurement function and the display
function of the meters will be separated.
Power theft is prevented by installing HD-PLC-mounted
power meters on a high position on power polls, while the
amount of power used in each household can still be
checked. 16
Modern PLC’s
17
DEFINITION ON AMR
 AMR(AUTOMATIC METER READING) automates the
process of measurement through digital communication
techniques.
18
.
 Automatic meter reading, or AMR, is the technology of
automatically collecting consumption, diagnostic, and
status data from energy metering devices or water meter
(gas, electric) and transferring that data to a central
database for billing, troubleshooting, and analyzing.
 This technology mainly saves utility providers the expense
of periodic trips to each physical location to read a meter.
 Billing can be based on near real-time consumption rather
than on estimates based on past or predicted
consumption.
 AMR technologies include handheld, mobile and network
technologies based on telephony platforms (wired and
wireless), radio frequency (RF), or powerline transmission.
19
FUNCTONS OF AMR SYSTEM
Every user has two PLC modems; one is for AMR
and the other is used to send the data from second
energy meter chip to host PLC modem.
An energy meter must be connected in the
connection box between a home line and main
power lines.
The host PLC unit must be placed in the
distribution transformer and the configuration of
the addressing format of PLC signaling must be
designed carefully.
20
GSM BASED AUTOMATIC METER READING
21
GSM MODEM
22
CONCLUSION
 By using techniques above the crime of stealing power
may be brought to an end and thereby a new bloom
may be expected in the economy of ourmotherland and
also there will be less scarcity for power utilisation
23
24
25

Más contenido relacionado

La actualidad más candente

Wireless Charging of Electric Vehicles
Wireless Charging of Electric VehiclesWireless Charging of Electric Vehicles
Wireless Charging of Electric Vehicles
Pritam Kumar Singh
 
Power theft detection via plc
Power theft detection via plcPower theft detection via plc
Power theft detection via plc
bbshashanka
 
Fault detection using iot PRESENTATION
Fault detection using iot PRESENTATIONFault detection using iot PRESENTATION
Fault detection using iot PRESENTATION
AnjanKumarHanumantha
 

La actualidad más candente (20)

Smart grid ppt
Smart grid pptSmart grid ppt
Smart grid ppt
 
Power theft detection
Power theft detectionPower theft detection
Power theft detection
 
Wireless Charging of Electric Vehicles
Wireless Charging of Electric VehiclesWireless Charging of Electric Vehicles
Wireless Charging of Electric Vehicles
 
Liquid electricity
Liquid electricityLiquid electricity
Liquid electricity
 
Smart energy meter ppt
Smart energy meter   pptSmart energy meter   ppt
Smart energy meter ppt
 
Speed control of dc motor using chopper
Speed control of dc motor using chopperSpeed control of dc motor using chopper
Speed control of dc motor using chopper
 
Wireless electricity
Wireless electricityWireless electricity
Wireless electricity
 
Automatic meter reading
Automatic meter readingAutomatic meter reading
Automatic meter reading
 
Solar based wireless charging of electric vehicle
Solar based wireless charging of electric vehicleSolar based wireless charging of electric vehicle
Solar based wireless charging of electric vehicle
 
Power theft detection via plc
Power theft detection via plcPower theft detection via plc
Power theft detection via plc
 
SMART METER ppt
SMART METER pptSMART METER ppt
SMART METER ppt
 
Electrical Projects
Electrical ProjectsElectrical Projects
Electrical Projects
 
SOLAR MOBILE CHARGER
SOLAR MOBILE CHARGERSOLAR MOBILE CHARGER
SOLAR MOBILE CHARGER
 
wireless electricity seminar report
wireless electricity seminar reportwireless electricity seminar report
wireless electricity seminar report
 
Latest Electrical Mini Projects For EEE Students
Latest Electrical Mini Projects For EEE StudentsLatest Electrical Mini Projects For EEE Students
Latest Electrical Mini Projects For EEE Students
 
Speed control of Three phase Induction motor using AC voltage regulator
Speed control of Three phase Induction motor using AC voltage regulatorSpeed control of Three phase Induction motor using AC voltage regulator
Speed control of Three phase Induction motor using AC voltage regulator
 
bio battery ppt
bio battery pptbio battery ppt
bio battery ppt
 
Ppt power theft identification and detection using gsm
Ppt power theft identification and detection using gsmPpt power theft identification and detection using gsm
Ppt power theft identification and detection using gsm
 
Smart metering-system
Smart metering-systemSmart metering-system
Smart metering-system
 
Fault detection using iot PRESENTATION
Fault detection using iot PRESENTATIONFault detection using iot PRESENTATION
Fault detection using iot PRESENTATION
 

Destacado

Electricity theft (1)
Electricity theft (1)Electricity theft (1)
Electricity theft (1)
sharique_64
 
Wireless power theft monitoring
Wireless power theft monitoringWireless power theft monitoring
Wireless power theft monitoring
Biswajit Pratihari
 
Micro controller-based-power-theft-identification
Micro controller-based-power-theft-identificationMicro controller-based-power-theft-identification
Micro controller-based-power-theft-identification
ranjeet1990
 
Intelligent Electric Power Management Using Zigbee with Advanced Metering Inf...
Intelligent Electric Power Management Using Zigbee with Advanced Metering Inf...Intelligent Electric Power Management Using Zigbee with Advanced Metering Inf...
Intelligent Electric Power Management Using Zigbee with Advanced Metering Inf...
Akbar Badusha
 
document of prepaid energy meter using gsm
document of prepaid energy meter using gsmdocument of prepaid energy meter using gsm
document of prepaid energy meter using gsm
udaypallyreddy
 
Digital jewellery ppt
Digital jewellery pptDigital jewellery ppt
Digital jewellery ppt
Nida Khan
 
Foot step power generator
Foot step power generatorFoot step power generator
Foot step power generator
Deepa Rani
 
prepaid energy meter using gsm
prepaid energy meter using gsm prepaid energy meter using gsm
prepaid energy meter using gsm
udaypallyreddy
 
Tampering-Methods
Tampering-MethodsTampering-Methods
Tampering-Methods
Hasan baig
 
A Solution to remote detection of illegal electricity
A Solution to remote detection of illegal electricityA Solution to remote detection of illegal electricity
A Solution to remote detection of illegal electricity
Ahmed Aslam
 
A solution to remote detection of illegal electricity.
A solution to remote detection of illegal electricity.A solution to remote detection of illegal electricity.
A solution to remote detection of illegal electricity.
Praveen Kumar
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
shilpi nagpal
 

Destacado (20)

Electricity theft (1)
Electricity theft (1)Electricity theft (1)
Electricity theft (1)
 
Wireless power-theft-monitering-ppt
Wireless power-theft-monitering-pptWireless power-theft-monitering-ppt
Wireless power-theft-monitering-ppt
 
Wireless power theft monitoring
Wireless power theft monitoringWireless power theft monitoring
Wireless power theft monitoring
 
Power theft
Power theftPower theft
Power theft
 
Micro controller-based-power-theft-identification
Micro controller-based-power-theft-identificationMicro controller-based-power-theft-identification
Micro controller-based-power-theft-identification
 
energy theft detection
energy theft detectionenergy theft detection
energy theft detection
 
GSM BASED PREPAID ENERGY METER BILLING VIA SMS
GSM BASED PREPAID ENERGY METER BILLING VIA SMSGSM BASED PREPAID ENERGY METER BILLING VIA SMS
GSM BASED PREPAID ENERGY METER BILLING VIA SMS
 
Major project presentation
Major project presentationMajor project presentation
Major project presentation
 
Intelligent Electric Power Management Using Zigbee with Advanced Metering Inf...
Intelligent Electric Power Management Using Zigbee with Advanced Metering Inf...Intelligent Electric Power Management Using Zigbee with Advanced Metering Inf...
Intelligent Electric Power Management Using Zigbee with Advanced Metering Inf...
 
document of prepaid energy meter using gsm
document of prepaid energy meter using gsmdocument of prepaid energy meter using gsm
document of prepaid energy meter using gsm
 
Digital jewellery ppt
Digital jewellery pptDigital jewellery ppt
Digital jewellery ppt
 
Foot step power generator
Foot step power generatorFoot step power generator
Foot step power generator
 
prepaid energy meter using gsm
prepaid energy meter using gsm prepaid energy meter using gsm
prepaid energy meter using gsm
 
Tampering-Methods
Tampering-MethodsTampering-Methods
Tampering-Methods
 
Tech seminar
Tech seminarTech seminar
Tech seminar
 
Costly Throw Ups: Electricity Theft and Power Disruptions
Costly Throw Ups: Electricity Theft and Power DisruptionsCostly Throw Ups: Electricity Theft and Power Disruptions
Costly Throw Ups: Electricity Theft and Power Disruptions
 
A Solution to remote detection of illegal electricity
A Solution to remote detection of illegal electricityA Solution to remote detection of illegal electricity
A Solution to remote detection of illegal electricity
 
Eee ppt
Eee pptEee ppt
Eee ppt
 
A solution to remote detection of illegal electricity.
A solution to remote detection of illegal electricity.A solution to remote detection of illegal electricity.
A solution to remote detection of illegal electricity.
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 

Similar a Power theft detection

Powerlinecommunicatin ppt
Powerlinecommunicatin pptPowerlinecommunicatin ppt
Powerlinecommunicatin ppt
bsmoni
 
GSM Based Prepaid Remote Energy Meter & OverVoltage Protection
GSM Based Prepaid Remote Energy Meter & OverVoltage ProtectionGSM Based Prepaid Remote Energy Meter & OverVoltage Protection
GSM Based Prepaid Remote Energy Meter & OverVoltage Protection
Pringil Alphanso
 
eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)
IISRT
 

Similar a Power theft detection (20)

Sritish-powertheftdetection.ppt.pptx
Sritish-powertheftdetection.ppt.pptxSritish-powertheftdetection.ppt.pptx
Sritish-powertheftdetection.ppt.pptx
 
TECHNICAL SEMINAR 1CR19EE017.ppt
TECHNICAL SEMINAR 1CR19EE017.pptTECHNICAL SEMINAR 1CR19EE017.ppt
TECHNICAL SEMINAR 1CR19EE017.ppt
 
Rahul koundinya
Rahul koundinya Rahul koundinya
Rahul koundinya
 
Electricalelectricsl power theft detection
Electricalelectricsl power theft detectionElectricalelectricsl power theft detection
Electricalelectricsl power theft detection
 
Research paper amr
Research paper amrResearch paper amr
Research paper amr
 
POWER LINE COMMUNICATION
POWER LINE COMMUNICATIONPOWER LINE COMMUNICATION
POWER LINE COMMUNICATION
 
ELECTRICITY THEFT
ELECTRICITY THEFTELECTRICITY THEFT
ELECTRICITY THEFT
 
Powerlinecommunicatin ppt
Powerlinecommunicatin pptPowerlinecommunicatin ppt
Powerlinecommunicatin ppt
 
An application of Power Line Communication
An application of Power Line CommunicationAn application of Power Line Communication
An application of Power Line Communication
 
Yochi
YochiYochi
Yochi
 
GSM Based Prepaid Remote Energy Meter & OverVoltage Protection
GSM Based Prepaid Remote Energy Meter & OverVoltage ProtectionGSM Based Prepaid Remote Energy Meter & OverVoltage Protection
GSM Based Prepaid Remote Energy Meter & OverVoltage Protection
 
IRJET- Overloading Detection in Residentional Area
IRJET- Overloading Detection in Residentional AreaIRJET- Overloading Detection in Residentional Area
IRJET- Overloading Detection in Residentional Area
 
DISTRIBUTED TRANSFORMER ENERGY METER USING GSM TECHNOLOGY
DISTRIBUTED TRANSFORMER ENERGY METER USING GSM TECHNOLOGYDISTRIBUTED TRANSFORMER ENERGY METER USING GSM TECHNOLOGY
DISTRIBUTED TRANSFORMER ENERGY METER USING GSM TECHNOLOGY
 
IRJET- Advanced Metering Infrastructure Tripping System
IRJET-  	  Advanced Metering Infrastructure Tripping SystemIRJET-  	  Advanced Metering Infrastructure Tripping System
IRJET- Advanced Metering Infrastructure Tripping System
 
eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)
 
Automatic energy meter reading
Automatic energy meter readingAutomatic energy meter reading
Automatic energy meter reading
 
Energy meter
Energy meterEnergy meter
Energy meter
 
IRJET- Electricity Theft Monitoring and its Consumption Savings
IRJET- Electricity Theft Monitoring and its Consumption SavingsIRJET- Electricity Theft Monitoring and its Consumption Savings
IRJET- Electricity Theft Monitoring and its Consumption Savings
 
Proposal power-theft-detection
Proposal power-theft-detectionProposal power-theft-detection
Proposal power-theft-detection
 
Electricity Theft: Reason and Solution
Electricity Theft: Reason and SolutionElectricity Theft: Reason and Solution
Electricity Theft: Reason and Solution
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

Power theft detection

  • 1. 1 POWER THEFT DETECTION Presented By : Aravind Shaji Roll N0 : 03 Reg No : 13035127 EEE - E5 ,GPTC Nattakom
  • 2. INTRODUCTION 2 India, the largest democracy with an estimated population of about 1.04 billion, is on a road to rapid growth in economy. Energy, particularly electricity, is a key input for accelerating economic growth. The theft of electricity is a criminal offence and power utilities are losing billions of rupees in this account. The following sections will describe the proposed detection and control system for illegal electricity usage using the power lines.
  • 3. WHAT IS POWER THEFT….??? . • It is the use of electrical power without a contract with a supplier with total or partial bypassing metering system, or • Interfering this system in the way to adulterate its measurements. . • Power theft includes *Direct hooking from line *Bypassing the energy meter *Injecting foreign element into the energy meter *Physical obstruction etc.. . • World loses US$89.3 billion annually to electricity theft. The highest losses were in India ($16.2 billion), followed by Brazil ($10.5 billion) and Russia ($5.1 billion). 3
  • 4. THEFT OCCURS WHEN:  An illegal consumer(not a registered customer) steals directly from the distribution lines or from another legal customer.  A legal customer(registered customer) steals either bypassing the meter (connecting around the meter to a live cable on the company side of the meter) or tampering with the meter to make it read less or no consumption.  There is a collusion between the customer and a company employee to reduce the amount paid to the company (with lower side payments to the employee in return). 4
  • 5. POWER THEFT METHODS  Meters: • Tampering with meters and seals • By-passing the meters • Damaging or removing meters  Wires/ Cables: • Illegal tapping to bare wires or underground cables  Transformers: • Illegal terminal taps of overhead lines on the low side of the transformer  Billing irregularities made by meter readers.  Unpaid bills by individuals, government institutions and “untouchable” VIPs. 5
  • 6. FEW OTHER WAYS OF POWER THEFT Use of single phase supply from three phase supply. Disconnected neutral from both the ends. Used earth/separate neutral for return circuit. Connecting phase voltage to neutral of used single phase supply. Potential difference w.r.t. neutral of used single phase supply is zero. Hence power product of voltage and current, will be zero. Isolating neutral from both ends. 6
  • 7. . 7
  • 8.  HOW CAN ELECTRICITY THEFT BE REDUCED NON TECHNICAL SOLUTIONS  Financial rewards: Utility companies encourage consumers to report electricity theft ‡  Periodic checks: Electricity theft frequently takes place after service has been disconnected. Some utility companies periodically check disconnected meters if the customer has not contacted them to reconnect service.  Enforcement of law: Fines should be imposed by the government for stealing electricity.
  • 9. TECHNICAL SOLUTIONS Electronic tamper detection meter Pre payment meters Plastic meter encasements Anti theft cable Using GSM Using PLCs 9
  • 10. Plastic Meter Encasements Hard plastic encasements are a type of a meter seal. These transparent plastic covers serve as a warning and therefore reduce electricity theft. 10
  • 11. Pre-Payment Meters  Credit added to the meter on a keypad.  Credit is purchased on a rechargeable token or a card and entered into the meter with disconnection ability  It help in the reduction of non paid bills and meter reading iregularities 11
  • 12. Electronic Tamper Detection Meters  High performance Electronic Tamper Detection Meter reference design that integrates an ultra low- power tilt sensor used for electronic tamper detection. Automatic detection of : Meter tamper Meter Bypass Meter disconnection 12
  • 13. 13
  • 14. Programmable Logic Controller(PLC) PLC Presents an interesting and economical solution for automatic meter reading (AMR). If an AMR system via PLC is set in a power delivery system, a detection system for illegal electricity usage may be easily added in the existing PLC network.  In the detection system, the second digitally energy meter chip is used and the value of energy is stored. The recorded energy is compared with the value at the main kilowatt-hour meter.  In the case of difference between two recorded energy data, in error signal is generated and transmitted via PLC network. 14
  • 15. Programming of PLC Early PLC’s were programmed by using specific purpose programming terminals. Recently PLC’s are programmed using application software's on personal computers. 15
  • 16. INSTALLTION OF PLC Power meters with PLC modules will be installed near the top of the power polls. Meters installed in high places will send data of the used amount to each household through power lines. Homeowners can then check the amount used on the displays installed in each house. This means that the measurement function and the display function of the meters will be separated. Power theft is prevented by installing HD-PLC-mounted power meters on a high position on power polls, while the amount of power used in each household can still be checked. 16
  • 18. DEFINITION ON AMR  AMR(AUTOMATIC METER READING) automates the process of measurement through digital communication techniques. 18
  • 19. .  Automatic meter reading, or AMR, is the technology of automatically collecting consumption, diagnostic, and status data from energy metering devices or water meter (gas, electric) and transferring that data to a central database for billing, troubleshooting, and analyzing.  This technology mainly saves utility providers the expense of periodic trips to each physical location to read a meter.  Billing can be based on near real-time consumption rather than on estimates based on past or predicted consumption.  AMR technologies include handheld, mobile and network technologies based on telephony platforms (wired and wireless), radio frequency (RF), or powerline transmission. 19
  • 20. FUNCTONS OF AMR SYSTEM Every user has two PLC modems; one is for AMR and the other is used to send the data from second energy meter chip to host PLC modem. An energy meter must be connected in the connection box between a home line and main power lines. The host PLC unit must be placed in the distribution transformer and the configuration of the addressing format of PLC signaling must be designed carefully. 20
  • 21. GSM BASED AUTOMATIC METER READING 21
  • 23. CONCLUSION  By using techniques above the crime of stealing power may be brought to an end and thereby a new bloom may be expected in the economy of ourmotherland and also there will be less scarcity for power utilisation 23
  • 24. 24
  • 25. 25