SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 07 | July-2015, Available @ http://www.ijret.org 72
ELECTRICITY THEFT DETECTION AND LOCALISATION IN
UNKNOWN RADIAL LOW VOLTAGE NETWORK
Heman Shamachurn1
, Perenjordee Poollay Auroomoogum2
1
Lecturer, Electrical and Electronic Engineering, University of Mauritius, Reduit, Mauritius
2
Undergraduate Student, Electrical and Electronic Engineering, University of Mauritius, Reduit, Mauritius
Abstract
The distribution of electricity involves both technical and non-technical losses. One major cause of non-technical loss is the
illegal abstraction of electricity which is also known as ‘Electricity Theft’. The illegal usage of electricity has many associated
problems, both for utilities and consumers of electricity, implying that there is a pressing need for theft detection and localisation.
Traditional methods of identifying illegal electricity consumers are time consuming and ineffective as measurements have to be
performed at a large number of suspected locations. Smart metering in future electricity networks will lead to a more efficient
automated system for the detection and localisation of electricity theft. This will enable immediate action to be taken by
distribution network operators against the offenders and will help to improve the quality, reliability and security of electricity
supply systems. The aim of this study was to analyse the performance of an electricity theft detection and localisation technique in
an unknown grid. The method assumed the availability of measured voltages, currents, and powers from installed smart meters.
The detection step was a power comparison process and the localisation step was a voltage comparison process. The
investigation involved analysis in the presence of single and simultaneous multiple thefts. To better represent future networks with
increasing penetration of renewable energy generators, distributed generation was added to the system and the capability of the
detection and localisation technique was further explored. All the simulations were performed in Matlab/Simulink. It was found
that the method performed satisfactorily, with a minimum stolen power of 450 W successfully detected and localised.
Keywords: Electricity Theft, Smart Meters, Double Feeding, Low Voltage Radial Network, Matlab/Simulink
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Significant operational losses are involved in the generation,
transmission and distribution of electricity. The losses can
be classified as technical and non-technical. The technical
losses are associated with the components of the power
system and the non-technical losses (NTL) are associated
with external factors which do not directly involve the
power system. In some countries the illegal abstraction of
electricity takes a major proportion of the NTL. For
instance, 1200 GWh of electrical energy is illegally
consumed from the distribution grid each year in the
Netherlands, representing about 1% of the annual electricity
generation [1]. Electricity theft is a main concern for
utilities as the percentage of theft might be small overall, but
the associated financial loss is significant [2].
Several methods are employed to steal electricity including
tampering with the energy meter, bypassing the meter
through double feeding and evading bill payments.
Electricity theft can overload generator units as distribution
network operators (DNOs) cannot forecast the illegal
consumption, and if significant, the electricity supply can be
interrupted due to demand-supply mismatch. Moreover, the
stolen electricity increases grid losses and represents huge
monetary losses both for the DNOs and the Government.
Losses are eventually reflected in the price of electricity,
which implies that genuine customers have a pay a higher
electricity price because of illegal consumers [3].
Currently, tampering attempts are mostly detected by
measurements of electrical parameters in suspected
locations followed by an analysis of the acquired data. The
whole process is time consuming and ineffective, especially
in densely populated areas where there are many houses
very close together and many branches in the distribution
network. Smart meters and state of the art measurement
systems in the future grid will make electricity theft harder
[4]. The installed secure meters at the consumers’ premises
and in the substations will enable automated, fast and
successful electricity theft detection and localisation while
preventing tampering with the meter itself.
2. METHOD DESCRIPTION
2.1 Investigated Network Configuration
A three-phase, four-wire radial distribution system with a
TT earthing arrangement for residential customers was
considered. The model comprised a substation represented
by a 11 kV/ 400 V three-phase transformer and 35 single-
phase household loads as shown in Fig-1. The
corresponding parameters are provided in Table-1. The
distance between the substation and the first connected
house downstream was 100 m.
Each house was represented as a single-phase load
consuming both real and reactive powers. Each load was
modeled by voltage and power controlled current sources
[5]. The following assumptions were considered:
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 07 | July-2015, Available @ http://www.ijret.org 73
 Each house was connected to the network via a smart
meter which could record the RMS voltage, the RMS
current, the real and reactive power flows.
 The same measurement capabilities were present at
the substation.
 The active power consumption of each house had a
normal distribution with a mean and a variance of 1
kW.
 The reactive power consumption of each house had a
normal distribution with a mean of 0 VAr and a
variance of 200 VAr.
Fig-1: Simulated network
Electricity theft at a house was simulated by the connection
of an illegal load in parallel to the house, but bypassing the
smart meter as shown in Fig-2.
Fig-2: Illegal load connection
Table-1: Network parameters
Properties Value
Average length between houses 9 m
Cross section of feeder sections 150 mm2
Resistance of feeder 0.206 Ω/km
Inductance of feeder 0.318 mH/km
Length of connection cable between
house and feeder
5 m
Cross section of connection cables 10 mm2
Resistance of connection cable 1.83 Ω/km
Inductance of connection cable 0.402 mH/km
2.2 Electricity Theft Detection and Localization
During a given time step of the simulation, a probable
electricity pilfering attempt was identified by a large
difference between the total active power consumptions of
all customers and the total active power measured at the
substation, taking into account the technical losses
throughout the feeder.
If a theft was detected, the localisation process would
involve comparing the estimated grid voltage at each house
to the actual measured voltage.
The following assumptions were made:
 Order of each house on the feeder was known
 Cable impedances were unknown
 Phase of each house was unknown
The detection and localisation process is summarized in Fig-
3 [6].
Fig-3: Theft detection and localisation for unknown grid
The non linear load flow problem [6] can be approximated
by a linear model to obtain equation (1) where Vh,k is the
voltage at house h at time step k; Vk
0
is the voltage
magnitude at the distribution transformer for the
corresponding phase at time step k; Ph`,k is the active power
of house h` at time step k; Qh`,k is the reactive power of
house h` at time step k; ah,h` is the influence of the active
power of house h` on house h; bh,h` is the influence of the
reactive power of house h` on house h.
Vh,k = Vk
0
+ ah,h`Ph`,k + bh,h`Qh`,k
N
h`=1
N
h`=1
(1)
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 07 | July-2015, Available @ http://www.ijret.org 74
The influences ah,h` and bh,h` have to be determined by
solving a linear least squares problem. Considering the
technical losses, the influences are calculated for the time
steps without theft in order to identify the phase of each
house. After identifying the network, the voltage at each
house can be calculated by using equation (1). A large error
between the measured and the estimated voltages for a given
phase implies that a theft has been attempted on that phase.
Normally, for the theft location, the difference is
comparatively greater than other locations.
2.3 Simulations
Different cases were considered for the simulations as
follows:
Case 1: Without Theft
The model was simulated without any theft in the network
so as to compare the measured and expected voltage
profiles. The percentage voltage errors were calculated for
all the houses. The simulation was run for 1000 time steps
representing the different time frames during which data
was collected from the meters.
Case 2: Single Point of Theft on Feeder
An illegal load was connected at house 15, with the active
illegal power varied from 150 W to 3750 W in steps of 150
W for every 40 time steps starting at time step 0.
Case 3: Single Point of Theft on each Phase
Theft was simulated as shown in Table-2.
Table-2: Single point of theft on each phase
House
number
Phase Illegal active power
(kW)
Time steps of
theft
15 C 2 1 to 1000
16 A 1 401 to 1000
17 B 3 601 to 620
Case 4: Two Points of Theft on One Phase
Theft was simulated as shown in Table-3
Table-3: Two points of theft on one phase
House
number
Phase Illegal active power
(kW)
Time steps of
theft
16 A 2 1 to 1000
34 A 3 401 to 900
Case 5: Presence of Distributed Generator (DG) in
the Network
Several distributed generators were connected across the
network as per Table-4.
Table-4: DG connections
House number Phase DG active power (kW)
10 A 1
11 B 2
12 C 5
The effect of the generators on the voltage profiles were
initially analysed without theft. The algorithm was
subsequently tested for thefts of 2 kW and 3 kW at houses
10 and 17 respectively during all the time steps.
3. RESULTS AND DISCUSSIONS
3.1 Case 1: Without Theft
The maximum technical losses in the network was
determined from the power records of all meters and found
to be 3 % on each phase. This value was used as a
benchmark to detect illegal electricity consumption.
Moreover, the influences were determined for all the phases
to identify the houses on each of the three phases. Chart-1
shows the influence of active power of all houses on the
voltage magnitude of house 15. All the houses connected on
the same phase as house 15 can be identified and confirmed
from Fig-1. A similar plot was obtained for the influence of
reactive power.
Chart -1: Influence of active power of all houses on house
15
The percentage voltage errors obtained for all the houses
were very small (between 0 % and 0.008 %) and are
displayed in Chart-2. Expected and measured voltage
profiles for phase B at time step 500 are shown in Chart-3. It
can be observed that the voltage errors were very small.
Similar charts were obtained for the remaining two phases.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 07 | July-2015, Available @ http://www.ijret.org 75
Chart-2: Percentage voltage error for all houses at time step
500
Chart-3: Voltage profiles for phase B at time step 500
3.2 Case 2: Single Point of Theft on Feeder
Taking into account the 3 % technical losses, it was found
that the minimum stolen power detectable was 450 W based
on the increment of 150 W for every 40 time steps. The
voltage and percentage voltage error profiles for time step
81 are shown in Chart-4 and Chart-5 respectively.
Chart-4: Voltage profiles for phase C at time step 81
Chart-4 shows that a theft occurred on the system as the
measured and expected voltage profiles are no longer
superimposed on each other. Chart-5 depicts that the theft
occurred at house 15 as the corresponding percentage
voltage error is maximum. The same conclusions could be
drawn for profiles at time steps greater than 40, but with the
percentage voltage errors being higher due to increasing
stolen power at house 15.
3.3 Case 3: Single Point of Theft on Each Phase
The thefts at all the three houses were detected and located
successfully at the corresponding time steps. The charts used
for analysis were similar to Chart-4 and Chart-5.
Chart-5: Percentage voltage error profile for phase C at
time step 81
3.4 Case 4: Two Points of Theft on One Phase
The algorithm successfully detected and localised all points
of illegal abstraction as shown in Chart-6 and Chart-7.
Chart-6: Voltage profiles for phase A at time step 500
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 07 | July-2015, Available @ http://www.ijret.org 76
Chart-7: Percentage voltage error profile for phase A at
time step500
3.5 Case 5: Presence of DG in the Network
The voltage profiles in the absence of electricity theft for
phase C at time step 500 are shown in Chart-8. The peak at
house 12 is due to the relatively high power of 5 kW
injected into the network by the DG of the house. The
voltage errors can be observed to be very small.
Chart-8: Voltage profiles for phase C at time step 500
In the presence of electricity thefts, Chart-9 and Chart-11
clearly point out the presence of theft due to relatively large
errors between the measured and estimated voltages. Chart-
10 and Chart-12 show that the theft locations were
successfully identified.
Chart-9: Voltage profiles for phase A at time step 500
Chart-10: Percentage voltage error profile for phase A at
time step 500
Chart-11: Voltage profiles for phase B at time step 500
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 07 | July-2015, Available @ http://www.ijret.org 77
Chart-12: Percentage voltage error profile for phase B at
time step 500
4. CONCLUSION
Smart meters incorporating the tested algorithm will be
efficient in detecting single, multiple multi-phase and
multiple single-phase electricity thefts in a radial low
voltage network, both in the presence and in the absence of
distributed generators, even if the network design
parameters are unknown.
REFERENCES
[1] Frank Van Der Bergh, Petr Kadurek, Sjef Cobben,
and Wil Kling, "ELECTRICITY THEFT
LOCALIZATION BASED ON SMART
METERING," in 21st International Conference on
Electricity Distribution, Frankfurt, 2011, pp. 1-4.
[2] Thomas B Smith, "Electricity theft: a comparative
analysis," Energy Policy, vol. 32, no. 18, pp. 2067-
2076, August 2004.
[3] P. Kadurek, J. Blom, J. F.G. Cobben, and W. L.
Kling, "Theft detection and smart metering practices
and expectations in the Netherlands," in Proceedings
of the Innovative Smart Grid Technologies Europe
Conference, Gothenburg, 2010, pp. 1-6.
[4] R. Alves, P. Casanova, E. Quirogas, O. Ravelo, and
W. Gimenez, "Reduction of non-technical losses by
modernization and updating of measurement
systems," in 2006 IEEE/PES Transmission &
Distribution Conference & Exposition: Latin
America, Caracas, 2006, pp. 1-5.
[5] University of Texas at Austin - Center for
Electromechanics. (2011, September) Simulink
Smartgrid Simulation 1: The Basics. Video
(Youtube).
[6] Sam Weckx, Carlos Gonzalez, Jeroen Tant, Tom De
Rybel, and Johan Driesen, "Parameter identification
of unknown radial grids for theft detection," in
Innovative Smart Grid Technologies (ISGT Europe),
2012 3rd IEEE PES International Conference and
Exhibition on, Berlin, 2012, pp. 1-6.

Más contenido relacionado

La actualidad más candente

Ppt power theft identification and detection using gsm
Ppt power theft identification and detection using gsmPpt power theft identification and detection using gsm
Ppt power theft identification and detection using gsmradha krishna
 
Electricity theft control
Electricity theft controlElectricity theft control
Electricity theft controlAffable Mee
 
Electricalelectricsl power theft detection
Electricalelectricsl power theft detectionElectricalelectricsl power theft detection
Electricalelectricsl power theft detectionNagappa singaragoppa
 
Proposal power-theft-detection
Proposal power-theft-detectionProposal power-theft-detection
Proposal power-theft-detectionAneel-k Suthar
 
Power theft detection
Power theft detectionPower theft detection
Power theft detectionAravind Shaji
 
Electricity theft detection using image processing
Electricity theft detection using image processingElectricity theft detection using image processing
Electricity theft detection using image processingNileshMaher
 
WIRELESS Power theft DETECTION
WIRELESS Power theft DETECTION WIRELESS Power theft DETECTION
WIRELESS Power theft DETECTION MACLEANIMMANUEL
 
Proposal on Power Theft
Proposal on Power TheftProposal on Power Theft
Proposal on Power TheftAneel-k Suthar
 
Power Theft Detection
Power Theft DetectionPower Theft Detection
Power Theft DetectionLis Maria Roy
 
prevention of power theft and power uality by the help of fuzzy logic
prevention of power theft and power uality by the help of fuzzy logicprevention of power theft and power uality by the help of fuzzy logic
prevention of power theft and power uality by the help of fuzzy logicvaibyfrndz
 
presentation on POWER THEFT IDENTIFICATION SYSTEM
presentation on POWER THEFT IDENTIFICATION SYSTEMpresentation on POWER THEFT IDENTIFICATION SYSTEM
presentation on POWER THEFT IDENTIFICATION SYSTEMGaurav Shukla
 
Power theft detection via plc
Power theft detection via plcPower theft detection via plc
Power theft detection via plcbbshashanka
 
Wireless power theft monitoring
Wireless power theft monitoringWireless power theft monitoring
Wireless power theft monitoringBiswajit Pratihari
 
Micro controller-based-power-theft-identification
Micro controller-based-power-theft-identificationMicro controller-based-power-theft-identification
Micro controller-based-power-theft-identificationranjeet1990
 
Thesis power theft detection ch 3
Thesis power theft detection ch 3Thesis power theft detection ch 3
Thesis power theft detection ch 3Faraz Ahmed
 
Wireless power theft monitering system
Wireless power theft monitering systemWireless power theft monitering system
Wireless power theft monitering systemAshwin Gowda
 
Thesis power theft detection ch 5
Thesis power theft detection ch 5Thesis power theft detection ch 5
Thesis power theft detection ch 5Faraz Ahmed
 

La actualidad más candente (20)

Ppt power theft identification and detection using gsm
Ppt power theft identification and detection using gsmPpt power theft identification and detection using gsm
Ppt power theft identification and detection using gsm
 
Electricity theft control
Electricity theft controlElectricity theft control
Electricity theft control
 
Electricalelectricsl power theft detection
Electricalelectricsl power theft detectionElectricalelectricsl power theft detection
Electricalelectricsl power theft detection
 
Tech seminar
Tech seminarTech seminar
Tech seminar
 
Proposal power-theft-detection
Proposal power-theft-detectionProposal power-theft-detection
Proposal power-theft-detection
 
Power theft detection
Power theft detectionPower theft detection
Power theft detection
 
Electricity theft detection using image processing
Electricity theft detection using image processingElectricity theft detection using image processing
Electricity theft detection using image processing
 
WIRELESS Power theft DETECTION
WIRELESS Power theft DETECTION WIRELESS Power theft DETECTION
WIRELESS Power theft DETECTION
 
Power theft detection
Power theft detectionPower theft detection
Power theft detection
 
Proposal on Power Theft
Proposal on Power TheftProposal on Power Theft
Proposal on Power Theft
 
Power Theft Detection
Power Theft DetectionPower Theft Detection
Power Theft Detection
 
prevention of power theft and power uality by the help of fuzzy logic
prevention of power theft and power uality by the help of fuzzy logicprevention of power theft and power uality by the help of fuzzy logic
prevention of power theft and power uality by the help of fuzzy logic
 
presentation on POWER THEFT IDENTIFICATION SYSTEM
presentation on POWER THEFT IDENTIFICATION SYSTEMpresentation on POWER THEFT IDENTIFICATION SYSTEM
presentation on POWER THEFT IDENTIFICATION SYSTEM
 
24. deepti semwal.pptx
24. deepti semwal.pptx24. deepti semwal.pptx
24. deepti semwal.pptx
 
Power theft detection via plc
Power theft detection via plcPower theft detection via plc
Power theft detection via plc
 
Wireless power theft monitoring
Wireless power theft monitoringWireless power theft monitoring
Wireless power theft monitoring
 
Micro controller-based-power-theft-identification
Micro controller-based-power-theft-identificationMicro controller-based-power-theft-identification
Micro controller-based-power-theft-identification
 
Thesis power theft detection ch 3
Thesis power theft detection ch 3Thesis power theft detection ch 3
Thesis power theft detection ch 3
 
Wireless power theft monitering system
Wireless power theft monitering systemWireless power theft monitering system
Wireless power theft monitering system
 
Thesis power theft detection ch 5
Thesis power theft detection ch 5Thesis power theft detection ch 5
Thesis power theft detection ch 5
 

Destacado

Electricity theft (1)
Electricity theft (1)Electricity theft (1)
Electricity theft (1)sharique_64
 
Comparison of Energy Detection Based Spectrum Sensing Methods over Fading Cha...
Comparison of Energy Detection Based Spectrum Sensing Methods over Fading Cha...Comparison of Energy Detection Based Spectrum Sensing Methods over Fading Cha...
Comparison of Energy Detection Based Spectrum Sensing Methods over Fading Cha...CSCJournals
 
Webinar: Under Lock & Key; Theft Protection in Today's Utility Marketplace
Webinar: Under Lock & Key; Theft Protection in Today's Utility Marketplace Webinar: Under Lock & Key; Theft Protection in Today's Utility Marketplace
Webinar: Under Lock & Key; Theft Protection in Today's Utility Marketplace IUSTechnologies
 
power-theft-monitoring-system-consumer-monitoring-system-CMS-for-discom-UGVCL...
power-theft-monitoring-system-consumer-monitoring-system-CMS-for-discom-UGVCL...power-theft-monitoring-system-consumer-monitoring-system-CMS-for-discom-UGVCL...
power-theft-monitoring-system-consumer-monitoring-system-CMS-for-discom-UGVCL...vishnu1109
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsnElham Hormozi
 
AUTOMATED ELECTRICAL PROTECTION SYSTEM FOR DOMESTIC APPLICATION
AUTOMATED ELECTRICAL PROTECTION SYSTEM FOR DOMESTIC APPLICATIONAUTOMATED ELECTRICAL PROTECTION SYSTEM FOR DOMESTIC APPLICATION
AUTOMATED ELECTRICAL PROTECTION SYSTEM FOR DOMESTIC APPLICATIONAnand Parakkat Parambil
 
Detection and Location of Faults in 11KV Underground Cable by using Continuou...
Detection and Location of Faults in 11KV Underground Cable by using Continuou...Detection and Location of Faults in 11KV Underground Cable by using Continuou...
Detection and Location of Faults in 11KV Underground Cable by using Continuou...IOSR Journals
 
Detection and Instantaneous Prevention of Power Theft
Detection and Instantaneous Prevention of Power TheftDetection and Instantaneous Prevention of Power Theft
Detection and Instantaneous Prevention of Power TheftIOSR Journals
 
Amr presentation pak elektron ltd.
Amr  presentation pak elektron ltd.Amr  presentation pak elektron ltd.
Amr presentation pak elektron ltd.ehsan_786
 
An optimized hybrid system model solution for coastal area in bangladesh
An optimized hybrid system model   solution for coastal area in bangladeshAn optimized hybrid system model   solution for coastal area in bangladesh
An optimized hybrid system model solution for coastal area in bangladesheSAT Journals
 
Delivering distribution intelligence with MV/LV supervision and control
Delivering distribution intelligence with MV/LV supervision and controlDelivering distribution intelligence with MV/LV supervision and control
Delivering distribution intelligence with MV/LV supervision and controlLandis+Gyr
 
Gridstream Evolution
Gridstream EvolutionGridstream Evolution
Gridstream EvolutionLandis+Gyr
 
Optimal placement and sizing of ht shunt capacitors for transmission loss min...
Optimal placement and sizing of ht shunt capacitors for transmission loss min...Optimal placement and sizing of ht shunt capacitors for transmission loss min...
Optimal placement and sizing of ht shunt capacitors for transmission loss min...IAEME Publication
 
HYBRID POWER GENERATION SYSTEM FOR DOMESTIC PIRPOSEES
HYBRID POWER GENERATION SYSTEM FOR DOMESTIC PIRPOSEESHYBRID POWER GENERATION SYSTEM FOR DOMESTIC PIRPOSEES
HYBRID POWER GENERATION SYSTEM FOR DOMESTIC PIRPOSEESBhushith Kumar
 
Optimal placement and sizing of multi dg using pso
Optimal placement and sizing of multi dg  using psoOptimal placement and sizing of multi dg  using pso
Optimal placement and sizing of multi dg using psoJitendra Bhadoriya
 
Genetic Algo. for Radial Distribution System to reduce Losses
Genetic Algo. for Radial Distribution System to reduce LossesGenetic Algo. for Radial Distribution System to reduce Losses
Genetic Algo. for Radial Distribution System to reduce LossesAbhishek Jangid
 
seminar report on optimal placement and optimal sizing of DG
seminar report on optimal placement and optimal sizing of DGseminar report on optimal placement and optimal sizing of DG
seminar report on optimal placement and optimal sizing of DGkhemraj298
 

Destacado (20)

Electricity theft (1)
Electricity theft (1)Electricity theft (1)
Electricity theft (1)
 
final_report
final_reportfinal_report
final_report
 
Comparison of Energy Detection Based Spectrum Sensing Methods over Fading Cha...
Comparison of Energy Detection Based Spectrum Sensing Methods over Fading Cha...Comparison of Energy Detection Based Spectrum Sensing Methods over Fading Cha...
Comparison of Energy Detection Based Spectrum Sensing Methods over Fading Cha...
 
Webinar: Under Lock & Key; Theft Protection in Today's Utility Marketplace
Webinar: Under Lock & Key; Theft Protection in Today's Utility Marketplace Webinar: Under Lock & Key; Theft Protection in Today's Utility Marketplace
Webinar: Under Lock & Key; Theft Protection in Today's Utility Marketplace
 
Synopsis
SynopsisSynopsis
Synopsis
 
power-theft-monitoring-system-consumer-monitoring-system-CMS-for-discom-UGVCL...
power-theft-monitoring-system-consumer-monitoring-system-CMS-for-discom-UGVCL...power-theft-monitoring-system-consumer-monitoring-system-CMS-for-discom-UGVCL...
power-theft-monitoring-system-consumer-monitoring-system-CMS-for-discom-UGVCL...
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
AUTOMATED ELECTRICAL PROTECTION SYSTEM FOR DOMESTIC APPLICATION
AUTOMATED ELECTRICAL PROTECTION SYSTEM FOR DOMESTIC APPLICATIONAUTOMATED ELECTRICAL PROTECTION SYSTEM FOR DOMESTIC APPLICATION
AUTOMATED ELECTRICAL PROTECTION SYSTEM FOR DOMESTIC APPLICATION
 
Detection and Location of Faults in 11KV Underground Cable by using Continuou...
Detection and Location of Faults in 11KV Underground Cable by using Continuou...Detection and Location of Faults in 11KV Underground Cable by using Continuou...
Detection and Location of Faults in 11KV Underground Cable by using Continuou...
 
Detection and Instantaneous Prevention of Power Theft
Detection and Instantaneous Prevention of Power TheftDetection and Instantaneous Prevention of Power Theft
Detection and Instantaneous Prevention of Power Theft
 
Amr presentation pak elektron ltd.
Amr  presentation pak elektron ltd.Amr  presentation pak elektron ltd.
Amr presentation pak elektron ltd.
 
An optimized hybrid system model solution for coastal area in bangladesh
An optimized hybrid system model   solution for coastal area in bangladeshAn optimized hybrid system model   solution for coastal area in bangladesh
An optimized hybrid system model solution for coastal area in bangladesh
 
Delivering distribution intelligence with MV/LV supervision and control
Delivering distribution intelligence with MV/LV supervision and controlDelivering distribution intelligence with MV/LV supervision and control
Delivering distribution intelligence with MV/LV supervision and control
 
Gridstream Evolution
Gridstream EvolutionGridstream Evolution
Gridstream Evolution
 
Optimal placement and sizing of ht shunt capacitors for transmission loss min...
Optimal placement and sizing of ht shunt capacitors for transmission loss min...Optimal placement and sizing of ht shunt capacitors for transmission loss min...
Optimal placement and sizing of ht shunt capacitors for transmission loss min...
 
Overvoltages 1
Overvoltages 1Overvoltages 1
Overvoltages 1
 
HYBRID POWER GENERATION SYSTEM FOR DOMESTIC PIRPOSEES
HYBRID POWER GENERATION SYSTEM FOR DOMESTIC PIRPOSEESHYBRID POWER GENERATION SYSTEM FOR DOMESTIC PIRPOSEES
HYBRID POWER GENERATION SYSTEM FOR DOMESTIC PIRPOSEES
 
Optimal placement and sizing of multi dg using pso
Optimal placement and sizing of multi dg  using psoOptimal placement and sizing of multi dg  using pso
Optimal placement and sizing of multi dg using pso
 
Genetic Algo. for Radial Distribution System to reduce Losses
Genetic Algo. for Radial Distribution System to reduce LossesGenetic Algo. for Radial Distribution System to reduce Losses
Genetic Algo. for Radial Distribution System to reduce Losses
 
seminar report on optimal placement and optimal sizing of DG
seminar report on optimal placement and optimal sizing of DGseminar report on optimal placement and optimal sizing of DG
seminar report on optimal placement and optimal sizing of DG
 

Similar a IJRET: Detecting & Localizing Electricity Theft in Unknown Radial Networks

35_ELECTRICAL POWER
35_ELECTRICAL POWER35_ELECTRICAL POWER
35_ELECTRICAL POWERSagar Patil
 
35 electrical power
35 electrical power35 electrical power
35 electrical powerOsama Rizwan
 
power electrical
power electricalpower electrical
power electricaltetty_tee
 
Theft Detection00000000000000000000000000
Theft Detection00000000000000000000000000Theft Detection00000000000000000000000000
Theft Detection00000000000000000000000000kabileshcm55
 
IRJET- Overloading Detection in Residentional Area
IRJET- Overloading Detection in Residentional AreaIRJET- Overloading Detection in Residentional Area
IRJET- Overloading Detection in Residentional AreaIRJET Journal
 
Active power and frequency analysis of a smart grid – using matlabsimulink ap...
Active power and frequency analysis of a smart grid – using matlabsimulink ap...Active power and frequency analysis of a smart grid – using matlabsimulink ap...
Active power and frequency analysis of a smart grid – using matlabsimulink ap...eSAT Publishing House
 
An efficient and improved model for power theft detection in Pakistan
An efficient and improved model for power theft detection in PakistanAn efficient and improved model for power theft detection in Pakistan
An efficient and improved model for power theft detection in PakistanjournalBEEI
 
Electricity Theft: Reason and Solution
Electricity Theft: Reason and SolutionElectricity Theft: Reason and Solution
Electricity Theft: Reason and SolutionIRJET Journal
 
Theft Detection detection of raspberry and Arduino
Theft Detection detection of raspberry and ArduinoTheft Detection detection of raspberry and Arduino
Theft Detection detection of raspberry and Arduinokabileshcm55
 
MODERN SMART GRIDS AND LEVERAGING SMART METER DATA.pptx
MODERN SMART GRIDS AND LEVERAGING SMART METER DATA.pptxMODERN SMART GRIDS AND LEVERAGING SMART METER DATA.pptx
MODERN SMART GRIDS AND LEVERAGING SMART METER DATA.pptxJasmeet939104
 
DISTRIBUTED TRANSFORMER ENERGY METER USING GSM TECHNOLOGY
DISTRIBUTED TRANSFORMER ENERGY METER USING GSM TECHNOLOGYDISTRIBUTED TRANSFORMER ENERGY METER USING GSM TECHNOLOGY
DISTRIBUTED TRANSFORMER ENERGY METER USING GSM TECHNOLOGYecij
 
Fair Model for Electricity Billing and Sharing in Shared Apartment in Ghana
Fair Model for Electricity Billing and Sharing in Shared Apartment in GhanaFair Model for Electricity Billing and Sharing in Shared Apartment in Ghana
Fair Model for Electricity Billing and Sharing in Shared Apartment in GhanaIRJET Journal
 
Detection of Power Grid Synchronization Failure on Sensing Frequency and Volt...
Detection of Power Grid Synchronization Failure on Sensing Frequency and Volt...Detection of Power Grid Synchronization Failure on Sensing Frequency and Volt...
Detection of Power Grid Synchronization Failure on Sensing Frequency and Volt...IRJET Journal
 
Monitoring of Transmission and Distribution Grids using PMUs
Monitoring of Transmission and Distribution Grids using PMUsMonitoring of Transmission and Distribution Grids using PMUs
Monitoring of Transmission and Distribution Grids using PMUsLuigi Vanfretti
 
TECHNICAL SEMINAR 1CR19EE017.ppt
TECHNICAL SEMINAR 1CR19EE017.pptTECHNICAL SEMINAR 1CR19EE017.ppt
TECHNICAL SEMINAR 1CR19EE017.pptssuserb313d9
 
IRJET- Advanced Metering Infrastructure Tripping System
IRJET-  	  Advanced Metering Infrastructure Tripping SystemIRJET-  	  Advanced Metering Infrastructure Tripping System
IRJET- Advanced Metering Infrastructure Tripping SystemIRJET Journal
 
eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)IISRT
 
Design and Implementation of Low Cost Smart Web Sensors for Electric Power Qu...
Design and Implementation of Low Cost Smart Web Sensors for Electric Power Qu...Design and Implementation of Low Cost Smart Web Sensors for Electric Power Qu...
Design and Implementation of Low Cost Smart Web Sensors for Electric Power Qu...IJTET Journal
 
IRJET - Smart Grid Inspection Robot Exclusively Designed for High Power T...
IRJET -  	  Smart Grid Inspection Robot Exclusively Designed for High Power T...IRJET -  	  Smart Grid Inspection Robot Exclusively Designed for High Power T...
IRJET - Smart Grid Inspection Robot Exclusively Designed for High Power T...IRJET Journal
 

Similar a IJRET: Detecting & Localizing Electricity Theft in Unknown Radial Networks (20)

35_ELECTRICAL POWER
35_ELECTRICAL POWER35_ELECTRICAL POWER
35_ELECTRICAL POWER
 
35 electrical power
35 electrical power35 electrical power
35 electrical power
 
power electrical
power electricalpower electrical
power electrical
 
Theft Detection00000000000000000000000000
Theft Detection00000000000000000000000000Theft Detection00000000000000000000000000
Theft Detection00000000000000000000000000
 
IRJET- Overloading Detection in Residentional Area
IRJET- Overloading Detection in Residentional AreaIRJET- Overloading Detection in Residentional Area
IRJET- Overloading Detection in Residentional Area
 
Active power and frequency analysis of a smart grid – using matlabsimulink ap...
Active power and frequency analysis of a smart grid – using matlabsimulink ap...Active power and frequency analysis of a smart grid – using matlabsimulink ap...
Active power and frequency analysis of a smart grid – using matlabsimulink ap...
 
An efficient and improved model for power theft detection in Pakistan
An efficient and improved model for power theft detection in PakistanAn efficient and improved model for power theft detection in Pakistan
An efficient and improved model for power theft detection in Pakistan
 
Electricity Theft: Reason and Solution
Electricity Theft: Reason and SolutionElectricity Theft: Reason and Solution
Electricity Theft: Reason and Solution
 
Theft Detection detection of raspberry and Arduino
Theft Detection detection of raspberry and ArduinoTheft Detection detection of raspberry and Arduino
Theft Detection detection of raspberry and Arduino
 
MODERN SMART GRIDS AND LEVERAGING SMART METER DATA.pptx
MODERN SMART GRIDS AND LEVERAGING SMART METER DATA.pptxMODERN SMART GRIDS AND LEVERAGING SMART METER DATA.pptx
MODERN SMART GRIDS AND LEVERAGING SMART METER DATA.pptx
 
DISTRIBUTED TRANSFORMER ENERGY METER USING GSM TECHNOLOGY
DISTRIBUTED TRANSFORMER ENERGY METER USING GSM TECHNOLOGYDISTRIBUTED TRANSFORMER ENERGY METER USING GSM TECHNOLOGY
DISTRIBUTED TRANSFORMER ENERGY METER USING GSM TECHNOLOGY
 
Fair Model for Electricity Billing and Sharing in Shared Apartment in Ghana
Fair Model for Electricity Billing and Sharing in Shared Apartment in GhanaFair Model for Electricity Billing and Sharing in Shared Apartment in Ghana
Fair Model for Electricity Billing and Sharing in Shared Apartment in Ghana
 
Smart grid management an overview
Smart grid management an overviewSmart grid management an overview
Smart grid management an overview
 
Detection of Power Grid Synchronization Failure on Sensing Frequency and Volt...
Detection of Power Grid Synchronization Failure on Sensing Frequency and Volt...Detection of Power Grid Synchronization Failure on Sensing Frequency and Volt...
Detection of Power Grid Synchronization Failure on Sensing Frequency and Volt...
 
Monitoring of Transmission and Distribution Grids using PMUs
Monitoring of Transmission and Distribution Grids using PMUsMonitoring of Transmission and Distribution Grids using PMUs
Monitoring of Transmission and Distribution Grids using PMUs
 
TECHNICAL SEMINAR 1CR19EE017.ppt
TECHNICAL SEMINAR 1CR19EE017.pptTECHNICAL SEMINAR 1CR19EE017.ppt
TECHNICAL SEMINAR 1CR19EE017.ppt
 
IRJET- Advanced Metering Infrastructure Tripping System
IRJET-  	  Advanced Metering Infrastructure Tripping SystemIRJET-  	  Advanced Metering Infrastructure Tripping System
IRJET- Advanced Metering Infrastructure Tripping System
 
eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)
 
Design and Implementation of Low Cost Smart Web Sensors for Electric Power Qu...
Design and Implementation of Low Cost Smart Web Sensors for Electric Power Qu...Design and Implementation of Low Cost Smart Web Sensors for Electric Power Qu...
Design and Implementation of Low Cost Smart Web Sensors for Electric Power Qu...
 
IRJET - Smart Grid Inspection Robot Exclusively Designed for High Power T...
IRJET -  	  Smart Grid Inspection Robot Exclusively Designed for High Power T...IRJET -  	  Smart Grid Inspection Robot Exclusively Designed for High Power T...
IRJET - Smart Grid Inspection Robot Exclusively Designed for High Power T...
 

Más de eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

Más de eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Último

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 

Último (20)

young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 

IJRET: Detecting & Localizing Electricity Theft in Unknown Radial Networks

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 07 | July-2015, Available @ http://www.ijret.org 72 ELECTRICITY THEFT DETECTION AND LOCALISATION IN UNKNOWN RADIAL LOW VOLTAGE NETWORK Heman Shamachurn1 , Perenjordee Poollay Auroomoogum2 1 Lecturer, Electrical and Electronic Engineering, University of Mauritius, Reduit, Mauritius 2 Undergraduate Student, Electrical and Electronic Engineering, University of Mauritius, Reduit, Mauritius Abstract The distribution of electricity involves both technical and non-technical losses. One major cause of non-technical loss is the illegal abstraction of electricity which is also known as ‘Electricity Theft’. The illegal usage of electricity has many associated problems, both for utilities and consumers of electricity, implying that there is a pressing need for theft detection and localisation. Traditional methods of identifying illegal electricity consumers are time consuming and ineffective as measurements have to be performed at a large number of suspected locations. Smart metering in future electricity networks will lead to a more efficient automated system for the detection and localisation of electricity theft. This will enable immediate action to be taken by distribution network operators against the offenders and will help to improve the quality, reliability and security of electricity supply systems. The aim of this study was to analyse the performance of an electricity theft detection and localisation technique in an unknown grid. The method assumed the availability of measured voltages, currents, and powers from installed smart meters. The detection step was a power comparison process and the localisation step was a voltage comparison process. The investigation involved analysis in the presence of single and simultaneous multiple thefts. To better represent future networks with increasing penetration of renewable energy generators, distributed generation was added to the system and the capability of the detection and localisation technique was further explored. All the simulations were performed in Matlab/Simulink. It was found that the method performed satisfactorily, with a minimum stolen power of 450 W successfully detected and localised. Keywords: Electricity Theft, Smart Meters, Double Feeding, Low Voltage Radial Network, Matlab/Simulink --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Significant operational losses are involved in the generation, transmission and distribution of electricity. The losses can be classified as technical and non-technical. The technical losses are associated with the components of the power system and the non-technical losses (NTL) are associated with external factors which do not directly involve the power system. In some countries the illegal abstraction of electricity takes a major proportion of the NTL. For instance, 1200 GWh of electrical energy is illegally consumed from the distribution grid each year in the Netherlands, representing about 1% of the annual electricity generation [1]. Electricity theft is a main concern for utilities as the percentage of theft might be small overall, but the associated financial loss is significant [2]. Several methods are employed to steal electricity including tampering with the energy meter, bypassing the meter through double feeding and evading bill payments. Electricity theft can overload generator units as distribution network operators (DNOs) cannot forecast the illegal consumption, and if significant, the electricity supply can be interrupted due to demand-supply mismatch. Moreover, the stolen electricity increases grid losses and represents huge monetary losses both for the DNOs and the Government. Losses are eventually reflected in the price of electricity, which implies that genuine customers have a pay a higher electricity price because of illegal consumers [3]. Currently, tampering attempts are mostly detected by measurements of electrical parameters in suspected locations followed by an analysis of the acquired data. The whole process is time consuming and ineffective, especially in densely populated areas where there are many houses very close together and many branches in the distribution network. Smart meters and state of the art measurement systems in the future grid will make electricity theft harder [4]. The installed secure meters at the consumers’ premises and in the substations will enable automated, fast and successful electricity theft detection and localisation while preventing tampering with the meter itself. 2. METHOD DESCRIPTION 2.1 Investigated Network Configuration A three-phase, four-wire radial distribution system with a TT earthing arrangement for residential customers was considered. The model comprised a substation represented by a 11 kV/ 400 V three-phase transformer and 35 single- phase household loads as shown in Fig-1. The corresponding parameters are provided in Table-1. The distance between the substation and the first connected house downstream was 100 m. Each house was represented as a single-phase load consuming both real and reactive powers. Each load was modeled by voltage and power controlled current sources [5]. The following assumptions were considered:
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 07 | July-2015, Available @ http://www.ijret.org 73  Each house was connected to the network via a smart meter which could record the RMS voltage, the RMS current, the real and reactive power flows.  The same measurement capabilities were present at the substation.  The active power consumption of each house had a normal distribution with a mean and a variance of 1 kW.  The reactive power consumption of each house had a normal distribution with a mean of 0 VAr and a variance of 200 VAr. Fig-1: Simulated network Electricity theft at a house was simulated by the connection of an illegal load in parallel to the house, but bypassing the smart meter as shown in Fig-2. Fig-2: Illegal load connection Table-1: Network parameters Properties Value Average length between houses 9 m Cross section of feeder sections 150 mm2 Resistance of feeder 0.206 Ω/km Inductance of feeder 0.318 mH/km Length of connection cable between house and feeder 5 m Cross section of connection cables 10 mm2 Resistance of connection cable 1.83 Ω/km Inductance of connection cable 0.402 mH/km 2.2 Electricity Theft Detection and Localization During a given time step of the simulation, a probable electricity pilfering attempt was identified by a large difference between the total active power consumptions of all customers and the total active power measured at the substation, taking into account the technical losses throughout the feeder. If a theft was detected, the localisation process would involve comparing the estimated grid voltage at each house to the actual measured voltage. The following assumptions were made:  Order of each house on the feeder was known  Cable impedances were unknown  Phase of each house was unknown The detection and localisation process is summarized in Fig- 3 [6]. Fig-3: Theft detection and localisation for unknown grid The non linear load flow problem [6] can be approximated by a linear model to obtain equation (1) where Vh,k is the voltage at house h at time step k; Vk 0 is the voltage magnitude at the distribution transformer for the corresponding phase at time step k; Ph`,k is the active power of house h` at time step k; Qh`,k is the reactive power of house h` at time step k; ah,h` is the influence of the active power of house h` on house h; bh,h` is the influence of the reactive power of house h` on house h. Vh,k = Vk 0 + ah,h`Ph`,k + bh,h`Qh`,k N h`=1 N h`=1 (1)
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 07 | July-2015, Available @ http://www.ijret.org 74 The influences ah,h` and bh,h` have to be determined by solving a linear least squares problem. Considering the technical losses, the influences are calculated for the time steps without theft in order to identify the phase of each house. After identifying the network, the voltage at each house can be calculated by using equation (1). A large error between the measured and the estimated voltages for a given phase implies that a theft has been attempted on that phase. Normally, for the theft location, the difference is comparatively greater than other locations. 2.3 Simulations Different cases were considered for the simulations as follows: Case 1: Without Theft The model was simulated without any theft in the network so as to compare the measured and expected voltage profiles. The percentage voltage errors were calculated for all the houses. The simulation was run for 1000 time steps representing the different time frames during which data was collected from the meters. Case 2: Single Point of Theft on Feeder An illegal load was connected at house 15, with the active illegal power varied from 150 W to 3750 W in steps of 150 W for every 40 time steps starting at time step 0. Case 3: Single Point of Theft on each Phase Theft was simulated as shown in Table-2. Table-2: Single point of theft on each phase House number Phase Illegal active power (kW) Time steps of theft 15 C 2 1 to 1000 16 A 1 401 to 1000 17 B 3 601 to 620 Case 4: Two Points of Theft on One Phase Theft was simulated as shown in Table-3 Table-3: Two points of theft on one phase House number Phase Illegal active power (kW) Time steps of theft 16 A 2 1 to 1000 34 A 3 401 to 900 Case 5: Presence of Distributed Generator (DG) in the Network Several distributed generators were connected across the network as per Table-4. Table-4: DG connections House number Phase DG active power (kW) 10 A 1 11 B 2 12 C 5 The effect of the generators on the voltage profiles were initially analysed without theft. The algorithm was subsequently tested for thefts of 2 kW and 3 kW at houses 10 and 17 respectively during all the time steps. 3. RESULTS AND DISCUSSIONS 3.1 Case 1: Without Theft The maximum technical losses in the network was determined from the power records of all meters and found to be 3 % on each phase. This value was used as a benchmark to detect illegal electricity consumption. Moreover, the influences were determined for all the phases to identify the houses on each of the three phases. Chart-1 shows the influence of active power of all houses on the voltage magnitude of house 15. All the houses connected on the same phase as house 15 can be identified and confirmed from Fig-1. A similar plot was obtained for the influence of reactive power. Chart -1: Influence of active power of all houses on house 15 The percentage voltage errors obtained for all the houses were very small (between 0 % and 0.008 %) and are displayed in Chart-2. Expected and measured voltage profiles for phase B at time step 500 are shown in Chart-3. It can be observed that the voltage errors were very small. Similar charts were obtained for the remaining two phases.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 07 | July-2015, Available @ http://www.ijret.org 75 Chart-2: Percentage voltage error for all houses at time step 500 Chart-3: Voltage profiles for phase B at time step 500 3.2 Case 2: Single Point of Theft on Feeder Taking into account the 3 % technical losses, it was found that the minimum stolen power detectable was 450 W based on the increment of 150 W for every 40 time steps. The voltage and percentage voltage error profiles for time step 81 are shown in Chart-4 and Chart-5 respectively. Chart-4: Voltage profiles for phase C at time step 81 Chart-4 shows that a theft occurred on the system as the measured and expected voltage profiles are no longer superimposed on each other. Chart-5 depicts that the theft occurred at house 15 as the corresponding percentage voltage error is maximum. The same conclusions could be drawn for profiles at time steps greater than 40, but with the percentage voltage errors being higher due to increasing stolen power at house 15. 3.3 Case 3: Single Point of Theft on Each Phase The thefts at all the three houses were detected and located successfully at the corresponding time steps. The charts used for analysis were similar to Chart-4 and Chart-5. Chart-5: Percentage voltage error profile for phase C at time step 81 3.4 Case 4: Two Points of Theft on One Phase The algorithm successfully detected and localised all points of illegal abstraction as shown in Chart-6 and Chart-7. Chart-6: Voltage profiles for phase A at time step 500
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 07 | July-2015, Available @ http://www.ijret.org 76 Chart-7: Percentage voltage error profile for phase A at time step500 3.5 Case 5: Presence of DG in the Network The voltage profiles in the absence of electricity theft for phase C at time step 500 are shown in Chart-8. The peak at house 12 is due to the relatively high power of 5 kW injected into the network by the DG of the house. The voltage errors can be observed to be very small. Chart-8: Voltage profiles for phase C at time step 500 In the presence of electricity thefts, Chart-9 and Chart-11 clearly point out the presence of theft due to relatively large errors between the measured and estimated voltages. Chart- 10 and Chart-12 show that the theft locations were successfully identified. Chart-9: Voltage profiles for phase A at time step 500 Chart-10: Percentage voltage error profile for phase A at time step 500 Chart-11: Voltage profiles for phase B at time step 500
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 07 | July-2015, Available @ http://www.ijret.org 77 Chart-12: Percentage voltage error profile for phase B at time step 500 4. CONCLUSION Smart meters incorporating the tested algorithm will be efficient in detecting single, multiple multi-phase and multiple single-phase electricity thefts in a radial low voltage network, both in the presence and in the absence of distributed generators, even if the network design parameters are unknown. REFERENCES [1] Frank Van Der Bergh, Petr Kadurek, Sjef Cobben, and Wil Kling, "ELECTRICITY THEFT LOCALIZATION BASED ON SMART METERING," in 21st International Conference on Electricity Distribution, Frankfurt, 2011, pp. 1-4. [2] Thomas B Smith, "Electricity theft: a comparative analysis," Energy Policy, vol. 32, no. 18, pp. 2067- 2076, August 2004. [3] P. Kadurek, J. Blom, J. F.G. Cobben, and W. L. Kling, "Theft detection and smart metering practices and expectations in the Netherlands," in Proceedings of the Innovative Smart Grid Technologies Europe Conference, Gothenburg, 2010, pp. 1-6. [4] R. Alves, P. Casanova, E. Quirogas, O. Ravelo, and W. Gimenez, "Reduction of non-technical losses by modernization and updating of measurement systems," in 2006 IEEE/PES Transmission & Distribution Conference & Exposition: Latin America, Caracas, 2006, pp. 1-5. [5] University of Texas at Austin - Center for Electromechanics. (2011, September) Simulink Smartgrid Simulation 1: The Basics. Video (Youtube). [6] Sam Weckx, Carlos Gonzalez, Jeroen Tant, Tom De Rybel, and Johan Driesen, "Parameter identification of unknown radial grids for theft detection," in Innovative Smart Grid Technologies (ISGT Europe), 2012 3rd IEEE PES International Conference and Exhibition on, Berlin, 2012, pp. 1-6.