SlideShare una empresa de Scribd logo
1 de 21
Descargar para leer sin conexión
WIRELESS POWER THEFT
MONITORING
SUBMITTED TO:
MR.RANJAN .K. JENA
MR.ABHIMANYU MOHAPATR
DEPARTMENT OF
ELECTRICAL ENGINEER
SUBMITTED BY:
RUPALI PATRA
0901106017
7TH SEM,EE
CONTENTS:
 INTRODUCTION
i.POWER THEFT :DEFINITION
ii.HOW IT OCCURS ?
 DIFFERENT WAYS OF MONITORING POWER THEFT
 MICROCONTROLLER BASED POWER THEFT
MONITORING
i.PROPOSED ARCHITECTURE
 BLOCK DIAGRAM DESCRIPTION
WORKING OF WIRELESS SENSOR NETWORK
ADVANTAGES
LIMITATIONS
CONCLUSION
INTRODUCTION-
POWER THEFT :DEFINITION
It is the use of electrical power without a
contract with a supplier with total or partial
bypassing of the metering system or interfering
with this system in such a way so as to
adulterate its measurements.
Contract is understood here as a valid
obligation to deliver power and to pay for it.
1.SLOWING DOWN THE
METER:
A common method of tampering
older meters is to attach magnets to
the outside of the meter.
When this happens, the rotor disc is
exposed to a high magnetic field.
Hence, the resultant opposing
magnetic field to the rotor is highly
increased leading to slowing down of
rotor or perfect stopping of the disc
rotation.
The electricity meter is thus
manipulated and ultimately power is
consumed without being paid for. ex-
neodymium magnets.
HOW IT OCCURS?
2.INVERTING THE METER/FEEDER:
Another common form of electricity theft is
to invert the meter (pull the meter out of the
socket and plug the meter back in upside
down, which causes the meter to run
backwards and the kWh register to count
down instead of up).
3.BYPASSING THE FEEDER/METER:
Usually, the bypass supplies
power to large and stable loads
which will not trip fuses in the
case of overloads. Ex-jumper
cables.
The rest of the circuits are
supplied normally through the
meter, so the bill, which is close
to average, does not suggest a
theft.
DIFFERENT WAYS OF MONITORING POWER
THEFT:
GSM based power theft
monitoring
Microcontroller based power theft
monitoring
Power theft monitoring using
PLC.
MICRO-CONTROLLER BASED
POWER THEFT MONITORING:
The whole system architecture is based on
integrating wireless network with existing
electrical grid.
The proposed module also incorporates
different data aggregation algorithms and
effective solutions needed for the different
pathways of the electricity distribution system.
OVERVIEW:
THE PROPOSED ARCHITECTURE:
The Architecture Consists Of Four Modules
Namely:
Controlling Station (CS)
 Wireless Transformer Sensor Node (WTSN)
Transmission Line Sensor Node (TLSN)
Wireless Consumer Sensor Node (WCSN)
ARCHITECTURE
 WCSN is a module which acts as a consumer
power metering device that measures the power
consumed by the consumer and send the data
periodically to the WTSN.
Each feeder of the transformer has a WTSN
which monitors power through each line and
collects data from WCSN ,aggregates it and sends
to the CS.
TLSN is another module associated with
distribution line, mounted in each distribution line
posts .
DIFFERENT PARTS AND THEIR
FUNCTIONS:
ZIGBEE:
We are using XBee-PRO OEM RF
Module whish uses the zigbee
technology.
It is engineered to support the unique
needs of low-cost, low-power and low
data rate wireless sensor network
providing reliable delivery of data
between devices.
 The XBee-PRO OEM RF Modules
interface to a host device through a
logic-level asynchronous serial port.
ZIGBEE MODULE
CURRENT TRANSFORMER CIRCUITRY:
We are using Allegro ACS709
current sensor IC chip.
The ACS709 consists of a Hall
sensor integrated circuit (IC) with a
copper conduction path located near
the surface of the silicon die.
 Applied current flows through the
copper conduction path, and the
analog output voltage from the Hall
sensor IC linearly tracks the magnetic
field generated by the applied current.
MICROCONTROLLER:
The LPC2148 microcontroller is based on a16-bit/32-bit
ARM7TDMI-S CPU with embedded high-speed flash memory
ranging from 32 kB to 512 kB.
 A 128-bit wide memory interface architecture enable 32-bit
code execution at the maximum clock rate.
Due to their tiny size and low power consumption, LPC2148
is ideal for applications where miniaturization is a key
requirement.
Serial communication interfaces ranging from multiple
UARTs, on-chip SRAM of 8 kB up to 40 kB, make these
devices very well suited for communication gateways.
LCD:
LCD stands for Liquid Crystal Display.
As the output of the circuit should be
displayed in some form or the other, LCD
display is selected as it can display 16
characters at a time.
It is also easy to interface with the
microcontroller without any decoder. So it
is better than the seven segment display.
Wirelesspowertheftmonitoringoriginalbyrupalipatra 121126043543-phpapp02
WORKING OF WIRELESS
SENSOR NETWORK:
The sensor network monitors the electrical grid for a specified
period of time, which may be daily, monthly or yearly.
 Thus the WTSN stores the maximum demand for each consumer
including the losses.
The measured data from each WCSN is send to the neighbouring
TLSN.
The aggregated data is then sent to the next nearby WTSN. Thus
the data transfers from WCSN to the corresponding WTSN through
TLSN.
 The collected data is compared with the measured data by the
energy meter.
•Normally these two data are almost same.
 If there is any difference (dmc) in the collected data and the
measured data, there may be a line fault or a power theft in that
segment.
 Large value of dmc indicates a line fault and small value of dmc
indicate a power theft .
ADVANTAGES:
The proposed system provides the solution for some
of the main problems faced by the existing Indian
grid system, such as wastage of energy, power theft,
manual billing system, and transmission line fault.
 This method will reduce the energy wastage and
save a lot of energy for future use.
 We can detect the location from where the power is
being stolen which was not possible before.
 Optimized use of energy.
LIMITATIONS:
One major disadvantage of this project is that it is
not capable of detecting the exact location from
where the power is being stolen giving only a
approximation to that place.
 Cannot determine who is stealing, but even no
other existing system is capable of doing this.
 If implemented on a large scale it may take a lot of
time and manual input.
CONCLUSION:
This method reduces the heavy power and revenue losses
that occur due to power theft by the customers.
 By this design it can be concluded that power theft can be
effectively curbed by detecting where the power theft occurs
and informing the authorities.
Also an automatic circuit breaker may be integrated to the
unit so as to remotely cut off the power supply to the house or
consumer who tries to indulge in power theft.
 The ability of the proposed system to inform or send data
digitally to a remote station using wireless radio link adds a
large amount of possibilities to the way the power supply is
controlled by the electricity board.
This system will reduce the energy wastage and save a lot
for future use.
Wirelesspowertheftmonitoringoriginalbyrupalipatra 121126043543-phpapp02

Más contenido relacionado

La actualidad más candente

energy theft detection
energy theft detectionenergy theft detection
energy theft detectionabdulsuboor235
 
Wireless power theft monitoring
Wireless power theft monitoringWireless power theft monitoring
Wireless power theft monitoringBiswajit Pratihari
 
Power theft detection
Power theft detectionPower theft detection
Power theft detectionAravind Shaji
 
A Solution to remote detection of illegal electricity
A Solution to remote detection of illegal electricityA Solution to remote detection of illegal electricity
A Solution to remote detection of illegal electricityAhmed Aslam
 
Electricity theft detection using image processing
Electricity theft detection using image processingElectricity theft detection using image processing
Electricity theft detection using image processingNileshMaher
 
Thesis power theft detection ch 3
Thesis power theft detection ch 3Thesis power theft detection ch 3
Thesis power theft detection ch 3Faraz Ahmed
 
Wireless power-theft-monitering-ppt
Wireless power-theft-monitering-pptWireless power-theft-monitering-ppt
Wireless power-theft-monitering-pptArjit Rajwal
 
Proposal on Power Theft
Proposal on Power TheftProposal on Power Theft
Proposal on Power TheftAneel-k Suthar
 
Power theft detection
Power theft detectionPower theft detection
Power theft detectionbishow kandel
 
prevention of power theft and power uality by the help of fuzzy logic
prevention of power theft and power uality by the help of fuzzy logicprevention of power theft and power uality by the help of fuzzy logic
prevention of power theft and power uality by the help of fuzzy logicvaibyfrndz
 
Electricalelectricsl power theft detection
Electricalelectricsl power theft detectionElectricalelectricsl power theft detection
Electricalelectricsl power theft detectionNagappa singaragoppa
 
Micro controller-based-power-theft-identification
Micro controller-based-power-theft-identificationMicro controller-based-power-theft-identification
Micro controller-based-power-theft-identificationranjeet1990
 
Proposal power-theft-detection
Proposal power-theft-detectionProposal power-theft-detection
Proposal power-theft-detectionAneel-k Suthar
 
Thesis power theft detection ch 5
Thesis power theft detection ch 5Thesis power theft detection ch 5
Thesis power theft detection ch 5Faraz Ahmed
 
Project paper
Project paperProject paper
Project paperchigongo
 
A solution to remote detection of illegal electricity.
A solution to remote detection of illegal electricity.A solution to remote detection of illegal electricity.
A solution to remote detection of illegal electricity.Praveen Kumar
 

La actualidad más candente (20)

energy theft detection
energy theft detectionenergy theft detection
energy theft detection
 
Wireless power theft monitoring
Wireless power theft monitoringWireless power theft monitoring
Wireless power theft monitoring
 
Power theft detection
Power theft detectionPower theft detection
Power theft detection
 
A Solution to remote detection of illegal electricity
A Solution to remote detection of illegal electricityA Solution to remote detection of illegal electricity
A Solution to remote detection of illegal electricity
 
24. deepti semwal.pptx
24. deepti semwal.pptx24. deepti semwal.pptx
24. deepti semwal.pptx
 
Electricity theft detection using image processing
Electricity theft detection using image processingElectricity theft detection using image processing
Electricity theft detection using image processing
 
Power theft detection
Power theft detectionPower theft detection
Power theft detection
 
Thesis power theft detection ch 3
Thesis power theft detection ch 3Thesis power theft detection ch 3
Thesis power theft detection ch 3
 
Report its
Report itsReport its
Report its
 
Wireless power-theft-monitering-ppt
Wireless power-theft-monitering-pptWireless power-theft-monitering-ppt
Wireless power-theft-monitering-ppt
 
Proposal on Power Theft
Proposal on Power TheftProposal on Power Theft
Proposal on Power Theft
 
Power theft detection
Power theft detectionPower theft detection
Power theft detection
 
prevention of power theft and power uality by the help of fuzzy logic
prevention of power theft and power uality by the help of fuzzy logicprevention of power theft and power uality by the help of fuzzy logic
prevention of power theft and power uality by the help of fuzzy logic
 
PROJECT REPORT
PROJECT REPORTPROJECT REPORT
PROJECT REPORT
 
Electricalelectricsl power theft detection
Electricalelectricsl power theft detectionElectricalelectricsl power theft detection
Electricalelectricsl power theft detection
 
Micro controller-based-power-theft-identification
Micro controller-based-power-theft-identificationMicro controller-based-power-theft-identification
Micro controller-based-power-theft-identification
 
Proposal power-theft-detection
Proposal power-theft-detectionProposal power-theft-detection
Proposal power-theft-detection
 
Thesis power theft detection ch 5
Thesis power theft detection ch 5Thesis power theft detection ch 5
Thesis power theft detection ch 5
 
Project paper
Project paperProject paper
Project paper
 
A solution to remote detection of illegal electricity.
A solution to remote detection of illegal electricity.A solution to remote detection of illegal electricity.
A solution to remote detection of illegal electricity.
 

Similar a Wirelesspowertheftmonitoringoriginalbyrupalipatra 121126043543-phpapp02

Power theft detection via plc
Power theft detection via plcPower theft detection via plc
Power theft detection via plcbbshashanka
 
Architecture for Smart Grid based Consumer End Solution
Architecture for Smart Grid based Consumer End SolutionArchitecture for Smart Grid based Consumer End Solution
Architecture for Smart Grid based Consumer End SolutionShashank Dhariwal
 
Automatic energy meter reading
Automatic energy meter readingAutomatic energy meter reading
Automatic energy meter readingSURYAANDUKURI
 
eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)IISRT
 
Modern Electricity Billing System.pptx
Modern Electricity Billing System.pptxModern Electricity Billing System.pptx
Modern Electricity Billing System.pptxSudhanshuNajawan1
 
Abstract--Smart meter
Abstract--Smart meterAbstract--Smart meter
Abstract--Smart meterArjun .M.M.
 
under grund fault ppt (1).pptx
under grund fault ppt (1).pptxunder grund fault ppt (1).pptx
under grund fault ppt (1).pptxPoojaG86
 
A Novel Design of User Responsive Smart Meter
A Novel Design of User Responsive Smart MeterA Novel Design of User Responsive Smart Meter
A Novel Design of User Responsive Smart MeterArjun .M.M.
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...Iaetsd Iaetsd
 
TECHNICAL SEMINAR 1CR19EE017.ppt
TECHNICAL SEMINAR 1CR19EE017.pptTECHNICAL SEMINAR 1CR19EE017.ppt
TECHNICAL SEMINAR 1CR19EE017.pptssuserb313d9
 
Sample Database For Rfid Automatic Vehicle Identification
Sample Database For Rfid Automatic Vehicle IdentificationSample Database For Rfid Automatic Vehicle Identification
Sample Database For Rfid Automatic Vehicle IdentificationAlicia Johnson
 
RAJPRASAD PAPER NO-127
RAJPRASAD PAPER NO-127RAJPRASAD PAPER NO-127
RAJPRASAD PAPER NO-127RAJPRASAD RS
 
IRJET-Electrical Power Robbery Detection and Transformer Fault Detection
IRJET-Electrical Power Robbery Detection and Transformer Fault Detection  IRJET-Electrical Power Robbery Detection and Transformer Fault Detection
IRJET-Electrical Power Robbery Detection and Transformer Fault Detection IRJET Journal
 
IRJET- Iot Based Underground Cable Line Fault Detection
IRJET- Iot Based Underground Cable Line Fault DetectionIRJET- Iot Based Underground Cable Line Fault Detection
IRJET- Iot Based Underground Cable Line Fault DetectionIRJET Journal
 

Similar a Wirelesspowertheftmonitoringoriginalbyrupalipatra 121126043543-phpapp02 (20)

Rahul koundinya
Rahul koundinya Rahul koundinya
Rahul koundinya
 
Power theft detection via plc
Power theft detection via plcPower theft detection via plc
Power theft detection via plc
 
Architecture for Smart Grid based Consumer End Solution
Architecture for Smart Grid based Consumer End SolutionArchitecture for Smart Grid based Consumer End Solution
Architecture for Smart Grid based Consumer End Solution
 
Automatic energy meter reading
Automatic energy meter readingAutomatic energy meter reading
Automatic energy meter reading
 
eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)
 
S2-R2
S2-R2S2-R2
S2-R2
 
Modern Electricity Billing System.pptx
Modern Electricity Billing System.pptxModern Electricity Billing System.pptx
Modern Electricity Billing System.pptx
 
Abstract--Smart meter
Abstract--Smart meterAbstract--Smart meter
Abstract--Smart meter
 
under grund fault ppt (1).pptx
under grund fault ppt (1).pptxunder grund fault ppt (1).pptx
under grund fault ppt (1).pptx
 
A Novel Design of User Responsive Smart Meter
A Novel Design of User Responsive Smart MeterA Novel Design of User Responsive Smart Meter
A Novel Design of User Responsive Smart Meter
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
 
TECHNICAL SEMINAR 1CR19EE017.ppt
TECHNICAL SEMINAR 1CR19EE017.pptTECHNICAL SEMINAR 1CR19EE017.ppt
TECHNICAL SEMINAR 1CR19EE017.ppt
 
Smart Grid
Smart GridSmart Grid
Smart Grid
 
A12PPT.pdf
A12PPT.pdfA12PPT.pdf
A12PPT.pdf
 
Sample Database For Rfid Automatic Vehicle Identification
Sample Database For Rfid Automatic Vehicle IdentificationSample Database For Rfid Automatic Vehicle Identification
Sample Database For Rfid Automatic Vehicle Identification
 
RAJPRASAD PAPER NO-127
RAJPRASAD PAPER NO-127RAJPRASAD PAPER NO-127
RAJPRASAD PAPER NO-127
 
IRJET-Electrical Power Robbery Detection and Transformer Fault Detection
IRJET-Electrical Power Robbery Detection and Transformer Fault Detection  IRJET-Electrical Power Robbery Detection and Transformer Fault Detection
IRJET-Electrical Power Robbery Detection and Transformer Fault Detection
 
1.4
1.41.4
1.4
 
SMART GRID.pptx
SMART GRID.pptxSMART GRID.pptx
SMART GRID.pptx
 
IRJET- Iot Based Underground Cable Line Fault Detection
IRJET- Iot Based Underground Cable Line Fault DetectionIRJET- Iot Based Underground Cable Line Fault Detection
IRJET- Iot Based Underground Cable Line Fault Detection
 

Último

The Vietnam Believer Newsletter_MARCH 25, 2024_EN_Vol. 003
The Vietnam Believer Newsletter_MARCH 25, 2024_EN_Vol. 003The Vietnam Believer Newsletter_MARCH 25, 2024_EN_Vol. 003
The Vietnam Believer Newsletter_MARCH 25, 2024_EN_Vol. 003believeminhh
 
Human Resource Management Chapter 9: Performance Management and Appraisal
Human Resource Management Chapter 9: Performance Management and AppraisalHuman Resource Management Chapter 9: Performance Management and Appraisal
Human Resource Management Chapter 9: Performance Management and Appraisalgomezdominic3
 
Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access
 
Intellectual Property Licensing Examples
Intellectual Property Licensing ExamplesIntellectual Property Licensing Examples
Intellectual Property Licensing Examplesamberjiles31
 
מיסוי רילוקיישן לפורטוגל- היבטי מיסוי ישראלי ופורטוגלי
מיסוי רילוקיישן לפורטוגל- היבטי מיסוי ישראלי ופורטוגלימיסוי רילוקיישן לפורטוגל- היבטי מיסוי ישראלי ופורטוגלי
מיסוי רילוקיישן לפורטוגל- היבטי מיסוי ישראלי ופורטוגליBen Shushan & Co. C.P.A (Isr.)
 
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for BusinessQ2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for BusinessAPCO
 
PDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfPDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfHajeJanKamps
 
Ethical stalking by Mark Williams. UpliftLive 2024
Ethical stalking by Mark Williams. UpliftLive 2024Ethical stalking by Mark Williams. UpliftLive 2024
Ethical stalking by Mark Williams. UpliftLive 2024Winbusinessin
 
Transform Your Kitchen Essential Tips for Renovations in Launceston
Transform Your Kitchen Essential Tips for Renovations in LauncestonTransform Your Kitchen Essential Tips for Renovations in Launceston
Transform Your Kitchen Essential Tips for Renovations in Launcestondjhbuildersau
 
Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024Borderless Access
 
Building Your Personal Brand on LinkedIn - Expert Planet- 2024
 Building Your Personal Brand on LinkedIn - Expert Planet-  2024 Building Your Personal Brand on LinkedIn - Expert Planet-  2024
Building Your Personal Brand on LinkedIn - Expert Planet- 2024Stephan Koning
 
MC Heights construction company in Jhang
MC Heights construction company in JhangMC Heights construction company in Jhang
MC Heights construction company in Jhangmcgroupjeya
 
Live-Streaming in the Music Industry Webinar
Live-Streaming in the Music Industry WebinarLive-Streaming in the Music Industry Webinar
Live-Streaming in the Music Industry WebinarNathanielSchmuck
 
Developing Coaching Skills: Mine, Yours, Ours
Developing Coaching Skills: Mine, Yours, OursDeveloping Coaching Skills: Mine, Yours, Ours
Developing Coaching Skills: Mine, Yours, OursKaiNexus
 
Company Profile and SWOT Analysis Product List.pdf
Company Profile and SWOT Analysis Product List.pdfCompany Profile and SWOT Analysis Product List.pdf
Company Profile and SWOT Analysis Product List.pdfRobertPhillips265023
 
Project Brief & Information Architecture Report
Project Brief & Information Architecture ReportProject Brief & Information Architecture Report
Project Brief & Information Architecture Reportamberjiles31
 
7movierulz.uk
7movierulz.uk7movierulz.uk
7movierulz.ukaroemirsr
 
Data skills for Agile Teams- Killing story points
Data skills for Agile Teams- Killing story pointsData skills for Agile Teams- Killing story points
Data skills for Agile Teams- Killing story pointsyasinnathani
 

Último (20)

The Vietnam Believer Newsletter_MARCH 25, 2024_EN_Vol. 003
The Vietnam Believer Newsletter_MARCH 25, 2024_EN_Vol. 003The Vietnam Believer Newsletter_MARCH 25, 2024_EN_Vol. 003
The Vietnam Believer Newsletter_MARCH 25, 2024_EN_Vol. 003
 
Human Resource Management Chapter 9: Performance Management and Appraisal
Human Resource Management Chapter 9: Performance Management and AppraisalHuman Resource Management Chapter 9: Performance Management and Appraisal
Human Resource Management Chapter 9: Performance Management and Appraisal
 
Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024
 
Intellectual Property Licensing Examples
Intellectual Property Licensing ExamplesIntellectual Property Licensing Examples
Intellectual Property Licensing Examples
 
AL Satwa Dubai Call Girls +971552825767 Call Girls In AL Karama
AL Satwa Dubai Call Girls +971552825767  Call Girls In AL KaramaAL Satwa Dubai Call Girls +971552825767  Call Girls In AL Karama
AL Satwa Dubai Call Girls +971552825767 Call Girls In AL Karama
 
מיסוי רילוקיישן לפורטוגל- היבטי מיסוי ישראלי ופורטוגלי
מיסוי רילוקיישן לפורטוגל- היבטי מיסוי ישראלי ופורטוגלימיסוי רילוקיישן לפורטוגל- היבטי מיסוי ישראלי ופורטוגלי
מיסוי רילוקיישן לפורטוגל- היבטי מיסוי ישראלי ופורטוגלי
 
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for BusinessQ2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
 
PDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfPDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdf
 
WAM Corporate Presentation Mar 25 2024.pdf
WAM Corporate Presentation Mar 25 2024.pdfWAM Corporate Presentation Mar 25 2024.pdf
WAM Corporate Presentation Mar 25 2024.pdf
 
Ethical stalking by Mark Williams. UpliftLive 2024
Ethical stalking by Mark Williams. UpliftLive 2024Ethical stalking by Mark Williams. UpliftLive 2024
Ethical stalking by Mark Williams. UpliftLive 2024
 
Transform Your Kitchen Essential Tips for Renovations in Launceston
Transform Your Kitchen Essential Tips for Renovations in LauncestonTransform Your Kitchen Essential Tips for Renovations in Launceston
Transform Your Kitchen Essential Tips for Renovations in Launceston
 
Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024
 
Building Your Personal Brand on LinkedIn - Expert Planet- 2024
 Building Your Personal Brand on LinkedIn - Expert Planet-  2024 Building Your Personal Brand on LinkedIn - Expert Planet-  2024
Building Your Personal Brand on LinkedIn - Expert Planet- 2024
 
MC Heights construction company in Jhang
MC Heights construction company in JhangMC Heights construction company in Jhang
MC Heights construction company in Jhang
 
Live-Streaming in the Music Industry Webinar
Live-Streaming in the Music Industry WebinarLive-Streaming in the Music Industry Webinar
Live-Streaming in the Music Industry Webinar
 
Developing Coaching Skills: Mine, Yours, Ours
Developing Coaching Skills: Mine, Yours, OursDeveloping Coaching Skills: Mine, Yours, Ours
Developing Coaching Skills: Mine, Yours, Ours
 
Company Profile and SWOT Analysis Product List.pdf
Company Profile and SWOT Analysis Product List.pdfCompany Profile and SWOT Analysis Product List.pdf
Company Profile and SWOT Analysis Product List.pdf
 
Project Brief & Information Architecture Report
Project Brief & Information Architecture ReportProject Brief & Information Architecture Report
Project Brief & Information Architecture Report
 
7movierulz.uk
7movierulz.uk7movierulz.uk
7movierulz.uk
 
Data skills for Agile Teams- Killing story points
Data skills for Agile Teams- Killing story pointsData skills for Agile Teams- Killing story points
Data skills for Agile Teams- Killing story points
 

Wirelesspowertheftmonitoringoriginalbyrupalipatra 121126043543-phpapp02

  • 1. WIRELESS POWER THEFT MONITORING SUBMITTED TO: MR.RANJAN .K. JENA MR.ABHIMANYU MOHAPATR DEPARTMENT OF ELECTRICAL ENGINEER SUBMITTED BY: RUPALI PATRA 0901106017 7TH SEM,EE
  • 2. CONTENTS:  INTRODUCTION i.POWER THEFT :DEFINITION ii.HOW IT OCCURS ?  DIFFERENT WAYS OF MONITORING POWER THEFT  MICROCONTROLLER BASED POWER THEFT MONITORING i.PROPOSED ARCHITECTURE  BLOCK DIAGRAM DESCRIPTION WORKING OF WIRELESS SENSOR NETWORK ADVANTAGES LIMITATIONS CONCLUSION
  • 3. INTRODUCTION- POWER THEFT :DEFINITION It is the use of electrical power without a contract with a supplier with total or partial bypassing of the metering system or interfering with this system in such a way so as to adulterate its measurements. Contract is understood here as a valid obligation to deliver power and to pay for it.
  • 4. 1.SLOWING DOWN THE METER: A common method of tampering older meters is to attach magnets to the outside of the meter. When this happens, the rotor disc is exposed to a high magnetic field. Hence, the resultant opposing magnetic field to the rotor is highly increased leading to slowing down of rotor or perfect stopping of the disc rotation. The electricity meter is thus manipulated and ultimately power is consumed without being paid for. ex- neodymium magnets. HOW IT OCCURS?
  • 5. 2.INVERTING THE METER/FEEDER: Another common form of electricity theft is to invert the meter (pull the meter out of the socket and plug the meter back in upside down, which causes the meter to run backwards and the kWh register to count down instead of up).
  • 6. 3.BYPASSING THE FEEDER/METER: Usually, the bypass supplies power to large and stable loads which will not trip fuses in the case of overloads. Ex-jumper cables. The rest of the circuits are supplied normally through the meter, so the bill, which is close to average, does not suggest a theft.
  • 7. DIFFERENT WAYS OF MONITORING POWER THEFT: GSM based power theft monitoring Microcontroller based power theft monitoring Power theft monitoring using PLC.
  • 8. MICRO-CONTROLLER BASED POWER THEFT MONITORING: The whole system architecture is based on integrating wireless network with existing electrical grid. The proposed module also incorporates different data aggregation algorithms and effective solutions needed for the different pathways of the electricity distribution system. OVERVIEW:
  • 9. THE PROPOSED ARCHITECTURE: The Architecture Consists Of Four Modules Namely: Controlling Station (CS)  Wireless Transformer Sensor Node (WTSN) Transmission Line Sensor Node (TLSN) Wireless Consumer Sensor Node (WCSN)
  • 11.  WCSN is a module which acts as a consumer power metering device that measures the power consumed by the consumer and send the data periodically to the WTSN. Each feeder of the transformer has a WTSN which monitors power through each line and collects data from WCSN ,aggregates it and sends to the CS. TLSN is another module associated with distribution line, mounted in each distribution line posts .
  • 12. DIFFERENT PARTS AND THEIR FUNCTIONS: ZIGBEE: We are using XBee-PRO OEM RF Module whish uses the zigbee technology. It is engineered to support the unique needs of low-cost, low-power and low data rate wireless sensor network providing reliable delivery of data between devices.  The XBee-PRO OEM RF Modules interface to a host device through a logic-level asynchronous serial port. ZIGBEE MODULE
  • 13. CURRENT TRANSFORMER CIRCUITRY: We are using Allegro ACS709 current sensor IC chip. The ACS709 consists of a Hall sensor integrated circuit (IC) with a copper conduction path located near the surface of the silicon die.  Applied current flows through the copper conduction path, and the analog output voltage from the Hall sensor IC linearly tracks the magnetic field generated by the applied current.
  • 14. MICROCONTROLLER: The LPC2148 microcontroller is based on a16-bit/32-bit ARM7TDMI-S CPU with embedded high-speed flash memory ranging from 32 kB to 512 kB.  A 128-bit wide memory interface architecture enable 32-bit code execution at the maximum clock rate. Due to their tiny size and low power consumption, LPC2148 is ideal for applications where miniaturization is a key requirement. Serial communication interfaces ranging from multiple UARTs, on-chip SRAM of 8 kB up to 40 kB, make these devices very well suited for communication gateways.
  • 15. LCD: LCD stands for Liquid Crystal Display. As the output of the circuit should be displayed in some form or the other, LCD display is selected as it can display 16 characters at a time. It is also easy to interface with the microcontroller without any decoder. So it is better than the seven segment display.
  • 17. WORKING OF WIRELESS SENSOR NETWORK: The sensor network monitors the electrical grid for a specified period of time, which may be daily, monthly or yearly.  Thus the WTSN stores the maximum demand for each consumer including the losses. The measured data from each WCSN is send to the neighbouring TLSN. The aggregated data is then sent to the next nearby WTSN. Thus the data transfers from WCSN to the corresponding WTSN through TLSN.  The collected data is compared with the measured data by the energy meter. •Normally these two data are almost same.  If there is any difference (dmc) in the collected data and the measured data, there may be a line fault or a power theft in that segment.  Large value of dmc indicates a line fault and small value of dmc indicate a power theft .
  • 18. ADVANTAGES: The proposed system provides the solution for some of the main problems faced by the existing Indian grid system, such as wastage of energy, power theft, manual billing system, and transmission line fault.  This method will reduce the energy wastage and save a lot of energy for future use.  We can detect the location from where the power is being stolen which was not possible before.  Optimized use of energy.
  • 19. LIMITATIONS: One major disadvantage of this project is that it is not capable of detecting the exact location from where the power is being stolen giving only a approximation to that place.  Cannot determine who is stealing, but even no other existing system is capable of doing this.  If implemented on a large scale it may take a lot of time and manual input.
  • 20. CONCLUSION: This method reduces the heavy power and revenue losses that occur due to power theft by the customers.  By this design it can be concluded that power theft can be effectively curbed by detecting where the power theft occurs and informing the authorities. Also an automatic circuit breaker may be integrated to the unit so as to remotely cut off the power supply to the house or consumer who tries to indulge in power theft.  The ability of the proposed system to inform or send data digitally to a remote station using wireless radio link adds a large amount of possibilities to the way the power supply is controlled by the electricity board. This system will reduce the energy wastage and save a lot for future use.