Post on 03-Apr-2018
7/29/2019 Wireless Power Theft Monitering_2
1/22
PRESENTED BY
dharmendra Kumar .g
7/29/2019 Wireless Power Theft Monitering_2
2/22
Introduction
Literature Survey
Problem definition
Preliminary Design
Microcontroller PIC16F73
RF Transceiver
RF Receiver
Objective
Conclusion
Reference
7/29/2019 Wireless Power Theft Monitering_2
3/22
Electricity theft is at the center of focus all over theworld but electricity theft in India has a significant effect
on the Indian economy, as this figure is considerably
high.
The experts says, losses are currently 29 % of the
total generation, which equals a shocking Rs 45,000
crore in the year 2009-10 and 55,000cr in2011-12
According to experts, if not for these losses over a
decade now, India could have built two mega power
plants of around 4,000 MW capacity every yearPower loss in 2001-02 was 32.86% and increased
to 34.78% in 2003-04. In 2008-09 , it stood at 28.44%
but currently the figure is again 29.9%.
7/29/2019 Wireless Power Theft Monitering_2
4/22
The normal practice for power theft is to short the input and output
terminals or to place a magnet on the wheel in case of old meters.
7/29/2019 Wireless Power Theft Monitering_2
5/22
Use of single phase supply from three phase supply.
Disconnected neutral from both the ends. Used
earth/separate neutral for return circuit.
Connecting phase voltage to neutral of used single phasesupply. Potential difference w.r.t. neutral of used single
phase supply is zero. Hence power, product of voltage and
current, will be zero.
Drilling pin hole in meter box and in meter, near MRI port.
Disturbing electronic common reference point of
measurement
7/29/2019 Wireless Power Theft Monitering_2
6/22
These are some of the more common methods of identifying
electricity theft today:
Financial Rewards - Utility companies encourage consumers to
report electricity theft, sometimes offering big rewards for
information leading to conviction of anyone stealing electricity.
Unfortunately, most cases are never identified
Periodic Checks - Electricity theft frequently takes place after service
has been disconnected. Some utility companies periodically check
disconnected meters if the customer has not contacted them to
reconnect service. This labor-intensive, manual process has little
chance of success.
Meter Readers - Utility meter readers typically suspect that
electricity theft is taking place when they find a broken meter tag or
other signs of tampering. But as more utility companies outsource
the meter reading function to third parties, training meter readers to
detect theft is becoming more difficult and less efficient. In addition,
third party meter readers do not read disconnected meters
7/29/2019 Wireless Power Theft Monitering_2
7/22
Power theft detection circuit
Patent number : 4532471 ( 30.07.1985)
This invention relates to a method and apparatus for
detecting the theft of power when a short circuit jumperis coupled across a line conductor passing through watt-
hour meter. However the method is costlier to be
implemented and it has no way of alerting the authorities
unless a regular survey is done.
7/29/2019 Wireless Power Theft Monitering_2
8/22
Power theft detection system
Patent number : US20080109387A1(May 8th
2008)
The system finds out the power theft by
monitoring the total power consumption,
receiving the delivered power data that includesdata delivered to a number of users. Determining
the amount of difference between them, thus
finding out if power theft has occurred. But there
lies no specific way to find out where the powertheft has occurred
7/29/2019 Wireless Power Theft Monitering_2
9/22
Ineffective and inefficient present methods of detecting
and preventing Power theft cause a revenue loss along
with damage to personal and Public property
Large amount of power shortage is caused due to power
theft
One of the challenges in stopping power theft is the
difficulty in detecting power theft. In particular it is
difficult to find the exact location where power theft is
occurring.
Measurement of parameters like power line current and
power line voltage has not been available in a satisfactory
way to optimize power network management
7/29/2019 Wireless Power Theft Monitering_2
10/22
7/29/2019 Wireless Power Theft Monitering_2
11/22
Regulated power supply.RF transmitter and Receiver.
Two Micro controller boards.
Serial Port interfacingPC
Meter and line pulse sensor
Relay systemMAX 232 Interface
7/29/2019 Wireless Power Theft Monitering_2
12/22
In our system, a micro controller is interfaced with an
energy metering circuit, current sensing circuit, RF
communication link & a contactor to make or break
power line. At the sub-station end, a pc is connected witha RF link to communicate with all energy meters & a
buzzer
In normal condition, micro controller reads energy pulses
& current signals. If current is drawing &energy pulses arenormal, then no power theft is being done & the o/p is
connected. If current is drawing & energy
If microcontroller detects no pulses, then it indicates
power theft. So microcontroller trips the o/p using relay.This information is sent to substation using wireless
communication
In the substation, it receives the information in the form
of digital codes & on decoding it, we can know at whichhouse ower theft occurred.
7/29/2019 Wireless Power Theft Monitering_2
13/22
The PIC16F73 CMOS FLASH-based 8-bitmicrocontroller
Operating speed: DC - 20 MHz clock input
DC - 200 ns instruction cycle
Features 8 channels of 8-bit Analog-to-
Digital (A/D) converter
Up to 8K x 14 words of FLASH ProgramMemory, Up to 368 x 8 bytes of Data
Memory (RAM)
7/29/2019 Wireless Power Theft Monitering_2
14/22
A synchronous serial port that can be
configured as either 3-wire SPI or 2-wire
I2C bus,
a Universal Synchronous Asynchronous
Receiver Transmitter(USART)
a Parallel Slave Port.
Only 35 single word instructions to learn
Interrupt capability (up to 12 sources)Eight level deep hardware stack
7/29/2019 Wireless Power Theft Monitering_2
15/22
An RF transmitter module is a small pcbsub assembly capable of transmitting a
radio wave and modulating that wave tocarry data. Transmitter modules are usuallyimplemented alongside a microcontrollerwhich will provide data to the module
which can be transmitted.
7/29/2019 Wireless Power Theft Monitering_2
16/22
The 433 MHz Parallax RF Transceiver Module
3.3 to 5.0VDC, Transmit: 12mA, Receive: 6.1 mA
Power Down: 11.5 uA High speed data transfer rates: 1200-9600 bps
Asynchronous serial data (TTL/CMOS compatible)
SIP header allows for ease of use with breadboards
Compatible with most microcontrollers including the
Propeller chip and all BASIC Stamp models
Power-down mode for conservative energy usage (longer
battery life)
Line of sight range up to 250 feet (depending on operating
conditions
7/29/2019 Wireless Power Theft Monitering_2
17/22
The ST-RX02-ASK
A effective low cost solution for using at
315/433.92 MHZ.
Receiver Frequency: 315 / 433.92 MHZTypical sensitivity: -105dBm
Supply Current: 3.5mA
IF Frequency:1MHz
7/29/2019 Wireless Power Theft Monitering_2
18/22
Real-time Power monitoring athouses.
Sensing the power theft at the exact
location.Transmitting the information over
wireless, to substation
7/29/2019 Wireless Power Theft Monitering_2
19/22
Aim of this project is at reducing the heavy power and
revenue losses that occur due to power theft by the
customers.
This design would like to conclude that the power theft
can be effectively curbed by detecting where the power
theft occurs inform the authorities. Also a automatic
circuit breaker may be integrated to the unit so as to
remotely cut off the power supply to the house or
consumer who tries to indulge in power theft.
The ability of this system to inform or send data digitally
to a remote station using wireless radio link adds a largeamount of possibilities to the way the power supply is
controlled by the electricity board.
7/29/2019 Wireless Power Theft Monitering_2
20/22
Thus by the above mentioned design we can successfully and
effectively address the problems related to power theft by
the consumers, in a completely automated, wire-free, cost
effective and most importantly a reliable way.
7/29/2019 Wireless Power Theft Monitering_2
21/22
IEEE links for this project:
http://ieeexplore.ieee.org/Xplore/login.jsp?url=
http%3A%2F%2Fieeexplore.ieee.org%2Fiel5%2F4
918025%2F4918026%2F04918176.pdf%3Farnumber%3D4918176&authDecision=-203
7/29/2019 Wireless Power Theft Monitering_2
22/22