This paper describes an improved model for the monitoring of power used by a party such as household users and different industries in Pakistan. The power theft detection was done using the intelligent internet of things (IoT) service system for calculating the user's power simultaneously. The power meter catches a theft detection device that is instantly transmitted to the central system which compares both the data by means of microcontroller and if there is any difference found, it informs the power utility about the hooking, meter relief or theft activities happen. Information of the theft detection through the global mobile communications system is transmitted and notified theft is displayed on the terminal monitor or won. As a result, although consumers continue to use excess fuel, the customer's power supply is cut in the electricity boards segment. The general radio package module system sends central circuit and meter data via an internet protocol address to a web server. GSM's IoT based perception is used to monitor the power supply and billing information calculated with a microcontroller continuously with the determination of the electricity table area. With this unit, the duplicate user can be located at the rear of the electricity office with the power meter status.
IRJET- Overloading Detection in Residentional AreaIRJET Journal
The document summarizes a proposed system for detecting overloading in residential areas. Current sensors measure incoming and outgoing current from an energy meter. If outgoing current is greater than incoming, overloading occurs. The currents are compared using Arduino programming. If overloading is detected, warning SMS are sent to the utility and consumer via GSM. The supply is then cut off by a relay. The system aims to prevent losses from transformer overloading due to electricity theft or excessive usage.
Design a smart control strategy to implement an intelligentAnggara Nasution
This research article proposes an intelligent energy safety and management system (IESMS) that uses RFID and ZigBee wireless sensor network technologies. The system identifies users, monitors and controls power outlets, and cuts off power when the RFID card is removed. It also implements a smart control strategy to prevent electrical circuit overload by shutting down some power outlets. Test results validated the effectiveness of the proposed IESMS and its ability to achieve energy savings and safety.
Power distribution system fault monitoring device for supply networks in NigeriaIJECEIAES
Electric power is the bedrock of our modern way of life. In Nigeria, power supply availability, sufficiency and reliability are major operational challenges. At the generation and transmission level, effort is made to ensure status monitoring and fault detection on the power network, but at the distribution level, particularly within domestic consumer communities there are no fault monitoring and detection devices except for HRC fuses at the feeder pillar. Unfortunately, these fuses are sometimes replaced by a copper wire bridge at some locations rendering the system unprotected and creating a great potential for transformer destruction on overload. This study is focused on designing an on-site power system monitoring device to be deployed on selected household entry power cables for detecting and indicating when phase off, low voltage, high voltage, over current, and blown fuse occurs on the building’s incomer line. The fault indication will help in reducing troubleshooting time and also ensure quick service restoration. After design implementation, the test result confirms design accuracy, device functionality and suitability as a low-cost solution to power supply system fault monitoring within local communities.
Necessity of Internet of Things in Smart Gridijtsrd
This document discusses the importance of implementing Internet of Things (IoT) technologies in smart grids. It covers how IoT can enhance generation, transmission, and distribution in the grid. At the generation level, IoT allows for better integration of renewable energy sources like wind and solar. In transmission, IoT sensors can monitor infrastructure and mitigate damage from natural disasters. At the distribution level, IoT enables monitoring of microgrids and smart energy management in homes and buildings. The document argues that IoT is necessary to efficiently manage energy resources and ensure sustainability in future power systems.
This document discusses overvoltage protection for data concentrators used in smart grid applications. It describes the different network levels in smart grids - core, distribution and access networks. For the access network, which provides last mile connectivity between hardware and smart meters, technologies used include power line communication and various wireless standards. Outdoor data concentrator hardware is susceptible to lightning strikes and surges. The document then discusses lightning protection zones and the electrical parameters for surge protection devices used to protect communications ports and power inputs for such outdoor hardware from transient overvoltages.
Design of smart wireless changeover for continuous electric current feeding f...IJECEIAES
Electric power has become a vital element for life today. Despite this importance, electric power consumers in Iraq suffer from the problem of noncontinuity and daily electric power supply interruption. This problem led to the use of various sources of electric power as an alternative to compensate for the shortage of electric power provided by the Iraqi national grid. In this work, a smart wireless changeover device is designed using wireless sensor networks technology aiming to solve problem caused by the multiplicity of power sources received at home and governmental buildings in Iraq by controlling operation of some electrical devices (which consume high current) in the home or workplace automatically when changing source of electricity from one to another. This solution will help to ensure the continuity of electric current feeding from power sources of variable capacities, also, to rationalize power consumption by assigning an operation priority to electric devices. Furthermore, a statistical measurement as a case study was performed in a building with a total power consumption of 160.8 KW/h. The result showed that the device functions effectively and it is capable of achieving an average saving in power of about 50% to 86% depending on the applied priorities and case study scenario.
Smart Grid Components Control Elements & Smart Grid TechnologySurajPrakash115
1. The document discusses the key components of a smart grid, including monitoring and control technology, transmission systems, smart devices interfaces, distribution systems, storage, and demand side management.
2. It describes each component in detail, explaining their functions and how they improve reliability, integration of renewable resources, and two-way power flow.
3. The technologies that will drive smart grids are identified as integrated communications, sensing and measurement, advanced components, and advanced control methods.
The document discusses key aspects of smart grids including how they allow two-way communication between utilities and consumers to save energy and reduce costs and emissions. It also discusses how smart grids optimize the operation of interconnected grid elements and integrate renewable energy and energy storage. Challenges to smart grids include upgrading aging infrastructure and developing regulatory policies to accommodate features like time-of-use pricing.
IRJET- Overloading Detection in Residentional AreaIRJET Journal
The document summarizes a proposed system for detecting overloading in residential areas. Current sensors measure incoming and outgoing current from an energy meter. If outgoing current is greater than incoming, overloading occurs. The currents are compared using Arduino programming. If overloading is detected, warning SMS are sent to the utility and consumer via GSM. The supply is then cut off by a relay. The system aims to prevent losses from transformer overloading due to electricity theft or excessive usage.
Design a smart control strategy to implement an intelligentAnggara Nasution
This research article proposes an intelligent energy safety and management system (IESMS) that uses RFID and ZigBee wireless sensor network technologies. The system identifies users, monitors and controls power outlets, and cuts off power when the RFID card is removed. It also implements a smart control strategy to prevent electrical circuit overload by shutting down some power outlets. Test results validated the effectiveness of the proposed IESMS and its ability to achieve energy savings and safety.
Power distribution system fault monitoring device for supply networks in NigeriaIJECEIAES
Electric power is the bedrock of our modern way of life. In Nigeria, power supply availability, sufficiency and reliability are major operational challenges. At the generation and transmission level, effort is made to ensure status monitoring and fault detection on the power network, but at the distribution level, particularly within domestic consumer communities there are no fault monitoring and detection devices except for HRC fuses at the feeder pillar. Unfortunately, these fuses are sometimes replaced by a copper wire bridge at some locations rendering the system unprotected and creating a great potential for transformer destruction on overload. This study is focused on designing an on-site power system monitoring device to be deployed on selected household entry power cables for detecting and indicating when phase off, low voltage, high voltage, over current, and blown fuse occurs on the building’s incomer line. The fault indication will help in reducing troubleshooting time and also ensure quick service restoration. After design implementation, the test result confirms design accuracy, device functionality and suitability as a low-cost solution to power supply system fault monitoring within local communities.
Necessity of Internet of Things in Smart Gridijtsrd
This document discusses the importance of implementing Internet of Things (IoT) technologies in smart grids. It covers how IoT can enhance generation, transmission, and distribution in the grid. At the generation level, IoT allows for better integration of renewable energy sources like wind and solar. In transmission, IoT sensors can monitor infrastructure and mitigate damage from natural disasters. At the distribution level, IoT enables monitoring of microgrids and smart energy management in homes and buildings. The document argues that IoT is necessary to efficiently manage energy resources and ensure sustainability in future power systems.
This document discusses overvoltage protection for data concentrators used in smart grid applications. It describes the different network levels in smart grids - core, distribution and access networks. For the access network, which provides last mile connectivity between hardware and smart meters, technologies used include power line communication and various wireless standards. Outdoor data concentrator hardware is susceptible to lightning strikes and surges. The document then discusses lightning protection zones and the electrical parameters for surge protection devices used to protect communications ports and power inputs for such outdoor hardware from transient overvoltages.
Design of smart wireless changeover for continuous electric current feeding f...IJECEIAES
Electric power has become a vital element for life today. Despite this importance, electric power consumers in Iraq suffer from the problem of noncontinuity and daily electric power supply interruption. This problem led to the use of various sources of electric power as an alternative to compensate for the shortage of electric power provided by the Iraqi national grid. In this work, a smart wireless changeover device is designed using wireless sensor networks technology aiming to solve problem caused by the multiplicity of power sources received at home and governmental buildings in Iraq by controlling operation of some electrical devices (which consume high current) in the home or workplace automatically when changing source of electricity from one to another. This solution will help to ensure the continuity of electric current feeding from power sources of variable capacities, also, to rationalize power consumption by assigning an operation priority to electric devices. Furthermore, a statistical measurement as a case study was performed in a building with a total power consumption of 160.8 KW/h. The result showed that the device functions effectively and it is capable of achieving an average saving in power of about 50% to 86% depending on the applied priorities and case study scenario.
Smart Grid Components Control Elements & Smart Grid TechnologySurajPrakash115
1. The document discusses the key components of a smart grid, including monitoring and control technology, transmission systems, smart devices interfaces, distribution systems, storage, and demand side management.
2. It describes each component in detail, explaining their functions and how they improve reliability, integration of renewable resources, and two-way power flow.
3. The technologies that will drive smart grids are identified as integrated communications, sensing and measurement, advanced components, and advanced control methods.
The document discusses key aspects of smart grids including how they allow two-way communication between utilities and consumers to save energy and reduce costs and emissions. It also discusses how smart grids optimize the operation of interconnected grid elements and integrate renewable energy and energy storage. Challenges to smart grids include upgrading aging infrastructure and developing regulatory policies to accommodate features like time-of-use pricing.
29 9136 eee learning manuscript on power (edit lafi)IAESIJEECS
This paper manages the investigation of the control system and the down to earth utilization of electrical machines utilizing an android telephone in a Zigbee arrange. The framework measures the voltage and current parameters of electric gadgets and consequently sees the power devoured. The proposed framework is an adaptable framework which gives a proficient and successful control system from a remote area. The framework likewise concentrates on voice based control and in this manner spares the power cost of the purchasers. Alternate other options to zigbee are additionally examined in the paper.
The document discusses and compares the existing U.S. power grid and the future "smart grid". The existing grid is highly decentralized with no central control, but relies on aging infrastructure. While it is resilient to outages and attacks, increasing demand will require upgrades. The smart grid will use more advanced monitoring through computer networks, allowing utilities and consumers to reduce usage. While this poses security challenges, experts believe the benefits outweigh the risks, and political support is growing for standards to secure critical infrastructure.
IRJET - Design and Simulation of DSTATCOM using Fuzzy Logic ControllerIRJET Journal
This document discusses the design and simulation of a DSTATCOM (distributed static compensator) using a fuzzy logic controller. A DSTATCOM is a shunt-connected voltage source converter that can generate or absorb reactive power to improve power quality issues like voltage sags and swells. The document first provides background on power quality issues and the factors driving increased focus on power quality. It then describes the basic components and operating principle of a DSTATCOM for reactive power compensation and power factor correction. Finally, it discusses controlling strategies for DSTATCOM, including using a fuzzy logic supervisor to vary the gains of a PI controller and improve transient performance of the DC link voltage during load changes.
IRJET- Power Line Carrier Communication (PLCC) Systems: A ReviewIRJET Journal
The document reviews power line carrier communication (PLCC) systems, which use existing power lines to transmit data communication signals. It discusses the benefits of PLCC such as using existing infrastructure and ubiquity. The document also summarizes several research papers on applications of PLCC including home automation, remote meter reading, and smart lighting control.
IRJET- Smart Energy Meter Theft Detection using IoTIRJET Journal
The document discusses a smart energy meter theft detection system using IoT. It proposes using an Arduino board connected to sensors to monitor two energy meters - one for a paid customer and one for an unpaid customer. If the unpaid customer's usage exceeds a limit, an alert would be sent via WiFi modules. If the customer does not pay their bill, a command would be sent to the server to cut off the unpaid customer's power supply. The system aims to reduce electricity theft and help utilities better monitor energy usage and bill payment.
GREEN POWER & BROADBAND CONNECTIVITY FOR RURAL AREAS WITH REMOTE SITE MANAGEMENTkvnpk123
Knowledge Partnership for Transforming Lives by Technological Excellence
GREEN POWER & BROADBAND CONNECTIVITY FOR RURAL AREAS WITH REMOTE SITE MANAGEMENT
This document provides an overview of smart grid physical protection. It discusses system reliability analysis and failures in protection mechanisms. For system reliability analysis, it describes methods to ensure reliability of distributed generation, measurement infrastructure, and the network before implementation. It also discusses empowering substations with decision-making abilities. For failures in protection mechanisms, it covers predicting and preventing failures, as well as identifying, diagnosing, and recovering from failures. The document provides examples of research in these areas and their approaches to improving smart grid reliability and protection.
The document discusses smart grids, which are developing networks of energy systems that allow for two-way communication between suppliers and consumers. Some key points:
- Cities use 75% of the world's energy and 400 kWh are wasted currently.
- Smart grids would create 370,000 new jobs and allow consumers to get feedback on their energy usage in real-time to reduce consumption.
- When developing smart grids, management of consumer privacy, well-structured implementation to avoid negatively impacting energy companies, and developing new communication and sensor networks are important issues to consider.
- The biggest challenges to implementing smart grids are the large costs and effort required to completely change a country's energy infrastructure and ensure consumers understand
IoT Based Smart Energy Meter using Raspberry Pi and Arduino Bilal Amjad
This project, design and implemented a low-cost IoT based energy monitoring system (smart energy meter) for real-time monitoring of all electrical parameters i.e. AC voltage, AC current, active power, total energy consumption, power factor, frequency, and tariff. The design is based on a low-cost PZEM-004T, using a non-invasive Current Transformer
(CT) sensors, Arduino and Raspberry pi. Electrical measurements are done by PZEM-004T and CT sensors through Arduino. Raspberry pi communicates with Arduino through serial communication to retrieve these sensor’s data and send it to the server via internet. As a result, the developed energy monitoring system can successfully record the voltage, current, active power, power factor, frequency, accumulative power consumption and tariff. Consumers will be able to
see their electricity usage and the tariff according to the energy usage in real-time through web and mobile application. In case of any fault e.g., short circuit or power supply cut off, the consumer will receive a text message on his mobile number. Moreover, consumers will be able to receive the tariff on a weekly or monthly basis.
GRID INTERCONNECTION OF RENEWABLE ENERGY SOURCES AT DISTRIBUTION LEVEL WITH P...Pradeep Avanigadda
Renewable energy resources (RES) are being increasingly connected in distribution systems utilizing power electronic converters. This project presents a novel control strategy for achieving maximum benefits from these grid-interfacing inverters when installed in 3-phase 4-wire distribution systems. The inverter is controlled to perform as a multi-function device by incorporating active power filter functionality. The inverter can thus be utilized as: 1) power converter to inject power generated from RES to the grid, and 2) shunt APF to compensate current unbalance, load current harmonics, load reactive power demand and load neutral current. All of these functions may be accomplished either individually or simultaneously. With such a control, the combination of grid-interfacing inverter and the 3-phase 4-wire linear/non-linear unbalanced load at point of common coupling appears as balanced linear load to the grid. This new control concept is demonstrated with extensive MATLAB/ Simulink simulation studies and validated through digital signal processor-based laboratory experimental results.
On Going research on Problems Faced In smart grid in general. Yet Work is in progress Just a light notes on General issues in smart grid, Technically work is to be on target in smart grid.
Overall fuzzy logic control strategy of direct driven PMSG wind turbine conne...IJECEIAES
The fuzzy logic strategies reported in the literature about the control of direct drive permanent magnet synchronous generator (PMSG) connected to grid are limited in terms of inclusiveness and efficiency. So an overall control based on fuzzy logic and anti-windup compensation is proposed in this paper. Aiming at the inadequate of hill climb search (HCS) MPPT with fixed step size, the fuzzy logic is introduced in the stage of "generating rotor speed reference" to overcome the oscillations and slowness in traditional method. PI controllers are replaced by anti-windup fuzzy logic controllers in the "machine side control" stage and in "grid side control" stage to pertinently regulate the reference parameters. Then comparison tests with classical methods are implemented under varying climatic conditions. The results obtained demonstrate that the developed control is superior to other methods in response time (less than 4.528E-04 s), precision (an overshoot about 0.41%) and quality of produced energy (efficiency is 91%). The study verifying the feasibility and effectiveness of this algorithm in PMSG wind turbine connected to grid.
IRJET- A Smart Monitoring System for Hybrid Energy System using IoTIRJET Journal
This document describes a smart monitoring system for a hybrid energy system using IoT. The system uses solar and wind energy sources and can switch between them without inconvenience through an Android app and WiFi module. An ESP32 microcontroller module transmits and receives electrical data wirelessly from the app and monitors the system. Users can control the energy sources remotely through the app in a flexible and secure manner. The system provides an efficient, cheaper, and flexible way to control hybrid energy sources manually and remotely.
this slide shows what is smart grid ,its comparison between the electromechanical grids . smart meters and devises for the smart grid . benefit of smart grid . and a conclution
IOT BASED POWER GRID MONITORING & CONTROL SYSTEMvivatechijri
Energy generation corporations provide electricity to any or all the households via intermediate controlled power transmission hubs referred to as Electricity Grid. Generally issues arise thanks to failure of the electricity grid resulting in black out of a complete space that was obtaining provide from that individual grid. This project aims to resolve this downside victimization IOT because the means that of communication and conjointly coping with numerous alternative problems that a wise system will traumatize to avoid needless losses to the Energy producers.
This document provides an introduction to smart grids. It defines a smart grid as an intelligent power grid that uses communication technology and smart meters to allow bidirectional power flow and handle distributed energy resources. The key benefits of smart grids are more reliable, flexible, efficient and robust power delivery. Smart grids modernize the traditional one-way power grid into an automated system with two-way data communication between power producers and consumers. This enables features like self-monitoring, self-healing and demand response capabilities. Security is also an important consideration for smart grids due to the integration of digital technologies.
Detection and Instantaneous Prevention of Power TheftIOSR Journals
This document discusses methods for detecting and preventing power theft. It begins by outlining the problem of electricity theft in India, costing $17 billion annually. It then describes some common methods of theft, such as attaching magnets to meters or bypassing meters. The document presents a proposed circuit to detect two types of theft: phase bypassing and overloading. It includes block diagrams of the circuit and simulations of overload and phase bypass conditions. Upon detection, the circuit would instantly disconnect the main power supply. The circuit uses readily available components like optocouplers and relays in a cost-effective design. In conclusion, the circuit could help address the significant problem of power theft.
1) The document discusses a GSM based power meter reading and control system that uses GSM technology to remotely read electricity meters and control home appliances.
2) Current manual meter reading is time-consuming and prone to errors. The proposed system sends daily meter readings via SMS to both users and the electricity department to generate accurate bills.
3) It also allows remote control of appliances to reduce unnecessary power consumption and save energy by monitoring power usage and controlling loads that exceed predefined limits.
Design of Wireless Power Transfer Charge Station for Electric VehicleIRJET Journal
1. The document describes a proposed design for a wireless power transfer charging station for electric vehicles.
2. It would use magnetic resonance to wirelessly transfer power between charging pads underground and electric vehicles parked above.
3. Drivers would identify themselves at the station using RFID cards, then select the amount of power to charge their vehicle batteries wirelessly through inductive power transfer without needing cables.
This document summarizes a study on the economic effects of technical and non-technical losses in Nigeria's power transmission system. The study found that Nigeria's 330kV transmission network suffers from high voltage drops and power losses of around 454.73 GW annually, costing over 4.4 billion naira. These losses are caused by technical issues like low generation capacity and a long, fragile network as well as non-technical issues like electricity theft. Reducing these transmission and distribution losses, which at 17.72% of output are very high compared to more efficient countries, could boost Nigeria's economic growth.
This document describes an advanced power theft detection system developed by students at ROHINI College of Engineering & Technology. The system uses two ESP8266 modules and current sensors to continuously monitor power consumption in real-time. It analyzes the data using an algorithm implemented on the Arduino IDE to detect anomalies that may indicate electricity theft. When theft is detected, alerts are triggered to notify authorities. The system aims to help mitigate electricity theft through rigorous testing and real-time monitoring capabilities.
29 9136 eee learning manuscript on power (edit lafi)IAESIJEECS
This paper manages the investigation of the control system and the down to earth utilization of electrical machines utilizing an android telephone in a Zigbee arrange. The framework measures the voltage and current parameters of electric gadgets and consequently sees the power devoured. The proposed framework is an adaptable framework which gives a proficient and successful control system from a remote area. The framework likewise concentrates on voice based control and in this manner spares the power cost of the purchasers. Alternate other options to zigbee are additionally examined in the paper.
The document discusses and compares the existing U.S. power grid and the future "smart grid". The existing grid is highly decentralized with no central control, but relies on aging infrastructure. While it is resilient to outages and attacks, increasing demand will require upgrades. The smart grid will use more advanced monitoring through computer networks, allowing utilities and consumers to reduce usage. While this poses security challenges, experts believe the benefits outweigh the risks, and political support is growing for standards to secure critical infrastructure.
IRJET - Design and Simulation of DSTATCOM using Fuzzy Logic ControllerIRJET Journal
This document discusses the design and simulation of a DSTATCOM (distributed static compensator) using a fuzzy logic controller. A DSTATCOM is a shunt-connected voltage source converter that can generate or absorb reactive power to improve power quality issues like voltage sags and swells. The document first provides background on power quality issues and the factors driving increased focus on power quality. It then describes the basic components and operating principle of a DSTATCOM for reactive power compensation and power factor correction. Finally, it discusses controlling strategies for DSTATCOM, including using a fuzzy logic supervisor to vary the gains of a PI controller and improve transient performance of the DC link voltage during load changes.
IRJET- Power Line Carrier Communication (PLCC) Systems: A ReviewIRJET Journal
The document reviews power line carrier communication (PLCC) systems, which use existing power lines to transmit data communication signals. It discusses the benefits of PLCC such as using existing infrastructure and ubiquity. The document also summarizes several research papers on applications of PLCC including home automation, remote meter reading, and smart lighting control.
IRJET- Smart Energy Meter Theft Detection using IoTIRJET Journal
The document discusses a smart energy meter theft detection system using IoT. It proposes using an Arduino board connected to sensors to monitor two energy meters - one for a paid customer and one for an unpaid customer. If the unpaid customer's usage exceeds a limit, an alert would be sent via WiFi modules. If the customer does not pay their bill, a command would be sent to the server to cut off the unpaid customer's power supply. The system aims to reduce electricity theft and help utilities better monitor energy usage and bill payment.
GREEN POWER & BROADBAND CONNECTIVITY FOR RURAL AREAS WITH REMOTE SITE MANAGEMENTkvnpk123
Knowledge Partnership for Transforming Lives by Technological Excellence
GREEN POWER & BROADBAND CONNECTIVITY FOR RURAL AREAS WITH REMOTE SITE MANAGEMENT
This document provides an overview of smart grid physical protection. It discusses system reliability analysis and failures in protection mechanisms. For system reliability analysis, it describes methods to ensure reliability of distributed generation, measurement infrastructure, and the network before implementation. It also discusses empowering substations with decision-making abilities. For failures in protection mechanisms, it covers predicting and preventing failures, as well as identifying, diagnosing, and recovering from failures. The document provides examples of research in these areas and their approaches to improving smart grid reliability and protection.
The document discusses smart grids, which are developing networks of energy systems that allow for two-way communication between suppliers and consumers. Some key points:
- Cities use 75% of the world's energy and 400 kWh are wasted currently.
- Smart grids would create 370,000 new jobs and allow consumers to get feedback on their energy usage in real-time to reduce consumption.
- When developing smart grids, management of consumer privacy, well-structured implementation to avoid negatively impacting energy companies, and developing new communication and sensor networks are important issues to consider.
- The biggest challenges to implementing smart grids are the large costs and effort required to completely change a country's energy infrastructure and ensure consumers understand
IoT Based Smart Energy Meter using Raspberry Pi and Arduino Bilal Amjad
This project, design and implemented a low-cost IoT based energy monitoring system (smart energy meter) for real-time monitoring of all electrical parameters i.e. AC voltage, AC current, active power, total energy consumption, power factor, frequency, and tariff. The design is based on a low-cost PZEM-004T, using a non-invasive Current Transformer
(CT) sensors, Arduino and Raspberry pi. Electrical measurements are done by PZEM-004T and CT sensors through Arduino. Raspberry pi communicates with Arduino through serial communication to retrieve these sensor’s data and send it to the server via internet. As a result, the developed energy monitoring system can successfully record the voltage, current, active power, power factor, frequency, accumulative power consumption and tariff. Consumers will be able to
see their electricity usage and the tariff according to the energy usage in real-time through web and mobile application. In case of any fault e.g., short circuit or power supply cut off, the consumer will receive a text message on his mobile number. Moreover, consumers will be able to receive the tariff on a weekly or monthly basis.
GRID INTERCONNECTION OF RENEWABLE ENERGY SOURCES AT DISTRIBUTION LEVEL WITH P...Pradeep Avanigadda
Renewable energy resources (RES) are being increasingly connected in distribution systems utilizing power electronic converters. This project presents a novel control strategy for achieving maximum benefits from these grid-interfacing inverters when installed in 3-phase 4-wire distribution systems. The inverter is controlled to perform as a multi-function device by incorporating active power filter functionality. The inverter can thus be utilized as: 1) power converter to inject power generated from RES to the grid, and 2) shunt APF to compensate current unbalance, load current harmonics, load reactive power demand and load neutral current. All of these functions may be accomplished either individually or simultaneously. With such a control, the combination of grid-interfacing inverter and the 3-phase 4-wire linear/non-linear unbalanced load at point of common coupling appears as balanced linear load to the grid. This new control concept is demonstrated with extensive MATLAB/ Simulink simulation studies and validated through digital signal processor-based laboratory experimental results.
On Going research on Problems Faced In smart grid in general. Yet Work is in progress Just a light notes on General issues in smart grid, Technically work is to be on target in smart grid.
Overall fuzzy logic control strategy of direct driven PMSG wind turbine conne...IJECEIAES
The fuzzy logic strategies reported in the literature about the control of direct drive permanent magnet synchronous generator (PMSG) connected to grid are limited in terms of inclusiveness and efficiency. So an overall control based on fuzzy logic and anti-windup compensation is proposed in this paper. Aiming at the inadequate of hill climb search (HCS) MPPT with fixed step size, the fuzzy logic is introduced in the stage of "generating rotor speed reference" to overcome the oscillations and slowness in traditional method. PI controllers are replaced by anti-windup fuzzy logic controllers in the "machine side control" stage and in "grid side control" stage to pertinently regulate the reference parameters. Then comparison tests with classical methods are implemented under varying climatic conditions. The results obtained demonstrate that the developed control is superior to other methods in response time (less than 4.528E-04 s), precision (an overshoot about 0.41%) and quality of produced energy (efficiency is 91%). The study verifying the feasibility and effectiveness of this algorithm in PMSG wind turbine connected to grid.
IRJET- A Smart Monitoring System for Hybrid Energy System using IoTIRJET Journal
This document describes a smart monitoring system for a hybrid energy system using IoT. The system uses solar and wind energy sources and can switch between them without inconvenience through an Android app and WiFi module. An ESP32 microcontroller module transmits and receives electrical data wirelessly from the app and monitors the system. Users can control the energy sources remotely through the app in a flexible and secure manner. The system provides an efficient, cheaper, and flexible way to control hybrid energy sources manually and remotely.
this slide shows what is smart grid ,its comparison between the electromechanical grids . smart meters and devises for the smart grid . benefit of smart grid . and a conclution
IOT BASED POWER GRID MONITORING & CONTROL SYSTEMvivatechijri
Energy generation corporations provide electricity to any or all the households via intermediate controlled power transmission hubs referred to as Electricity Grid. Generally issues arise thanks to failure of the electricity grid resulting in black out of a complete space that was obtaining provide from that individual grid. This project aims to resolve this downside victimization IOT because the means that of communication and conjointly coping with numerous alternative problems that a wise system will traumatize to avoid needless losses to the Energy producers.
This document provides an introduction to smart grids. It defines a smart grid as an intelligent power grid that uses communication technology and smart meters to allow bidirectional power flow and handle distributed energy resources. The key benefits of smart grids are more reliable, flexible, efficient and robust power delivery. Smart grids modernize the traditional one-way power grid into an automated system with two-way data communication between power producers and consumers. This enables features like self-monitoring, self-healing and demand response capabilities. Security is also an important consideration for smart grids due to the integration of digital technologies.
Detection and Instantaneous Prevention of Power TheftIOSR Journals
This document discusses methods for detecting and preventing power theft. It begins by outlining the problem of electricity theft in India, costing $17 billion annually. It then describes some common methods of theft, such as attaching magnets to meters or bypassing meters. The document presents a proposed circuit to detect two types of theft: phase bypassing and overloading. It includes block diagrams of the circuit and simulations of overload and phase bypass conditions. Upon detection, the circuit would instantly disconnect the main power supply. The circuit uses readily available components like optocouplers and relays in a cost-effective design. In conclusion, the circuit could help address the significant problem of power theft.
1) The document discusses a GSM based power meter reading and control system that uses GSM technology to remotely read electricity meters and control home appliances.
2) Current manual meter reading is time-consuming and prone to errors. The proposed system sends daily meter readings via SMS to both users and the electricity department to generate accurate bills.
3) It also allows remote control of appliances to reduce unnecessary power consumption and save energy by monitoring power usage and controlling loads that exceed predefined limits.
Design of Wireless Power Transfer Charge Station for Electric VehicleIRJET Journal
1. The document describes a proposed design for a wireless power transfer charging station for electric vehicles.
2. It would use magnetic resonance to wirelessly transfer power between charging pads underground and electric vehicles parked above.
3. Drivers would identify themselves at the station using RFID cards, then select the amount of power to charge their vehicle batteries wirelessly through inductive power transfer without needing cables.
This document summarizes a study on the economic effects of technical and non-technical losses in Nigeria's power transmission system. The study found that Nigeria's 330kV transmission network suffers from high voltage drops and power losses of around 454.73 GW annually, costing over 4.4 billion naira. These losses are caused by technical issues like low generation capacity and a long, fragile network as well as non-technical issues like electricity theft. Reducing these transmission and distribution losses, which at 17.72% of output are very high compared to more efficient countries, could boost Nigeria's economic growth.
This document describes an advanced power theft detection system developed by students at ROHINI College of Engineering & Technology. The system uses two ESP8266 modules and current sensors to continuously monitor power consumption in real-time. It analyzes the data using an algorithm implemented on the Arduino IDE to detect anomalies that may indicate electricity theft. When theft is detected, alerts are triggered to notify authorities. The system aims to help mitigate electricity theft through rigorous testing and real-time monitoring capabilities.
Agriculture Power Station Circuit Breaker using LTE CommunicationIRJET Journal
This document summarizes a research paper on developing a mobile application to remotely control agricultural power stations and circuit breakers using LTE communication. The system aims to address the issue of farmers risking their lives when needing to manually turn off power stations during thunderstorms or other hazardous conditions. It describes how farmers frequently die from electrocution due to faults in electrical lines on agricultural fields. The proposed mobile app would allow farmers to operate power stations safely from a distance by integrating circuit breakers, an LTE module, database API and Raspberry Pi for automation and remote control via a user-friendly interface.
Theft Detection detection of raspberry and Arduinokabileshcm55
The document describes a project to develop an advanced power theft detection system. The system integrates two ESP8266 modules, two current sensors, an Arduino, and the Blynk app. It aims to continuously monitor power consumption in real-time to detect anomalies indicative of electricity theft. The system conducts simulations to validate its functionality and ability to detect theft. Upon detecting anomalies, it triggers alerts to notify authorities for further investigation and action. The system was developed as a student project to address the prevalent issue of electricity theft and help improve distribution network efficiency and reliability.
Advantages and recent advances of smart energy gridjournalBEEI
Smart grid is widely recognized technology used to improve the stability and losses of the electric power system. It is encouraging reliability, efficiency, and effective control of the supply of electrical energy. However, it is a hot topic for recent publications and still has a limited understanding among researchers. This review work is to provide insight and support to the beginner researchers since this topic needs a multidisciplinary background knowledge. The conventional electric transmission system and distribution networks struggle to provide resilient performance and reliable service and real-time data. Also, smart grid id a promising network maneuver to stabilize the system once any disturbances break out by using the distributed renewable energy generators, while the conventional networks lack for flexibility to integrate with renewable energy generators or microgrids. This comprehensive work is conducted to map previous controbution in a coherent manar, including the specifications, features, and fundamentals that are presented to benefit the interested readers interested in smart grid development.
IRJET- SMART GRID: The Internet of Electrical Energy SystemIRJET Journal
This document discusses smart grids as the new distribution technology that can help address challenges in India's electrical sector like increasing demand, costs, and pollution. Smart grids integrate distributed energy sources, allow for electric vehicle integration, reduce peak loads, lower emissions, and give customers more control over energy use. Key components of smart grids include intelligent appliances, smart meters, smart substations, superconductors, integrated communications, and phasor measurement units. The document also describes a smart grid pilot project in Puducherry, India that implements technologies like advanced metering infrastructure, peak load management, and renewable energy integration. Overall, smart grids can improve reliability, optimize investments, aid network operation and planning, and reduce air pollution.
IRJET- A Review on Power Line Carrier Communication (PLCC) SystemsIRJET Journal
This document provides an overview of power line carrier communication (PLCC) systems. It discusses how PLCC uses existing power lines to transmit data communication signals. PLCC offers advantages over traditional communication methods like lower costs since it utilizes existing infrastructure. The document reviews several studies on using PLCC for applications like automatic meter reading, home automation, and monitoring electricity distribution systems. It also discusses challenges like noise, attenuation, and varying impedance on power lines. Future work is proposed to further validate PLCC system designs and improve performance.
IRJET- Power Theft and Fault Detection using IoT TechnologyIRJET Journal
This document discusses using IoT technology to detect power theft and faults in electrical distribution systems. It begins with an abstract that outlines the goals of detecting power theft and faults quickly and accurately. It then provides background on IoT and discusses how an IoT-based system could work, using sensors to monitor voltage and current on distribution lines and detect deviations that indicate faults or theft. If a fault or theft is detected, the system would send an SMS notification. The document concludes that such a system could help reduce losses from power theft and more quickly detect and locate faults, improving reliability for consumers.
Advancement in Smart grid by Embedding a Last meter in a Internet of Things P...IRJET Journal
This document discusses embedding a smart meter into an Internet of Things platform to advance smart grids. It proposes an architecture that integrates smart grid applications with smart home applications. The architecture allows different wireless protocols to communicate between meters, users and the system. It also provides secure data access and simplifies interaction for non-technical users. Key benefits include integrating smart grids and smart homes on a single infrastructure, gathering data from various sensors securely, and providing a common interface for applications.
IRJET - Smart Grid Inspection Robot Exclusively Designed for High Power T...IRJET Journal
This document describes a proposed smart grid inspection robot designed to move along high power transmission lines. Some key points:
- The robot would continuously monitor parameters like temperature, current, and location to detect any abnormalities or malfunctions in the transmission lines.
- If issues are detected, it would notify the relevant authorities through IoT to allow problems to be addressed before becoming serious.
- Sensors would measure things like GPS, temperature, current, and a solar panel/battery would power the device sustainably.
- The robot aims to allow inspections to be done safely and regularly without needing manual checks that are dangerous near high-power lines.
This document discusses methods for detecting and preventing power theft. It begins by outlining the problem of electricity theft in India, costing $17 billion annually. It then describes some common methods of theft, such as attaching magnets to meters or bypassing meters. The document presents a proposed circuit to detect two types of theft: phase bypassing and overloading. It includes block diagrams of the circuit and simulations of overload and phase bypass conditions. It concludes that the circuit can detect and instantly stop the supply in these theft situations, helping to reduce losses for electricity boards.
This document discusses electricity theft detection and presents a proposed solution. It begins with an introduction to electricity monitoring and challenges with theft. It then describes a system to monitor power consumption from a central location using microcontrollers, current sensors, and wireless communication between users and a substation. The system is designed to identify authorized vs unauthorized power usage to help control theft. It provides details of the system design including components, working principle, and a theft detection method based on comparing power sent and consumed. Testing showed the prototype hardware worked satisfactorily for its purpose of informing authorities about theft by detecting excess power usage.
Power Theft Identification System Using Iotsakru naik
The document describes a power theft identification system using IoT. It discusses using a Raspberry Pi connected to measure voltage and current, with thresholds set to detect power theft. When voltage increases above the threshold, power theft is detected. It aims to help reduce power theft and losses in the distribution system through remote monitoring using wireless communication technologies like IoT.
This document summarizes research on transmitting data through power lines. It discusses how power lines can be used as a communication medium by transmitting digital signals over them using power line communication interfaces and modems. The researchers developed a system where data is encoded by a transmitter modem and sent over power lines, then received and decoded by a receiver modem. They simulated an amplitude-shift keying modulation circuit to demonstrate how digital data can be modulated onto a carrier signal for transmission. The outcome of this work could enable high-speed data transmission over existing power lines for applications like home automation and integration of smart devices on a single network without additional cabling infrastructure.
This document provides an overview of smart management of electric power grids. It discusses how smart grids use two-way communication between utilities and users to create an automated and distributed energy network. Key components of smart grids include smart meters that monitor energy usage in intervals and can remotely control appliances, information transfer networks to share data, and distributed generation from sources like solar panels. The document outlines benefits like improved reliability, efficiency, and ability to incorporate renewable energy through advanced monitoring and control enabled by smart grid technologies.
The energy grid is currently undergoing a historical change of state from the traditional structure where a utility owns the generation, transmission and distribution services into an integrated smart grid in a monopolistic market which introduce consumers as active players in managing and controlling the power. This report provides an analysis of the methods applicable to smart grid interoperability tests. A systematic approach for developing smart grid interoperability tests was adopted by analyzing a house and an industries looking at the analysis of their active power. This analysis of active power gives the exact idea to know the range of maximum permissible loads that can be connected to their relevant bus bars. This paper presents the change in the value of Active Power with varying load angle in context with small signal analysis using wind, solar and generator grid . The result obtained showed that, consumers can then choose the cheapest energy to be consumed. Makinde Kayode | Owolabi Balikis Omowunmi | Lawal Olawale Kazeem "Analysis of Smart Grid Interoperability" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-5 , August 2022, URL: https://www.ijtsrd.com/papers/ijtsrd50629.pdf Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/50629/analysis-of-smart-grid-interoperability/makinde-kayode
This document discusses smart grids and the role of advanced metering infrastructure in India. It notes that India has one of the weakest electrical grids in the world with high transmission losses. A smart grid uses communication and information technologies to better manage electricity distribution and demand. Advanced metering infrastructure is a key component, allowing two-way communication between utilities and customers to provide energy usage data and enable demand response programs. This can help improve grid reliability and efficiency while empowering consumers.
This document discusses the design and implementation of a smart anti-power theft system. It begins with an abstract that outlines the issues of electricity theft, including the economic losses incurred. It then discusses the key components of embedded systems used in power monitoring and describes the objectives, block diagram, and circuit diagram of the proposed smart anti-power theft system. The system is intended to automatically detect theft and restrict unauthorized electricity usage. The document also provides a literature review on previous work in electricity theft detection and monitoring systems. It concludes by discussing the scope for further improvements to the system, including integrating WiFi modules to notify users of theft detection.
Smart Grid Technology - The Future of Power Network: A ReviewIRJET Journal
The document discusses smart grid technology as the future of power networks. Key points:
1. Smart grids use bidirectional communication between power suppliers and consumers to allow for more efficient use of energy through real-time monitoring and demand response.
2. Smart grids can better integrate renewable energy sources and continue supplying power during outages through self-healing mechanisms like islanding.
3. Components of smart grids include advanced infrastructure for generation, transmission, distribution and metering of electricity as well as communication and control systems to enable real-time monitoring and management of the power network.
Fair Model for Electricity Billing and Sharing in Shared Apartment in GhanaIRJET Journal
This document proposes a smart monitoring system to fairly determine individual electricity consumption in a shared apartment with a single energy meter. The system is designed using an Arduino Uno microcontroller, PZEM-004T energy metering device, SIM800L GSM module, LCD display, current transformers, and other components. It monitors tenants' electricity usage in real-time and sends SMS notifications at the end of each month with the energy consumed and amount owed by each tenant. The system aims to resolve disputes around electricity bill sharing that commonly occur in shared apartment settings with a single meter.
Similar to An efficient and improved model for power theft detection in Pakistan (20)
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
The document proposes using a particle swarm optimization (PSO) algorithm to optimize the hyperparameters of a convolutional neural network (CNN) for image classification. The PSO algorithm is used to find optimal values for CNN hyperparameters like the number and size of convolutional filters. In experiments on the MNIST handwritten digit dataset, the optimized CNN achieved a testing error rate of 0.87%, which is competitive with state-of-the-art models. The proposed approach finds optimized CNN architectures automatically without requiring manual design or encoding strategies during training.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
1) Researchers developed a prototype contactless transaction system using QR codes and digital payments to support physical distancing during the COVID-19 pandemic in traditional markets.
2) The system allows sellers and buyers in traditional markets to conduct fast, secure transactions via smartphones without direct cash exchange. Buyers scan sellers' QR codes to view product details and make e-wallet payments.
3) Testing showed the system's functions worked properly and users found it easy to use and useful for supporting contactless transactions and digital transformation of traditional markets. However, further development is needed to increase trust in digital payments for users unfamiliar with the technology.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
This document describes the implementation of a double-layer structure on an octagon microstrip yagi antenna (OMYA) to improve its performance at 5.8 GHz. The double-layer consists of two double positive (DPS) substrates placed above the OMYA. Simulation and experimental results show that the double-layer configuration increases the gain of the OMYA by 2.5 dB compared to without the double-layer. The measured bandwidth of the OMYA with double-layer is 14.6%, indicating the double-layer can increase both the gain and bandwidth of the OMYA.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
The document provides an overview of the key performance indicators (KPIs) for 6G wireless networks compared to 5G networks. Some of the major KPIs discussed for 6G include: achieving data rates of up to 1 Tbps and individual user data rates up to 100 Gbps; reducing latency below 10 milliseconds; supporting up to 10 million connected devices per square kilometer; improving spectral efficiency by up to 100 times through technologies like terahertz communications and smart surfaces; and achieving an energy efficiency of 1 pico-joule per bit transmitted through techniques like wireless power transmission and energy harvesting. The document outlines how 6G aims to integrate terrestrial, aerial and maritime communications into a single network to provide ubiquitous connectivity with higher
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
Gas agency management system project report.pdfKamal Acharya
The project entitled "Gas Agency" is done to make the manual process easier by making it a computerized system for billing and maintaining stock. The Gas Agencies get the order request through phone calls or by personal from their customers and deliver the gas cylinders to their address based on their demand and previous delivery date. This process is made computerized and the customer's name, address and stock details are stored in a database. Based on this the billing for a customer is made simple and easier, since a customer order for gas can be accepted only after completing a certain period from the previous delivery. This can be calculated and billed easily through this. There are two types of delivery like domestic purpose use delivery and commercial purpose use delivery. The bill rate and capacity differs for both. This can be easily maintained and charged accordingly.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
An efficient and improved model for power theft detection in Pakistan
1. Bulletin of Electrical Engineering and Informatics
Vol. 10, No. 4, August 2021, pp. 1828~1837
ISSN: 2302-9285, DOI: 10.11591/eei.v10i4.3014 1828
Journal homepage: http://beei.org
An efficient and improved model for power theft detection in
Pakistan
Abid Afridi1
, Abdul Wahab2
, Shamsher Khan3
, Wasi Ullah4
, Sheharyar Khan5
, Syed Zia Ul Islam6
,
Kashif Hussain7
1,6
School of Automation Science and Engineering, South China University of Technology, Guanghzou, China
2
School of Automation, Northwestern Polytechnical University, Xian, China
3
Department of Mechanical Engineering, University of Engineering and Technology Peshawar, Pakistan
4
Department of Electrical (Telecom) University of Science and Technology, Bannu, Pakistan
5
School of Software, Northwestern Polytechnical University, Xian, China
7
School of Information Science and Technology, Dalian Maritime University, Dalian, China
Article Info ABSTRACT
Article history:
Received Oct 21, 2020
Revised Dec 20, 2020
Accepted Mar 27, 2021
This paper describes an improved model for the monitoring of power used by
a party such as household users and different industries in Pakistan. The
power theft detection was done using the intelligent internet of things (IoT)
service system for calculating the user's power simultaneously. The power
meter catches a theft detection device that is instantly transmitted to the
central system which compares both the data by means of microcontroller and
if there is any difference found, it informs the power utility about the hooking,
meter relief or theft activities happen. Information of the theft detection
through the global mobile communications system is transmitted and notified
theft is displayed on the terminal monitor or won. As a result, although
consumers continue to use excess fuel, the customer's power supply is cut in
the electricity boards segment. The general radio package module system
sends central circuit and meter data via an internet protocol address to a web
server. GSM's IoT based perception is used to monitor the power supply and
billing information calculated with a microcontroller continuously with the
determination of the electricity table area. With this unit, the duplicate user
can be located at the rear of the electricity office with the power meter status.
Keywords:
Automated meter reading
Microcontroller unit receiver
transmitter
Subscriber identification
module
Universal asynchronous
Universal synchronous receiver
transmitter
This is an open access article under the CC BY-SA license.
Corresponding Author:
Abdul Wahab
School of Automation
Northwestern Polytechnical University, Xian, China
Dongda Road, Changan campus of NPU, Xian, Shanxi province, China
Email: abdul_wahab@mail.nwpu.edu.cn, wahab.engr55@yahoo.com
1. INTRODUCTION
Since the beginning of electricity, it has become an essential part of our life. From the first electric
bulb by Edison to the Tesla coil we humans have come a long way. Currently every little appliance operates
on electricity from the electric toothbrush to huge motors [1]. Every year power theft is a major issue in the
global power grid network, and it is both illegal and strictly forbidden. Pakistan is under develop country
which has energy crisis, as everyday there is loadshieding of around 10 to 12 hrs and one of the causes of this
issue is also power theft. In recent years, power theft has emerged as the most severe and widespread
problem, resulting in major losses for electric utilities. As a consequence of the value of considering this
problem, prices have been raised to resolve and overcome these losses [2]. Acoording to the different
statistics provided by the WAPDA, Pakistan, they suffer each year more than 53 billion rupees per year
2. Bulletin of Electr Eng & Inf ISSN: 2302-9285
An efficient and improved model for power theft detection in Pakistan (Abid Afridi)
1829
(0.3million USD) of power theft. The power theft across the globe is highest in Russia, which has the
16.2 million$ USD loss per year. According to the statistics Brazil has the second highest loss of 10.5$,
where as USA with the total loss of 6million$ has the third and India with total loss of 5.10 million $ secured
the forth highest per year. Power theft is the illegal use of electricity without a contract with the supplier.
Illegal connections by electricity consumers cost power providers a large amount of money. Electricity theft
is described as "a dishonest or unlawful use of electricity or service with the intent not to have a billing
charge [3]." It's difficult to differentiate between truthful and dishonest consumers. They will never be able to
completely eradicate fraud, but they can take steps to detect, deter, and remove it [4].
The implications of technical losses in generation, transmission, and distribution networks, as well
as the overall performance of power networks, are being studied by power utilities. Since consumers are
unaware of their energy usage before their electricity bills arrive, energy monitoring is possible. Electricity
supply must be reliable, quality and secured. To do so, utilities need to have better information about the
operation and the state of the distribution networks. For this to materialize, in the future, there will an
increasing penetration of distributed generation connected to customer’s premises and a shift from the
traditional dominant large central power plants electricity generation concept to more complex power
delivery [5]. Generation, transmission, and distribution networks all suffer from operational losses. Though
generation losses can theoretically be established, transmission and distribution losses cannot be accurately
measured using the data sent at the end [6]. It illustrates the existence of non-technical parameters in
transmission and distribution lines for electricity. Power dissipation losses on transmission lines,
transformers, and other power system components typically occur randomly [7].
The cumulative energy bill and the overall load are used to measure transmission and distribution
technical losses. Despite the advancement of technology, illegal activity is also on the rise. With a
professional look. Power theft is a serious offence that has far-reaching consequences for a country's
economy. Non-technical power pilferage losses contribute to a large portion of the annual losses in the
energy sector, which total about 25 billion dollars in world currency [8]. Electricity theft is a social problem
that must be stopped at all costs. To make the most productive use of the generated electricity, power
consumption and losses must be closely monitored. This system prevents unauthorized power use. At this
point in technological growth, the issue of illegal electricity use can be solved using GSM and internet of
thing (IoT) without human intervention. The client and the supplier have an arrangement in which the
customer pays for the energy he uses. However, nearly 32% of electrical power consumed in India is not paid
for, meaning that the consumer is cheated, necessitating the creation of a scheme to address this problem.
This system primarily consists of a microcontroller, sensors, and an IoT module for detecting electricity theft
and sending a message to an approved electricity management agency. Remote access to device functionality
is included in today's submission. Connecting a device (energy meter) to the internet with efficiency [9] is
one method of accomplishing the task. This device would save a significant amount of energy and provide
power to a greater number of customers. The electricity board section uses an IoT-based concept to
continuously track power consumption in the area. Power theft causes major impact on electricity system and
institutions are:
− Theft of electricity leads to loss of income for the utility/institution
− Because of the undesirable load of the transformer, it causes blackouts or brownouts
− Property damage to the utilities, such as distribution transformers, protective instruments
− Increased losses in transmission and distribution due to cable and wire tampering
2. TECHNIQUES OF ELECTRICITY THEFT
There are numerous reasons for power theft, including high kilowatt–hour and secondary electricity
charges, a consumer's low subsistence level, tax purposes, law enforcement's lack of accountability,
economic crisis, and resulting increased poverty [10], [11]. Several power theft techniques are discussed as:
− Direct connection from the pole: Because the metres and equipment in this category are for 220 V
systems, where the customers are largely residences and small enterprises, a direct connection from the
pole is much easier than for high-voltage systems. Now, at least more securely, a pair of rubber gloves
might provide all the protection needed and a lever and all the required equipment, in contrast to
climbing up the HV lines. This is by far the most popular electric theft method.
− Use of Remote: On the market, there are certain remote controls that slow down the metre speed.
− Phase-to-phase connection: This is comparable to utilising an additional neutral line, with the exception
that at 240 or 380 volts, the system voltage becomes the phasetophase voltage.
− Using alternate neutral lines: The single-phase system usually just has one cable coming into a residence,
the hot line. Neutral (electrically linked to the earth) is normally grounded and occasionally generic via
3. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 4, August 2021 : 1828 – 1837
1830
the base of the building. So if a person manages to employ a tiny transformer and use it as "neutral," the
metre that utilises the same neutral source reads down the input voltage to a decreased unit count.
− Meter tampering/breaking seal: This is quite similar to what happens with the HV metres.
− Other methods of electricity theft include: Detect a paying consumer nearby, damage to metre boxes and
slow the spinning discs in the metre box using magnets [12].
3. RELATED WORK
The use of the high voltage distribution system (HVDS) was highlighted as a source of power and
energy theft. The voltage line is normally 230v, but it must be increased to 350v by a voltage regulator,
which is why it is 350v, but when it arrives at delivery, the voltage is again lowered by 230v alternative
current (alternating current). The supply can be in 3 or 1 phases, depending on the load. The supply and
consumption of energy determines a country's economic growth [13].
Power line communications (PLC) provides a range of new data transfer services that do not require
the use of external cables [14]. Electricity tampering and safety have become a major concern for
government agencies around the world as power prices have risen. Electric metering and energy theft have
grown in popularity, particularly in populous countries like India and China [15]. The supervisory
mechanism for power theft is the AMR (automatic metering system). The following are the key pathways of
AMR; power supply, sensors, and controlling process are all included in the system meter module. Data
transmission, telemetry, and loading systems are all examples of communication systems. The host modem
for the PLC should be the same. The energy disparity between the host PLC modem and the PLC modem
error arises if unlawful load is allowed [16]. The smart energy meter has been proposed as a revolutionary
arrangement to encourage moderation and lower utility costs in recent years [17].
Electronic meters are used to keep track of how much electricity is used. It's a two-way touch that
detects any power theft or power system problem [18]. A box is set up two meters away from the
transmission and reception points. Around the head are current outlets, inspectors, and consumers. When
shoplifting occurs, the current flow changes, and the inspector issues an alert to track the power theft. In this
paper, the detection of fraud is addressed [19]. Smart meters make it possible to interpret non-technical loss
functions, which were previously difficult. The smart meter also has functions that measure energy
consumption and help consumers better understand their behavior [20]. We can use intelligent meters to track
power theft in this way. Assume that the number of people staying in an apartment is' n. ' An inspector box
must be installed in the center, and the transmission and reception sides must be separated by two meters.
The present passes into the hands of the head, the inspector, and the consumers. If theft occurs, the current
flow shifts, and the inspector issues a warning, allowing us to keep track of power theft [21], but our
proposed system will have improved efficiency and will be economical as shown in Table 1.
Table 1. Comparison of all the method used for theft detection
S/NO Methods used for controlling
Reliability
of system
Economy
Efficiency
of system
Methods used for controlling
1
Detection identification based on
HDVS system
Normal High Poor
Detection identification based on
HDVS system
2 Using PLC Good Normal High Using PLC
3 Using smart meter Perfect High High Using smart meter
4
Proposed power theft detection
system
Perfect Less High Proposed power theft detection system
4. PROPOSED METHODOLOGY
Many people engaged in illegal power theft in Pakistan, such as taping lines at events without
permission, bypassing the meter, and so on. All the transmission lines are very old in Pakistan and it is very
easy for peoples to do it so, as it is necessary to prevent electricity theft because many peoples and industries
are at the loss because of this issue. IoT is a relatively modern technology [22]. Our proposed system states
to identify power theft in real time also provide information about the nearest location of electricity theft as
shown in Figure 1. This system has an online database that records all information about the delivery system,
as well as the time and date [23]. The transmitted electricity, the voltage absorbed at a pole, and the electric
pole serial number are all included in these figures. The voltage is measured against the passage of time. The
pole number tells us where power theft is most likely to occur.
After the generation of electricity in power plant by means of turbines it is stepped-up and
transmitted to transmission substation, where it is further transmitted to distribution substations. Hence,
4. Bulletin of Electr Eng & Inf ISSN: 2302-9285
An efficient and improved model for power theft detection in Pakistan (Abid Afridi)
1831
Power theft cannot be done in generation and transmission system, but it is possible in distribution system
[24]. Hence, we have installed our central circuit on distribution transformer to measure the actual current
value as well installed at consumer end which sends data through GSM to central circuit where the actual
value of current and collective value of current received from consumer end are compared by means of
microcontroller. If there is any difference between the actual and end users’ current values, it means that theft
is detected, and a text message is sent to authorize person through GSM else the same process will be in
operation continuously.
Figure 1. Implementation sciencario of proposed theft detection system
Power theft is an unlawful method of collecting energy for different purposes, resulting in
substantial losses for successful businesses. Every year, almost $25 billion is lost around the world. By
calculating the energy given and subtracting the actual amount of energy charged, losses can be measured.
Electricity theft can be accomplished in a variety of ways, including bypassing a meter, modifying meters,
billing irregularities, and unpaid accounts. Various scientific and non-technical approaches for detecting
electric theft have been implemented in the past. Identification of clients with a suspect load profile is one
example of a nontechnical technique. Periodic inspections can help to reduce robberies, but such measures
necessitate a large workforce and a lot of hard work [25]. It fails in the majority of cases due to the staff's
dishonesty.
4.1. Block diagram
The circuit is composed of a microcontroller ATMEGA328P, GSM, LCD and hall effect current
sensor as shown in Figure 2. Meters should not be used for high currents because hall effect current sensors
perform a current sensing. Two hall effect controllers are used, one of which is connected to the load side for
the charging of the current and the other hall effect current sensor is connected to supply terminals for the
evaluation of the current supplied by the source. The proposed method asserts that power theft and the
nearest location of theft can be detected in real time. The system has an online database that records the data
of the delivery system combined with the time and date. These statistics include transmission of electricity,
voltage consumption at the bars and serial no electric pole. The voltage value is measured by time. The pole
number shows us where the power theft is located. The important aspect of this circuit is the ATMEGA328P
microprocessor. The current signal is acquired through a bridge rectifier from two hall effect current sensors.
Then the conditional operator equals these two current magnitudes. Since the two hall effect current sensors
disclose essentially identical numbers if there is no theft load. The system here is healthy. The
microcontroller ATMEGA328P can not access the current signal. The hall effect current sensors therefore
just need to be attached to a voltage source. In this scenario, the current signal must be translated into a
voltage signal. The resistor can be linked to voltage in series. The ATMEGA328P microprocessor receives
resistance and voltage information. Since the secondary current sensor Hall Effect is never able to open the
circuit, a resistor is employed. Adjustments to the comparable current may be performed. Calibration can also
be performed by connecting different loads, calculating different voltages and currents, and turning a current
signal into a voltage signal with a correction system. The output over the resistor linked to the rectifier
circuit, when the rectifier transforms the AC to a DC signal, can be used as a voltage signal. The input of the
bridge corrector is attached to the side of the hall effect sensor. This voltage signal is received by the
ATMEGA328P microcontroller and the calibration measures the related current. This translates the current
signal from the current hall effect sensor into a voltage signal to access the microcontroller ATMEGA328P.
If the hall effect current sensor is connected on the loading side, the same protocol is use. The aim of this
program is to gain access to the voltage signals produced by the rectifier circuits. The software defines the
condition for comparing voltage magnitudes. If the difference exceeds the specified number, the condition
has been broken, and the control will switch to the SMS and email warning functions.
5. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 4, August 2021 : 1828 – 1837
1832
Figure 2. Proposed block diagram
5. RESEARCH METHOD
5.1. Software development & Implementation
Flow charts
a. Centre flow chart
The chart in Figure 3 illustrates the working process of central circuit. As it starts, first we declare
and initialize variables like bit variable, it has values of 1 or 0, strings, integers (saves integers). Furthermore,
we also initiate some modules like universal asynchronous receiver transmitter (UART) which is used for
GSM connectivity because both are having transmitters and receivers & connect them in inverse fashion for
better communication between them therefore, we also maintain same speed at both ends. In addition, ADC
is also initiated because it converts analog signal to digital signal as microcontroller cannot read analog
signal. Afterwards, we read ACS 712 sensor by means of analog channel as we have given the output of
sensor to analog channel 0, thus we read this analog channel 0 and it gives us a number, so we find voltage
from that given number and then find current.
Moreover, we have also developed a block for GSM which will receive values and after decoding
we will get the overall current value sent by individuals. Now after getting both the actual value of central
circuit and houses we can decide, if there is no difference between actual current and current value of houses
it means that no theft is detected so if log time is not reached the same cycle will be in progress & if log time
is reached then data will be sent to server. However, if there is a difference between both these current values
it means that theft is detected, and message will be sent to authorize person & the process will be recycled.
Figure 3. Center flow chart
6. Bulletin of Electr Eng & Inf ISSN: 2302-9285
An efficient and improved model for power theft detection in Pakistan (Abid Afridi)
1833
b. House flow chart
Flow chart in Figure 4 describes the working process of house circuit. It is the simpler form of
central circuit where it also initiates some variables needed like bit variables, strings or characters and
modules like UART for GSM connectivity & ADC module for analog to digital conversion. Furthermore, we
read current sensor and find current. At the phase of decision making, if log time is not reached the process
will be continuously in progress & if the assigned time is reached the house circuit will send current value to
central circuit.
Figure 4. House flowchart
6. SIMULATION RESULTS AND DISCUSSION
The work has been performed using the proposed methodology for the detection of power theft
using IoT, as Figure 5 describes the normal load when there is no theft activity happened. when the is normal
load it means that there is no theft occur and the house circuit is the replica of the central circuit and consist
of hall effect sensor these sensors generate a hall voltage when a magnetic field is detected, which is used to
measure the magnetic flux density. This sensor compares the supply voltage and actual voltage. The LCD
displayed on the central circuit so same current reading as it is shown on the LCD on the house circuit it
means that there is no theft occur. In this situation normal operation for circuits will be in progress and house
& central circuits communicate regularly through GSM/GPRS module.
Figure 5. Normal load
7. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 4, August 2021 : 1828 – 1837
1834
6.1. Display of no illegal load
The given figure describes that when there is no theft occurred mean when there is no difference
between supply voltage and actual voltage, the graph shown on oscilloscope will be normal and shows
0.8Vpp as it is shown in Figure 6 (a). This graph illustrates that there is no difference found between house
and central circuit’s value and the conditional operators on MCU detected no variance. This simulation shown in
Figure 6 (b) shows when there was any theft, the house circuit sending data to central circuit for further
process to compare it with the actual load. The entire connected house circuits send data to central circuit and
collectively it is compared with actual value by means of microcontroller. There difference between both
values occurred and “Suspected Theft” on both center and house circuits’ LCDs as well a command was sent
to GSM to send text message to authorized person.
(a) (b)
Figure 6. These figures are; (a) normal load when there is no illegal load, (b) theft load ON
6.2. Display of illegal load
When there is illegal load connected to the normal load the above graph shows such type of result as
it as shown in Figure 7. This graph value is noted 1.6Vpp which is doubled as normal value when no theft
was there. This result describes that there was a difference between the supply voltage of consumer side and
actual voltage which means that there was an illegal connection. Reviewing the general concepts of Energy
theft its types and detection methods. Moreover, we also discussed the previous work done in power theft
using IoT. Thus, we developed a system named IoT based power theft detection system which is designed
because of the flaws in the previous work like, HVD system efficiency was poor, PLC system was not much
reliable while smart metering was costly & some deficiencies in IoT based detection systems. To avoid these
flaws, we developed a smart system which requires no human contact, reliable, highly efficient and less
costly to stop power theft.
Figure 7. Demonstration of illegal load
8. Bulletin of Electr Eng & Inf ISSN: 2302-9285
An efficient and improved model for power theft detection in Pakistan (Abid Afridi)
1835
7. CONCLUSION
We have concluded in this paper that the proposed theft detection system is used to solve major
issues with existing electric supply systems, such as energy waste, power theft, and so on. The distributor
will be aware of how much power in that area is to be used or how much energy will be stolen by people in
that area if this system is used. When the difference between current values exceeds a certain threshold, an
automatic message is sent to the appropriate authority and displayed on circuit LCDs, as well as data being
sent from the power utility side to an online web server. It uses the GSM module to send the SMS to the
distributor, and the proposed system will digitally alert or send data to a remote station using the GSM
module. Some governments, such as Pakistan's, have proposed the development of intelligent cities based on
the use of IoT related sensors, which are already being used in operational energy management,
transportation, waste disposal, and resource conservation strategies around the world.
REFERENCES
[1] R Giridhar Balakrishna, P Yogananda Reddy, “IOT based Power Theft Detection,” International Journal of
Innovations in Engineering and Technology IJIET,vol. 8, no. 3, pp. 111-115, 2017, doi:
http://dx.doi.org/10.21172/ijiet.83.016.
[2] Mazdi Muhammad Ali, Majdi Janice Gillespie, McKinley Rollin D, “The 8051 Microcontroller and Embedded
System,” Prentice hall I ndia, 3rd edition, 2002.
[3] Srujana Uddanti, Christeena Joseph, P. C. Kishoreraja, “IoT Based Energy Metering And Theft Detection,”
International Journal of Pure and Applied Mathematics, vol. 117, no. 9, pp. 47-51, 2017, doi:
10.12732/ijpam.v117i9.9.
[4] George M. M, Nikos D. H, “Review of non-technical loss detection methods,” Electric Power Systems Research,
vol. 158, pp. 250-266, 2018, doi: https://doi.org/10.1016/j.epsr.2018.01.005.
[5] A. A. Isqeel, S. M. Eyiomika, T. B. Ismaeel, “Consumer Load Prediction Based on NARX for Electricity Theft
Detection,” International Conference on Computer and Communication Engineering ICCCE, 2016, pp. 294-299,
doi: 10.1109/ICCCE.2016.70.
[6] C. J. Bandim et al., “Identification of energy theft and tampered meters using a central observer meter: a
mathematical approach,” 2003 IEEE PES Transmission and Distribution Conference and Exposition IEEE Cat,
No.03CH37495), 2003, vol. 1, pp. 163-168, doi: 10.1109/TDC.2003.1335175.
[7] S. Patil, G. Pawaskar, K. Patil, “Electrical Power Theft Detection and Wireless Meter Reading,” International
Journal of Innovative Research in Science, Engineering and Technology, vol. 2, no. 4, pp. 1114-1119, 2013.
[8] Joaquim L.Viegas, Paulo R. Esteves, R. Melício, V. M. F.Mendes, Susana M.Vieira, “Solutions for detection of
non-technical losses in the electricity grid: A review,” Renewable and Sustainable Energy Review, vol. 80, pp. 1256-
1268, 2017, doi: https://doi.org/10.1016/j.rser.2017.05.193.
[9] S. S. S. R Depuru, L. Wang, V. Devabhaktuni, “Electricity theft: Overview, issues, prevention and a smart meter-
based approach to control theft,” Energy Policy, vol. 39, no. 2, pp. 1007-1015, 2011, doi:
https://doi.org/10.1016/j.enpol.2010.11.037.
[10] S. S. S. R. Depuru, L. Wang, V. Devabhaktuni, P. Nelapati, “A hybrid neural network model and encoding
technique for enhanced classification of energy consumption data,” IEEE Power and Energy Society General
Meeting, 2011, pp. 1-8, doi: 10.1109/PES.2011.6039050.
[11] A. H. Nizar, Z. Y. Dong, Y. Wang, “Power Utility Nontechnical Loss Analysis With Extreme Learning Machine
Method,” IEEE Transactions on Power Systems, vol. 23, no. 3, pp. 946-955, 2008, doi:
10.1109/TPWRS.2008.926431.
[12] Konstantinos, B. Georgios S, “Efficient Power Theft Detection for Residential Consumers Using Mean Shift Data
Mining Knowledge Discovery Process,” International Journal of Artificial Intelligence and Applications IJAIA, vol.
10, no. 1, pp. 69-85, 2019.
[13] J. Nagi, K. S. Yap, S. K. Tiong, S. K. Ahmed, M. Mohamad, “Nontechnical Loss Detection for Metered Customers
in Power Utility Using Support Vector Machines,” IEEE Transactions on Power Delivery, vol. 25, no. 2, pp. 1162-
1171, 2010, doi: 10.1109/TPWRD.2009.2030890.
[14] Mayank Kumar Arjariya, Amita Mahor, “Modified Distribution Networks using HVDS Techniques,” International
Journal of Engineering Research and Applications, vol. 3, no. 5, pp. 1952-1955, 2013.
[15] I. H. Cavdar, “A solution to remote detection of illegal electricity usage via power line communications,” IEEE
Transactions on Power Delivery, vol. 19, no. 4, pp. 1663-1667, Oct. 2004, doi: 10.1109/TPWRD.2003.822540.
[16] A. Biranje, S. S. Lokhande, “Wireless ARM-Based Automatic Meter Reading & control system (WAMRCS),”
International Conference on Pervasive Computing ICPC, 2015, pp. 1-6, doi: 10.1109/PERVASIVE.2015.7087019.
[17] Z. Xiao, Y. Xiao, D. H. Du, “Exploring Malicious Meter Inspection in Neighborhood Area Smart Grids,” IEEE
Transactions on Smart Grid, vol. 4, no. 1, pp. 214-226, 2013, doi: 10.1109/TSG.2012.2229397.
[18] Prabhu. R, Geetha. A, Vadivelan. P, Ilayabharathy. L, “Smart Energy Meter with GSM Technology and Self
Thermal Printing Technology,” International Journalof Emerging Technologyin Computer Science & Electronics
IJETCSE, vol. 12, no. 1, pp. 58-66, 2014.
[19] R. Jiang, R. Lu, Chengzhe Lai, J. Luo, X. Shen, “Robust group key management with revocation and collusion
resistance for SCADA in smart grid,” IEEE Global Communications Conference (GLOBECOM), 2013, pp. 802-
807, doi: 10.1109/GLOCOM.2013.6831171.
9. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 4, August 2021 : 1828 – 1837
1836
[20] C. Brasek, “Urban utilities warm up to the idea of wireless meter reading,” Computer and Control Engineering, vol.
15, no. 6, pp. 10-14, 2004, doi: 10.1049/cce:20040606.
[21] J. Nezhad, T. K. Wijaya, M. Vasirani, K. Aberer, “SmartD: Smart Meter Data Analytics Dashboard,” Proceedings of
the 5th international conference on Future energy systems, pp. 213-214, 2014, Doi: 10.1145/2602044.2602046.
[22] T. A. Short, “Advanced Metering for Phase Identification, Transformer Identification, and Secondary Modeling,”
IEEE Transactions on Smart Grid, vol. 4, no. 2, pp. 651-658, 2013, doi: 10.1109/TSG.2012.2219081.
[23] H. Sundmaeker, P. Guillemin, P. Friess, S. Woelfflé, “Vision and challenges for realising the Internet of Things,”
Cluster of European Research Projects on the Internet of Things - CERP IoT, 2010.
[24] R Giridhar Balakrishna, P Yogananda Reddy, M L N Vital, “IOT based Power Theft Detection,” International
Journal of Innovations in Engineering and Technology IJIET, vol. 8, no. 3, pp. 111-115, 2017, doi:
http://dx.doi.org/10.21172/ijiet.83.016.
[25] J. Nagi, K. S. Yap, S. K. Tiong, S. K. Ahmed, A. M. Mohammad, “Detection of abnormalities and electricity theft
using genetic Support Vector Machines,” TENCON 2008 - 2008 IEEE Region 10 Conference, 2008, pp. 1-6, doi:
10.1109/TENCON.2008.4766403.
BIOGRAPHIES OF AUTHORS
Abid Afridi was born in District Khyber KPK Pakistan. He received his bachelor degree from
University of Science and Technology,Bannu KPK Pakistan with major in the Electrical
Engineering (Telecom) in 2020. Currently he is enrolled with the school of Automation
Science and Engineering, South China University of Technology, Guangzhou, China, for his
Master degree in Electrical and Computer Engineering. His current research interest includes
IoT and Time Sensitive Networking.
Abdul Wahab was born in Mardan KPK Pakistan. He received his bachelor degree in
electrical (Telecom) engineering from University of Science and Technology, KPK Pakistan in
2018.He did his master degree from Chongqing University, Chongqing, China with major in
electronics and communications engineering in session 2020. Currently he is enrolled at
Northwestern Polytechnical University, Xian China for a PhD degree in control science and
engineering. He is working as a postgraduate researcher in the state key laboratory of school of
automation. His current research interest include adaptive signal and processing, filtering,
radars and power electronics.
Shamsher Khan was born in District Orakzai KPK Pakistan. He received his bachelor degree
from Balochistan University of Engineering & Technology Khuzdar Pakistan with major in the
Mechanical Engineering in 2019. Currently he is completed coursework of master degree in
Mechanical Engineering (Design) from N.W.F.P University of Engineering and Technology
Peshawar, Pakistan His current research interest includes IoT and Time Sensitive Networking.
Wasi Ullah Khan was born in District Kohat KPK Pakistan. He received his bachelor degree
from University of Science and Technology, Bannu KPK Pakistan with major in the Electrical
Engineering (Telecom) in 2020.
10. Bulletin of Electr Eng & Inf ISSN: 2302-9285
An efficient and improved model for power theft detection in Pakistan (Abid Afridi)
1837
Shahryar Khan was born in Haripur KPK Pakistan. He received his bachelor degree from
University of Haripur University KPK Pakistan with major in the computer science in 2016.
Later on in 2020 he received his master degree from southwest university of science and
technology, Sichuan, China. Currently he is enrolled with the school of software, Northwestern
Polytechnical University, Xian China, for his PhD degree in software engineering. His current
research interest includes smart grid and android apps development.
Syed Zia Ul Islam Zia was born in District Swabi KPK Pakistan. He received his bachelor
degree from University of Peshawar, Peshawar KPK Pakistan with major in Electronics in
2019. Currently he is enrolled with the school of Automation Science and Engineering, South
China University of Technology, Guangzhou, China, for his Master degree in Electrical and
Computer Engineering. His current research interest includes IoT, Time Sensitive Networking
and Embedded Systems Technology.
Kashif Hussain is a PhD candidate majoring in Information and Communication Engineering
at Dalian Maritime University, China. He received his Masters degree from Chongqing
University in 2020. His research interest includes cognitive networks, smart grid, deep learning
theory for efficient and reliable information transfer.