2. 2019 5th
International Conference on Advanced Computing & Communication Systems (ICACCS 2019)
raising slope. Power theft techically affects economy of the
nation and it is one of the non ignorable crime.so the power
theft is a crime and it is a social evil that has to be fully
eradicated. The power generated must be utilized in a most
coherent manner by the way of closely examining the
consmption and losses of power.This proposed system is
used to prevent the theft electricity.Due to technology
developement IOT is used to prevent the theft electricity
without the intervention of the human.Due to this
implementation, more consumers in highly populated
country such as India,China will consumes electricity as it
saves large amount of electricity.Electricity theft can be
defined as the usage of the electrical power without any
valid contract with the supplier.This power theft also can be
reduced in many ways such as benefited companies should
appreciate consumers to report about the power theft.power
theft frequently caused when there is disconnection in the
transmission lines.so the lines should be checked
periodically.The government must take initiative to provide
awareness about the theft and enforcement of law among the
consumers.In case of any negative value occurred in the
system power theft can be identified by using iot.So, this
power theft system will overcome the problems faced before
.This system help us to save energy and distribute power
equally.
II. LITERATURE REVIEW
1) In this survey, “Energy Audit and Analysis of
Electricity Consumption of an Educational Building
Philippines for smart consumption” 2017IEEE 9th
International Conference on Humanoid, Nanotechnology,
Information Technology, Communication and Control,
Environment and Management (HNICEM)-This paper
discusses the energy audit results of an educational building
in the Philippines.This paper is highly utilized in
educational institutions for monthly electricity analyses of
data.
2) This paper is about “The Internet of Things :A
survey ,”Computer Networks ,Vol,54, pp. 2787-2805, 2010,
it is connected many physical devices over the internet
,having exchange information between two or more devices
.Now due to technology changes the current scenario, all
devices are converted into smart devices, which can learn
and take this decision by self-configuration properties.
3) In this paper “Design of Smart Home Mobile
Application with High Security and Automatic Features”-
2018 3rd
International Conference on Intelligence Green
Building and Smart Grid(IGBSG) describes the control of
electrical source supplied to a complete room.The electrical
source supplied is monitored and stored in cloud and it is
controlled using android app.
4) In this paper “Efficient and Autonomous Energy
Management Techniques for the Future Smart Homes”-
IEEE Transactions on Smart Grid( Volume: 8, Issue: 2 ,
March 2017)-A modern energy system installed at the user
end that is used to examine, calculate, optimize, and manage
the flow and use of energy, a HEMS module is connected
with the meter at one end and to all the appliances at the
other end, the user has fixed ten number of appliances, these
devices will remain ON during each time slot, while
collecting the data HEMS identifies the electricity usage,
and it calculates the price of used electrical power in kwh,
and it gathers the data based upon the consumers utilization.
III. EXISTING SYSTEM
In case of existing system errors may occurred due to
less concentration.Meter reading is not accurate.It requires
Huge Manpower.the system monitoring work get delayed
due to external conditions.Due to this Manual operation
there is a high wastage of Power.
BLOCK DIAGRAM
IV METHODOLOGY
In the society it was seen lot of people doing illegal
power theft like unauthorized tapings from lines during
functions and meter bypassing etc. These led us to do
something to stop power theft as much as we.IoT is the
recently evolving technology. Here the prototype has been
developed to identify the energy theft using iot for the
industrial purpose.Iot was selected due to the rapid growth
in technology and utilization of iot become drastic.At
present the system are controlled through manual operations
and we cannot know amount of energy consumed. In this
work machine learning is used.The proposed system is used
to identify the power theft in industries.Here the load is
connected in series with current transformer and parallel
with potential transformer. This current transformer is used
to measure the current consumption.Potential transformer is
used to measure the voltage across the supply.The supply
from the source is AC and bridge rectifier is used as a
converting unit.This converting unit transforms the ac
supply to dc supply.Here the filter is used for removing
unwanted dc signal.The dc supply produced by the bridge
rectifier is in the form of analog values.The produced analog
values is converted to digital values by using A/D
826
3. 2019 5th
International Conference on Advanced Computing & Communication Systems (ICACCS 2019)
converter.Then it is connected to raspberry pi in which the
threshold voltage range is fixed.The fixed voltage will be
monitored continuously in the system.If the measured
voltage and current is greater than the fixed threshold
voltage.Due to the increase in voltage and current the buzzer
start alarming.Since ,it is connected to the internet of
things(IOT) a webpage is created .By using this web page
mail will be displayed to the consumers.
IV. HARDWARE COMPONENTS CURRENT
TRANSFORMER
Current transformer has many specialized types and it is
now available. The transformer ratio in the current
transformer is defined as the ratio of primary current to the
secondary current.For example the primary current of the
transformer is 120amps and the secondary current of the
transformer is 4 amps .The ratio will be 30:1.In case polarity
in the current transformer when the primary current is into
the polarity side then the secondary currentb will be in the
out of polarity region.And also when the primary current is
into the non-polarity side than the secondary current will be
out os the non-polarity region.The rating factor of the
current transformer is given by the product of rated current
and their current carrying ability .This current carrying
ability should not overcome the temperature limits and their
accuracy.Some current transformers may leads to saturation.
This saturation can be avoided by using high ratio current
transformers and separate current transformers for fault
current tripping.The secondary leads size should be
increased and their length should be decreased in current
transformer through which the saturation can be
eradicated.Generally current transformer can be used along
with the ammeter which produces the maximum current in
the secondary .current transformers shapes and the sizes
may get vary depends upon the user and the
manufacturer.This current transformers has high usage in
the power grid .Current transformers has an special usage in
safety installation and it is used to monitor high current and
low current at high and low voltages.Current transformer
accuracy can be affected by many factors such as
load,magnetizing current in core,phase change,and the
primary,secondary capacitance coupling.The factors that is
to be considered while selecting the current transformer is
burden,accuracy class,knee point voltage ,and accuracy
factor. The application of the current transformer is that it
makes the output signal insensitive to the shock and
vibration.the optical current transformer is most suitable for
outdoor applications like substations.And also used in the
measuring of fault currents.The advantages of current
transformer is no expolsions ,it has large range of dynamic
and wide range of frequency response.It does not require
any gas or oil insulation system so this will be considered
for environment safety.The major drawback of current
transformer is that the insulation structure should be
designed in a careful manner to avoid insulation break down
and it has less reliability. The equation for calculating the
(1)
From㳨 ≈ ` thiswe䁰get,棿 䁰䁰㳨ൌ
(2)
Thus, the changes in the current transformer
can be achieved by the changes in the primary turns.
V. POTENTIAL TRANSFORMER
potential transformer or voltage transformer is a
device which is used to step down the voltage value to the
safest value which can be feeded to the relays .The major
difference between the current transformer and the potential
transformer is that it is made up of high quality steel
operating at low flux densities.The potential transformer has
high impeadance when compared with the current
transformer.The main application potential transformer is
that it is used in measurement,power source and in operating
relay.This potential transformer is connected parallel to the
load and the voltage is measured.
VI. INTERNET OF THINGS.
Iot helps the object to understand and exchange the
data.Iot is driven by the combinations of
sensors,connectivity ,people and progress.The massive
potential of iot is used for improved performance,innovative
services and in revenue streams.Iot is used in various fields
in homes iot is used in light bulbs,security and in energy
monitoring.In transport it is used in traffic routing
,telematics and in shipping.In health patient care,elderly
monitoring ,Bio-wearabies.In buildings
infrastructure security,lightening,and in emergency
credits.In cities it is used in electrical
disturbances,maintenance and in emergency
services.Internet of things is used to create and expand new
markets and services.We are at the development and
planning to implement the iot solutions.An examples of iot
enabled devices are iot button,MS stack.The exciting
challenges connectivity ,security,energy efficiency and
economic feasibility .the security includes device
modification data transfer and performance.The electronic
platform for iot is arduinoand raspberry pi. The environment
parameter sensing iot is used to make a better and pollution
free society.this environment parameters are Dht22
module,mq-135 gas sensors,soil moisture environment this
senses the volumetric content of the water in the
underground soil.Internet of things also plays an major role
in industries.better environment.iot works through the flow
of Rfid ,sensor,smart tech and nano tech.RFID is used to
identify and track the data. Sensor is used to collect and
progress the data and it senses the changes in physical
things.smart technology provides enhancement to power of
the network by processing the data to different part of the
827
4. 2019 5th
International Conference on Advanced Computing & Communication Systems (ICACCS 2019)
network. Nano technology provides the ability of
communication and interaction.the structure of iot is
tagging,feeling, shrinking and thinking things.network of
network helps the iot become more powerful and through it
can help the people to achieve.the objects present in the iot
not only provides the sensor capabilities it also provides
thethe sensor capabilities it also provides the actuation
capabilities.iot is rapidly used due to its facilities such as
privacy,security.Iot has become inclusively very important
in the development of technology.In collection, devices and
sensors are used for collecting the datas.communication is
the mode of sending information through the network to
some destination.analyses is the method of producing
information from the data by focusing the data.action leads
to interacting with each system based upon the provided
informations and datas.the characteristics of internet of
things are Ambient Intelligence, Flexible structure,Semantic
Sharing,Event Driven. In future iot plays a major role in our
day to day life, Resource control etc.
VII. A/D CONVERTER
Analog signal produces analog values. the current
produced in the current transformer and the voltage
measured in the potential transformer is in the form of
analog values. This analog values cannot be fed to the
raspberry pi. So the analog values are converted into the
digital values using A/D converter. Analog to digital
converter takes place through two process such as
Quantizing and Encoding. In qantizing process the analog
values are converted into the set of finite values. Whereas in
encoding each finite state values are converted to digital
values and it is matched with the input.
VIII.RASPBERRY PI
Raspberry pi is small sized computer that is connected
with the monitor and in raspberry pi languages like python
and scratch are programmed.over one million units are
chipped in it. It has a drastic usage in education.The power
in raspberr pi is 5v micro usb connector which is similar to
one on a lot of mobile phones.There is an A/V ie hdmi audio
and video which works with both monitors and television
and an rca videos which works with the most older
television.it is also integrated with standard headphone
socket.for connectivity 2*usb 2.0 ports and along with it
GPIO and Ethernet are also used.Internals consists of soc
(system on a chip),a lan controller,debug ports , a camera
and display is interfaced in it.the storage card slot up to 32
GB is provided in it .It is highly used in programming
concepts ,hardware interfacing, it plays a vital role in
education and for a person who is interested with computers
and electronics.
The default educational language python are used in
raspberry pi. Other than that any languages that will compile
ARM v6 are used. the raspberry pi can be powered when it
is connected to the supply through USB port but in future it
can be powered using the battery.though raspberry pi is in
small size it act as a mini computer in future and performs
all task which desktop perform.so, it has the drastic scope in
future as it is cost less and it is easy to carry.the main
drawback of raspberry pi is that it cannot perform complex
multi task. As raspberry pi can be recycled and it is
environment friendly. The application of raspberry pi is it
can be employed in robotics for the control of motors and
sensors. It is also used in media at home.the dektop
available today runs only in two operating system.this two
operating systems are closed source and it is created using
high qualitey techniques. This closed source operating
systems tells the desktop to perform the task. In this
consumers are able to view the completed software but they
don’t know how it is created.In contrast raspberry pi runs
the operating system like GNU/LINUX. This operating
systems are open source and the consumers can view both
the software and how it is created. In raspberry pi SD card
holder is used due to the size and easy handle.Now- a-days
the card holder is a top since the consumers wont push pop
the card out.if you connect HDMI desktop with the speaker
you will receive an digital audio.Here we uses raspberry pi 0
which is smaller in size and reduces input, output and GPIO.
Raspberry pi 0 is a launched model on 2017 with a WIFI
and Bluetooth facilities.It is not only that processor differs
in raspberry pi it also uses different ISA (Instruction Set
Architecture) in it. it has a drastic future usage.
IX. BUZZER
Buzzer is a device that coverts electricalenergy in to
sound energy.It acts as an audio signaling device, used as
alarm device,timers.Buzzer plays an major role in many
modernized applications and it is the only hardware that is
frequently used in all electronic project systems.buzzer can
be used in the supply range about 4v to 9v.the buzzer is
usually coupled with the switching circuits that help us to
turn on and off the buzzer.
828
5. 2019 5th
International Conference on Advanced Computing & Communication Systems (ICACCS 2019)
X. RESULT
In previous paper of theft detection the voltage and the
current values are measured manually.In this paper the
experimental setup for theft is done with the help of
automation.the voltage and current values are measured
using current transformer and potential transformer,it is
provided to the bridge rectifiers and filters which removes
the unwanted signals and with the help of A/D converter
analog values are converted to digital values and it is feeded
to the raspberry pi here the voltage and current values are
fixed with the help of python coding and when the extra
load is connected the buzzer starts alarming and the theft
will be detected.The model experimental are as follows,
The load is connected with the potential transformer and
current transformer.the voltage and the current values are
measured using this transformers and the threshold voltage
and the current value is coded to the raspberry pi with a help
of python coding.
The fixed voltage and current values which is coded to the
raspberry pi is,
PT:230.77
CT:1.2
PT:230.7
CT:1.2
PT:230.77
CT:1.2
PT:230.77
CT:1.2
PT:230.77
In case of any load which is connected more than the fixed
voltage and current then the fixed values will exceed than
the threshold voltage which is coded to the raspberry pi .so
that the theft will be detected and the buzzer start alarming.
By using the IOT webpage is created and the mail will be
sent with the caption”THEFT DETECTED”.This is highly
utilized in industries,smart homes etc. when the extra load is
connected illegally than the requirements theft is detected.
If the current values increases than the fixed threshold
values than the system with a help of iot the caption power
theft will be intimated to the mail which is coded in the
program,
PT:230.77
CT:1.4
POWER THEFT DETECTED
PT:230.77
CT:1.5
POWER THEFT DETECTED
PT:230.77
CT:1.6
POWER THEFT DETECTED
PT:230.77
CT:1.6
POWER THEFT DETECTED
XI. CONCLUSION
This paper has addressed an overview
of power theft in various fields and how to get rid of it
currently, in india there is more shortage of power due to
the theft, This assessment and technology helps us to save
power efficiently. This project can be implemented in
industries homes and in power stations.
REFERENCES
1) Q. M. Ashraf and M. H. Habaebi, "Autonomic
schemes for threat mitigation in Internet of Things,"
Elsevier Journal of Network and Computer
Applications, vol. 49, no. 1, pp. 112-127, 2015.
2) . C. Aggarwal, N. Ashish and A. Sheth, "The
Internet of Things: A Survey from the Data-Centric
Perspective," in Managing and Mining Sensor Data,
Springer US, 2013, pp. 383-428.
3) . L. Atzori, A. Iera and G. Morabito, "The Internet
of Things: A survey,“ Computer Networks, vol. 54, no.
15, pp. 2787-2805, 2010.
4) . Z. Shelby and C. Bormann, 6LoWPAN: The
Wireless Embedded Internet, John Wiley & Sons, 2011.
5) Q. M. Ashraf and M. H. Habaebi, "Introducing
autonomy in internet of things," in 14th International
Conference on Applied Computer and Applied
Computational Science (ACACOS '15), Kuala Lumpur,
2015.
6) V.Soma Sekhar and R.puviarasi “Design of GSM
based Power Theft Detection and Load Control,”vol 119,
No. 15,pp. 2697-2703, 2018.
7) Nilesh, Rinkuraj, Prakash “GSM based Electricity
Theft Detection”, 2016 IJSEAS, Volume-2.
8) Nayan Thakre, Shreya Vaidya, Prachi Damedhar,
“Energy power theft detection in Distribution System”,
vol. 5,2017.
9) S.McLaughlin,B.Holbert, A.Fawaz, R.Bertheir,
and S.Zonouz, “A multi-sensor energy theft detection
829
6. 2019 5th
International Conference on Advanced Computing & Communication Systems (ICACCS 2019)
Frame work for advancement metering infrastructure,
“IEEE J.select. Area Commun., vol. 31,no.7,pp.1319-
1330, jul.2013
830