SlideShare a Scribd company logo
1 of 6
Download to read offline
2019 5th
International Conference on Advanced Computing & Communication Systems (ICACCS 2019)
978-1-5386-9533-3/19/$31.00 ©2019 IEEE
Power Theft Identification System
Using Iot
Mr.P.Leninpugalhanthi (ASST PROF)
Department of Electrical and
Electronics Engineering, Sri
Krishna College of Technology
Coimbatore,TamilNadu
leninpugal@skct.edu.in
Mamtha R.V
Department of Electrical and
Electronics Engineering,
Sri Krishna College of Technology
Coimbatore,TamilNadu
mamtha1814@gmail.com
Janani.R
Department of Electrical and
Electronics Engineering, Sri
Krishna College of Technology
Coimbatore,TamilNadu
trjana2498@gmail.com
Keerthana .I
Department of Electrical and
Electronics Engineering, Sri
Krishna College of Technology
Coimbatore,TamilNadu
15tuee120@skct.edu.in
Nidheesh.s
Department of Electrical and
Electronics Engineering, Sri
Krishna College of Technology
Coimbatore,TamilNadu
15tuee150@skct.edu.in
Mr R.Senthil Kumar (ASST PROF)
Department of Electrical and
Electronics Engineering, Sri
Krishna College of Technology
Coimbatore,TamilNadu
Senthilkumar.r@skct.edu.in
Abstract ----Power theft is a blatant problem in
electric powersystems, which causes great economic
losses and leads to irregular supply of electicity.Power
theft can be briefly defined as usage of power without
the knowledge of the supplier.It has become the major
problem in India and it is a crime.Overall India has
highest losses about 16.2 billion dollar.Power theft can
be happened in many ways one such way is that a
registered customers steal either bypassing the meter
ie:connecting around the meter to a live cable on a
company side of the meter or tampering with the meter
to make the meter to read less or no consumption. In
order to eradicate the power theft it has to be
identified.In this paper the raspberry Pi is fixed with
threshold voltage and current whenever the voltage level
get increased power theft is detected.
Index Terms-Power theft,IOT,Raspberry
I. INTRODUCTION
An power theft identification system is used to analyses
the flow of energy. Power theft detection is uesd to find the
unauthorized tapping on the distribution lines. Existing
system is less efficient than this system and the particular
location of the tapping is also identified but manually. This
real time system is also used to find the electrical line
tapping. But the tapping is found by using the wireless data
transmission and receiving techniques.this system also
follows the same techniques in same cost but it provides the
additional features of wireless meter reading. This system
will protects the distribution network..Bounce inspecting is
the initial step of distinguishing the chances for sparing,
both in business and private applications. Mechanical spirit
examining has turned into an essential assignment because
of expanding vitality cost. Right now, spirit examining and
request side administration of businesses confront couple of
troubles because of the inaccessibility of rapid information
breaking down frameworks, mind-boggling expense of
value vitality meters, low examining velocity of meters
which restrains their abilities and so on .In today’s world,
power saving is very important but it is difficult. Even
though there are many power generation methods, power
saving has become very difficult due to insufficient
resources. So, saving of power is very important for our
society. This work consists of monitoring the system
through Internet based communication. The proposed
system will also provide the faults and energy consumption
through internet.In today’s world, power saving is very
important and difficult. This work consists of monitoring the
system through Wi-Fi based communication.
The proposed system will also provide the faults and
energy consumption . IoT can be used for various
applications for energy monitoring and saving it helps in
demand side management and various area of energy
production.Power system may face many losses in their way
of producing power, mainley the operational losses occured
in the genartion of power and in the distribution of
power.but the losses occured in the genertion process can be
technically defined but the losses occured in the distribtion
may not be evaluate by using sending end information.this
let us know the usage of unspecialized techniques in
transmition and distribution of power.Most probably power
losses in the transmission lines,transformers, and in power
sysytem component occured due to the technical losses
naturally.The details found about the energy bill and the
total load is used to find the technical losses in the
transmission and the distribution of power.we should find
the greatest crime activity incase if the technology is in the
825
2019 5th
International Conference on Advanced Computing & Communication Systems (ICACCS 2019)
raising slope. Power theft techically affects economy of the
nation and it is one of the non ignorable crime.so the power
theft is a crime and it is a social evil that has to be fully
eradicated. The power generated must be utilized in a most
coherent manner by the way of closely examining the
consmption and losses of power.This proposed system is
used to prevent the theft electricity.Due to technology
developement IOT is used to prevent the theft electricity
without the intervention of the human.Due to this
implementation, more consumers in highly populated
country such as India,China will consumes electricity as it
saves large amount of electricity.Electricity theft can be
defined as the usage of the electrical power without any
valid contract with the supplier.This power theft also can be
reduced in many ways such as benefited companies should
appreciate consumers to report about the power theft.power
theft frequently caused when there is disconnection in the
transmission lines.so the lines should be checked
periodically.The government must take initiative to provide
awareness about the theft and enforcement of law among the
consumers.In case of any negative value occurred in the
system power theft can be identified by using iot.So, this
power theft system will overcome the problems faced before
.This system help us to save energy and distribute power
equally.
II. LITERATURE REVIEW
1) In this survey, “Energy Audit and Analysis of
Electricity Consumption of an Educational Building
Philippines for smart consumption” 2017IEEE 9th
International Conference on Humanoid, Nanotechnology,
Information Technology, Communication and Control,
Environment and Management (HNICEM)-This paper
discusses the energy audit results of an educational building
in the Philippines.This paper is highly utilized in
educational institutions for monthly electricity analyses of
data.
2) This paper is about “The Internet of Things :A
survey ,”Computer Networks ,Vol,54, pp. 2787-2805, 2010,
it is connected many physical devices over the internet
,having exchange information between two or more devices
.Now due to technology changes the current scenario, all
devices are converted into smart devices, which can learn
and take this decision by self-configuration properties.
3) In this paper “Design of Smart Home Mobile
Application with High Security and Automatic Features”-
2018 3rd
International Conference on Intelligence Green
Building and Smart Grid(IGBSG) describes the control of
electrical source supplied to a complete room.The electrical
source supplied is monitored and stored in cloud and it is
controlled using android app.
4) In this paper “Efficient and Autonomous Energy
Management Techniques for the Future Smart Homes”-
IEEE Transactions on Smart Grid( Volume: 8, Issue: 2 ,
March 2017)-A modern energy system installed at the user
end that is used to examine, calculate, optimize, and manage
the flow and use of energy, a HEMS module is connected
with the meter at one end and to all the appliances at the
other end, the user has fixed ten number of appliances, these
devices will remain ON during each time slot, while
collecting the data HEMS identifies the electricity usage,
and it calculates the price of used electrical power in kwh,
and it gathers the data based upon the consumers utilization.
III. EXISTING SYSTEM
In case of existing system errors may occurred due to
less concentration.Meter reading is not accurate.It requires
Huge Manpower.the system monitoring work get delayed
due to external conditions.Due to this Manual operation
there is a high wastage of Power.
BLOCK DIAGRAM
IV METHODOLOGY
In the society it was seen lot of people doing illegal
power theft like unauthorized tapings from lines during
functions and meter bypassing etc. These led us to do
something to stop power theft as much as we.IoT is the
recently evolving technology. Here the prototype has been
developed to identify the energy theft using iot for the
industrial purpose.Iot was selected due to the rapid growth
in technology and utilization of iot become drastic.At
present the system are controlled through manual operations
and we cannot know amount of energy consumed. In this
work machine learning is used.The proposed system is used
to identify the power theft in industries.Here the load is
connected in series with current transformer and parallel
with potential transformer. This current transformer is used
to measure the current consumption.Potential transformer is
used to measure the voltage across the supply.The supply
from the source is AC and bridge rectifier is used as a
converting unit.This converting unit transforms the ac
supply to dc supply.Here the filter is used for removing
unwanted dc signal.The dc supply produced by the bridge
rectifier is in the form of analog values.The produced analog
values is converted to digital values by using A/D
826
2019 5th
International Conference on Advanced Computing & Communication Systems (ICACCS 2019)
converter.Then it is connected to raspberry pi in which the
threshold voltage range is fixed.The fixed voltage will be
monitored continuously in the system.If the measured
voltage and current is greater than the fixed threshold
voltage.Due to the increase in voltage and current the buzzer
start alarming.Since ,it is connected to the internet of
things(IOT) a webpage is created .By using this web page
mail will be displayed to the consumers.
IV. HARDWARE COMPONENTS CURRENT
TRANSFORMER
Current transformer has many specialized types and it is
now available. The transformer ratio in the current
transformer is defined as the ratio of primary current to the
secondary current.For example the primary current of the
transformer is 120amps and the secondary current of the
transformer is 4 amps .The ratio will be 30:1.In case polarity
in the current transformer when the primary current is into
the polarity side then the secondary currentb will be in the
out of polarity region.And also when the primary current is
into the non-polarity side than the secondary current will be
out os the non-polarity region.The rating factor of the
current transformer is given by the product of rated current
and their current carrying ability .This current carrying
ability should not overcome the temperature limits and their
accuracy.Some current transformers may leads to saturation.
This saturation can be avoided by using high ratio current
transformers and separate current transformers for fault
current tripping.The secondary leads size should be
increased and their length should be decreased in current
transformer through which the saturation can be
eradicated.Generally current transformer can be used along
with the ammeter which produces the maximum current in
the secondary .current transformers shapes and the sizes
may get vary depends upon the user and the
manufacturer.This current transformers has high usage in
the power grid .Current transformers has an special usage in
safety installation and it is used to monitor high current and
low current at high and low voltages.Current transformer
accuracy can be affected by many factors such as
load,magnetizing current in core,phase change,and the
primary,secondary capacitance coupling.The factors that is
to be considered while selecting the current transformer is
burden,accuracy class,knee point voltage ,and accuracy
factor. The application of the current transformer is that it
makes the output signal insensitive to the shock and
vibration.the optical current transformer is most suitable for
outdoor applications like substations.And also used in the
measuring of fault currents.The advantages of current
transformer is no expolsions ,it has large range of dynamic
and wide range of frequency response.It does not require
any gas or oil insulation system so this will be considered
for environment safety.The major drawback of current
transformer is that the insulation structure should be
designed in a careful manner to avoid insulation break down
and it has less reliability. The equation for calculating the
(1)
From㳨 ≈ ` thiswe䁰get,棿 䁰䁰㳨ൌ
(2)
Thus, the changes in the current transformer
can be achieved by the changes in the primary turns.
V. POTENTIAL TRANSFORMER
potential transformer or voltage transformer is a
device which is used to step down the voltage value to the
safest value which can be feeded to the relays .The major
difference between the current transformer and the potential
transformer is that it is made up of high quality steel
operating at low flux densities.The potential transformer has
high impeadance when compared with the current
transformer.The main application potential transformer is
that it is used in measurement,power source and in operating
relay.This potential transformer is connected parallel to the
load and the voltage is measured.
VI. INTERNET OF THINGS.
Iot helps the object to understand and exchange the
data.Iot is driven by the combinations of
sensors,connectivity ,people and progress.The massive
potential of iot is used for improved performance,innovative
services and in revenue streams.Iot is used in various fields
in homes iot is used in light bulbs,security and in energy
monitoring.In transport it is used in traffic routing
,telematics and in shipping.In health patient care,elderly
monitoring ,Bio-wearabies.In buildings
infrastructure security,lightening,and in emergency
credits.In cities it is used in electrical
disturbances,maintenance and in emergency
services.Internet of things is used to create and expand new
markets and services.We are at the development and
planning to implement the iot solutions.An examples of iot
enabled devices are iot button,MS stack.The exciting
challenges connectivity ,security,energy efficiency and
economic feasibility .the security includes device
modification data transfer and performance.The electronic
platform for iot is arduinoand raspberry pi. The environment
parameter sensing iot is used to make a better and pollution
free society.this environment parameters are Dht22
module,mq-135 gas sensors,soil moisture environment this
senses the volumetric content of the water in the
underground soil.Internet of things also plays an major role
in industries.better environment.iot works through the flow
of Rfid ,sensor,smart tech and nano tech.RFID is used to
identify and track the data. Sensor is used to collect and
progress the data and it senses the changes in physical
things.smart technology provides enhancement to power of
the network by processing the data to different part of the
827
2019 5th
International Conference on Advanced Computing & Communication Systems (ICACCS 2019)
network. Nano technology provides the ability of
communication and interaction.the structure of iot is
tagging,feeling, shrinking and thinking things.network of
network helps the iot become more powerful and through it
can help the people to achieve.the objects present in the iot
not only provides the sensor capabilities it also provides
thethe sensor capabilities it also provides the actuation
capabilities.iot is rapidly used due to its facilities such as
privacy,security.Iot has become inclusively very important
in the development of technology.In collection, devices and
sensors are used for collecting the datas.communication is
the mode of sending information through the network to
some destination.analyses is the method of producing
information from the data by focusing the data.action leads
to interacting with each system based upon the provided
informations and datas.the characteristics of internet of
things are Ambient Intelligence, Flexible structure,Semantic
Sharing,Event Driven. In future iot plays a major role in our
day to day life, Resource control etc.
VII. A/D CONVERTER
Analog signal produces analog values. the current
produced in the current transformer and the voltage
measured in the potential transformer is in the form of
analog values. This analog values cannot be fed to the
raspberry pi. So the analog values are converted into the
digital values using A/D converter. Analog to digital
converter takes place through two process such as
Quantizing and Encoding. In qantizing process the analog
values are converted into the set of finite values. Whereas in
encoding each finite state values are converted to digital
values and it is matched with the input.
VIII.RASPBERRY PI
Raspberry pi is small sized computer that is connected
with the monitor and in raspberry pi languages like python
and scratch are programmed.over one million units are
chipped in it. It has a drastic usage in education.The power
in raspberr pi is 5v micro usb connector which is similar to
one on a lot of mobile phones.There is an A/V ie hdmi audio
and video which works with both monitors and television
and an rca videos which works with the most older
television.it is also integrated with standard headphone
socket.for connectivity 2*usb 2.0 ports and along with it
GPIO and Ethernet are also used.Internals consists of soc
(system on a chip),a lan controller,debug ports , a camera
and display is interfaced in it.the storage card slot up to 32
GB is provided in it .It is highly used in programming
concepts ,hardware interfacing, it plays a vital role in
education and for a person who is interested with computers
and electronics.
The default educational language python are used in
raspberry pi. Other than that any languages that will compile
ARM v6 are used. the raspberry pi can be powered when it
is connected to the supply through USB port but in future it
can be powered using the battery.though raspberry pi is in
small size it act as a mini computer in future and performs
all task which desktop perform.so, it has the drastic scope in
future as it is cost less and it is easy to carry.the main
drawback of raspberry pi is that it cannot perform complex
multi task. As raspberry pi can be recycled and it is
environment friendly. The application of raspberry pi is it
can be employed in robotics for the control of motors and
sensors. It is also used in media at home.the dektop
available today runs only in two operating system.this two
operating systems are closed source and it is created using
high qualitey techniques. This closed source operating
systems tells the desktop to perform the task. In this
consumers are able to view the completed software but they
don’t know how it is created.In contrast raspberry pi runs
the operating system like GNU/LINUX. This operating
systems are open source and the consumers can view both
the software and how it is created. In raspberry pi SD card
holder is used due to the size and easy handle.Now- a-days
the card holder is a top since the consumers wont push pop
the card out.if you connect HDMI desktop with the speaker
you will receive an digital audio.Here we uses raspberry pi 0
which is smaller in size and reduces input, output and GPIO.
Raspberry pi 0 is a launched model on 2017 with a WIFI
and Bluetooth facilities.It is not only that processor differs
in raspberry pi it also uses different ISA (Instruction Set
Architecture) in it. it has a drastic future usage.
IX. BUZZER
Buzzer is a device that coverts electricalenergy in to
sound energy.It acts as an audio signaling device, used as
alarm device,timers.Buzzer plays an major role in many
modernized applications and it is the only hardware that is
frequently used in all electronic project systems.buzzer can
be used in the supply range about 4v to 9v.the buzzer is
usually coupled with the switching circuits that help us to
turn on and off the buzzer.
828
2019 5th
International Conference on Advanced Computing & Communication Systems (ICACCS 2019)
X. RESULT
In previous paper of theft detection the voltage and the
current values are measured manually.In this paper the
experimental setup for theft is done with the help of
automation.the voltage and current values are measured
using current transformer and potential transformer,it is
provided to the bridge rectifiers and filters which removes
the unwanted signals and with the help of A/D converter
analog values are converted to digital values and it is feeded
to the raspberry pi here the voltage and current values are
fixed with the help of python coding and when the extra
load is connected the buzzer starts alarming and the theft
will be detected.The model experimental are as follows,
The load is connected with the potential transformer and
current transformer.the voltage and the current values are
measured using this transformers and the threshold voltage
and the current value is coded to the raspberry pi with a help
of python coding.
The fixed voltage and current values which is coded to the
raspberry pi is,
PT:230.77
CT:1.2
PT:230.7
CT:1.2
PT:230.77
CT:1.2
PT:230.77
CT:1.2
PT:230.77
In case of any load which is connected more than the fixed
voltage and current then the fixed values will exceed than
the threshold voltage which is coded to the raspberry pi .so
that the theft will be detected and the buzzer start alarming.
By using the IOT webpage is created and the mail will be
sent with the caption”THEFT DETECTED”.This is highly
utilized in industries,smart homes etc. when the extra load is
connected illegally than the requirements theft is detected.
If the current values increases than the fixed threshold
values than the system with a help of iot the caption power
theft will be intimated to the mail which is coded in the
program,
PT:230.77
CT:1.4
POWER THEFT DETECTED
PT:230.77
CT:1.5
POWER THEFT DETECTED
PT:230.77
CT:1.6
POWER THEFT DETECTED
PT:230.77
CT:1.6
POWER THEFT DETECTED
XI. CONCLUSION
This paper has addressed an overview
of power theft in various fields and how to get rid of it
currently, in india there is more shortage of power due to
the theft, This assessment and technology helps us to save
power efficiently. This project can be implemented in
industries homes and in power stations.
REFERENCES
1) Q. M. Ashraf and M. H. Habaebi, "Autonomic
schemes for threat mitigation in Internet of Things,"
Elsevier Journal of Network and Computer
Applications, vol. 49, no. 1, pp. 112-127, 2015.
2) . C. Aggarwal, N. Ashish and A. Sheth, "The
Internet of Things: A Survey from the Data-Centric
Perspective," in Managing and Mining Sensor Data,
Springer US, 2013, pp. 383-428.
3) . L. Atzori, A. Iera and G. Morabito, "The Internet
of Things: A survey,“ Computer Networks, vol. 54, no.
15, pp. 2787-2805, 2010.
4) . Z. Shelby and C. Bormann, 6LoWPAN: The
Wireless Embedded Internet, John Wiley & Sons, 2011.
5) Q. M. Ashraf and M. H. Habaebi, "Introducing
autonomy in internet of things," in 14th International
Conference on Applied Computer and Applied
Computational Science (ACACOS '15), Kuala Lumpur,
2015.
6) V.Soma Sekhar and R.puviarasi “Design of GSM
based Power Theft Detection and Load Control,”vol 119,
No. 15,pp. 2697-2703, 2018.
7) Nilesh, Rinkuraj, Prakash “GSM based Electricity
Theft Detection”, 2016 IJSEAS, Volume-2.
8) Nayan Thakre, Shreya Vaidya, Prachi Damedhar,
“Energy power theft detection in Distribution System”,
vol. 5,2017.
9) S.McLaughlin,B.Holbert, A.Fawaz, R.Bertheir,
and S.Zonouz, “A multi-sensor energy theft detection
829
2019 5th
International Conference on Advanced Computing & Communication Systems (ICACCS 2019)
Frame work for advancement metering infrastructure,
“IEEE J.select. Area Commun., vol. 31,no.7,pp.1319-
1330, jul.2013
830

More Related Content

What's hot

Smart health monitoring system using IoT based smart fitness mirror
Smart health monitoring system using IoT based smart fitness mirrorSmart health monitoring system using IoT based smart fitness mirror
Smart health monitoring system using IoT based smart fitness mirrorTELKOMNIKA JOURNAL
 
IOT HEALTH CARE
IOT HEALTH CAREIOT HEALTH CARE
IOT HEALTH CARESarath K
 
Smart health care System Using IOT and Machine learning
Smart health care System Using IOT and Machine learningSmart health care System Using IOT and Machine learning
Smart health care System Using IOT and Machine learningTAPAPRABHACHOWDHURY
 
PATIENT HEALTH MONITORING SYSTEM USING IOT AND ANDROID
PATIENT HEALTH MONITORING SYSTEM USING IOT AND ANDROIDPATIENT HEALTH MONITORING SYSTEM USING IOT AND ANDROID
PATIENT HEALTH MONITORING SYSTEM USING IOT AND ANDROIDJournal For Research
 
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET-  	  A Survey on-Security for using Pervasive Healthcare Monitoring Sys...IRJET-  	  A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...IRJET Journal
 
Patient Health Monitoring System using IOT
Patient Health Monitoring System using IOTPatient Health Monitoring System using IOT
Patient Health Monitoring System using IOTIRJET Journal
 
Business Plan: Health Monitoring System
Business Plan: Health Monitoring SystemBusiness Plan: Health Monitoring System
Business Plan: Health Monitoring SystemSunil Kumar
 
Health care application system using io t
Health care application system using io tHealth care application system using io t
Health care application system using io tIJARIIT
 
IRJET - Heartbeat Monitoring and Heart Attack Detection using IoT(Interne...
IRJET -  	  Heartbeat Monitoring and Heart Attack Detection using IoT(Interne...IRJET -  	  Heartbeat Monitoring and Heart Attack Detection using IoT(Interne...
IRJET - Heartbeat Monitoring and Heart Attack Detection using IoT(Interne...IRJET Journal
 
IRJET - IoT based Health Monitoring System and Telemedicine
IRJET - IoT based Health Monitoring System and TelemedicineIRJET - IoT based Health Monitoring System and Telemedicine
IRJET - IoT based Health Monitoring System and TelemedicineIRJET Journal
 
IRJET- Patient Health Monitoring with Health Assistant
IRJET- Patient Health Monitoring with Health AssistantIRJET- Patient Health Monitoring with Health Assistant
IRJET- Patient Health Monitoring with Health AssistantIRJET Journal
 
An IoT Based Patient Health Monitoring System
An IoT Based Patient Health Monitoring SystemAn IoT Based Patient Health Monitoring System
An IoT Based Patient Health Monitoring Systemvishal dineshkumar soni
 
IRJET- IoT based Advanced Healthcare Architecture: A New Approach
IRJET- IoT based Advanced Healthcare Architecture: A New ApproachIRJET- IoT based Advanced Healthcare Architecture: A New Approach
IRJET- IoT based Advanced Healthcare Architecture: A New ApproachIRJET Journal
 

What's hot (20)

Smart health monitoring system using IoT based smart fitness mirror
Smart health monitoring system using IoT based smart fitness mirrorSmart health monitoring system using IoT based smart fitness mirror
Smart health monitoring system using IoT based smart fitness mirror
 
IOT HEALTH CARE
IOT HEALTH CAREIOT HEALTH CARE
IOT HEALTH CARE
 
Smart health care System Using IOT and Machine learning
Smart health care System Using IOT and Machine learningSmart health care System Using IOT and Machine learning
Smart health care System Using IOT and Machine learning
 
PATIENT HEALTH MONITORING SYSTEM USING IOT AND ANDROID
PATIENT HEALTH MONITORING SYSTEM USING IOT AND ANDROIDPATIENT HEALTH MONITORING SYSTEM USING IOT AND ANDROID
PATIENT HEALTH MONITORING SYSTEM USING IOT AND ANDROID
 
REVIEW ON: IOT BASED HEART DISEASE MONITORING SYSTEM
REVIEW ON: IOT BASED HEART DISEASE MONITORING SYSTEMREVIEW ON: IOT BASED HEART DISEASE MONITORING SYSTEM
REVIEW ON: IOT BASED HEART DISEASE MONITORING SYSTEM
 
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET-  	  A Survey on-Security for using Pervasive Healthcare Monitoring Sys...IRJET-  	  A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
 
ADVANCED HEALTH CARE SYSTEM USING IOT
ADVANCED HEALTH CARE SYSTEM USING IOTADVANCED HEALTH CARE SYSTEM USING IOT
ADVANCED HEALTH CARE SYSTEM USING IOT
 
Patient Health Monitoring System using IOT
Patient Health Monitoring System using IOTPatient Health Monitoring System using IOT
Patient Health Monitoring System using IOT
 
Business Plan: Health Monitoring System
Business Plan: Health Monitoring SystemBusiness Plan: Health Monitoring System
Business Plan: Health Monitoring System
 
Health care application system using io t
Health care application system using io tHealth care application system using io t
Health care application system using io t
 
IOT in healthcare
IOT in healthcareIOT in healthcare
IOT in healthcare
 
IRJET - Heartbeat Monitoring and Heart Attack Detection using IoT(Interne...
IRJET -  	  Heartbeat Monitoring and Heart Attack Detection using IoT(Interne...IRJET -  	  Heartbeat Monitoring and Heart Attack Detection using IoT(Interne...
IRJET - Heartbeat Monitoring and Heart Attack Detection using IoT(Interne...
 
WARNING SYSTEM FROM THREAT OF WILD ANIMALS USING IOT
WARNING SYSTEM FROM THREAT OF WILD ANIMALS USING IOTWARNING SYSTEM FROM THREAT OF WILD ANIMALS USING IOT
WARNING SYSTEM FROM THREAT OF WILD ANIMALS USING IOT
 
IoT Healthcare
IoT HealthcareIoT Healthcare
IoT Healthcare
 
IRJET - IoT based Health Monitoring System and Telemedicine
IRJET - IoT based Health Monitoring System and TelemedicineIRJET - IoT based Health Monitoring System and Telemedicine
IRJET - IoT based Health Monitoring System and Telemedicine
 
Iot healthcare
Iot healthcareIot healthcare
Iot healthcare
 
IRJET- Patient Health Monitoring with Health Assistant
IRJET- Patient Health Monitoring with Health AssistantIRJET- Patient Health Monitoring with Health Assistant
IRJET- Patient Health Monitoring with Health Assistant
 
An IoT Based Patient Health Monitoring System
An IoT Based Patient Health Monitoring SystemAn IoT Based Patient Health Monitoring System
An IoT Based Patient Health Monitoring System
 
IoT in Health Care
IoT in Health CareIoT in Health Care
IoT in Health Care
 
IRJET- IoT based Advanced Healthcare Architecture: A New Approach
IRJET- IoT based Advanced Healthcare Architecture: A New ApproachIRJET- IoT based Advanced Healthcare Architecture: A New Approach
IRJET- IoT based Advanced Healthcare Architecture: A New Approach
 

Similar to Power Theft Identification System Using Iot

IRJET- IoT based Smart Electricity Meter and Billing System
IRJET- IoT based Smart Electricity Meter and Billing SystemIRJET- IoT based Smart Electricity Meter and Billing System
IRJET- IoT based Smart Electricity Meter and Billing SystemIRJET Journal
 
IRJET- A Review on Smart Energy Meter for Power Consumption Monitoring with O...
IRJET- A Review on Smart Energy Meter for Power Consumption Monitoring with O...IRJET- A Review on Smart Energy Meter for Power Consumption Monitoring with O...
IRJET- A Review on Smart Energy Meter for Power Consumption Monitoring with O...IRJET Journal
 
IRJET - IoT based Energy Monitoring System for Energy Conservation
IRJET -  	  IoT based Energy Monitoring System for Energy ConservationIRJET -  	  IoT based Energy Monitoring System for Energy Conservation
IRJET - IoT based Energy Monitoring System for Energy ConservationIRJET Journal
 
IoT based Smart Energy Meter
IoT based Smart Energy MeterIoT based Smart Energy Meter
IoT based Smart Energy MeterIRJET Journal
 
IOT-ENABLED GREEN CAMPUS ENERGY MANAGEMENT SYSTEM
IOT-ENABLED GREEN CAMPUS ENERGY MANAGEMENT SYSTEM IOT-ENABLED GREEN CAMPUS ENERGY MANAGEMENT SYSTEM
IOT-ENABLED GREEN CAMPUS ENERGY MANAGEMENT SYSTEM ijesajournal
 
Robotic Monitoring of Power Systems
Robotic Monitoring of Power SystemsRobotic Monitoring of Power Systems
Robotic Monitoring of Power Systemsijtsrd
 
Devices-Smart Electric Surveillance
Devices-Smart Electric SurveillanceDevices-Smart Electric Surveillance
Devices-Smart Electric Surveillanceijtsrd
 
energy meter reader (1).pdf
energy meter reader (1).pdfenergy meter reader (1).pdf
energy meter reader (1).pdfDEEPAKAIT20
 
Smart Anti Power Theft System
Smart Anti Power Theft SystemSmart Anti Power Theft System
Smart Anti Power Theft SystemIRJET Journal
 
IRJET- Automated Energy Metering System
IRJET- Automated Energy Metering SystemIRJET- Automated Energy Metering System
IRJET- Automated Energy Metering SystemIRJET Journal
 
A PROFICIENT SENSOR NETWORK BASED SMART METER MULTI-DEMAND RESPONSE SYSTEM US...
A PROFICIENT SENSOR NETWORK BASED SMART METER MULTI-DEMAND RESPONSE SYSTEM US...A PROFICIENT SENSOR NETWORK BASED SMART METER MULTI-DEMAND RESPONSE SYSTEM US...
A PROFICIENT SENSOR NETWORK BASED SMART METER MULTI-DEMAND RESPONSE SYSTEM US...aravind Guru
 
IRJET - IoT based Smart Monitoring in Distribution System
IRJET - IoT based Smart Monitoring in Distribution SystemIRJET - IoT based Smart Monitoring in Distribution System
IRJET - IoT based Smart Monitoring in Distribution SystemIRJET Journal
 
An IoT based Electric meter Billing System
An IoT based Electric meter Billing SystemAn IoT based Electric meter Billing System
An IoT based Electric meter Billing SystemIRJET Journal
 
Design a Talking Energy Meter based on Microcontroller
Design a Talking Energy Meter based on MicrocontrollerDesign a Talking Energy Meter based on Microcontroller
Design a Talking Energy Meter based on MicrocontrollerIRJET Journal
 
IRJET- Overloading Detection in Residentional Area
IRJET- Overloading Detection in Residentional AreaIRJET- Overloading Detection in Residentional Area
IRJET- Overloading Detection in Residentional AreaIRJET Journal
 
IRJET- Power Theft and Fault Detection using IoT Technology
IRJET-  	  Power Theft and Fault Detection using IoT TechnologyIRJET-  	  Power Theft and Fault Detection using IoT Technology
IRJET- Power Theft and Fault Detection using IoT TechnologyIRJET Journal
 
An IOT based smart metering development for energy management system
An IOT based smart metering development for energy management systemAn IOT based smart metering development for energy management system
An IOT based smart metering development for energy management systemIJECEIAES
 
IRJET- Study of IoT in Energy Industry
IRJET- Study of IoT in Energy IndustryIRJET- Study of IoT in Energy Industry
IRJET- Study of IoT in Energy IndustryIRJET Journal
 
IoT Based Smart Energy Meter
IoT Based Smart Energy MeterIoT Based Smart Energy Meter
IoT Based Smart Energy Meterijtsrd
 
IRJET- IoT based Monitoring and Controlling of Smart Speaking Energy Mete...
IRJET-  	  IoT based Monitoring and Controlling of Smart Speaking Energy Mete...IRJET-  	  IoT based Monitoring and Controlling of Smart Speaking Energy Mete...
IRJET- IoT based Monitoring and Controlling of Smart Speaking Energy Mete...IRJET Journal
 

Similar to Power Theft Identification System Using Iot (20)

IRJET- IoT based Smart Electricity Meter and Billing System
IRJET- IoT based Smart Electricity Meter and Billing SystemIRJET- IoT based Smart Electricity Meter and Billing System
IRJET- IoT based Smart Electricity Meter and Billing System
 
IRJET- A Review on Smart Energy Meter for Power Consumption Monitoring with O...
IRJET- A Review on Smart Energy Meter for Power Consumption Monitoring with O...IRJET- A Review on Smart Energy Meter for Power Consumption Monitoring with O...
IRJET- A Review on Smart Energy Meter for Power Consumption Monitoring with O...
 
IRJET - IoT based Energy Monitoring System for Energy Conservation
IRJET -  	  IoT based Energy Monitoring System for Energy ConservationIRJET -  	  IoT based Energy Monitoring System for Energy Conservation
IRJET - IoT based Energy Monitoring System for Energy Conservation
 
IoT based Smart Energy Meter
IoT based Smart Energy MeterIoT based Smart Energy Meter
IoT based Smart Energy Meter
 
IOT-ENABLED GREEN CAMPUS ENERGY MANAGEMENT SYSTEM
IOT-ENABLED GREEN CAMPUS ENERGY MANAGEMENT SYSTEM IOT-ENABLED GREEN CAMPUS ENERGY MANAGEMENT SYSTEM
IOT-ENABLED GREEN CAMPUS ENERGY MANAGEMENT SYSTEM
 
Robotic Monitoring of Power Systems
Robotic Monitoring of Power SystemsRobotic Monitoring of Power Systems
Robotic Monitoring of Power Systems
 
Devices-Smart Electric Surveillance
Devices-Smart Electric SurveillanceDevices-Smart Electric Surveillance
Devices-Smart Electric Surveillance
 
energy meter reader (1).pdf
energy meter reader (1).pdfenergy meter reader (1).pdf
energy meter reader (1).pdf
 
Smart Anti Power Theft System
Smart Anti Power Theft SystemSmart Anti Power Theft System
Smart Anti Power Theft System
 
IRJET- Automated Energy Metering System
IRJET- Automated Energy Metering SystemIRJET- Automated Energy Metering System
IRJET- Automated Energy Metering System
 
A PROFICIENT SENSOR NETWORK BASED SMART METER MULTI-DEMAND RESPONSE SYSTEM US...
A PROFICIENT SENSOR NETWORK BASED SMART METER MULTI-DEMAND RESPONSE SYSTEM US...A PROFICIENT SENSOR NETWORK BASED SMART METER MULTI-DEMAND RESPONSE SYSTEM US...
A PROFICIENT SENSOR NETWORK BASED SMART METER MULTI-DEMAND RESPONSE SYSTEM US...
 
IRJET - IoT based Smart Monitoring in Distribution System
IRJET - IoT based Smart Monitoring in Distribution SystemIRJET - IoT based Smart Monitoring in Distribution System
IRJET - IoT based Smart Monitoring in Distribution System
 
An IoT based Electric meter Billing System
An IoT based Electric meter Billing SystemAn IoT based Electric meter Billing System
An IoT based Electric meter Billing System
 
Design a Talking Energy Meter based on Microcontroller
Design a Talking Energy Meter based on MicrocontrollerDesign a Talking Energy Meter based on Microcontroller
Design a Talking Energy Meter based on Microcontroller
 
IRJET- Overloading Detection in Residentional Area
IRJET- Overloading Detection in Residentional AreaIRJET- Overloading Detection in Residentional Area
IRJET- Overloading Detection in Residentional Area
 
IRJET- Power Theft and Fault Detection using IoT Technology
IRJET-  	  Power Theft and Fault Detection using IoT TechnologyIRJET-  	  Power Theft and Fault Detection using IoT Technology
IRJET- Power Theft and Fault Detection using IoT Technology
 
An IOT based smart metering development for energy management system
An IOT based smart metering development for energy management systemAn IOT based smart metering development for energy management system
An IOT based smart metering development for energy management system
 
IRJET- Study of IoT in Energy Industry
IRJET- Study of IoT in Energy IndustryIRJET- Study of IoT in Energy Industry
IRJET- Study of IoT in Energy Industry
 
IoT Based Smart Energy Meter
IoT Based Smart Energy MeterIoT Based Smart Energy Meter
IoT Based Smart Energy Meter
 
IRJET- IoT based Monitoring and Controlling of Smart Speaking Energy Mete...
IRJET-  	  IoT based Monitoring and Controlling of Smart Speaking Energy Mete...IRJET-  	  IoT based Monitoring and Controlling of Smart Speaking Energy Mete...
IRJET- IoT based Monitoring and Controlling of Smart Speaking Energy Mete...
 

More from sakru naik

An automated low cost IoT based Fertilizer Intimation System forsmart agricul...
An automated low cost IoT based Fertilizer Intimation System forsmart agricul...An automated low cost IoT based Fertilizer Intimation System forsmart agricul...
An automated low cost IoT based Fertilizer Intimation System forsmart agricul...sakru naik
 
Kepad lcd 8051
Kepad lcd 8051Kepad lcd 8051
Kepad lcd 8051sakru naik
 
C 14-deee-v&vi sems
C 14-deee-v&vi semsC 14-deee-v&vi sems
C 14-deee-v&vi semssakru naik
 
Eee r16 syllabus
Eee r16 syllabusEee r16 syllabus
Eee r16 syllabussakru naik
 
An improved dft based channel estimation
An improved dft based channel estimationAn improved dft based channel estimation
An improved dft based channel estimationsakru naik
 

More from sakru naik (7)

An automated low cost IoT based Fertilizer Intimation System forsmart agricul...
An automated low cost IoT based Fertilizer Intimation System forsmart agricul...An automated low cost IoT based Fertilizer Intimation System forsmart agricul...
An automated low cost IoT based Fertilizer Intimation System forsmart agricul...
 
Kepad lcd 8051
Kepad lcd 8051Kepad lcd 8051
Kepad lcd 8051
 
C 14-deee-v&vi sems
C 14-deee-v&vi semsC 14-deee-v&vi sems
C 14-deee-v&vi sems
 
Eee r16 syllabus
Eee r16 syllabusEee r16 syllabus
Eee r16 syllabus
 
Ec lab viva
Ec lab vivaEc lab viva
Ec lab viva
 
Ijst 131202
Ijst 131202Ijst 131202
Ijst 131202
 
An improved dft based channel estimation
An improved dft based channel estimationAn improved dft based channel estimation
An improved dft based channel estimation
 

Recently uploaded

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 

Power Theft Identification System Using Iot

  • 1. 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS 2019) 978-1-5386-9533-3/19/$31.00 ©2019 IEEE Power Theft Identification System Using Iot Mr.P.Leninpugalhanthi (ASST PROF) Department of Electrical and Electronics Engineering, Sri Krishna College of Technology Coimbatore,TamilNadu leninpugal@skct.edu.in Mamtha R.V Department of Electrical and Electronics Engineering, Sri Krishna College of Technology Coimbatore,TamilNadu mamtha1814@gmail.com Janani.R Department of Electrical and Electronics Engineering, Sri Krishna College of Technology Coimbatore,TamilNadu trjana2498@gmail.com Keerthana .I Department of Electrical and Electronics Engineering, Sri Krishna College of Technology Coimbatore,TamilNadu 15tuee120@skct.edu.in Nidheesh.s Department of Electrical and Electronics Engineering, Sri Krishna College of Technology Coimbatore,TamilNadu 15tuee150@skct.edu.in Mr R.Senthil Kumar (ASST PROF) Department of Electrical and Electronics Engineering, Sri Krishna College of Technology Coimbatore,TamilNadu Senthilkumar.r@skct.edu.in Abstract ----Power theft is a blatant problem in electric powersystems, which causes great economic losses and leads to irregular supply of electicity.Power theft can be briefly defined as usage of power without the knowledge of the supplier.It has become the major problem in India and it is a crime.Overall India has highest losses about 16.2 billion dollar.Power theft can be happened in many ways one such way is that a registered customers steal either bypassing the meter ie:connecting around the meter to a live cable on a company side of the meter or tampering with the meter to make the meter to read less or no consumption. In order to eradicate the power theft it has to be identified.In this paper the raspberry Pi is fixed with threshold voltage and current whenever the voltage level get increased power theft is detected. Index Terms-Power theft,IOT,Raspberry I. INTRODUCTION An power theft identification system is used to analyses the flow of energy. Power theft detection is uesd to find the unauthorized tapping on the distribution lines. Existing system is less efficient than this system and the particular location of the tapping is also identified but manually. This real time system is also used to find the electrical line tapping. But the tapping is found by using the wireless data transmission and receiving techniques.this system also follows the same techniques in same cost but it provides the additional features of wireless meter reading. This system will protects the distribution network..Bounce inspecting is the initial step of distinguishing the chances for sparing, both in business and private applications. Mechanical spirit examining has turned into an essential assignment because of expanding vitality cost. Right now, spirit examining and request side administration of businesses confront couple of troubles because of the inaccessibility of rapid information breaking down frameworks, mind-boggling expense of value vitality meters, low examining velocity of meters which restrains their abilities and so on .In today’s world, power saving is very important but it is difficult. Even though there are many power generation methods, power saving has become very difficult due to insufficient resources. So, saving of power is very important for our society. This work consists of monitoring the system through Internet based communication. The proposed system will also provide the faults and energy consumption through internet.In today’s world, power saving is very important and difficult. This work consists of monitoring the system through Wi-Fi based communication. The proposed system will also provide the faults and energy consumption . IoT can be used for various applications for energy monitoring and saving it helps in demand side management and various area of energy production.Power system may face many losses in their way of producing power, mainley the operational losses occured in the genartion of power and in the distribution of power.but the losses occured in the genertion process can be technically defined but the losses occured in the distribtion may not be evaluate by using sending end information.this let us know the usage of unspecialized techniques in transmition and distribution of power.Most probably power losses in the transmission lines,transformers, and in power sysytem component occured due to the technical losses naturally.The details found about the energy bill and the total load is used to find the technical losses in the transmission and the distribution of power.we should find the greatest crime activity incase if the technology is in the 825
  • 2. 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS 2019) raising slope. Power theft techically affects economy of the nation and it is one of the non ignorable crime.so the power theft is a crime and it is a social evil that has to be fully eradicated. The power generated must be utilized in a most coherent manner by the way of closely examining the consmption and losses of power.This proposed system is used to prevent the theft electricity.Due to technology developement IOT is used to prevent the theft electricity without the intervention of the human.Due to this implementation, more consumers in highly populated country such as India,China will consumes electricity as it saves large amount of electricity.Electricity theft can be defined as the usage of the electrical power without any valid contract with the supplier.This power theft also can be reduced in many ways such as benefited companies should appreciate consumers to report about the power theft.power theft frequently caused when there is disconnection in the transmission lines.so the lines should be checked periodically.The government must take initiative to provide awareness about the theft and enforcement of law among the consumers.In case of any negative value occurred in the system power theft can be identified by using iot.So, this power theft system will overcome the problems faced before .This system help us to save energy and distribute power equally. II. LITERATURE REVIEW 1) In this survey, “Energy Audit and Analysis of Electricity Consumption of an Educational Building Philippines for smart consumption” 2017IEEE 9th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM)-This paper discusses the energy audit results of an educational building in the Philippines.This paper is highly utilized in educational institutions for monthly electricity analyses of data. 2) This paper is about “The Internet of Things :A survey ,”Computer Networks ,Vol,54, pp. 2787-2805, 2010, it is connected many physical devices over the internet ,having exchange information between two or more devices .Now due to technology changes the current scenario, all devices are converted into smart devices, which can learn and take this decision by self-configuration properties. 3) In this paper “Design of Smart Home Mobile Application with High Security and Automatic Features”- 2018 3rd International Conference on Intelligence Green Building and Smart Grid(IGBSG) describes the control of electrical source supplied to a complete room.The electrical source supplied is monitored and stored in cloud and it is controlled using android app. 4) In this paper “Efficient and Autonomous Energy Management Techniques for the Future Smart Homes”- IEEE Transactions on Smart Grid( Volume: 8, Issue: 2 , March 2017)-A modern energy system installed at the user end that is used to examine, calculate, optimize, and manage the flow and use of energy, a HEMS module is connected with the meter at one end and to all the appliances at the other end, the user has fixed ten number of appliances, these devices will remain ON during each time slot, while collecting the data HEMS identifies the electricity usage, and it calculates the price of used electrical power in kwh, and it gathers the data based upon the consumers utilization. III. EXISTING SYSTEM In case of existing system errors may occurred due to less concentration.Meter reading is not accurate.It requires Huge Manpower.the system monitoring work get delayed due to external conditions.Due to this Manual operation there is a high wastage of Power. BLOCK DIAGRAM IV METHODOLOGY In the society it was seen lot of people doing illegal power theft like unauthorized tapings from lines during functions and meter bypassing etc. These led us to do something to stop power theft as much as we.IoT is the recently evolving technology. Here the prototype has been developed to identify the energy theft using iot for the industrial purpose.Iot was selected due to the rapid growth in technology and utilization of iot become drastic.At present the system are controlled through manual operations and we cannot know amount of energy consumed. In this work machine learning is used.The proposed system is used to identify the power theft in industries.Here the load is connected in series with current transformer and parallel with potential transformer. This current transformer is used to measure the current consumption.Potential transformer is used to measure the voltage across the supply.The supply from the source is AC and bridge rectifier is used as a converting unit.This converting unit transforms the ac supply to dc supply.Here the filter is used for removing unwanted dc signal.The dc supply produced by the bridge rectifier is in the form of analog values.The produced analog values is converted to digital values by using A/D 826
  • 3. 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS 2019) converter.Then it is connected to raspberry pi in which the threshold voltage range is fixed.The fixed voltage will be monitored continuously in the system.If the measured voltage and current is greater than the fixed threshold voltage.Due to the increase in voltage and current the buzzer start alarming.Since ,it is connected to the internet of things(IOT) a webpage is created .By using this web page mail will be displayed to the consumers. IV. HARDWARE COMPONENTS CURRENT TRANSFORMER Current transformer has many specialized types and it is now available. The transformer ratio in the current transformer is defined as the ratio of primary current to the secondary current.For example the primary current of the transformer is 120amps and the secondary current of the transformer is 4 amps .The ratio will be 30:1.In case polarity in the current transformer when the primary current is into the polarity side then the secondary currentb will be in the out of polarity region.And also when the primary current is into the non-polarity side than the secondary current will be out os the non-polarity region.The rating factor of the current transformer is given by the product of rated current and their current carrying ability .This current carrying ability should not overcome the temperature limits and their accuracy.Some current transformers may leads to saturation. This saturation can be avoided by using high ratio current transformers and separate current transformers for fault current tripping.The secondary leads size should be increased and their length should be decreased in current transformer through which the saturation can be eradicated.Generally current transformer can be used along with the ammeter which produces the maximum current in the secondary .current transformers shapes and the sizes may get vary depends upon the user and the manufacturer.This current transformers has high usage in the power grid .Current transformers has an special usage in safety installation and it is used to monitor high current and low current at high and low voltages.Current transformer accuracy can be affected by many factors such as load,magnetizing current in core,phase change,and the primary,secondary capacitance coupling.The factors that is to be considered while selecting the current transformer is burden,accuracy class,knee point voltage ,and accuracy factor. The application of the current transformer is that it makes the output signal insensitive to the shock and vibration.the optical current transformer is most suitable for outdoor applications like substations.And also used in the measuring of fault currents.The advantages of current transformer is no expolsions ,it has large range of dynamic and wide range of frequency response.It does not require any gas or oil insulation system so this will be considered for environment safety.The major drawback of current transformer is that the insulation structure should be designed in a careful manner to avoid insulation break down and it has less reliability. The equation for calculating the (1) From㳨 ≈ ` thiswe䁰get,棿 䁰䁰㳨ൌ (2) Thus, the changes in the current transformer can be achieved by the changes in the primary turns. V. POTENTIAL TRANSFORMER potential transformer or voltage transformer is a device which is used to step down the voltage value to the safest value which can be feeded to the relays .The major difference between the current transformer and the potential transformer is that it is made up of high quality steel operating at low flux densities.The potential transformer has high impeadance when compared with the current transformer.The main application potential transformer is that it is used in measurement,power source and in operating relay.This potential transformer is connected parallel to the load and the voltage is measured. VI. INTERNET OF THINGS. Iot helps the object to understand and exchange the data.Iot is driven by the combinations of sensors,connectivity ,people and progress.The massive potential of iot is used for improved performance,innovative services and in revenue streams.Iot is used in various fields in homes iot is used in light bulbs,security and in energy monitoring.In transport it is used in traffic routing ,telematics and in shipping.In health patient care,elderly monitoring ,Bio-wearabies.In buildings infrastructure security,lightening,and in emergency credits.In cities it is used in electrical disturbances,maintenance and in emergency services.Internet of things is used to create and expand new markets and services.We are at the development and planning to implement the iot solutions.An examples of iot enabled devices are iot button,MS stack.The exciting challenges connectivity ,security,energy efficiency and economic feasibility .the security includes device modification data transfer and performance.The electronic platform for iot is arduinoand raspberry pi. The environment parameter sensing iot is used to make a better and pollution free society.this environment parameters are Dht22 module,mq-135 gas sensors,soil moisture environment this senses the volumetric content of the water in the underground soil.Internet of things also plays an major role in industries.better environment.iot works through the flow of Rfid ,sensor,smart tech and nano tech.RFID is used to identify and track the data. Sensor is used to collect and progress the data and it senses the changes in physical things.smart technology provides enhancement to power of the network by processing the data to different part of the 827
  • 4. 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS 2019) network. Nano technology provides the ability of communication and interaction.the structure of iot is tagging,feeling, shrinking and thinking things.network of network helps the iot become more powerful and through it can help the people to achieve.the objects present in the iot not only provides the sensor capabilities it also provides thethe sensor capabilities it also provides the actuation capabilities.iot is rapidly used due to its facilities such as privacy,security.Iot has become inclusively very important in the development of technology.In collection, devices and sensors are used for collecting the datas.communication is the mode of sending information through the network to some destination.analyses is the method of producing information from the data by focusing the data.action leads to interacting with each system based upon the provided informations and datas.the characteristics of internet of things are Ambient Intelligence, Flexible structure,Semantic Sharing,Event Driven. In future iot plays a major role in our day to day life, Resource control etc. VII. A/D CONVERTER Analog signal produces analog values. the current produced in the current transformer and the voltage measured in the potential transformer is in the form of analog values. This analog values cannot be fed to the raspberry pi. So the analog values are converted into the digital values using A/D converter. Analog to digital converter takes place through two process such as Quantizing and Encoding. In qantizing process the analog values are converted into the set of finite values. Whereas in encoding each finite state values are converted to digital values and it is matched with the input. VIII.RASPBERRY PI Raspberry pi is small sized computer that is connected with the monitor and in raspberry pi languages like python and scratch are programmed.over one million units are chipped in it. It has a drastic usage in education.The power in raspberr pi is 5v micro usb connector which is similar to one on a lot of mobile phones.There is an A/V ie hdmi audio and video which works with both monitors and television and an rca videos which works with the most older television.it is also integrated with standard headphone socket.for connectivity 2*usb 2.0 ports and along with it GPIO and Ethernet are also used.Internals consists of soc (system on a chip),a lan controller,debug ports , a camera and display is interfaced in it.the storage card slot up to 32 GB is provided in it .It is highly used in programming concepts ,hardware interfacing, it plays a vital role in education and for a person who is interested with computers and electronics. The default educational language python are used in raspberry pi. Other than that any languages that will compile ARM v6 are used. the raspberry pi can be powered when it is connected to the supply through USB port but in future it can be powered using the battery.though raspberry pi is in small size it act as a mini computer in future and performs all task which desktop perform.so, it has the drastic scope in future as it is cost less and it is easy to carry.the main drawback of raspberry pi is that it cannot perform complex multi task. As raspberry pi can be recycled and it is environment friendly. The application of raspberry pi is it can be employed in robotics for the control of motors and sensors. It is also used in media at home.the dektop available today runs only in two operating system.this two operating systems are closed source and it is created using high qualitey techniques. This closed source operating systems tells the desktop to perform the task. In this consumers are able to view the completed software but they don’t know how it is created.In contrast raspberry pi runs the operating system like GNU/LINUX. This operating systems are open source and the consumers can view both the software and how it is created. In raspberry pi SD card holder is used due to the size and easy handle.Now- a-days the card holder is a top since the consumers wont push pop the card out.if you connect HDMI desktop with the speaker you will receive an digital audio.Here we uses raspberry pi 0 which is smaller in size and reduces input, output and GPIO. Raspberry pi 0 is a launched model on 2017 with a WIFI and Bluetooth facilities.It is not only that processor differs in raspberry pi it also uses different ISA (Instruction Set Architecture) in it. it has a drastic future usage. IX. BUZZER Buzzer is a device that coverts electricalenergy in to sound energy.It acts as an audio signaling device, used as alarm device,timers.Buzzer plays an major role in many modernized applications and it is the only hardware that is frequently used in all electronic project systems.buzzer can be used in the supply range about 4v to 9v.the buzzer is usually coupled with the switching circuits that help us to turn on and off the buzzer. 828
  • 5. 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS 2019) X. RESULT In previous paper of theft detection the voltage and the current values are measured manually.In this paper the experimental setup for theft is done with the help of automation.the voltage and current values are measured using current transformer and potential transformer,it is provided to the bridge rectifiers and filters which removes the unwanted signals and with the help of A/D converter analog values are converted to digital values and it is feeded to the raspberry pi here the voltage and current values are fixed with the help of python coding and when the extra load is connected the buzzer starts alarming and the theft will be detected.The model experimental are as follows, The load is connected with the potential transformer and current transformer.the voltage and the current values are measured using this transformers and the threshold voltage and the current value is coded to the raspberry pi with a help of python coding. The fixed voltage and current values which is coded to the raspberry pi is, PT:230.77 CT:1.2 PT:230.7 CT:1.2 PT:230.77 CT:1.2 PT:230.77 CT:1.2 PT:230.77 In case of any load which is connected more than the fixed voltage and current then the fixed values will exceed than the threshold voltage which is coded to the raspberry pi .so that the theft will be detected and the buzzer start alarming. By using the IOT webpage is created and the mail will be sent with the caption”THEFT DETECTED”.This is highly utilized in industries,smart homes etc. when the extra load is connected illegally than the requirements theft is detected. If the current values increases than the fixed threshold values than the system with a help of iot the caption power theft will be intimated to the mail which is coded in the program, PT:230.77 CT:1.4 POWER THEFT DETECTED PT:230.77 CT:1.5 POWER THEFT DETECTED PT:230.77 CT:1.6 POWER THEFT DETECTED PT:230.77 CT:1.6 POWER THEFT DETECTED XI. CONCLUSION This paper has addressed an overview of power theft in various fields and how to get rid of it currently, in india there is more shortage of power due to the theft, This assessment and technology helps us to save power efficiently. This project can be implemented in industries homes and in power stations. REFERENCES 1) Q. M. Ashraf and M. H. Habaebi, "Autonomic schemes for threat mitigation in Internet of Things," Elsevier Journal of Network and Computer Applications, vol. 49, no. 1, pp. 112-127, 2015. 2) . C. Aggarwal, N. Ashish and A. Sheth, "The Internet of Things: A Survey from the Data-Centric Perspective," in Managing and Mining Sensor Data, Springer US, 2013, pp. 383-428. 3) . L. Atzori, A. Iera and G. Morabito, "The Internet of Things: A survey,“ Computer Networks, vol. 54, no. 15, pp. 2787-2805, 2010. 4) . Z. Shelby and C. Bormann, 6LoWPAN: The Wireless Embedded Internet, John Wiley & Sons, 2011. 5) Q. M. Ashraf and M. H. Habaebi, "Introducing autonomy in internet of things," in 14th International Conference on Applied Computer and Applied Computational Science (ACACOS '15), Kuala Lumpur, 2015. 6) V.Soma Sekhar and R.puviarasi “Design of GSM based Power Theft Detection and Load Control,”vol 119, No. 15,pp. 2697-2703, 2018. 7) Nilesh, Rinkuraj, Prakash “GSM based Electricity Theft Detection”, 2016 IJSEAS, Volume-2. 8) Nayan Thakre, Shreya Vaidya, Prachi Damedhar, “Energy power theft detection in Distribution System”, vol. 5,2017. 9) S.McLaughlin,B.Holbert, A.Fawaz, R.Bertheir, and S.Zonouz, “A multi-sensor energy theft detection 829
  • 6. 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS 2019) Frame work for advancement metering infrastructure, “IEEE J.select. Area Commun., vol. 31,no.7,pp.1319- 1330, jul.2013 830