This document proposes a microcontroller-based wireless power theft monitoring system. The system architecture includes wireless sensor nodes that monitor power consumption at transformers, transmission lines, and consumer locations. Data on power usage is sent wirelessly between nodes and aggregated to detect differences that could indicate power theft. The system aims to reduce losses from theft by identifying locations where theft occurs and notifying authorities. It allows remote monitoring and control of power distribution to curb theft.
WIRELESS POWER THEFT MONITORING SYSTEMvivatechijri
Power larceny is the sizably voluminous quandary now days which causes immensely colossal loss to electricity boards. And to surmount these losses prices are incremented. So if we can obviate this larceny we can preserve lots of potency. The mundane practice for power larceny is to short input output terminals or to place magnet on the wheel in case of old meters. In this system a micro controller is interfaced with an energy metering circuit current sensing circuit, RF communication & a contactor to make or break power line. If current is drawing & energy pulses are mundane then no puissance is larceny. If current is drawing & energy pulses are not coming then it designates power larceny. So microcontroller trip the o/p utilizing relay. This information is sent to substation utilizing wireless communication. Line faults may be caused due to over current or earth fault. If there transpires to be a connection between two phase lines then over current fault occurs. Earth fault occurs due to the earthing of phase line through cross arm or any other way.
GSM based electricity theft contol system, it also intimates the concernded person when theft is happening. It sends messages about the unit consumed too.
Electricity theft detection and localisation in unknown radial low voltage ne...eSAT Journals
Abstract The distribution of electricity involves both technical and non-technical losses. One major cause of non-technical loss is the illegal abstraction of electricity which is also known as ‘Electricity Theft’. The illegal usage of electricity has many associated problems, both for utilities and consumers of electricity, implying that there is a pressing need for theft detection and localisation. Traditional methods of identifying illegal electricity consumers are time consuming and ineffective as measurements have to be performed at a large number of suspected locations. Smart metering in future electricity networks will lead to a more efficient automated system for the detection and localisation of electricity theft. This will enable immediate action to be taken by distribution network operators against the offenders and will help to improve the quality, reliability and security of electricity supply systems. The aim of this study was to analyse the performance of an electricity theft detection and localisation technique in an unknown grid. The method assumed the availability of measured voltages, currents, and powers from installed smart meters. The detection step was a power comparison process and the localisation step was a voltage comparison process. The investigation involved analysis in the presence of single and simultaneous multiple thefts. To better represent future networks with increasing penetration of renewable energy generators, distributed generation was added to the system and the capability of the detection and localisation technique was further explored. All the simulations were performed in Matlab/Simulink. It was found that the method performed satisfactorily, with a minimum stolen power of 450 W successfully detected and localised. Keywords: Electricity Theft, Smart Meters, Double Feeding, Low Voltage Radial Network, Matlab/Simulink
WIRELESS POWER THEFT MONITORING SYSTEMvivatechijri
Power larceny is the sizably voluminous quandary now days which causes immensely colossal loss to electricity boards. And to surmount these losses prices are incremented. So if we can obviate this larceny we can preserve lots of potency. The mundane practice for power larceny is to short input output terminals or to place magnet on the wheel in case of old meters. In this system a micro controller is interfaced with an energy metering circuit current sensing circuit, RF communication & a contactor to make or break power line. If current is drawing & energy pulses are mundane then no puissance is larceny. If current is drawing & energy pulses are not coming then it designates power larceny. So microcontroller trip the o/p utilizing relay. This information is sent to substation utilizing wireless communication. Line faults may be caused due to over current or earth fault. If there transpires to be a connection between two phase lines then over current fault occurs. Earth fault occurs due to the earthing of phase line through cross arm or any other way.
GSM based electricity theft contol system, it also intimates the concernded person when theft is happening. It sends messages about the unit consumed too.
Electricity theft detection and localisation in unknown radial low voltage ne...eSAT Journals
Abstract The distribution of electricity involves both technical and non-technical losses. One major cause of non-technical loss is the illegal abstraction of electricity which is also known as ‘Electricity Theft’. The illegal usage of electricity has many associated problems, both for utilities and consumers of electricity, implying that there is a pressing need for theft detection and localisation. Traditional methods of identifying illegal electricity consumers are time consuming and ineffective as measurements have to be performed at a large number of suspected locations. Smart metering in future electricity networks will lead to a more efficient automated system for the detection and localisation of electricity theft. This will enable immediate action to be taken by distribution network operators against the offenders and will help to improve the quality, reliability and security of electricity supply systems. The aim of this study was to analyse the performance of an electricity theft detection and localisation technique in an unknown grid. The method assumed the availability of measured voltages, currents, and powers from installed smart meters. The detection step was a power comparison process and the localisation step was a voltage comparison process. The investigation involved analysis in the presence of single and simultaneous multiple thefts. To better represent future networks with increasing penetration of renewable energy generators, distributed generation was added to the system and the capability of the detection and localisation technique was further explored. All the simulations were performed in Matlab/Simulink. It was found that the method performed satisfactorily, with a minimum stolen power of 450 W successfully detected and localised. Keywords: Electricity Theft, Smart Meters, Double Feeding, Low Voltage Radial Network, Matlab/Simulink
It is a new concept in world of Electricity measurement. This concept is not only beneficial for electricity measurement but also has the capability to prevent theft and misuses of electricity. The concept of IOT (Internet of Things) based prepaid energy meter is very similar to prepaid mobile system, you recharge and spend Accordingly.
When the purchased units are used up by the consumer the meter disconnect the power supply until the next Recharge. The system will automatically notify the consumer to recharge before zero balance unit recharge will be done by the service provider.
MONTHLY ELECTRICITY BILLING WITH BILL SMS USING PIC.pptxNANDHAKUMARA10
The project provides a system that allows for consumed electricity reading in unit and How much amount of Current Can be Consumed by User its Prevent the Electricity Theft.
Our system provides the electricity readings on an LCD screen as well as can SMS this reading and cost to the user.
This lets the user know about his exact electricity units consumed and cost directly from his meter so that there is no chance of bill tampering.
The project allows a two way reading. One on LCD display and the second on SMS. Our project consists of IOT connected to a ATMEGA328p is an family of PIC. The system continuously monitors electrical pulses and calculates the unit consumption.
Kseniya Leshchenko: Shared development support service model as the way to ma...Lviv Startup Club
Kseniya Leshchenko: Shared development support service model as the way to make small projects with small budgets profitable for the company (UA)
Kyiv PMDay 2024 Summer
Website – www.pmday.org
Youtube – https://www.youtube.com/startuplviv
FB – https://www.facebook.com/pmdayconference
Memorandum Of Association Constitution of Company.pptseri bangash
www.seribangash.com
A Memorandum of Association (MOA) is a legal document that outlines the fundamental principles and objectives upon which a company operates. It serves as the company's charter or constitution and defines the scope of its activities. Here's a detailed note on the MOA:
Contents of Memorandum of Association:
Name Clause: This clause states the name of the company, which should end with words like "Limited" or "Ltd." for a public limited company and "Private Limited" or "Pvt. Ltd." for a private limited company.
https://seribangash.com/article-of-association-is-legal-doc-of-company/
Registered Office Clause: It specifies the location where the company's registered office is situated. This office is where all official communications and notices are sent.
Objective Clause: This clause delineates the main objectives for which the company is formed. It's important to define these objectives clearly, as the company cannot undertake activities beyond those mentioned in this clause.
www.seribangash.com
Liability Clause: It outlines the extent of liability of the company's members. In the case of companies limited by shares, the liability of members is limited to the amount unpaid on their shares. For companies limited by guarantee, members' liability is limited to the amount they undertake to contribute if the company is wound up.
https://seribangash.com/promotors-is-person-conceived-formation-company/
Capital Clause: This clause specifies the authorized capital of the company, i.e., the maximum amount of share capital the company is authorized to issue. It also mentions the division of this capital into shares and their respective nominal value.
Association Clause: It simply states that the subscribers wish to form a company and agree to become members of it, in accordance with the terms of the MOA.
Importance of Memorandum of Association:
Legal Requirement: The MOA is a legal requirement for the formation of a company. It must be filed with the Registrar of Companies during the incorporation process.
Constitutional Document: It serves as the company's constitutional document, defining its scope, powers, and limitations.
Protection of Members: It protects the interests of the company's members by clearly defining the objectives and limiting their liability.
External Communication: It provides clarity to external parties, such as investors, creditors, and regulatory authorities, regarding the company's objectives and powers.
https://seribangash.com/difference-public-and-private-company-law/
Binding Authority: The company and its members are bound by the provisions of the MOA. Any action taken beyond its scope may be considered ultra vires (beyond the powers) of the company and therefore void.
Amendment of MOA:
While the MOA lays down the company's fundamental principles, it is not entirely immutable. It can be amended, but only under specific circumstances and in compliance with legal procedures. Amendments typically require shareholder
Putting the SPARK into Virtual Training.pptxCynthia Clay
This 60-minute webinar, sponsored by Adobe, was delivered for the Training Mag Network. It explored the five elements of SPARK: Storytelling, Purpose, Action, Relationships, and Kudos. Knowing how to tell a well-structured story is key to building long-term memory. Stating a clear purpose that doesn't take away from the discovery learning process is critical. Ensuring that people move from theory to practical application is imperative. Creating strong social learning is the key to commitment and engagement. Validating and affirming participants' comments is the way to create a positive learning environment.
What is the TDS Return Filing Due Date for FY 2024-25.pdfseoforlegalpillers
It is crucial for the taxpayers to understand about the TDS Return Filing Due Date, so that they can fulfill your TDS obligations efficiently. Taxpayers can avoid penalties by sticking to the deadlines and by accurate filing of TDS. Timely filing of TDS will make sure about the availability of tax credits. You can also seek the professional guidance of experts like Legal Pillers for timely filing of the TDS Return.
Skye Residences | Extended Stay Residences Near Toronto Airportmarketingjdass
Experience unparalleled EXTENDED STAY and comfort at Skye Residences located just minutes from Toronto Airport. Discover sophisticated accommodations tailored for discerning travelers.
Website Link :
https://skyeresidences.com/
https://skyeresidences.com/about-us/
https://skyeresidences.com/gallery/
https://skyeresidences.com/rooms/
https://skyeresidences.com/near-by-attractions/
https://skyeresidences.com/commute/
https://skyeresidences.com/contact/
https://skyeresidences.com/queen-suite-with-sofa-bed/
https://skyeresidences.com/queen-suite-with-sofa-bed-and-balcony/
https://skyeresidences.com/queen-suite-with-sofa-bed-accessible/
https://skyeresidences.com/2-bedroom-deluxe-queen-suite-with-sofa-bed/
https://skyeresidences.com/2-bedroom-deluxe-king-queen-suite-with-sofa-bed/
https://skyeresidences.com/2-bedroom-deluxe-queen-suite-with-sofa-bed-accessible/
#Skye Residences Etobicoke, #Skye Residences Near Toronto Airport, #Skye Residences Toronto, #Skye Hotel Toronto, #Skye Hotel Near Toronto Airport, #Hotel Near Toronto Airport, #Near Toronto Airport Accommodation, #Suites Near Toronto Airport, #Etobicoke Suites Near Airport, #Hotel Near Toronto Pearson International Airport, #Toronto Airport Suite Rentals, #Pearson Airport Hotel Suites
3.0 Project 2_ Developing My Brand Identity Kit.pptxtanyjahb
A personal brand exploration presentation summarizes an individual's unique qualities and goals, covering strengths, values, passions, and target audience. It helps individuals understand what makes them stand out, their desired image, and how they aim to achieve it.
Improving profitability for small businessBen Wann
In this comprehensive presentation, we will explore strategies and practical tips for enhancing profitability in small businesses. Tailored to meet the unique challenges faced by small enterprises, this session covers various aspects that directly impact the bottom line. Attendees will learn how to optimize operational efficiency, manage expenses, and increase revenue through innovative marketing and customer engagement techniques.
VAT Registration Outlined In UAE: Benefits and Requirementsuae taxgpt
Vat Registration is a legal obligation for businesses meeting the threshold requirement, helping companies avoid fines and ramifications. Contact now!
https://viralsocialtrends.com/vat-registration-outlined-in-uae/
What are the main advantages of using HR recruiter services.pdfHumanResourceDimensi1
HR recruiter services offer top talents to companies according to their specific needs. They handle all recruitment tasks from job posting to onboarding and help companies concentrate on their business growth. With their expertise and years of experience, they streamline the hiring process and save time and resources for the company.
Personal Brand Statement:
As an Army veteran dedicated to lifelong learning, I bring a disciplined, strategic mindset to my pursuits. I am constantly expanding my knowledge to innovate and lead effectively. My journey is driven by a commitment to excellence, and to make a meaningful impact in the world.
Unveiling the Secrets How Does Generative AI Work.pdfSam H
At its core, generative artificial intelligence relies on the concept of generative models, which serve as engines that churn out entirely new data resembling their training data. It is like a sculptor who has studied so many forms found in nature and then uses this knowledge to create sculptures from his imagination that have never been seen before anywhere else. If taken to cyberspace, gans work almost the same way.
Attending a job Interview for B1 and B2 Englsih learnersErika906060
It is a sample of an interview for a business english class for pre-intermediate and intermediate english students with emphasis on the speking ability.
Premium MEAN Stack Development Solutions for Modern BusinessesSynapseIndia
Stay ahead of the curve with our premium MEAN Stack Development Solutions. Our expert developers utilize MongoDB, Express.js, AngularJS, and Node.js to create modern and responsive web applications. Trust us for cutting-edge solutions that drive your business growth and success.
Know more: https://www.synapseindia.com/technology/mean-stack-development-company.html
1. WIRELESS POWER THEFT
MONITORING
SUBMITTED TO:
MR.RANJAN .K. JENA
MR.ABHIMANYU MOHAPATR
DEPARTMENT OF
ELECTRICAL ENGINEER
SUBMITTED BY:
RUPALI PATRA
0901106017
7TH SEM,EE
2. CONTENTS:
INTRODUCTION
i.POWER THEFT :DEFINITION
ii.HOW IT OCCURS ?
DIFFERENT WAYS OF MONITORING POWER THEFT
MICROCONTROLLER BASED POWER THEFT
MONITORING
i.PROPOSED ARCHITECTURE
BLOCK DIAGRAM DESCRIPTION
WORKING OF WIRELESS SENSOR NETWORK
ADVANTAGES
LIMITATIONS
CONCLUSION
3. INTRODUCTION-
POWER THEFT :DEFINITION
It is the use of electrical power without a
contract with a supplier with total or partial
bypassing of the metering system or interfering
with this system in such a way so as to
adulterate its measurements.
Contract is understood here as a valid
obligation to deliver power and to pay for it.
4. 1.SLOWING DOWN THE
METER:
A common method of tampering
older meters is to attach magnets to
the outside of the meter.
When this happens, the rotor disc is
exposed to a high magnetic field.
Hence, the resultant opposing
magnetic field to the rotor is highly
increased leading to slowing down of
rotor or perfect stopping of the disc
rotation.
The electricity meter is thus
manipulated and ultimately power is
consumed without being paid for. ex-
neodymium magnets.
HOW IT OCCURS?
5. 2.INVERTING THE METER/FEEDER:
Another common form of electricity theft is
to invert the meter (pull the meter out of the
socket and plug the meter back in upside
down, which causes the meter to run
backwards and the kWh register to count
down instead of up).
6. 3.BYPASSING THE FEEDER/METER:
Usually, the bypass supplies
power to large and stable loads
which will not trip fuses in the
case of overloads. Ex-jumper
cables.
The rest of the circuits are
supplied normally through the
meter, so the bill, which is close
to average, does not suggest a
theft.
7. DIFFERENT WAYS OF MONITORING POWER
THEFT:
GSM based power theft
monitoring
Microcontroller based power theft
monitoring
Power theft monitoring using
PLC.
8. MICRO-CONTROLLER BASED
POWER THEFT MONITORING:
The whole system architecture is based on
integrating wireless network with existing
electrical grid.
The proposed module also incorporates
different data aggregation algorithms and
effective solutions needed for the different
pathways of the electricity distribution system.
OVERVIEW:
9. THE PROPOSED ARCHITECTURE:
The Architecture Consists Of Four Modules
Namely:
Controlling Station (CS)
Wireless Transformer Sensor Node (WTSN)
Transmission Line Sensor Node (TLSN)
Wireless Consumer Sensor Node (WCSN)
11. WCSN is a module which acts as a consumer
power metering device that measures the power
consumed by the consumer and send the data
periodically to the WTSN.
Each feeder of the transformer has a WTSN
which monitors power through each line and
collects data from WCSN ,aggregates it and sends
to the CS.
TLSN is another module associated with
distribution line, mounted in each distribution line
posts .
12. DIFFERENT PARTS AND THEIR
FUNCTIONS:
ZIGBEE:
We are using XBee-PRO OEM RF
Module whish uses the zigbee
technology.
It is engineered to support the unique
needs of low-cost, low-power and low
data rate wireless sensor network
providing reliable delivery of data
between devices.
The XBee-PRO OEM RF Modules
interface to a host device through a
logic-level asynchronous serial port.
ZIGBEE MODULE
13. CURRENT TRANSFORMER CIRCUITRY:
We are using Allegro ACS709
current sensor IC chip.
The ACS709 consists of a Hall
sensor integrated circuit (IC) with a
copper conduction path located near
the surface of the silicon die.
Applied current flows through the
copper conduction path, and the
analog output voltage from the Hall
sensor IC linearly tracks the magnetic
field generated by the applied current.
14. MICROCONTROLLER:
The LPC2148 microcontroller is based on a16-bit/32-bit
ARM7TDMI-S CPU with embedded high-speed flash memory
ranging from 32 kB to 512 kB.
A 128-bit wide memory interface architecture enable 32-bit
code execution at the maximum clock rate.
Due to their tiny size and low power consumption, LPC2148
is ideal for applications where miniaturization is a key
requirement.
Serial communication interfaces ranging from multiple
UARTs, on-chip SRAM of 8 kB up to 40 kB, make these
devices very well suited for communication gateways.
15. LCD:
LCD stands for Liquid Crystal Display.
As the output of the circuit should be
displayed in some form or the other, LCD
display is selected as it can display 16
characters at a time.
It is also easy to interface with the
microcontroller without any decoder. So it
is better than the seven segment display.
16.
17. WORKING OF WIRELESS
SENSOR NETWORK:
The sensor network monitors the electrical grid for a specified
period of time, which may be daily, monthly or yearly.
Thus the WTSN stores the maximum demand for each consumer
including the losses.
The measured data from each WCSN is send to the neighbouring
TLSN.
The aggregated data is then sent to the next nearby WTSN. Thus
the data transfers from WCSN to the corresponding WTSN through
TLSN.
The collected data is compared with the measured data by the
energy meter.
•Normally these two data are almost same.
If there is any difference (dmc) in the collected data and the
measured data, there may be a line fault or a power theft in that
segment.
Large value of dmc indicates a line fault and small value of dmc
indicate a power theft .
18. ADVANTAGES:
The proposed system provides the solution for some
of the main problems faced by the existing Indian
grid system, such as wastage of energy, power theft,
manual billing system, and transmission line fault.
This method will reduce the energy wastage and
save a lot of energy for future use.
We can detect the location from where the power is
being stolen which was not possible before.
Optimized use of energy.
19. LIMITATIONS:
One major disadvantage of this project is that it is
not capable of detecting the exact location from
where the power is being stolen giving only a
approximation to that place.
Cannot determine who is stealing, but even no
other existing system is capable of doing this.
If implemented on a large scale it may take a lot of
time and manual input.
20. CONCLUSION:
This method reduces the heavy power and revenue losses
that occur due to power theft by the customers.
By this design it can be concluded that power theft can be
effectively curbed by detecting where the power theft occurs
and informing the authorities.
Also an automatic circuit breaker may be integrated to the
unit so as to remotely cut off the power supply to the house or
consumer who tries to indulge in power theft.
The ability of the proposed system to inform or send data
digitally to a remote station using wireless radio link adds a
large amount of possibilities to the way the power supply is
controlled by the electricity board.
This system will reduce the energy wastage and save a lot
for future use.