SlideShare a Scribd company logo
WIRELESS POWER THEFT
MONITORING
SUBMITTED TO:
MR.RANJAN .K. JENA
MR.ABHIMANYU MOHAPATR
DEPARTMENT OF
ELECTRICAL ENGINEER
SUBMITTED BY:
RUPALI PATRA
0901106017
7TH SEM,EE
CONTENTS:
 INTRODUCTION
i.POWER THEFT :DEFINITION
ii.HOW IT OCCURS ?
 DIFFERENT WAYS OF MONITORING POWER THEFT
 MICROCONTROLLER BASED POWER THEFT
MONITORING
i.PROPOSED ARCHITECTURE
 BLOCK DIAGRAM DESCRIPTION
WORKING OF WIRELESS SENSOR NETWORK
ADVANTAGES
LIMITATIONS
CONCLUSION
INTRODUCTION-
POWER THEFT :DEFINITION
It is the use of electrical power without a
contract with a supplier with total or partial
bypassing of the metering system or interfering
with this system in such a way so as to
adulterate its measurements.
Contract is understood here as a valid
obligation to deliver power and to pay for it.
1.SLOWING DOWN THE
METER:
A common method of tampering
older meters is to attach magnets to
the outside of the meter.
When this happens, the rotor disc is
exposed to a high magnetic field.
Hence, the resultant opposing
magnetic field to the rotor is highly
increased leading to slowing down of
rotor or perfect stopping of the disc
rotation.
The electricity meter is thus
manipulated and ultimately power is
consumed without being paid for. ex-
neodymium magnets.
HOW IT OCCURS?
2.INVERTING THE METER/FEEDER:
Another common form of electricity theft is
to invert the meter (pull the meter out of the
socket and plug the meter back in upside
down, which causes the meter to run
backwards and the kWh register to count
down instead of up).
3.BYPASSING THE FEEDER/METER:
Usually, the bypass supplies
power to large and stable loads
which will not trip fuses in the
case of overloads. Ex-jumper
cables.
The rest of the circuits are
supplied normally through the
meter, so the bill, which is close
to average, does not suggest a
theft.
DIFFERENT WAYS OF MONITORING POWER
THEFT:
GSM based power theft
monitoring
Microcontroller based power theft
monitoring
Power theft monitoring using
PLC.
MICRO-CONTROLLER BASED
POWER THEFT MONITORING:
The whole system architecture is based on
integrating wireless network with existing
electrical grid.
The proposed module also incorporates
different data aggregation algorithms and
effective solutions needed for the different
pathways of the electricity distribution system.
OVERVIEW:
THE PROPOSED ARCHITECTURE:
The Architecture Consists Of Four Modules
Namely:
Controlling Station (CS)
 Wireless Transformer Sensor Node (WTSN)
Transmission Line Sensor Node (TLSN)
Wireless Consumer Sensor Node (WCSN)
ARCHITECTURE
 WCSN is a module which acts as a consumer
power metering device that measures the power
consumed by the consumer and send the data
periodically to the WTSN.
Each feeder of the transformer has a WTSN
which monitors power through each line and
collects data from WCSN ,aggregates it and sends
to the CS.
TLSN is another module associated with
distribution line, mounted in each distribution line
posts .
DIFFERENT PARTS AND THEIR
FUNCTIONS:
ZIGBEE:
We are using XBee-PRO OEM RF
Module whish uses the zigbee
technology.
It is engineered to support the unique
needs of low-cost, low-power and low
data rate wireless sensor network
providing reliable delivery of data
between devices.
 The XBee-PRO OEM RF Modules
interface to a host device through a
logic-level asynchronous serial port.
ZIGBEE MODULE
CURRENT TRANSFORMER CIRCUITRY:
We are using Allegro ACS709
current sensor IC chip.
The ACS709 consists of a Hall
sensor integrated circuit (IC) with a
copper conduction path located near
the surface of the silicon die.
 Applied current flows through the
copper conduction path, and the
analog output voltage from the Hall
sensor IC linearly tracks the magnetic
field generated by the applied current.
MICROCONTROLLER:
The LPC2148 microcontroller is based on a16-bit/32-bit
ARM7TDMI-S CPU with embedded high-speed flash memory
ranging from 32 kB to 512 kB.
 A 128-bit wide memory interface architecture enable 32-bit
code execution at the maximum clock rate.
Due to their tiny size and low power consumption, LPC2148
is ideal for applications where miniaturization is a key
requirement.
Serial communication interfaces ranging from multiple
UARTs, on-chip SRAM of 8 kB up to 40 kB, make these
devices very well suited for communication gateways.
LCD:
LCD stands for Liquid Crystal Display.
As the output of the circuit should be
displayed in some form or the other, LCD
display is selected as it can display 16
characters at a time.
It is also easy to interface with the
microcontroller without any decoder. So it
is better than the seven segment display.
WORKING OF WIRELESS
SENSOR NETWORK:
The sensor network monitors the electrical grid for a specified
period of time, which may be daily, monthly or yearly.
 Thus the WTSN stores the maximum demand for each consumer
including the losses.
The measured data from each WCSN is send to the neighbouring
TLSN.
The aggregated data is then sent to the next nearby WTSN. Thus
the data transfers from WCSN to the corresponding WTSN through
TLSN.
 The collected data is compared with the measured data by the
energy meter.
•Normally these two data are almost same.
 If there is any difference (dmc) in the collected data and the
measured data, there may be a line fault or a power theft in that
segment.
 Large value of dmc indicates a line fault and small value of dmc
indicate a power theft .
ADVANTAGES:
The proposed system provides the solution for some
of the main problems faced by the existing Indian
grid system, such as wastage of energy, power theft,
manual billing system, and transmission line fault.
 This method will reduce the energy wastage and
save a lot of energy for future use.
 We can detect the location from where the power is
being stolen which was not possible before.
 Optimized use of energy.
LIMITATIONS:
One major disadvantage of this project is that it is
not capable of detecting the exact location from
where the power is being stolen giving only a
approximation to that place.
 Cannot determine who is stealing, but even no
other existing system is capable of doing this.
 If implemented on a large scale it may take a lot of
time and manual input.
CONCLUSION:
This method reduces the heavy power and revenue losses
that occur due to power theft by the customers.
 By this design it can be concluded that power theft can be
effectively curbed by detecting where the power theft occurs
and informing the authorities.
Also an automatic circuit breaker may be integrated to the
unit so as to remotely cut off the power supply to the house or
consumer who tries to indulge in power theft.
 The ability of the proposed system to inform or send data
digitally to a remote station using wireless radio link adds a
large amount of possibilities to the way the power supply is
controlled by the electricity board.
This system will reduce the energy wastage and save a lot
for future use.
Wirelesspowertheftmonitoringoriginalbyrupalipatra 121126043543-phpapp02

More Related Content

What's hot

energy theft detection
energy theft detectionenergy theft detection
energy theft detection
abdulsuboor235
 
Wireless power theft monitoring
Wireless power theft monitoringWireless power theft monitoring
Wireless power theft monitoringBiswajit Pratihari
 
Power theft detection
Power theft detectionPower theft detection
Power theft detection
Aravind Shaji
 
A Solution to remote detection of illegal electricity
A Solution to remote detection of illegal electricityA Solution to remote detection of illegal electricity
A Solution to remote detection of illegal electricityAhmed Aslam
 
24. deepti semwal.pptx
24. deepti semwal.pptx24. deepti semwal.pptx
24. deepti semwal.pptx
Snehdeep Kunwar
 
Electricity theft detection using image processing
Electricity theft detection using image processingElectricity theft detection using image processing
Electricity theft detection using image processing
NileshMaher
 
Power theft detection
Power theft detectionPower theft detection
Power theft detection
Shailly Maheshwari
 
Thesis power theft detection ch 3
Thesis power theft detection ch 3Thesis power theft detection ch 3
Thesis power theft detection ch 3
Faraz Ahmed
 
Report its
Report itsReport its
Report its
DivyanshuAgrey
 
Wireless power-theft-monitering-ppt
Wireless power-theft-monitering-pptWireless power-theft-monitering-ppt
Wireless power-theft-monitering-ppt
Arjit Rajwal
 
Proposal on Power Theft
Proposal on Power TheftProposal on Power Theft
Proposal on Power Theft
Aneel-k Suthar
 
Power theft detection
Power theft detectionPower theft detection
Power theft detection
bishow kandel
 
prevention of power theft and power uality by the help of fuzzy logic
prevention of power theft and power uality by the help of fuzzy logicprevention of power theft and power uality by the help of fuzzy logic
prevention of power theft and power uality by the help of fuzzy logic
vaibyfrndz
 
Electricalelectricsl power theft detection
Electricalelectricsl power theft detectionElectricalelectricsl power theft detection
Electricalelectricsl power theft detection
Nagappa singaragoppa
 
Micro controller-based-power-theft-identification
Micro controller-based-power-theft-identificationMicro controller-based-power-theft-identification
Micro controller-based-power-theft-identificationranjeet1990
 
Proposal power-theft-detection
Proposal power-theft-detectionProposal power-theft-detection
Proposal power-theft-detection
Aneel-k Suthar
 
Thesis power theft detection ch 5
Thesis power theft detection ch 5Thesis power theft detection ch 5
Thesis power theft detection ch 5
Faraz Ahmed
 
Project paper
Project paperProject paper
Project paperchigongo
 
A solution to remote detection of illegal electricity.
A solution to remote detection of illegal electricity.A solution to remote detection of illegal electricity.
A solution to remote detection of illegal electricity.Praveen Kumar
 

What's hot (20)

energy theft detection
energy theft detectionenergy theft detection
energy theft detection
 
Wireless power theft monitoring
Wireless power theft monitoringWireless power theft monitoring
Wireless power theft monitoring
 
Power theft detection
Power theft detectionPower theft detection
Power theft detection
 
A Solution to remote detection of illegal electricity
A Solution to remote detection of illegal electricityA Solution to remote detection of illegal electricity
A Solution to remote detection of illegal electricity
 
24. deepti semwal.pptx
24. deepti semwal.pptx24. deepti semwal.pptx
24. deepti semwal.pptx
 
Electricity theft detection using image processing
Electricity theft detection using image processingElectricity theft detection using image processing
Electricity theft detection using image processing
 
Power theft detection
Power theft detectionPower theft detection
Power theft detection
 
Thesis power theft detection ch 3
Thesis power theft detection ch 3Thesis power theft detection ch 3
Thesis power theft detection ch 3
 
Report its
Report itsReport its
Report its
 
Wireless power-theft-monitering-ppt
Wireless power-theft-monitering-pptWireless power-theft-monitering-ppt
Wireless power-theft-monitering-ppt
 
Proposal on Power Theft
Proposal on Power TheftProposal on Power Theft
Proposal on Power Theft
 
Power theft detection
Power theft detectionPower theft detection
Power theft detection
 
prevention of power theft and power uality by the help of fuzzy logic
prevention of power theft and power uality by the help of fuzzy logicprevention of power theft and power uality by the help of fuzzy logic
prevention of power theft and power uality by the help of fuzzy logic
 
PROJECT REPORT
PROJECT REPORTPROJECT REPORT
PROJECT REPORT
 
Electricalelectricsl power theft detection
Electricalelectricsl power theft detectionElectricalelectricsl power theft detection
Electricalelectricsl power theft detection
 
Micro controller-based-power-theft-identification
Micro controller-based-power-theft-identificationMicro controller-based-power-theft-identification
Micro controller-based-power-theft-identification
 
Proposal power-theft-detection
Proposal power-theft-detectionProposal power-theft-detection
Proposal power-theft-detection
 
Thesis power theft detection ch 5
Thesis power theft detection ch 5Thesis power theft detection ch 5
Thesis power theft detection ch 5
 
Project paper
Project paperProject paper
Project paper
 
A solution to remote detection of illegal electricity.
A solution to remote detection of illegal electricity.A solution to remote detection of illegal electricity.
A solution to remote detection of illegal electricity.
 

Similar to Wirelesspowertheftmonitoringoriginalbyrupalipatra 121126043543-phpapp02

Rahul koundinya
Rahul koundinya Rahul koundinya
Rahul koundinya
Rahulkoundinya Ummethala
 
Power theft detection via plc
Power theft detection via plcPower theft detection via plc
Power theft detection via plcbbshashanka
 
Architecture for Smart Grid based Consumer End Solution
Architecture for Smart Grid based Consumer End SolutionArchitecture for Smart Grid based Consumer End Solution
Architecture for Smart Grid based Consumer End SolutionShashank Dhariwal
 
Automatic energy meter reading
Automatic energy meter readingAutomatic energy meter reading
Automatic energy meter reading
SURYAANDUKURI
 
eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)
IISRT
 
Modern Electricity Billing System.pptx
Modern Electricity Billing System.pptxModern Electricity Billing System.pptx
Modern Electricity Billing System.pptx
SudhanshuNajawan1
 
Abstract--Smart meter
Abstract--Smart meterAbstract--Smart meter
Abstract--Smart meterArjun .M.M.
 
under grund fault ppt (1).pptx
under grund fault ppt (1).pptxunder grund fault ppt (1).pptx
under grund fault ppt (1).pptx
PoojaG86
 
A Novel Design of User Responsive Smart Meter
A Novel Design of User Responsive Smart MeterA Novel Design of User Responsive Smart Meter
A Novel Design of User Responsive Smart MeterArjun .M.M.
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
Iaetsd Iaetsd
 
TECHNICAL SEMINAR 1CR19EE017.ppt
TECHNICAL SEMINAR 1CR19EE017.pptTECHNICAL SEMINAR 1CR19EE017.ppt
TECHNICAL SEMINAR 1CR19EE017.ppt
ssuserb313d9
 
Smart Grid
Smart GridSmart Grid
A12PPT.pdf
A12PPT.pdfA12PPT.pdf
A12PPT.pdf
nanisaketh
 
MONTHLY ELECTRICITY BILLING WITH BILL SMS USING PIC.pptx
MONTHLY ELECTRICITY BILLING WITH BILL SMS USING PIC.pptxMONTHLY ELECTRICITY BILLING WITH BILL SMS USING PIC.pptx
MONTHLY ELECTRICITY BILLING WITH BILL SMS USING PIC.pptx
NANDHAKUMARA10
 
RAJPRASAD PAPER NO-127
RAJPRASAD PAPER NO-127RAJPRASAD PAPER NO-127
RAJPRASAD PAPER NO-127RAJPRASAD RS
 
IRJET-Electrical Power Robbery Detection and Transformer Fault Detection
IRJET-Electrical Power Robbery Detection and Transformer Fault Detection  IRJET-Electrical Power Robbery Detection and Transformer Fault Detection
IRJET-Electrical Power Robbery Detection and Transformer Fault Detection
IRJET Journal
 
1.4
1.41.4
SMART GRID.pptx
SMART GRID.pptxSMART GRID.pptx
SMART GRID.pptx
ssuser9f2ad7
 
IRJET- Iot Based Underground Cable Line Fault Detection
IRJET- Iot Based Underground Cable Line Fault DetectionIRJET- Iot Based Underground Cable Line Fault Detection
IRJET- Iot Based Underground Cable Line Fault Detection
IRJET Journal
 

Similar to Wirelesspowertheftmonitoringoriginalbyrupalipatra 121126043543-phpapp02 (20)

Rahul koundinya
Rahul koundinya Rahul koundinya
Rahul koundinya
 
Power theft detection via plc
Power theft detection via plcPower theft detection via plc
Power theft detection via plc
 
Architecture for Smart Grid based Consumer End Solution
Architecture for Smart Grid based Consumer End SolutionArchitecture for Smart Grid based Consumer End Solution
Architecture for Smart Grid based Consumer End Solution
 
Automatic energy meter reading
Automatic energy meter readingAutomatic energy meter reading
Automatic energy meter reading
 
eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)
 
S2-R2
S2-R2S2-R2
S2-R2
 
Modern Electricity Billing System.pptx
Modern Electricity Billing System.pptxModern Electricity Billing System.pptx
Modern Electricity Billing System.pptx
 
Abstract--Smart meter
Abstract--Smart meterAbstract--Smart meter
Abstract--Smart meter
 
under grund fault ppt (1).pptx
under grund fault ppt (1).pptxunder grund fault ppt (1).pptx
under grund fault ppt (1).pptx
 
A Novel Design of User Responsive Smart Meter
A Novel Design of User Responsive Smart MeterA Novel Design of User Responsive Smart Meter
A Novel Design of User Responsive Smart Meter
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
 
TECHNICAL SEMINAR 1CR19EE017.ppt
TECHNICAL SEMINAR 1CR19EE017.pptTECHNICAL SEMINAR 1CR19EE017.ppt
TECHNICAL SEMINAR 1CR19EE017.ppt
 
Smart Grid
Smart GridSmart Grid
Smart Grid
 
A12PPT.pdf
A12PPT.pdfA12PPT.pdf
A12PPT.pdf
 
MONTHLY ELECTRICITY BILLING WITH BILL SMS USING PIC.pptx
MONTHLY ELECTRICITY BILLING WITH BILL SMS USING PIC.pptxMONTHLY ELECTRICITY BILLING WITH BILL SMS USING PIC.pptx
MONTHLY ELECTRICITY BILLING WITH BILL SMS USING PIC.pptx
 
RAJPRASAD PAPER NO-127
RAJPRASAD PAPER NO-127RAJPRASAD PAPER NO-127
RAJPRASAD PAPER NO-127
 
IRJET-Electrical Power Robbery Detection and Transformer Fault Detection
IRJET-Electrical Power Robbery Detection and Transformer Fault Detection  IRJET-Electrical Power Robbery Detection and Transformer Fault Detection
IRJET-Electrical Power Robbery Detection and Transformer Fault Detection
 
1.4
1.41.4
1.4
 
SMART GRID.pptx
SMART GRID.pptxSMART GRID.pptx
SMART GRID.pptx
 
IRJET- Iot Based Underground Cable Line Fault Detection
IRJET- Iot Based Underground Cable Line Fault DetectionIRJET- Iot Based Underground Cable Line Fault Detection
IRJET- Iot Based Underground Cable Line Fault Detection
 

Recently uploaded

CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
Lviv Startup Club
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 

Recently uploaded (20)

CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 

Wirelesspowertheftmonitoringoriginalbyrupalipatra 121126043543-phpapp02

  • 1. WIRELESS POWER THEFT MONITORING SUBMITTED TO: MR.RANJAN .K. JENA MR.ABHIMANYU MOHAPATR DEPARTMENT OF ELECTRICAL ENGINEER SUBMITTED BY: RUPALI PATRA 0901106017 7TH SEM,EE
  • 2. CONTENTS:  INTRODUCTION i.POWER THEFT :DEFINITION ii.HOW IT OCCURS ?  DIFFERENT WAYS OF MONITORING POWER THEFT  MICROCONTROLLER BASED POWER THEFT MONITORING i.PROPOSED ARCHITECTURE  BLOCK DIAGRAM DESCRIPTION WORKING OF WIRELESS SENSOR NETWORK ADVANTAGES LIMITATIONS CONCLUSION
  • 3. INTRODUCTION- POWER THEFT :DEFINITION It is the use of electrical power without a contract with a supplier with total or partial bypassing of the metering system or interfering with this system in such a way so as to adulterate its measurements. Contract is understood here as a valid obligation to deliver power and to pay for it.
  • 4. 1.SLOWING DOWN THE METER: A common method of tampering older meters is to attach magnets to the outside of the meter. When this happens, the rotor disc is exposed to a high magnetic field. Hence, the resultant opposing magnetic field to the rotor is highly increased leading to slowing down of rotor or perfect stopping of the disc rotation. The electricity meter is thus manipulated and ultimately power is consumed without being paid for. ex- neodymium magnets. HOW IT OCCURS?
  • 5. 2.INVERTING THE METER/FEEDER: Another common form of electricity theft is to invert the meter (pull the meter out of the socket and plug the meter back in upside down, which causes the meter to run backwards and the kWh register to count down instead of up).
  • 6. 3.BYPASSING THE FEEDER/METER: Usually, the bypass supplies power to large and stable loads which will not trip fuses in the case of overloads. Ex-jumper cables. The rest of the circuits are supplied normally through the meter, so the bill, which is close to average, does not suggest a theft.
  • 7. DIFFERENT WAYS OF MONITORING POWER THEFT: GSM based power theft monitoring Microcontroller based power theft monitoring Power theft monitoring using PLC.
  • 8. MICRO-CONTROLLER BASED POWER THEFT MONITORING: The whole system architecture is based on integrating wireless network with existing electrical grid. The proposed module also incorporates different data aggregation algorithms and effective solutions needed for the different pathways of the electricity distribution system. OVERVIEW:
  • 9. THE PROPOSED ARCHITECTURE: The Architecture Consists Of Four Modules Namely: Controlling Station (CS)  Wireless Transformer Sensor Node (WTSN) Transmission Line Sensor Node (TLSN) Wireless Consumer Sensor Node (WCSN)
  • 11.  WCSN is a module which acts as a consumer power metering device that measures the power consumed by the consumer and send the data periodically to the WTSN. Each feeder of the transformer has a WTSN which monitors power through each line and collects data from WCSN ,aggregates it and sends to the CS. TLSN is another module associated with distribution line, mounted in each distribution line posts .
  • 12. DIFFERENT PARTS AND THEIR FUNCTIONS: ZIGBEE: We are using XBee-PRO OEM RF Module whish uses the zigbee technology. It is engineered to support the unique needs of low-cost, low-power and low data rate wireless sensor network providing reliable delivery of data between devices.  The XBee-PRO OEM RF Modules interface to a host device through a logic-level asynchronous serial port. ZIGBEE MODULE
  • 13. CURRENT TRANSFORMER CIRCUITRY: We are using Allegro ACS709 current sensor IC chip. The ACS709 consists of a Hall sensor integrated circuit (IC) with a copper conduction path located near the surface of the silicon die.  Applied current flows through the copper conduction path, and the analog output voltage from the Hall sensor IC linearly tracks the magnetic field generated by the applied current.
  • 14. MICROCONTROLLER: The LPC2148 microcontroller is based on a16-bit/32-bit ARM7TDMI-S CPU with embedded high-speed flash memory ranging from 32 kB to 512 kB.  A 128-bit wide memory interface architecture enable 32-bit code execution at the maximum clock rate. Due to their tiny size and low power consumption, LPC2148 is ideal for applications where miniaturization is a key requirement. Serial communication interfaces ranging from multiple UARTs, on-chip SRAM of 8 kB up to 40 kB, make these devices very well suited for communication gateways.
  • 15. LCD: LCD stands for Liquid Crystal Display. As the output of the circuit should be displayed in some form or the other, LCD display is selected as it can display 16 characters at a time. It is also easy to interface with the microcontroller without any decoder. So it is better than the seven segment display.
  • 16.
  • 17. WORKING OF WIRELESS SENSOR NETWORK: The sensor network monitors the electrical grid for a specified period of time, which may be daily, monthly or yearly.  Thus the WTSN stores the maximum demand for each consumer including the losses. The measured data from each WCSN is send to the neighbouring TLSN. The aggregated data is then sent to the next nearby WTSN. Thus the data transfers from WCSN to the corresponding WTSN through TLSN.  The collected data is compared with the measured data by the energy meter. •Normally these two data are almost same.  If there is any difference (dmc) in the collected data and the measured data, there may be a line fault or a power theft in that segment.  Large value of dmc indicates a line fault and small value of dmc indicate a power theft .
  • 18. ADVANTAGES: The proposed system provides the solution for some of the main problems faced by the existing Indian grid system, such as wastage of energy, power theft, manual billing system, and transmission line fault.  This method will reduce the energy wastage and save a lot of energy for future use.  We can detect the location from where the power is being stolen which was not possible before.  Optimized use of energy.
  • 19. LIMITATIONS: One major disadvantage of this project is that it is not capable of detecting the exact location from where the power is being stolen giving only a approximation to that place.  Cannot determine who is stealing, but even no other existing system is capable of doing this.  If implemented on a large scale it may take a lot of time and manual input.
  • 20. CONCLUSION: This method reduces the heavy power and revenue losses that occur due to power theft by the customers.  By this design it can be concluded that power theft can be effectively curbed by detecting where the power theft occurs and informing the authorities. Also an automatic circuit breaker may be integrated to the unit so as to remotely cut off the power supply to the house or consumer who tries to indulge in power theft.  The ability of the proposed system to inform or send data digitally to a remote station using wireless radio link adds a large amount of possibilities to the way the power supply is controlled by the electricity board. This system will reduce the energy wastage and save a lot for future use.