You are on page 1of 11

SYNOPSIS ON WIRELESS POWER THEFT MONITORING SYSTEM AND INDICATION AT LOCAL SUBSTATION

Submitted To:
Mr. Ashutosh Bhatt EEE Dept. Graphic Era University Dehradun

Submitted By:
Shubhanjali Gupta (2001241) Ritesh Joshi (2001223) Siddhant Gurung (2001242) Krishna Kumar Surya (2003863)

INTRODUCTION1
Electricity theft is at the center of focus all over the world but electricity theft in India has a significant effect on the Indian economy, as this figure is considerably high. The losses, experts say, are currently 29% of the total generation, which equals a shocking Rs 45,000 crore in the fiscal year 2009-10. According to experts, if not for these losses over a decade now, India could have built two mega power plants of around 4,000 MW capacities every year. Power loss in 2001-02 was 32.86% and increased to 34.78% in 2003-04. In 2008-09, it stood at 28.44% but currently the figure is again 29%. It is as high as 51% in Jharkhand, 45% in Madhya Pradesh and 40% in Bihar.

Few other ways for Power theft are:2 Use of single phase supply from three phase supply. Disconnected neutral from both the ends. Used earth/separate neutral for return circuit. Connecting phase voltage to neutral of used single phase supply. Potential difference with respect to neutral of used single phase supply is zero. Hence power, product of voltage and current, will be zero. Isolating neutral from both ends. Drilling pin hole in meter box and in meter near MRI port. Disturbing electronic common reference point of measurement.

LITERATURE REVIEW2

These are some of the common methods of identifying electricity theft today: Financial Rewards - Utility companies encourage consumers to report electricity theft, sometimes offering big rewards for information leading to conviction of anyone stealing electricity. Unfortunately, most cases are never identified.

Periodic Checks - Electricity theft frequently takes place after service has been disconnected. Some utility companies periodically check disconnected meters if the customer has not contacted them to reconnect service. This labor-intensive, manual process has little chance of success.

Meter Readers - Utility meter readers typically suspect that electricity theft is taking place when they find a broken meter tag or other signs of tampering. But as more utility companies outsource the meter reading function to third parties, training meter readers to detect theft is becoming more difficult and less efficient. In addition, third party meter readers do not read disconnected meters.

Developments until now:


Power theft detection circuit :

Patent number: 4532471 (30.07.1985) This invention relates to a method and apparatus for detecting the theft of power when a short circuit jumper is coupled across a line conductor passing through watt-hour meter. However the method is costlier to be implemented and it has no way of alerting the authorities unless a regular survey is done.

Power theft detection system:

Patent number: US20080109387A1 (May 8th 2008) The system finds out the power theft by monitoring the total power consumption, receiving the delivered power data that includes data delivered to a number of users. Determining the amount of difference between them, thus finding out if power theft has occurred. But there lies no specific way to find out where the power theft has occurred.

Problems:

Ineffective and inefficient present methods of detecting and preventing Power theft cause a revenue loss along with damage to Personal and Public property.

Large amount of power shortage is caused due to power theft

One of the challenges in stopping power theft is the difficulty in detecting power theft. In particular it is difficult to find the exact location where power theft is occurring.

Measurement of parameters like power line current and power line voltage has not been available in a satisfactory way to optimize power network management

Motivation:
The motivation for us to take up this project is the current inefficient distribution system of the electricity boards all over the world.

Also the present inability of the authorities in applying the existing laws in a stringent form has encouraged more and more people to involve in such unlawful activities.

In case we develop an effective system to remotely monitor the use of power and are able to detect power theft at the exact location in an accurate and cost effective way, such huge losses can be prevented.

This kind of money could definitely be used for the development of the quality of electricity board and its service. The severe power shortage can be overcome by the implementation of our simple system.

More over this kind of implementation of proper billing to all the customers would reduce the reckless use of power and would surely help us to build a greener and more eco friendly environment for ourselves.

As the majority of the power we generated is by burning coal, which adds to the already severe problem of the green house effect.

Thus our group has been motivated to bring up this completely unique method of remotely sensing power theft in most of the possible ways.

BLOCK DIAGRAM3

FIG.1: Block Diagram of Power Theft Monitoring System

DESCRIPTION AND WORKING OF CIRCUIT DIAGRAM DESCRIPTION:4


In this project, MAX 232 is used to convert the digital information received. Power is calculated from using voltages and currents coming from the power circuit and this power is displayed using the LCD. If the delivered power exceeds the maximum power, the electrical appliance is turned off by means of a relay connected to the output pin of the micro controller. If the delivered power is less than the maximum power, this indicates that the power is stolen on that particular line voltage and that information is send to the substation using the transmitter. We can also identify on which line power theft has occurred. The programming language used for developing the software to the microcontroller is Embedded/Assembly. The KEIL cross compiler is used to edit, compile and debug this program. Here in our application we are using AT89S52 microcontroller which is Flash Programmable IC.AT represents the Atmel Corporation represents CMOS technology is used for designing the IC. This IC is one of the versions of 8051.

WORKING OF CIRCUIT:4
In this project, the micro controller gets the input from the power circuit. In the Micro controller a preset load of 60 watts is initialized. A hole is made on the top of the energy meter and the light is made to pass through it. LDR is used to sense the rotation of the wheel of energy meter with the help of the light falling on it. The energy meter constant values are taken and are used to calculate the rotations of the wheel for one watt. The power theft detection is checked for the duration of every 10 hours. If the energy meter takes 5 rotations for one watt when there is no power theft which is calculated from the energy meter constant.

The Micro controller checks whether there is power theft or not for every 10 hours duration of time by disconnecting the actual load from the energy meter. Connecting the preset load to the energy meter with the help of the relay. If the power theft doesnt occur, the Micro controller will not send any information to the substation. If the power theft occurs the information is sent to the substation with the help of the transmitter. RF receiver receives the information from the RF transmitter. 89S52 Micro controller is used for displaying the location of the theft with the help of LCD. MAX 232 Interface is used to convert the digital information received from the RF Receiver and convert it into analog information which is displayed on the LCD.

HARDWARE AND SOFTWARE REQUIRED4


HARDWARE: Power Circuit 89s52 Micro controller ULN Relay Radio Frequency Transmitter 555 Timer MAX 232 Interface LCD DB9 Female Connector RF Receiver

SOFTWARE: Embedded C Keil Assembly language

MODULAR BREAK-UP
Stage 1:- Study Transmitting Section and Receiving Section. Stage 2:- Study and implementation of Display Section and Measurement of different values of Monitoring System. Stage 3:- Study and programming of Microcontroller. Stage 4:- Implementation of all the above sections together for detection and indication of power theft at local substation.

REFERENCES
1. www.faadooengineers.com 2. www.ieeexplore.ieee.org 3. Presentation submitted by Vignans Institute Of Information Technology, Duvvada. 4. www.seminarprojects.com

You might also like