You are on page 1of 15

A Technical Idea on

MICROCONTROLLER BASED
POWER THEFT IDENTIFICTION

By,
TABISH AFTAB
B.TECH (E.C.)
U.P.T,U
LUCKNOW

WHY THIS IDEA ARISES?


Now-a-days, theft of power becomes very easy and day-by-day this is
becoming a major problem for Government Power Corporations.

COMMON MODES OF POWER THEFTBogus seals and tampering of seals.


Meter tampering, meter tilting, meter interface and meter bypassing.
Changing connection.
Direct tapping from line.

VARIOUS METHODS OF DETECTING POWER THEFT


IDENTIFICATION
Tamper proof seals and labels.
Meter leaders.
Tamper resistant screws / locks.
Check meter and remote meter readers.
Tamper alarms and sensors.

What Is Micro Controller?


A microcontroller is a single integrated circuit containing a processor,
memory, and programmable input/output peripherals.
Microcontrollers are generally design for embedded
applications(embedded system means to install a program into the
microcontroller).
The main application of Microcontrollers is that, they are used to
automatically control the products and devices.

HOW MICROCONTROLLER IS USED AS POWER


THEFT IDENTIFIER ?
Firstly, The disc revolutions of consumers energy meter are
converted into pulses by the microcontroller.
These pulses are frequency division multiplexed and transmitted
through power line by the microcontroller.
These signals are individually picked and counted at the receiver end
by the microcontroller.
If the difference of the sum of the consumers readings and that of
distribution transformer exceeds the preset value, which is set by
considering transmission loss, the power theft is said to occur.

PROCESS
The Method Of Power Theft Identification By The Use Of
Microcontroller Is Divided Into Four SectionsTransmitting Section
Receiving Section
Processing Section
Counter Section

1. TRANSMITTING SECTION:
The first and foremost requirements for a transmitter section are the The sensing unit
Phase locked loop
CMOS analog switch
Buffer
Intermediate Frequency Transformer

Block Diagram Of Transmitting Section

2. RECEIVING SECTION:
The basic components in the receiving section are :Intermediate Frequency Transformer
Clipper
Phase locked loop

Block Diagram Of Receiving Section


8

3. COUNTER CUM DISPLAY SECTION:


It counts the no. of pulses at the receiver end.
It converts the no. of pulses into units.
Then, it displays the no. of units with the help of 7-segment L.E.D.
display which is connected with the counter part.

Block diagram of counter cum display section


9

4. PROCESSING SECTION:
This section first stores the total units distributed and the total units
consumed whose information is received in form of pulses.
It compares the two values.
If the two values are not equal than, it means loss or theft of power is
occurring, Which is indicated by the alarm.

10

About the microcontroller used for Power theft


identificationThe microcontroller used is IC 89c51.
IC 89c51 is 8-bit 40 pin microcontroller.
It includes EPROM of 4 kilobytes.
The data memory space is read-write memory space.
It has I/O ports to carry 8 bit information to and fro, simultaneously.

11

About IC 89c51
PORT 1 & 3 (1-8,10-17)- A 8-Bit BiDirectional I/O port with internal Pull-Ups. It
receives lower order address bytes during
Flash Programming.
PORT O (22-29)- A 8-Bit Bi-Directional I/O
port. It is configured to be the multiplexed
low order Address or Data Bus during
accesses to external program and data
memory.
PORT 2 (33-40)- It performs the same
function as the port 1 in addition it receives
some control signals during flash
programming.
12

MERITS:
Due to the availability of digital energy meter, this implementation can
be easily performed for power theft identification.
Highly accurate, low loss and economical one.
Its maintenance is easy.
Our implementation may gives a big hand to vigilance squad to control
theft quickly and easily.
Using this same logic, instead of micro controller we can adapt
computer for more number of uses.
In day-to-day conventional methods, its possible to identify the theft
but the extent of theft cannot be identified but its possible with our
Check meter and remote meter readers.
Compact size, Reliability, lightweight for quick operation and high
accuracy makes the system more effective.

13

ConclusionInitially, It is designed for industrial purposes, but now it is extended for


domestic purposes also.
It gives a big hand to vigilance squad to control power theft quickly and
easily.
With its more usage, the crime of stealing power may be brought to an
end and thereby it gives a new bloom in the economy of our Motherland.

14

Thank you
Have a Good Day

15

You might also like