Power theft pdf




















Billing can be based on near real-time An energy meter must be connected in the connection box between a home line and main power lines. The host PLC unit must be placed in the distribution transformer and the configuration of the addressing format of PLC signaling must be designed carefully. The Transmitter circuit is connected to the meter which counts the pulses from it and displays it over the LCD display. The transmitter circuit containing a GSM modem for data transforming, which transforms the meter reading after each 10 pulses to a particular number through SMS.

An additional advanced service is also available, which includes the software operating on the computer. This software shows the updated reading. User has to put the unit rate and date of billing, and then this software automatically calculates the bill and also print it if printer is connected to computer. Surface-mount technology SMT is a method for producing electronic circuits in which the components are mounted or placed directly onto the surface of printed circuit boards PCBs.

An electronic device so made is called a surface-mount device SMD. By using techniques above the crime of stealing power may be brought to an end and thereby a new bloom may be expected in the economy of ourmotherland and also there will be less scarcity for power utilisation.

Open navigation menu. Close suggestions Search Search. User Settings. Skip carousel. Carousel Previous. Carousel Next. What is Scribd? Explore Ebooks. Bestsellers Editors' Picks All Ebooks. Explore Audiobooks. Bestsellers Editors' Picks All audiobooks. Explore Magazines. Editors' Picks All magazines. Explore Podcasts All podcasts. Difficulty Beginner Intermediate Advanced. Explore Documents. Power Theft Detection.

Uploaded by akshat singh. Document Information click to expand document information Description: power theft detection ppt. Original Title power theft detection. Did you find this document useful? Is this content inappropriate? Report this Document. Description: power theft detection ppt. Flag for inappropriate content. Download now. Save Save power theft detection For Later.

Original Title: power theft detection. Related titles. Carousel Previous Carousel Next. Jump to Page. Search inside document. Disconnected neutral from boththe ends.

Used earth for return circuit. Isolating neutral from both ends. Recently PLCs are programmed using application software's on personal 14 computers. Meters installed in high places will send data of the used amount to each household through power lines. Homeowners can then check the amount used on the displays installed in each house. This means that the measurement function and the display function of the meters will be separated.

Power theft is prevented by installing HD-PLC-mounted power meters on a high position on power polls, while the amount of power used in each household can still be checked. Documents Similar To power theft detection. Damian Chmielewski.

If compared result has any negative value electricity supply, which results in loss of electricity then this particular post is detected as theft point. This companies energy and because of which we are facing the compared value is transmitted to electricity board through frequent problems of load shading in urban as well as rural RF transmitter.

RF receiver is placed in electricity board area so as to overcome the need of electricity for whole office. This RF receiver receives this value and given as state. Also the ways using which theft can be done are also input to PIC. The innumerable so we can never keep track of how a theft has information will then be quickly processed by the occurred, and this issue is needed to be solved as early as microcontroller and a SMS will be sent through the GSM possible.

EXISTING METHODS the meter using a piece of wire, people simply bypasses the In the existing methods wireless communication electricity meter which is counting the current units by system of energy meter used with Zigbee, relay control and placing a wire before and after the meter reading unit.

The GPRS. The cryptographic method is used to secure the proposed system will be hidden in such meters and as soon communication channel and Zigbee for the transmission of as an attempt is made for the theft, it will send an SMS to data in a serial process.

In this paper input and output current of a particular poleis compared by using current transformer. If there is any negative value means it is indicated that the particular pole has drawn more current as theft.

Here one current III. Fig 1 shows the block diagram of power theft V. Current used for meters, relays, control equipment and other instruments. CT's transform current isolate the high voltage primary, permit grounding of the secondary, and step-down the magnitude of the measured current to a standard value that can be safely handled by the instrument. The system was designed to authenticate the Energy meter is a device that calculates the cost of subscriber using a pre-shared key and challenge-response.

IR sensor and magnetic GSM only authenticates the user to the network and not reed switch are used to detect the theft in energy meter.

Fig 2 vice versa. Communications between the subscriber and the shows the maximum demand of load base station can be encrypted.

The security model therefore offers confidentiality and authentication, but limited authorization capabilities, and no non-repudiation. PIC consists of high performance and low cost of network technology. The memory organization of PIC consists of three memory blocks. The program memory organization consists of 13bit program count memory space. The general purpose register file can be accessed in a straight Fig. Maximum Demand line or in some way through the file select register.

SFR is used in the processor and peripheral for controlling the IV. The input to the circuit is applied from the VIII. The AC input i.

The output obtained from the rectifier is a theft on one line following flowchart as shown in Fig 3 is pulsating DC voltage. So in order to get a pure DC voltage, used. First of all initialize ports of micro-controller as input the output voltage from the rectifier is fed to a filter to or output as per required.

Set the tolerance in program remove any AC components present even after rectification. Set the delay time say 10min which is depending pure constant dc voltage. It represents power consumed [1]. Amin S. Mehmood, T. Choudhry, M. If power sent on line is more than power consumed by that load over a given time [2]. Abdollahi, A. Dehghani, M. Send the signal of power theft with the line number and Applications, For this wireless transmission or [3].

Bharath, P. Rakesh Malhotra et al. Mason, C. Retrieved October 9,



0コメント

  • 1000 / 1000