Design And Construction Of A Microcontroller Based Power Theft Identifier

The design and construction of a microcontroller-based power theft identifier represent a pioneering effort in the realm of energy security and accountability. This innovative system leverages advanced microcontroller technology to detect and identify instances of unauthorized electricity consumption, thereby curbing losses and promoting fair distribution. By integrating sophisticated algorithms and sensor networks, the device autonomously monitors power usage patterns, promptly flagging any irregularities indicative of potential theft. Through meticulous hardware and software integration, coupled with real-time data processing capabilities, the system ensures swift and accurate identification of theft occurrences, empowering utility providers with actionable insights to mitigate losses and uphold the integrity of the energy infrastructure. With a focus on reliability, efficiency, and adaptability, this solution stands as a testament to the transformative potential of microcontroller technology in addressing multifarious challenges in the energy sector.

ABSTRACT

The present thesis, Micro-controller Based Power Theft Identifier, introduces the concept of preventing the illegal usage of the electrical power. Here, the radio communication principles are employed and also the technology of Micro-controllers is utilized to find out the user trying for pilferage of power i.e., by displaying the respective consumer meter number and address.

For the complete operation, the system can be sub-divided into two major sections, one is the transmitting section and the other is the receiving section. The transmitting section has to be incorporated at the consumer’s end and the receiver section has to be placed at the electrical sub-station.

In the transmitting section, two types of automatic power theft detection schemes are provided. In the first scheme, within the meter (inside the bottom cover), an electro-optical sensor is placed and it is configured to feed trigger signal for the timer circuit. Whenever light falls on it (when user tries to open the bottom cover), the output of the timer circuit energizes a relay which provides supply for modulating input section which differs from user to user.

The GSM module used Microcontroller identifies theft when it occur, the frequency and its associated user. Then it energizes an alarm and displays the address of the user to the power holding company ( PHC)

TABLE OF CONTENTS

COVER PAGE

TITLE PAGE

APPROVAL PAGE

DEDICATION

ACKNOWELDGEMENT

ABSTRACT

CHAPTER ONE

INTRODUCTION

1.1      BACKGROUND OF THE PROJECT

  • PROBLEM STATEMENT
  • AIM/OBJECTIVE OF THE PROJECT
  • SIGNIFICANCE OF THE PROJECT
  • SCOPE OF THE PROJECT
  • ADVANTAGES OF THE PROJECT
  • LIMITATIONS OF THE PROJECT
  • APPLICATIONS OF THE PROJECT
  • METHODOLOGY
  • PROJECT ORGANISATION

CHAPTER TWO

LITERATURE REVIEW

  • OVERVIEW OF ELECTRICITY THEFT
  • DIFFERENT TYPES OF ILLEGAL ELECTRICITY THEFT
  • CAUSES OF ELECTRICITY THEFT
  • EXISTING WAYS OF TACKLING ELECTRICITY THEFT
  • MERITS OF PROPOSED METHODOLOGY
  • HISTORICAL BACKGROUND OF ELECTRICAL POWER THEFT
  • REVIEW OF RELATED STUDIES

CHAPTER THREE

METHODOLOGY

  • SYSTEM DESIGN
  • COMPOSITION OF HARDWARE
  • WORKING OPERATION
  • SYSTEM BLOCK DIAGRAM
  • POWER SUPPLY CIRCUIT CONNECTION
  • CIRCUIT EXPLANATION
  • MATHEMATICAL MODEL OF THE SYSTEM
  • PROGRAMMING LANGUAGE AND SIMULATION SOFTWARE UTILIZED

CHAPTER FOUR

RESULT ANALYSIS

  • RESULTS AND DISCUSSION

CHAPTER FIVE

  • CONCLUSION
  • RECOMMENDATION
  • REFERENCES

CHAPTER ONE

1.0                                                      INTRODUCTION

The proposed project work aims on the design and development of energy theft prevention aspect. Thereby, energy pilferage can be reduced to a considerable extent. This project envisages the development of energy theft identification. Hence this project work is titled as “MICROCONTROLLER BASED POWER THEFT IDENTIFIER”.

Meters in the past and today in a few countries, were electromechanical devices with poor accuracy and lack of configurability. The present billing system is minimally able to detect power theft and even when it does that it is at the month. The distribution company is unable to keep track of the changing maximum demand for the domestic consumer while the consumer is faced with problems like receiving due bills for bills paid for and also poor reliability of electricity supply and quality [1]. Prior to the introduction of prepaid meter, various methods were proposed to detect electricity theft which includes: inspection of suspicious load profile, though the method was good certain drawbacks accruing to this method are the requirement of large manpower and huge labour, this failed due to dishonesty of the service workers. A huge amount of money is lost due to theft, in some countries; the government has to provide subsidies to the power sector to maintain a reasonable price of electricity [2]. The major problem facing the electricity industry in many developing countries is poor revenue generation. This arises from illegal consumption of electricity via mostly meter tampering and bypassing as well as direct connection to the low voltage distribution lines. In order to solve all the problems of the traditional meter reading, the consumer load should be tracked on a regular basis as this will help ensure accurate billing, keep track of the maximum demand and detect theft. In this work a GSM is used here to send message to power holding company whenever the power detected theft.

1.1                                       BACKGROUND OF THE STUDY

Science and technology with all its miraculous advancements has fascinated human life to a great extent that imagining a world without these innovations is hardly possible. While technology is on the raising slope, we should also note the increasing immoral activities. With a technical view, “Power Theft” is a non-ignorable crime that is highly prevalent, and at the same time it directly affects the economy of a nation.

Electricity is the modern man’s most convenient and useful form of energy without which the present social infrastructure would not be feasible. The increase in per capita production is the reflection of the increase in the living standard of people. When importance of electricity is on the increasing side, then how much should theft of this energy or illegal consumption of power from the transmission lines be averted?

Power theft has become a great challenge to the electricity board. The dailies report that Electricity Board suffers a total loss of 8 % in revenue due to power theft every year, which has to controlled. Our paper identifies the Power theft and indicates it to the Electricity board through Power line. We had also dealt about the remote monitoring of an energy meter.

1.3                                   PROBLEM STATEMENT

Theft of electricity is an illegal means of using electrical power. It belongs to the non-technical losses. Non-technical loss (NTL) during transmission of electrical energy is a major problem in developing countries and it has been very difficult for the utility companies to detect and fight the people responsible for theft. Electricity theft forms a major chunk of NTL. These losses affect quality of supply, increase load on the generating station, and affect tariff imposed on genuine customers. This work solves the problem of consumers stealing electricity which causes loss of revenue.

1.3                                    AIM OF THE PROJECT

The main aim of this work is to identify the Power theft and indicates it to the Electricity board through Power line. In this work a GSM is used here to send message to power holding company whenever the power detected theft.

1.4                          SIGNIFICANCE OF THE PROJECT

This device detects illegal use of electricity thereby increasing country’s revenue. We had also dealt about the remote monitoring of an energy meter using GSM. With the implementation of this kind of systems in the real time, the need for regular vigilance can be avoided and power can be supplied at the economical rates, thereby improving the economy of the country.

1.5                                  SCOPE OF THE PROJECT

This paper proposes an architectural design of smart meter, external control station, and harmonic generator. Motivation of this work is to deject illegal consumers, and conserve and effectively utilize energy. As well, smart meters are designed to provide data of various parameters related to instantaneous power consumption. NTL in the distribution feeder is computed by external control station from the sending end information of the distribution feeder. If a considerable amount of NTL is detected, harmonic generator is operated at that feeder for introducing additional harmonic component for destroying appliances of the illegal consumers. For illustration, cost–benefit analysis for implementation of the proposed system in India is presented. This work is GSM based power theft identifier. The GSM is used for remote monitoring of the meter reading and sending SMS whenever there is abnormal readings in the customer electricity meter

1.6                           ADVANTAGES OF THE PROJECT

  1. The system consumes very little power for its operation.
  2. System operation is independent of time (24 hours functioning).
  • Automatic user identification.

1.7                           LIMITATIONS OF THE PROJECT

  1. Since the techniques employed in this module are based on simple electronics, the chances of making the system inoperative are more. But, if a Microcontroller chip is used for feeding the modulating input, we can make the system more efficient.
  2. Wide range of frequencies is required to facilitate large number of users. To overcome this, carrier levels can be changed from region to region.
  • Presently, it requires a power supply (230 V) for the operation, but a small battery with automatic charging facility can be provided in real time.

1.8                          APPLICATIONS OF THE PROJECT

  1. The system can be incorporated for almost all types of users.
  2. The concept is well suited especially for villages and interior areas.

1.9                                         METHODOLOGY

To achieve the aim and objectives of this work, the following are the steps involved:

  1. Study of the previous work on the project so as to improve it efficiency.
  2. Draw a block diagram.
  • Test for continuity of components and devices,
  1. programming of microcontroller
  2. Design and calculation for the changeover was carried out.
  3. Studying of various component used in circuit.
  • Construct a digital changeover circuit.
  • Finally, the whole device was cased and final test was carried out.

1.10                                                      PROJECT ORGANISATION

The work is organized as follows: chapter one discuses the introductory part of the work,   chapter two presents the literature review of the study,  chapter three describes the methods applied,  chapter four discusses the results of the work, chapter five summarizes the research outcomes and the recommendations.

 

Save/Share This On Social Media:
More About Design And Construction Of A Microcontroller Based Power Theft Identifier Material

Author: See the writer of ‘Design And Construction Of A Microcontroller Based Power Theft Identifier’ name on the first page of the downloaded file.

Acknowledgement: You must acknowledge and reference the writer of Design And Construction Of A Microcontroller Based Power Theft Identifier on your acknowledgement and reference pages respectively.

Upload Similar: You can upload any content similar to Design And Construction Of A Microcontroller Based Power Theft Identifier and get paid when someone downloaded the material.

Download: Click on “Donate & Download” under this Design And Construction Of A Microcontroller Based Power Theft Identifier Title and you will be redirected to download page after the donation or chat with Us for alternative methods.

Content Size: Design And Construction Of A Microcontroller Based Power Theft Identifier contains , and .