Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Power theft detection

This is a presentation on power theft detection.

  • Login to see the comments

  • Be the first to like this

Power theft detection

  1. 1. Presented By: Ashish K.C (Khatri) Published on : International Journal of Engineering Science and Computing, April 2016 Researched by : Shailesh Sankpal, Omkar Kadam, Abhishek Jadhav, Poonam Bhosale Department of Electronics & Telecommunication Engineering Sanjeevan Engineering & Technology Institute, Panhala, Maharashtra, India 1
  2. 2.  Electricity is building block of developing nation.  It is necessary to monitor and control the uses of electricity.  The theft of electricity is the major problem in developing countries. International Journal of Engineering Science and Computing, 2016, www.ijesc.org 6/16/2019 2
  3. 3. International Journal of Engineering Science and Computing, 2016, www.ijesc.org 6/16/2019 3
  4. 4.  The electricity is being stolen via bypassing the energy meter .  Therefore the wireless system is proposed to overcome this type of the theft .  10 to 30 percent revenue is lost because of power theft. International Journal of Engineering Science and Computing, 2016, www.ijesc.org 6/16/2019 4
  5. 5.  Used as data communication device.  Is designed for low power consumption.  Provides network security and application support services.  Based on mesh networking. International Journal of Engineering Science and Computing, 2016, www.ijesc.org 6/16/2019 5
  6. 6. International Journal of Engineering Science and Computing, 2016, www.ijesc.org 6/16/2019 6 Figure : Overview of System
  7. 7.  Is real time power monitoring system.  Consists of three areas: - Host unit -Distribution unit -Subscriber unit  Host unit controls the two units.  Distribution is placed on electricity pole.  Subscriber unit is placed at home and repeated foe each subscriber. International Journal of Engineering Science and Computing, 2016, www.ijesc.org 6/16/2019 7
  8. 8. 6/16/2019 8International Journal of Engineering Science and Computing, 2016, www.ijesc.org
  9. 9.  The value of energy consumed by subscriber is stored in subscriber unit.  The recorded information of each subscriber is sent to host unit.  The distribution unit data is also recorded on host unit.  This recorded epower is compared at host unit.  If any difference is occurred then error signal is generated and transmitted through the Zigbee. International Journal of Engineering Science and Computing, 2016, www.ijesc.org 6/16/2019 9
  10. 10.  Host unit consists of microcontroller, Zigbee modem and PC.  To control the operation, commands are given to microcontroller.  PC provides GUI for authority at Central Station.  GUI shows energy consumption at both distributor and subscriber unit.  At central station the readings received from these units. International Journal of Engineering Science and Computing, 2016, www.ijesc.org 6/16/2019 10
  11. 11. Figure : Design Flow 6/16/2019 11
  12. 12. Start Take Data from subscriber unit Take Data from distributor unit Loss > Predeter mined level Normal Condition Theft Detected End Figure: Flowchart of Subscriber Unit 6/16/2019 12
  13. 13.  With the help of power theft detection system , Electricity Distribution Company will overcome the illegal power theft. International Journal of Engineering Science and Computing, 2016, www.ijesc.org 6/16/2019 13

×