Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
54Activity
0 of .
Results for:
No results containing your search query
P. 1
Micro Controller Based Power Theft Identification

Micro Controller Based Power Theft Identification

Ratings: (0)|Views: 5,796|Likes:
Published by moon403

More info:

Published by: moon403 on Jun 12, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

02/25/2015

pdf

text

original

 
101seminartopics.com
 
ABSTRACT
Science and technology with all its miraculous advancements hasfascinated human life to a great extent that imagining a world without theseinnovations is hardly possible. While technology is on the raising slope, weshould also note the increasing immoral activities. With a technical view, “PowerTheft” is a non-ignorable crime that is highly prevalent, and at the same time itdirectly affects the economy of a nation. Data collected over
Tirunelveli District
,
Bhel
Trichy proves the necessity of this project.Detecting and eradicating such crimes with the assistance of thedeveloping scientific field is the “Need of the Hour”. With these views was thispaper conceived and designed. Our paper provides a complete and comprehensivetool to prevent power theft which is very simple to understand and easy toimplement(Accepted by
T.N.E.B
officials). It includes four sections transmitting,receiving, counter display and processing sections.
DESCRIPTION OF OUR IMPLEMENTATION IDEAS
:The disc revolutions are sensed into pulses by optical slot sensor.These pulses are shaped and given as control signal to the CMOS switch whichbypasses carrier wave generated by PLL provides as input to receiving sectionwhere transmitted signal is selected by the Intermediate frequency transformer. Foreach lock a pulse is sent out. The counter section is designed to send out pulse forevery six input pulse from the receiver section. This count is parallely distributedin a 7-segmentdisplay and then to µc for further processing. µc performs thefunction of indication and identification. Pindetails, features, connections and softwareemployed for µc89c51 are described in detail.We believe our implementation ideas is a boon to the electricityboard offering them a chance to detect accurately the location and amount of power theft. Logical view for a digital meter is also included in our presentation.
 
101seminartopics.com
INTRODUCTION:
Electricity is the modern man’s most convenient and useful form of energy without which the present social infrastructure would not be feasible. Theincrease in per capita production is the reflection of the increase in the livingstandard of people. When importance of electricity is on the increasing side, thenhow much should theft of this energy or illegal consumption of power from thetransmission lines be averted? Power theft has become a great challenge to theelectricity board. The dailies report that Electricity Board suffers a total loss of 8 % in revenue due to power theft every year, which has to controlled. Our paperidentifies the Power theft and indicates it to the Electricity board through Powerline. We had also dealtabout the remote monitoring of an energy meter.
MICROCONTROLLER BASED AUTOMATION
:Embedded systems-a combination of software, hardware andadditional mechanical parts that together forms a component of a larger system, toperform a specific function. It’s a technology, characterized by high reliability,restricted memory footprint and real time operation associated with a narrowlydefined group of functions. Automation has made the art of living comfortable andeasy.Embedded systems have made the process of automation a most successfulone. Here, we have focusedon automotive, an area of embedded controllers, inwhich we have dealt with the Power theft identification and also about the remotemonitoring of an energy meter.The microcontroller chip is preprogrammed to perform a dedicated or a narrowrange of functions as a part of a larger system, usually with minimal end user or
 
Technology have taken the world by stormperformance ratings and exceptionally value for money prices”
TODAY’S TECHNICIANS ARE SO FOCUSSED ON THE TREES OF TECHNOLOGICALCHANGE THAT THEY FAIL TO SEE THE FOREST; THE UNDERLYING ECONOMICFORCESTHAT DETERMINE SUCCESS AND FAILURE…”“TECHNOLOGY CHANGES ECONOMY LAWS DO NOT”
 
101seminartopics.com
operator intervention. Our paper throws light on automated monitoring of theftidentification, which is an application of embedded controllers.
MODES OF THEFT:
It has been seen that there are 4 common methods of powertheft as given below :-Bogus seals and tampering of seals.Meter tampering, meter tilting, meter interface andmeter bypassing.Changing connection.Direct tapping from line.Due to introduction of modern electronic metering equipments, powerthieves are utilizing more technological methods. Recent cases of power theftdiscovered by British inspectors included customers tunneling out to roadsidemains cables and splicing into the supply, a garage taking its night time powersupply from the nearest lamp post and domestic customers drilling holes intometer boxes and attempting to stop the counter wheels from turning. Anothermethod of Power theft is by keeping a strong magnet in front of the disc inthe energy meter and thus arresting the rotation of the disc,connecting the loaddirectly to the power line bypassing the energy meter. But, it can be avoidedeasily by providing a non magnetic enclosure.
MODERN DETECTING TOOLS:
There are many modern tools that assist in power theft identification.Some of them are :-
Tamper proof seals and labels.
Meter leaders.
Tamper resistant screws / locks.
Check meter and remote meter readers.
Tamper alarms and sensors.This paper undertakes the Check meter and remote meter readers forpower theft identification. In our case, the consumption recurred by the check 

Activity (54)

You've already reviewed this. Edit your review.
ATHIRAK liked this
1 hundred reads
1 thousand reads
sskentura liked this
Raj Patel liked this
Srinivas Shivangi added this note
thank you
bondrun007 liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->