Professional Documents
Culture Documents
Vol.04,Issue.09,
April-2015,
Pages:1651-1655
www.ijsetr.com
Abstract: Electrical power theft detection system is used to detect an unauthorized tapping on distribution lines.
Implementation area of this system is a distribution network of electrical power supply system. Existing system is not able to
identify the exact location of tapping. This system actually finds out on which electrical line there is a tapping. This is a real time
system. This will provide an additional facility of meter reading with the same technique and in same cost. This will protect
distribution network from power theft done by tapping, meter tampering etc.
B. Objectives
This system would provide a simple way to detect an
electrical power theft without any human interface.
It would indicate exact zone and distribution line on
which unauthorized taping is done in real time.
It would be time saving if distribution company
personnel take reading by this wireless technique.
It would provide a digital record in case of any
judicial dispute.
To maximize the profit margin of power utility
company.
Fig.2. Schematic diagram.
C. Factors That Influence Illegal Consumers
There are many factors that encourage people to steal A. Methods of Theft
electricity of which socio-economic factors influence people Methods used to commit theft fall into the Following broad
to a great extent in stealing electricity. A common notion in categories:
many people is that, it is dishonest to steal something from Connection of supply without a meter Connection of
their neighbor but not from the state or public owned utility supply without a meter following disconnection for
company. In addition, other factors that influence illegal non-payment or by “squatters” occupying empty
consumers are: properties.
Higher energy prices deject consumers from buying By passing the meter with a cable. It coveted into the
electricity. . In light of this, rich and highly educated supply side of the metering installation (i.e. the meter
communities also steal electricity to escape from huge terminals, the metering cables, the cut-out or the
utility bills. service cable).
Growing unemployment rate show severe. c. Interfering with the meter to slow or stop the disc,
including use of electrical devices which stop the
II. SYSTEM OVERVIEW meter or cause it to reverse (so-called 'black boxes).
System block diagram and schematic diagram as shown in Interfering with the timing control Equipment used for
bellow Figs.1 and 2. two rate tariffs to obtain a cheaper rate.
C. Rectifier
“Rectification is the process of converting an alternating
voltage or alternating current into direct voltage or direct
current”. The device used for rectification is called rectifier.
Rectifiers are mainly two types, half wave rectifier and full
wave rectifier. Half wave rectifier is a circuit which rectifies
only one of the halves of the ac cycle. During the half cycles
when P is positive and N is negative, the diode is forward
biased and will conduct. When P is negative and N is
positive, the diode is reverse biased and will not conduct.
Efficiency of the half wave rectifier will be about 40.6%. Full
wave rectifier is a circuit which rectifies both half cycles of
the AC when P of 1st diode is positive; the 1st diode is
forward biased and will conduct. Now the 2nd diode will not
conduct as it is reverse biased. In all the half cycles either of
the two diodes will be conducting. The efficiency of a full
wave rectifier is about 81.2 %, twice the efficiency of a half
Fig.3. Power supply circuit. wave rectifier.
The power supply section is the important one is as shown D. Filter Circuit
in Fig.3. It should deliver constant output regulated power The filtered full wave rectifier is created from the FWR by
supply for successful working of the project. A 0-12V/500 adding a capacitor across the output.
mA transformer is used for this purpose. The primary of this
transformer is connected in to main supply through on/off E. Liquid Crystal Display
switch& fuse for protecting from overload and short circuit LCD stands for Liquid Crystal Display. LCD is finding
protection. The secondary is connected to the diodes to wide spread use replacing LEDs (seven segment LEDs or
convert 12V AC to 12V DC voltage. And filtered by the other multi segment LEDs) because of the following reasons:
capacitors, which are further regulated to +5v, by using IC The declining prices of LCDs.
7805. So to generate this 12v and 5v constant dc we used the The ability to display numbers, characters and
following components: graphics. This is in contrast to LEDs, which are limited
full wave bridge rectifier to numbers and a few characters.
step down transformer Incorporation of a refreshing controller into the LCD,
7805 voltage regulator thereby relieving the CPU of the task of refreshing the
1000uf/35v electrolytic capacitor
These components are “specialized” for being used with IV. SOFTWARE TOOLS
the microcontrollers, which means that they cannot be A. Embedded C Programming Language
activated by standard IC circuits. They are used for writing This course introduces the C programming language and
different messages on a miniature LCD is as shown in Fig.5. specifically addresses the issue of embedded programming. It
A model described here is for its low price and great is assumed that you have worked with some other high level
possibilities most frequently used in practice. It is based on language before, such as Python, BASIC, FORTRAN or
the HD44780 microcontroller (Hitachi) and can display Pascal. Due to the complexities of embedded systems, we
messages in two lines with 16 characters each. It displays all begin with a typical desktop system and examine the structure
the alphabets, Greek Etc. In addition, it is possible to display of the language along with basic examples. All C programs
symbols that user makes up on its own. Automatic shifting must have at least one function: main ( )
message on display (shift left and right), appearance of the Foundation of the C program.
pointer, backlight etc. are considered as useful characteristics. Starting point for a program.
Lowest level task.
Typically:
Contains a few initialization instructions.
Calls to other functions.
Simplest C program:
Fig.5.LCD.
F. Micro Controllers
Microprocessors and microcontrollers are widely used in
embedded systems products. Microcontroller is a Embedded systems programs are infinite loops: they will
programmable device. A microcontroller has a CPU in continue to execute until the microcontroller is turned off.
addition to a fixed amount of RAM, ROM, I/O ports and a
timer embedded all on a single chip. The fixed amount of on- B. Keil Compiler
chip ROM, RAM and number of I/O ports in microcontrollers Keil compiler is software used where the machine language
makes them ideal for many applications in which cost and code is written and compiled. After compilation, the machine
space are critical. The Intel 8052 is Harvard architecture, source code is converted into hex code which is to be dumped
single chip microcontroller (µC) which was developed by into the microcontroller for further processing. Keil compiler
Intel in 1980 for use in embedded systems. It was popular in also supports C language code.
the 1980s and early 1990s, but today it has largely been
superseded by a vast range of enhanced devices with 8052- C. Proload
compatible processor cores that are manufactured by more Proload is software which accepts only hex files. Once the
than 20 independent manufacturers including Atmel, Infineon machine code is converted into hex code, that hex code has to
Technologies and Maxim Integrated Products. 8052 is an 8- be dumped into the microcontroller and this is done by the
bit processor, meaning that the CPU can work on only 8 bits Proload. Proload is a simple programmer which itself
of data at a time. Data larger than 8 bits has to be broken into contains a microcontroller in it other than the one which is to
8-bit pieces to be processed by the CPU. 8052 is available in be programmed. This microcontroller has a program in it
different memory types such as UV-EPROM, Flash and NV- written in such a way that it accepts the hex file from the Keil
RAM. The present project is implemented on Keil Uvision. In compiler and dumps this hex file into the microcontroller
order to program the device, proload tool has been used to which is to be programmed.
burn the program onto the microcontroller. The features, pin
description of the microcontroller and the software tools used V. CONCLUSION
are discussed in the following sections. It is found that overloading, due to various reasons
such as power theft, unbalance condition due to loading
Features of AT89S52: of any phase are the prime cause of failure transformer.
4K Bytes of Re-programmable Flash Memory. Most of them are caused due to low maintenance as many
RAM is 128 bytes. localities are situated at remote areas so this system will help
2.7V to 6V Operating Range. to prevent transformers from being damaged or overload
Fully Static Operation: 0 Hz to 24 MHz condition. This will help to tackle the problem of
Two-level Program Memory Lock. electricity theft and transformer damage, as the failure
128 x 8-bit Internal RAM. rate is very high in INDIA, around 25% per annum, which
32 Programmable I/O Lines. is not favorably comparable to international norms of 1-2%.
Two 16-bit Timer/Counters.
International Journal of Scientific Engineering and Technology Research
Volume.04, IssueNo.09, April-2015, Pages: 1651-1655
Power Theft Identification System in Distribution Lines using Differential Power Measurement
VI. REFERENCES
[1] J. L. Del Monaco, “The role of distributed generation in
the critical electric power infrastructure,” in IEEE-Power
Engineering Soc. Winter Meeting, vol. 1, 2001, pp.
[2] L.Philipson, “Distributed and dispersed generation:
addressing the spectrum of consumer needs,” in IEEE -Power
Engineering Soc. Summer Meeting, vol. 3, 2000, pp. 1663–
1665.
[3] D. Casadei, G. Grandi, R. K. Jardan, and F. Profumo, “
Control strategy of a power line for household supply,” in
Proc. IEEE Power Electronics Specialist Conf., vol. 2, 1999,
pp. 607–612.
[4] R. K. Jardan, O. Dranga, and D. Bereknyei, “ Standby
power supply using alternative energy through co -phase
shifting technologies,” in Proc. 3rd Int. Conf. TELESCON
Telecommunications Energy Special, 2000, pp. 215 –219.
[5] M.Etezadi-Amoli and K. Choma, “Electrical performance
characteristics of a distribution transformer,”in IEEE
Power Engineering Soc.Winter Meeting, vol. 2, 2001, energy
through co -phase shifting.