You are on page 1of 56

2015

JIMMA UNIVERSITY
JIMMA INSTITUTE OF TECHNOLOGY
SCHOOL OF ELECTRICAL AND COMPUTER ENGINEERING
INDUSTRIAL CONTROL ENGINEERING STREAM

FINAL YEAR THESIS FOR GSM BASED POWER THEFT


CONTROL SYSTEM
Submitted to Jimma University, Institute of Technology, School of Electrical
and Computer Engineering in partial fulfilment of requirement for the award of
BSC, Control Industrial Engineering

GROUP MEMBER ID.NO


1. ABDULHAFIZ MOHAMMED 00327/03
2. ABRIHU GETAHUN 00397/03
3. ADDISU SEIFU 00418/03
4. BEDHASO KUFA 01628/03
5. EYASU ABULU 03584/03
6. GEBRIE LAMESGIN 02298/03

Advisor: Solomon W.Tsadik (MSc)


Submission date: JUN. 15, 2015
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

Abstract

Electrical energy is very important for ever day life and a spine for the industry. Electricity is
indiscipline to our daily life with increasing need of electricity the power theft is also increasing
power theft is a problem that continues to plague power sector across the whole country. Electrical
power theft detection and control system is used to detect the consumer when they try to use the
power illegally. Electricity theft happens when the customer use energy meter tampering such as
placing magnet near to energy meter, disconnecting the neutral line and shorting the phase coil of
the current transformer. For this theft mechanism we designed a system to overcome this
challenges. Two current transformer is used to measure the reading of electricity one is for
measurement of phase current and the other is to measure the turning back or neutral current. Those
signals fed to micro controller through the bridge rectifier microcontroller will compare both
signals. Depend on the comparison made by the microcontroller decides whether theft is going on
the energy meter or not and the message will be sent to notify the authorterized power vendor using
GSM for that energy meter. Moreover when there is occurrence of theft the relay will disconnect
the load from the electricity power. That is GSM based power theft control system is developed.
We used protest software to analyze and estimate what the hardware will look like. Mainly this
system consists of microcontroller, energy meter, current transformers, LDR, relay, LCD and GSM
module.

JIT.ECE Page I
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

Acknowledgement
First of all we would like to thank Jimma Institute of Technology, School of Electrical and
Computer engineering department to give us this marvelous enlightening chance. Which enable to
build ourselves with both the theoretical and practical knowledge; Secondly our heartfelt
Gratitude goes to our advisor Solomon W.Tsadik (MSc) and co-advisor Mr. Mulegeta H. for his
unreserved suggestion, idea and motivation throughout the completion of this project

JIT.ECE Page II
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

Table of Contents
CHAPTER ONE .................................................................................................................................................... 1
1. INTRODUCTION .............................................................................................................................................. 1
1.1 Background Information....................................................................................................................... 1
1.2 Statement of the problem ...................................................................................................................... 3
1.3 Objectives................................................................................................................................................ 4
1.3.1 General objectives ........................................................................................................................... 4
1.3.2 Specific objectives ........................................................................................................................... 4
1.4 Methodology ........................................................................................................................................... 4
1.5 Scope of project ...................................................................................................................................... 5
1.6 Organizations of the Thesis ................................................................................................................... 5
CHAPTER TWO ................................................................................................................................................... 6
2.1. LITERATURE REVIEW .................................................................................................................... 6
CHAPTER THREE ................................................................................................................................................. 8
3. SYSTEM DESIGN AND ANALYSIS ..................................................................................................................... 8
3.1 System block diagram............................................................................................................................ 9
3.2.1 Block diagram description ............................................................................................................. 9
3.2 System Components and Operation ................................................................................................... 10
3.2.1 Current transformer ..................................................................................................................... 10
3.2.2 Electric energy meter .................................................................................................................... 11
3.2.3 GSM modem .................................................................................................................................. 13
3.3.4 Relay ............................................................................................................................................... 15
3.2.5 Microcontroller ............................................................................................................................. 17
3.2.6 LCD display ................................................................................................................................... 22
3.2.7 Light depending resistor (LDR)................................................................................................... 24
3.3. Ways of electricity theft .................................................................................................................. 24
3.3.1 Proposed solution for power theft ............................................................................................... 28
CHAPTER 4 ....................................................................................................................................................... 30
4. Result and discussion ................................................................................................................................... 30
4.1. System flow chart ................................................................................................................................ 30
4.2. Software simulation result.................................................................................................................. 32
4.3. Working principle of the system ........................................................................................................ 34
5. Conclusion and Recommendations.............................................................................................................. 36

JIT.ECE Page III


GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

5.1 Conclusion ............................................................................................................................................ 36


5.2 Recommendations .............................................................................................................................. 37
References ....................................................................................................................................................... 38

JIT.ECE Page IV
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

Figure 3. 1 System block diagram ..................................................................................................................... 9


Figure 3. 2 GSM working ................................................................................................................................ 13
Figure 3. 3 relay coil ......................................................................................................................................... 16
Figure 3. 4 Arduino Uno microcontroller ........................................................................................................ 18
Figure 3. 5 LCD Display .................................................................................................................................. 22
Figure 3. 6 disconnection the neutral line ........................................................................................................ 26
Figure 3. 7 tampering using magnet................................................................................................................. 27

Figure 4 1 Simulation for no power theft ......................................................................................................... 32


Figure 4 2 Simulation for power theft .............................................................................................................. 32

Table 3 1 Arduino Uno parameters .................................................................................................................. 20


Table 3 2 Pin description of LCD .................................................................................................................... 23

JIT.ECE Page V
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

Acronym

AC: Alternative Current


ADC: Analog to Digital Conversion

AT: Attention command

CT: Current Transformers

D: Diode

DC: Direct current


EEPROM: for Electrically Erasable Programmable Read only memory

GSM: Global System for Mobile Communication

I/O: Input/output
IT: Information Technology

LCD: liquid Crystal Display

LED: Light Emitting Diode


RTC: Real Time Clock

POS: Point Of Sale

SMS: Short Message Service

JIT.ECE Page VI
DECLARATION
We declare that all the works included in this document are our own work and no copying or
Plagiarism is there with our work. We assure that we all agree with the information written
above with our signature as follows.

Name ID number Signature


1. Abdulhafiz Mohammed 00327/03 _____________________
2. Abrihu Getahun 00397/03 _____________________
3. Addisu Seifu 00418/03 _____________________
4. Bedhaso Kufa 01628/03 _____________________
5. Eyasu Abulu 03584/03 _____________________
6. Gebrie Lamesgin 02298/03 _____________________

JIT, School of Electrical and Computer Engineering


Program: BSC Degree
Project tittle: GSM based power theft control system
I certify that this project satisfies all the requirements as a project for the degree of Bachelor of
Science.
Name of the project coordinator __________________________________
Signature__________________________
This is to certify that I have read this project and that in my opinion it is fully adequate, in scope
And quality, as a project for the degree of Bachelor of Science.
Name of Advisor ____________________________________________

Signature________________________
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

CHAPTER ONE
1. INTRODUCTION
1.1 Background Information
The electricity is needed to be protected for efficient power delivery to the consumer
because electricity is indispensable to domestic and industrial development activity.
Generation, transmission and distribution of electrical energy involve many operational losses.
There are two types of losses technical and Nontechnical losses overall technical losses occur
naturally and are caused because of power dissipation in transmission lines, transformers, and other
power system components. Technical losses in transmission and distributions computed with the
information about total load and the total energy billed. While nontechnical losses cannot be
precisely computed, but it can be estimated from the difference between the total energy supplied to
the customers and the total energy billed. Moreover non-technical losses are illegal utilization of
power by electricity consumers.

An electricity theft is one form of nontechnical loss, it can be in the form of meter tampering,
stealing or illegal connections, billing irregularities, and unpaid bills. The financial impacts of theft
are reduced income from the sale of electricity. This illegal electricity usage may indirectly affect
the utility company and the economic status of a country also.

Electricity theft, a common form of commercial losses, involves tampering with meter.
Commercial losses are nearly impossible to measure using traditional power system analysis tools.
This is due to the lack of information on both commercial and the legitimate loads in the system.
Despite the best efforts by utilities, the current results of commercial losses measurements are often
inaccurate at best, because the data rely heavily on the records of detected cases, rather than by
actual measurement of the electrical power system. Certainly utilities have some control over the
magnitude of commercial losses; but even with their best efforts, some commercial losses will still
continue.

JIT.ECE Page 1
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

However, since electricity is indispensable to domestic and industrial development activities of a


nation, thus it needs to be protected and monitored for effective and efficient power delivery to the
consumers. Merely generating more power is not enough to meet present day requirements. Power
consumption and losses have to be closely monitored so that the generated power is utilized in an
efficient manner. Thus, the application of intelligent control in electrical system can improve the
power quality to a great extent, at the same time it can prevent a lot of illegal activities. Improving
quality in power is indeed an important requirement for our future. Hence this establishment of
automatic intelligence in power systems will be a great improvement.

A design of electricity theft monitoring system has been generated. It saves time as well as help to
maximize profit margin for utility company working in electrical distribution network. Utility
company can keep a constant eye on its costumer. This project provides an overview of GSM based
efficient and effective Power Management. As of days the problem of electricity theft has
increased in rural areas and in industrial parks. Also these thefts are quite noticeable in urban
houses too. As a solution to this problem, an electronic system that can control this is of great
requirement. This project adds a new security measure to such type of electricity theft control. The
design is compact enough to setup this system in houses and industries.

JIT.ECE Page 2
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

1.2 Statement of the problem


Today Electricity becomes our day to day part of life. When we woke up from our bed in the
morning we light up our class bulbs and then go to prepare a breakfast using the electricity that we
bought. Then we will continue our electricity usage trend throughout the whole day. Customers of
the electricity vendor must obey the rules and the regulation of the vendors. Which obviously
makes the customer to be in touch with the electricity supplier.

One of the rules that should respect might be legal usage of electrical power. But this rule might not
be respected due to inability to payback the used electricity to escape from huge utility bills, Weak
economic situation in many countries has implied its effect directly on common Man, Countries
with weak enforcement of law against electricity and Corrupt political leaders and employees of the
utility company are responsible for billing irregularities.

This usage of electricity could come up with sever negative effects. Primarily, electricity theft
affects the utility company and then its customers. In energy market, utility companies expect their
money back from the customers for the electricity supplied, most of which is lost by them due to the
NTL (Non-technical losses).Electricity theft is a serious concern for utility companies as they
are under threat of survival because of these incurring economic losses.

In order to exist the utility supplier the above effects should be eliminated. So that we designed a
system which overcome electricity theft. That is GSM based power theft control system. This
system detects theft without any human intervention. So that the vendor can simply notice via SMS
message and can also take corrective mechanism where the problem is occurred.

JIT.ECE Page 3
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

1.3 Objectives
1.3.1 General objectives
To design GSM based power theft control system in order to detect Electricity power theft and notify the
theft to electricity utility power supplier via SMS message.

1.3.2 Specific objectives


 Provide single way to detect and indicate electrical power theft without any
human interface.
 To maximize the profit margin of the power utility company.
 To replace the traditional way of task of force moving from house to house in
monitoring the power.
 To save the usage of electricity which is used illegally.

1.4 Methodology
A development method may be regarded as a path or a procedure by which the developer proceeds from a
problem of a certain class to a solution of a certain class. A method, to be worthy of the name, must at least
decompose the development task into a number of reasonably well-defined steps which the developer can
take with some confidence that they are leading to a satisfactory.

Methodology of GSM based power theft control system involves the following steps:

 Initial investigation (observation)

 Identifying component used

 System design

 Coding, testing

 Implementation through simulation.

JIT.ECE Page 4
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

1.5 Scope of project


Our project consists two parts such as hard ware design and software implementation.

We design the hard ware and we simulate the project with the help of protest software and Arduino
micro controller respectively.

1.6 Organizations of the Thesis


Chapter 1: this is all about introduction. We tried to discuss about the background of the project, the
scope that our project encompasses, the statements of the problem that initiate us to do such a
system as well as the scope of the system and the methodologies that we followed.

Chapter 2: in this chapter literature reviews and comparing our work with others have been
discussed.

Chapter 3: discusses about the overall system description with block diagram; system component
and flow chart; way of power theft by energy meter and their proposed solution and overall system
design and analysis

Chapter 4: this chapter contains discussion and software simulation result of the design

Chapter 5: This chapter contains Conclusion and Recommendations for future work

Appendix: Source code.

JIT.ECE Page 5
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

CHAPTER TWO
2.1. LITERATURE REVIEW
Electricity theft, which is the practice of using electricity from the utility company without the
Company’s authorization or consent, is a major problem challenging power utilities worldwide.
Electrical theft could be inform of billing irregularities, meter tampering and unpaid bills. But the
most prominent include illegal Connection and meter tampering. Various ways of tampering the
meter has been elucidated. However, since electricity is indispensable to domestic and industrial
development activities of a Nation, thus it needs to be protected and monitored for effective and
efficient power delivery he Consumers. Basically, electricity theft often resulted to overloading of
the generation units and this adversely affects the utility company in terms of revenue. In addition,
electricity theft raises safety concerns Such as electric shocks leading to death and maiming of
personnel’s, hence the need to prevent and minimize the adverse impact of electricity theft has
attracted the interest of this study. An Electricity meter or Energy meter is a device that
measures the amount of electric energy consumed by a residence, commercial and industrial, or an
electrically powered device. Electricity meters are typically calibrated in billing units, the most
common one being the kilowatt hour. One of the major challenges in energy mater in recent
time, is the detection elimination electricity theft. However, the previous theft control system is
manual. That is moving from house to house in monitoring the power.
A constituency has been proposed to be created through effective communication with the
important stakeholders, institutionalization of new business processes that adopt modern
technology, and improvisation of management information systems. Periodic inspection of illegal
connections involves a lot of labor and strain for vigilant officials. The shunts detecting equipment
proposed is time efficient and helps in the detection of electricity theft in underground distribution
cables. Revenue Assurance and Audit Process (RAAP) is composed of macro-functions to detect
and analyze revenues involved in illegal consumption of electricity. Several technical measures
were also implemented in order to detect and help utilities in their battle against NTL. GE has
patented an energy meter that reads electricity consumption correctly, even if the in-going and out-
coming meter terminals are reversed. This invention stopped illegal consumers from using their
energy meter in the reverse direction to reduce their utility bill. Installation of a prepaid energy

JIT.ECE Page 6
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

meter can be a solution to monitor the distribution system and control electricity theft. Location of
electricity theft on a distribution feeder can be detected based on the values of the phase angle and
impedance of the transmission lines at two different operating frequencies respectively. The value
of energy read by the central observer meter is compared with the sum of energy consumption
values read by all energy meters in range. These two values of the current are compared to estimate
the total electricity that is being consumed illegally.
Vigilant Energy Metering System (VEMS) is a proposed energy metering system that can fight
electricity theft. It has the ability to collect, transfer and process data between other energy meters,
local station and base station. It also identifies probable locations of theft and helps the utilities to
control theft. A remote billing system can also be developed modifying this model. Illegal
consumption of electricity can be detected by using a remote check meter based on the amount of
losses and time stamp of the check meter. This method is implemented before inspecting the illegal
consumers personally by the vigilance officials, based on the data at the proper frequency of the
consumer measurements. A microcontroller based energy meter gives utilities the ability to monitor
and control the power supply of its spatially distributed consumers. This meter acts as a check meter
that helps detect maters that have been tampered.

This paper discusses the problem of electricity theft as well as proposed a new method for its
prediction and detection. The proposed method has the following advantages over the existing
schemes, which are out lined here under. The need for the disconnection of power supply before is
no longer taken care of by the electrical workers because the proposed theft control system
automatically disconnects it when the consumers steal electricity. GSM is applied in system
monitoring: Nowadays, GSM modules are used to transmit the information about power theft to
utility company. The main aim of this work is to use the GSM network alongside in reducing theft
and losses. This also can be used to disconnect the power supply to the house in case of electricity
theft. In case of tampering, it immediately sends signal to the central server of the utilities. Another
advantage of the GSM is that it enables the utility engineers efficiently plan for network expansion
while delivering.

JIT.ECE Page 7
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

CHAPTER THREE
SYSTEM DESIGN AND ANALYSIS

3.

JIT.ECE Page 8
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

3.1 System block diagram

Figure 3. 1 System block diagram

3.2.1 Block diagram description


To provide a solution to the problems associated with the commercially available analog
meters as mentioned in the previous section, GSM based power theft control system is designed in
this project. In this project two CTs are used: CT1 in phase line and CT2 in neutral line. CT1
measures IP and CT2 measures IN. These values are converted dc and provided to the ADC
(Analog to Digital Conversion) input of the microcontroller. We have written a program for the
microcontroller to compare these two values in Arduino language. If there is any difference
between the two values, microcontroller will detect the occurrence of power theft. Then the
microcontroller will detect and display the status on LCD module. The power theft occurring at the
same time the load will disconnect the customer from service of the power because of trying to steal
the electricity .On the block diagram of this project. GSM module is present and it helps or uses to
tell the power supplier or company power theft is happening.

JIT.ECE Page 9
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

3.2 System Components and Operation


3.2.1 Current transformer

Current transformers (CT's) provide a simple, inexpensive and yet accurate means of sensing
current flow in power conductors. They are available in 3 basic configurations:

1. Ring Core CT's are available for measuring currents from 50 to 5000 amps, with windows
(power conductor opening size) from 1" to 8" diameter.

2. Split Core CT's are available for measuring currents from 100 to 5000 amps, with
windows in varying sizes from 1" by 2" to 13" by 30". Split core CT’s have one end
removable so that the load conductor or bus bar does not have to be disconnected to install the CT.

3. Wound Primary CT's are designed to measure currents from 1 amp to 100 amps. Since the
load current passes through primary windings in the CT, screw terminals are provided for the load
and secondary conductors. Wound primary CT's are available in ratios from 2.5:5 to 100:5 (Models
189 and 190 are examples of wound primary CT's). CT's used with watt transducers enable the
owner to control demand as well as monitor building and/or tenant power consumption. When CT's
are used with Current Transducers, the results are an excellent method of diagnosing the
performance of fans, pumps, chillers, etc. The Model 4CMA and 4CTV Current Transducers
provide alarms for each motor so the owner is warned immediately of any abnormal operating
condition. Low pump flows will be alarmed if the strainer is dirty or the coupling is broken. Low
fan flows will be alarmed if filters are dirty, belts are slipping, or dampers (fire, smoke, etc.) are
closed. High motor loads will alarm if bearings are dry or worn, or belts are out of alignment. CT’s
are designed to handle motor inrush currents, so no extra precaution is needed to monitor motors.

JIT.ECE Page 10
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

CT Accuracy

A CT is most accurate at rated current with a low burden (load). Accuracy decreases with
increased burden (load) or low line current. In sizing CT's the conductor size and distance is
important. Improper sizing of current transformers or long secondary conductor runs with
undersized cable can result in poor accuracy. CT's that are used to monitor motor loads can be sized
from the nameplate full load motor amps.

Mounting CT's

CT's are generally located in the main breaker panel or in branch distribution panels where space
is always at a premium. Since CT's do not have to be installed 90 degrees to the conductor run (the
conductors can go through the CT at any angle) they are generally held in place with plastic tie
wraps. CT's with mounting feet are available if appearance is important and there is enough room to
accommodate this type of mounting arrangement.

3.2.2 Electric energy meter


An electric meter or energy meter is a device that measures the amount of electrical energy
consumed by a household, business organization, industry etc. Electric meters are typically
calibrated in billing units, the most common one being the kilowatt hour. Periodic readings of
electric meters establish billing cycles and energy used during a cycle. There are two types of
energy meter commonly used such as

1) Analog meter and


2) Digital meter.

JIT.ECE Page 11
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

1. ANALOG METER

The analog meter operates by counting the revolutions of an aluminum disc which is made to
show revolutions proportional to the energy consumption. CT (Current Transformer) measures
the phase current (IP) and PT (Potential Transformer) measures the phase voltage to calculate
energy consumption. The meter itself consumes a small amount of power, typically around 2 watts
for operation. At normal condition, current flowing from the phase (IP) should be equal to current
returning through the neutral (IN).

2. Digital Energy Meters

Digital signal processor or high performance microprocessors are used in digital electric meters.
Voltage and current transducers are connected to a high resolution ADC. Once it converts analog
signals to digital samples, voltage and current samples are multiplied and integrated by digital
circuits to measure the energy consumed. It is programmed in such a way that it calculates energy
according to the tariff and other parameters like power factor, maximum demand, etc. and stores all
these values in a nonvolatile memory EEPROM. It contains real time clock (RTC) for calculating
time for power integration, maximum demand calculations. Furthermore it interacts with liquid
crystal display (LCD), communication devices and other meter outputs. Battery is provided for
RTC and other significant peripherals for backup power.

Working principle of digital meter

Digital meters are advanced versions of the analog energy meters. They have more protective
options than analog meters have. It measures both IP and IN. IP is measured by taking the voltage
of a shunt resistor connected in series with the line and later converting it to current in the
microprocessor unit of the meter. IN is measured by the CT. At normal condition, IP and IN are of
equal value. This value along with the phase voltage value from the PT is provided to the
microprocessor unit inside the meter to calculate the amount of energy consumed and shown in
LCD (Liquid Crystal Display). So, the operation is digital here requiring no rotating disk.

JIT.ECE Page 12
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

3.2.3 GSM modem


A GSM modem is a specialized type of modem which accepts a SIM card, and operates over a
subscription to a mobile operator, just like a mobile phone. A GSM modem exposes an
interface that allows applications such as SMS to send and receive messages over the modem
interface. The mobile operator charges for this message sending and receiving as if it was
performed directly on a mobile phone. To perform these tasks, a GSM modem must support asset”
for sending/receiving SMS messages. Due to some compatibility issues that can exist with mobile
phones, using a dedicated GSM modem is usually preferable to a GSM mobile phone. It should also
be noted that not all phones support the modem interface for sending and receiving SMS messages.
In particular, most smart phones, including Blackberries phone and Windows Mobile devices, do
not support this GSM modem interface for sending and receiving SMS messages at all.
Additionally, Nokia phones that use the S60 (Series 60) interface, which Is Symbian based, only
support sending SMS messages via the modem interface, and do not Support receiving SMS via the
modem interface. The Global System for Mobile Communication (GSM) network is a cellular
telecommunication Network with a versatile architecture complying with the ETSI GSM 900/GSM
1800 standard. Siemens’ implementation is the digital cellular mobile communication system
D900/1800/1900 that uses the very latest technology to meet every requirement of the standard.
SIM 900 is affixed cellular terminal (FCT) used for data applications. It is a compact and portable
terminal which satisfy various data communication over GSM. It also can be connected to a
computer with a standard RS232C serial port. SIM 900 offers features like short message service
(SMS), data services (sending and receiving data files),Fax service and data file connectivity
through wire is not available or not possible. SIM 900 is very easy to set up .it also finds
its application in IT companies, banks, financial institutions etc.

Figure 3. 2 GSM working


JIT.ECE Page 13
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

This diagram shows the flow of the data via a GSM module. The first embedded device is the
microcontroller which sends the data to the module. The module then via wireless link will send the
data to the GSM receiver in mobile phone. The mobile phone here acts as a second embedded
device which reads the data more and more applications emerged with the rapid development of
wireless data services, such as meter navigation, remote monitoring, wireless Internet access,
wireless point of sale (POS) etc. Thus, more and more devices need to be able to do wireless
communication.

Instruction of GSM modem


AT commands: AT commands are the instructions used for controlling a modem. AT stands
for Attention. Each and every command line starts with "AT" or "at". Because of this modem
commands are called AT commands. Many of the commands are also used for controlling wired
dial-up modems. These are supported by GSM/GPRS modems and mobile phones. Apart from this
common AT command set, GSM/GPRS modems and mobile phones also support an AT command
sets which are specific to the GSM technology, which also includes SMS-related commands.

Basic Commands and Extended Commands:


There are two types of AT commands: They are basic commands and extended commands.

 Basic commands are AT commands that do not start with "+". For example, D (Dial),
A (Answer), H (Hook control) and O (Return to online data state) are basic commands.
 Extended commands are AT commands that start with "+". All GSM AT commands are
extended commands. For example, +CMGS (Send SMS message), +CMSS (Send SMS
message from storage), +CMGL (List SMS messages) and +CMGR (Read SMS messages)
are extended commands.

JIT.ECE Page 14
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

Operation of GSM
AT commands are used by the computers to control modems. Both the GSM modems and dial-
up modems support a fixed set of standard AT commands. GSM modem can be used like a dial-up
modem. Apart from the standard AT commands, GSM modems also support an extended set of AT
commands. These extended set of AT commands are defined in the GSM standards. With the
extended AT commands, several things are done:

 To read, write and delete SMS messages.


 To send SMS messages.
 To monitor the signal strength.
 To monitor the charging status and charge level of the battery.
 Reading, writing and searching phone book entries.
 The number of SMS messages processed by a GSM modem per minute is very low -- only
six to ten SMS messages per minute.

GSM Network

Utilizing an existing cellular network for data transportation requires no additional equipment
or software, resulting in a significant savings in both time and capital. Cellular technology utilizes
an encryption technique to prevent an outside source from receiving the transmitted data. The
cellular network provides full two-way communications, allowing scheduled reads, demand reads,
alarm and event reporting, power outage reporting and power restoration reporting.

3.3.4 Relay
A relay is usually an electromechanical device that is actuated by an electrical current. Relays
are like remote-control switches and are used in many applications because of their relative
simplicity, long life, and proven high reliability. Relays are used in a wide variety of applications
throughout industry, such as in telephone exchanges, digital computers and automation systems.
Highly sophisticated relays are utilized to protect electric power systems against trouble and power
blackouts as well as to regulate and control the generation and distribution of power. Although
relays are generally associated with electrical circuitry, there are many other types, such as
pneumatic and hydraulic. Input may be electrical and output directly mechanical, or vice versa.

JIT.ECE Page 15
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

Work principle of relay.

The working of a relay can be better understood by explaining the following diagram given below.

Figure 3. 3 relay coil

The diagram shows an inner section diagram of a relay. An iron core is surrounded by a control
coil. As shown, the power source is given to the electromagnet through a control switch and
through contacts to the load. When current starts flowing through the control coil, the electromagnet
starts energizing and thus intensifies the magnetic field. Thus the upper contact arm starts to be
attracted to the lower fixed arm and thus closes the contacts causing a short circuit for the power to
the load. On the other hand, if the relay was already de-energized when the contacts were closed,
then the contact move oppositely and make an open circuit. As soon as the coil current is off, the
movable armature will be returned by a force back to its initial position. Relays are mainly made for
two basic operations. One is low voltage application and the other is high voltage. For low voltage
applications, more preference will be given to reduce the noise of the whole circuit. For high
voltage applications, they are mainly designed to reduce a phenomenon called arcing.

JIT.ECE Page 16
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

3.2.5 Microcontroller
Microcontroller is a small computer on a single integrated circuits containing processor core, memory
and programmeble input/output referance. For our project we choose Arduino UNO3 microcontroller.
Because it can easily interface with the system. Moreover it is easily programmed for opertaion of desired
performance.

Arduino microcontroller

Arduino is a tool for making computers that can sense and control more of phisical world than our
desktop computer. It is an open source physical computing platform based on simple microcontroller board
and a development environment for writing software for the board. Arduino can be used to develope
interactive objects taking point from a variety of switches or sensors an controlling a variety of lights, motor
and other physical output. Arduino projectscan be standalone or they can be communicated with software
running on our computer (eg. Flash, proessing, MAX MSp). The boards can be assembled by hand or
purhased preassembled; the opensource IDE can be downloaded free.

The Arduino programming language is an implementation of Wiring, a similar physical computing plat
form, which is based on the Processing multimedia programming environment.The Arduino Uno is a mic
ro controller board based on ATmega 328.it has 14 digital input /out put pin (of which 6 can be
used as PWM outputs,6 analog inputs a 16 MHZ ceramic resonator a USB connection,a power jack
an ICSP haeder and a reset button. It contains every thing needed to support the micro controller
;simply connevt it a computer with a USB cable or power it with a AC to DC adapter or battery to
get started.

JIT.ECE Page 17
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

Feature of ATmega328 microcontroller


 Input voltage - 7-12V, 14 Digital I/O Pins (6 PWM outputs), 6 Analog Inputs, 32k
Flash Memory, 16Mhz Clock Speed
 The maximum values that Arduino can handle: Max frequency: 16MHz, Max Voltage:
5V, Max Current: 50m
 Using the high-speed micro-processing controller
 The development of language and development environment is very simple, easy to

understand, very suitable for beginners to learn.

Figure 3. 4 Arduino Uno microcontroller

JIT.ECE Page 18
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

Pin description

 Reset: This pin enables to reset the micro controller.


 IOREF: This pin acts as reference to the inputs given to the Arduino board.
 AREF- This pin acts as reference to the analog inputs.
 Rx, TX are used for receiving and transmitting serial data.
 ICSP- (In circuit serial programming) - These pins enable the user to programmed the
chips on the circuit.
 There are 6 pins of input from A0– A5 through which analog input can be given to
the Arduino board.
 There are 14 digital pins 0-13. Among these (3,5,6,9,10,11) are PWM pins(pulse
width

Modulation) from which analog output can be taken from the Arduino board. There
is an inbuilt LED on pin 13.

 Arduino can be powered using power jack, USB port. Apart from this it can also be
powered by using an external battery or AC to DC adaptor through pin VIN 5V, 3.3V:
there is a inbuilt regulator on the board. Through this regulator a constant DC
Supply of 5V, 3.3V is provided

JIT.ECE Page 19
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

parameter of Arduino

Microcontroller Arduino Uno

Operating voltage 5V

Input voltage(recommended) 7-12V

Input voltage(limits) 6-20V

Digital I/O pins 14(of which 6 provide PWM output)

Analog input pins 6

DC current per input output pin 40Ma

DC current for 3.3v pin 50Ma

Flash memory 32kb

SRAM 2kb

EEPROM 1kb

Clock speed 16MHz

Length 68.6 mm

Width 53.4 mm

Weight 25 g

Table 3 1 Arduino Uno parameters

JIT.ECE Page 20
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

Functions and programs used in Arduino

I. pin Mode

Configures the specified pin to behave either as an input or an output. Pin Mode (pin, mode) pin:
the number of the pin whose mode you wish to set. Mode: either input or output.

II. Digital Read

Reads the value from a specified digital pin, either HIGH or LOW. Digital Read (pin) pin: the
number of the digital pin you want to read (int)

III. Digital Write

Write a HIGH or a LOW value to a digital pin

IV. Analog Read

Reads the value from the specified analog pin. The Arduino board contains a 6 channel, 10-bit
analog to digital converter. This means that it will map input voltages between 0 and 5 volts into
integer values between 0 and 1023. This yields a resolution between readings of: 5 volts / 1024
units or, 4.9 mV per unit.

V. Analog Write

Writes an analog value (PWM wave) to a pin. After a call to analog Write, the pin will generate
a steady square wave of the specified duty cycle. The frequency of the PWM signal is
approximately 490 Hz.The Arduino IDE comes with a C / C++ library called “Wiring” (from the
project of the same name), which makes many common input/output operations much easier.
Arduino programs are written in C/C++, although users only need to define two functions in order
to make a runnable program: setup () – a function run once at the start of a program which can be
used for initializing settings, and loop () – a function called repeatedly until the board is powered
off. The code written in Arduino not be seen by a standard C++ compiler as a valid program, so
when the user clicks the “Upload to I/O board” button in the IDE, a copy of the code is written to a
temporary file with an extra include header at the top and a very simple main () function at the
bottom, to make it a valid C++ program. Since the IDE is pin oriented, we can quickly achieve our
desired logic and build a working model

JIT.ECE Page 21
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

3.2.6 LCD display


LCD display is a flat display; electronic visual display that uses light modulating property of
liquid crystal. It can present a string, digits, and 7 segment display as digital clock. The LCD screen
is more efficient and can be disposed of more safely than a CRT(Cathode Ray Tube).There are
different types of LCD display, we choose in our project 16*2 type LCD to interface with the
Arduino Uno microcontroller. The criteria choosing this type is we need only to display the status
and current not the other parameters so small LCD display is required. The liquid-crystal display
has the distinct advantage of having low power consumption than the LED. It is typically of the
order of microwatts for the display in comparison to the some order of mill watts for LEDs. Low
power consumption requirement has made it compatible with metal–oxide–semiconductor (MOS)
integrated logic circuit. Its other advantages are its low cost, and good contrast. The main
drawbacks of LCDs are additional requirement of light source, a limited temperature range of
operation (between 0 and 60° C), low reliability, short operating life, and poor visibility in low
ambient lighting, slow speed and the need for an AC drive.

Figure 3. 5 LCD Display

The LCD display consists of command registers such as RS, RW (read and write), E(enable), data
bus(D0, D1, D2,…..D7) and a 5V VDD and others pin is describe table blow.

JIT.ECE Page 22
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

Pin description of LCD

Pin No Name Description

1 VSS Power supply (GND)

2 VCC Power supply (+5V)

3 VEE Contrast adjust

4 RS 0 = Instruction input
1 = Data input

5 R/W 0 = Write to LCD module


1 = Read from LCD module

6 EN Enable signal

7 DO Data bus line 0 (LSB

8 D1 Data bus line 2

9 D2 Data bus line 3

10 D3 Data bus line 4

11 D4 Data bus line 5

12 D5 Data bus line 6

13 D6 Data bus line 7

14 D7 Data bus line 7 (MSB)

Table 3 2 Pin description of LCD

JIT.ECE Page 23
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

3.2.7 Light depending resistor (LDR)


LIGHT OR A PHOTO is a device whose resistivity is a function of the incident electromagnetic
radiation. Hence, they are light sensitive devices. They are also called as photo conductors, photo
conductive cells or simply photocells. They are made up of semiconductor materials having high
resistance.

Working Principle of LDR

A light dependent resistor works on the principle of photo conductivity. Photo conductivity is an
optical phenomenon in which the materials conductivity (Hence resistivity) reduces when light is
absorbed by the material when light falls i.e. when the photons fall on the device, the electrons in
the valence band of the semiconductor material are excited to the conduction band. These photons
in the incident light should have energy greater than the band gap of the semiconductor material to
make the electrons jump from the valence band to the conduction band. Hence when light having
enough energy is incident on the device more & more electrons are excited to the conduction band
which results in large number of charge carriers. The result of this process is more and more current
starts flowing and hence it is said that the resistance of the device has decreased. This is the most
common working principle of L

3.3. Ways of electricity theft


Tampering meter or fraud contributes to the most part of the losses in electric power
distribution sector . It can be done by an individual consumer or an expert professional. There are
several ways to bypass an energy meter. The subsections of this section provide comprehensive
illustrations of the ways to tamper the commercial analog meters.

JIT.ECE Page 24
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

A. shorting the phase current coil

When, a consumer shorts the current coil of the meter the total current flows through the
shorted path, so the meter cannot detect the current flow through it. We know that electrical
power is given by the equation:

P=VI: where; P: stands for power absorbed or delivered

I: for current through and V for voltage across the device So, if the
current coil of the meter is shorted here I=0 ultimately leading to P=0. Therefore, the illegally
connected load is not detected by the meter.

FIG 3.5 shortening the phase line (bypassing)

JIT.ECE Page 25
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

b. Disconnecting the neutral line

A more common method of tampering analog meter is disconnecting the neutral line. In this
condition, the meter cannot detect any voltage difference across the supply line and neutral line. As
V=0 here, power will be zero by according to P=VI formula. So, no energy consumption will be
shown by the meter.

Figure 3. 6 disconnection the neutral line

JIT.ECE Page 26
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

C. Tampering using magnet


We know that Aluminum disk is revolving by the magnetic flux produced inside the device due to
current flow. If a magnet is kept in the path of this flux, the magnet interferes with the flow of flux.
So, the produced flux cannot help the aluminum disk rotate. In this case, the disk is stopped or
Revolves slower producing less number of revolutions than that it should give. Therefore, accurate
energy consumption is not shown in the meter.

Figure 3. 7 tampering using magnet

JIT.ECE Page 27
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

3.3.1 Proposed solution for power theft

A. Protection against shorting phase current coil

We used CT1 in series with in phase side and CT2 in neutral side. If phase coil is shorted, the
current flows through the shorted path so the CT1 current is zero but CT2 current is not zero. The
output of the two current transformer enter bridge rectifier and a regulated current will enter to the
microcontroller. Our device works with the value of the difference between the readings of two
CTs. If the difference is occur between the two transformers microcontroller will notify to power
supplier via GSM.SMS message will send to Power Company by GSM modem.

B. protection against disconnecting the neutral line

When the neutral line of the meter is opened with intention to tamper, no current flows through
the neutral line. So CT2 has no voltage. But CT1 has current. The difference between these two
voltage is transferred to the enter bridge rectifier and a regulated voltage will enter to the
microcontroller. If the difference is occur between the two transformers microcontroller will notify
to power supplier via GSM. SMS message will send to Power Company by GSM modem.

C. Protection against magnetically tampering

The aluminum disc of the meter is divided into four sectors each occupying same amount of
surface area. Two sectors are painted in black and rests are kept as they were before.
Among these four sectors two opposite sectors are of same color and the other two are without any
color in the proposed device an additional LED (Light Emitting Diode) and an LDR (Light
Dependent Resistor) were used to prevent magnetic tampering. The LED will always be on and the
light will fall upon the disc and the reflected light will be received by the LDR. LDR will convert
the received light into electrical voltage and transfer it to the microcontroller. The microcontroller
receives the voltage value thereafter. At normal condition, the disc keeps rotating and the LDR
output voltage is always changing. If someone attempts to tamper the meter by placing a
magnet the received voltage of microcontroller will not change. The disc will not rotate in this
case and therefore there will be no change in the voltage from LDR to microcontroller.

JIT.ECE Page 28
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

When microcontroller will not find any change in the voltage from the LDR, then SMS message
will send to Power Company by the help of GSM modem and indicate the occurrence of theft.

JIT.ECE Page 29
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

CHAPTER 4
4. Result and discussion
4.1. System flow chart

JIT.ECE Page 30
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

Component’s used on this project

 Current transformer(TRAN-2P2S)
 Diodes (1N4001)
 Capacitor
 Voltage regulator(U1 7805)
 Potentiometer (POT-HG)
 Virtual terminal
 LCD( 16*2 ,LM016L)
 LED (LED-RED)
 Load (lamp and motor)
 Microcontroller (ARDUINO UNO R3)
 Resistor (300 ohm)
 Relay (RL1)

JIT.ECE Page 31
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

4.2. Software simulation result

Figure 4 1 Simulation for no power theft

Figure 4 2 Simulation for power theft

JIT.ECE Page 32
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

For this project we have write the source code on of electricity theft control system on special IDE
namely arduino.cc. This IDE consist of Writes an analog value (PWM wave) to a pin. After a call to
analog Write, the pin will generate a steady square wave of the specified duty cycle. The Arduino
IDE comes with a C / C++ library called “Wiring” (from the project of the same name), which
makes many common input/output operations much easier. Arduino.cc programs are written in
C/C++, although users only need to define two functions in order to make a runnable program:

Void setup () – a function run once at the start of a program which can be used for initializing
settings for this project we have initialize;

 Pin Mode (7,OUTPUT);//This indicates connect the output pin of 7 to relay driver used to
open and close according we want
 pin Mode(A0,INPUT);// this will indicates the input pin of AO of the microcontroller for
comparison system

Void loop () – a function called repeatedly until the board is powered off. For this project we have
used

 CT1=analog Read(A0); //this will read all the inputs of the current transformer pin Ao
 lcd.setCursor (0, 0);//telling the microcontroller to set the cursor of the LCD on the first line.
 Lcd. print ("CT1 :");// display the word that is found on the under question mark.

The code that we have write in Arduino not be seen by a standard C++ compiler as a valid
program, so when we clicks the “Upload to I/O board” button in the IDE, a copy of the code is
written to a temporary file with an extra include header at the top and a very simple main () function
at the bottom, to make it a valid C++ program. Since the IDE is pin oriented, we can quickly
achieve our desired logic and build a working model.

JIT.ECE Page 33
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

4.3. Working principle of the system


The circuit diagram is used to detect whether electricity theft is occur on not on a given
customer. As shown in fig.4.2 two current transformers are used one side is connecting series on the
phase line (P) while the second current transformer is connect on the line that out from the load line
or the neutral line (N).. The single phase line will feed to the energy meter. Those two current
transformers are used to measure the amount of current and voltage that passes to energy meter.
When someone try to use the electricity illegally the circuit will automatically tell the power
supplier using GSM modem and disconnect the customer service using relay. In addition this
system also display on the LCD to customer electricity theft is happened on his/her home. Even this
project is comfort for not only for literacy but also for illiteracy that can’t read from the LCD using
red LED will automatically glow due to the electricity theft. ARDUINO UNO R3 microcontroller
will not work for 220v AC voltage source we have used our power electronics knowledge for
converting 220v AC voltage to 5v DC using single phase full wave bridge rectifier. Single phase
Full Wave Bridge Rectifier uses four individual rectifying diodes connected in a closed loop “bridge”
configuration to produce the desired output. The main advantage of this bridge circuit is that it does not
require a special Centre tapped transformer, thereby reducing its size and cost. The single secondary winding
is connected to one side of the diode bridge network and the load to the other side. The four diodes
labelled D1 to D4 are arranged in “series pairs” with only two diodes conducting current during each half
cycle. During the positive half cycle of the supply, diodes D1 and D2 conduct in series while
diodes D3 and D4 are reverse biased and the current flows through the load. During the negative half cycle
of the supply, diodes D3 and D4 conduct in series, but diodes D1 and D2switch “OFF” as they are now
reverse biased. The Smoothing Capacitor of the single phase half-wave rectifier produces an output wave
every half cycle and that it was not practical to use this type of circuit to produce a steady DC supply. The
full-wave bridge rectifier however, gives us a greater mean DC value (0.637 Vmax) with less superimposed
ripple while the output waveform is twice that of the frequency of the input supply frequency. We can
therefore increase its average DC output level even higher by connecting a suitable smoothing capacitor
across the output of the bridge circuit. The smoothing capacitor converts the full-wave rippled output of the
rectifier into a smooth DC output voltage. Generally for DC power supply circuits the smoothing capacitor is
an Aluminum Electrolytic type that has a capacitance value of 100uF or more with repeated DC voltage
pulses from the rectifier charging up the capacitor to peak voltage. Too low a capacitance value and the
capacitor has little effect on the output waveform. But if the smoothing capacitor is sufficiently large enough

JIT.ECE Page 34
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

(parallel capacitors can be used) and the load current is not too large, the output voltage will be almost as
smooth as pure DC. As a general rule of thumb, we are looking to have a ripple voltage of less than 100mV
peak to peak. Bridge Rectifier Ripple Voltage can be calculated
V ripple=current load (I)/ f*C

Where: I is the DC load current in amps, ƒ is the frequency of the ripple or twice the input
frequency in Hertz, and C is the capacitance in Farads.

Vs=220v Fs=50 Hz Ripple voltage=7 Fr=2*f source=100h z

VO=1.44*Vs=311.8
Ripple factor=Ripple/Vo*100=7/311.08*100=3%

From the data sheet 0f capacitor for 3% 0f ripple factor capacitor value is 0.01f

Where: I is the DC load current in amps, ƒ is the frequency of the ripple or twice the input
frequency in Hertz, and C is the capacitance in Farads.

The main advantages of a full-wave bridge rectifier is that it has a smaller AC ripple value for
a given load and a smaller reservoir or smoothing capacitor than an equivalent half-wave rectifier.
Therefore, the fundamental frequency of the ripple voltage is twice that of the AC supply frequency
(100Hz) where for the half-wave rectifier it is exactly equal to the supply frequency (50Hz). The
amount of ripple voltage that is superimposed on top of the DC supply voltage by the diodes can be
virtually eliminated by adding cheaper alternative is to use an off the shelf 3-terminal voltage
regulator IC, here we have used as a LM7805 (where “05” stands for the output voltage rating) for a
positive output voltage or its inverse equivalent the LM7905 for a negative output voltage which
can reduce the ripple by more than 70dB (Datasheet) while delivering a constant output current of
over 1 amp. The same is true for the second current transformer. Therefore ARDUINO UNO R3
will read the two analog signals then will compare and if there is a difference in reading of the two
microcontroller putting the two values of the current transformer and if and only if the electricity
theft cannot occur if both current transformers are equal unless otherwise reading difference in both
current transformers electricity theft is happened as a result the ARDUINO UNO R3 will tell by
send short message to power supplier electricity theft is happened using GSM modem consequently
ARDUINO UNO R3 will disconnect the load using relay. Red LED will glow when electricity theft
is happening.

JIT.ECE Page 35
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

CHAPTER FIVE

5. Conclusion and Recommendations


5.1 Conclusion
Electrical power theft detection and control system is used to detect the consumer when
they try to use the power illegally. This GSM based system is much useful to detect the stealing of
the electricity worldwide. To control the revenue losses the authorized officials needs to detect the
theft of the electricity it means the theft of the bypassing tampering is the most effective one over
the whole world comparing to the disconnecting the neutral line or magnetic tampering used to steal
the electricity i.e. the unauthorized consumption of the electricity. This system ensures the accurate
billing of the electricity consumed hence to provide the best way to prevent from the electricity
theft. This GSM based system is provides much better results at short haul as well as long haul.

Electricity theft, a common form of commercial losses, involves tampering with meters to
distort the billing information of the power system. Commercial losses are nearly impossible to
measure using traditional power system analysis tools. This is due to the lack of information on
both commercial and the legitimate loads in the system, which translates to insufficient inputs for
any meaningful loss calculations. By this design it can be concluded that power theft can be
effectively curbed by detecting where the power theft occurs and informing the authority. Also an
automatic relay is integrated to the unit so as to remotely cut off the power to the house or customer
when someone try to indulge in power theft. The ability of the proposed system to inform or send
data digitally to a remote station using GSM adds a large amount of possibility to the way the
power supply is controlled by the electricity board.

JIT.ECE Page 36
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

5.2 Recommendations
Errors in accounting and record keeping that distort technical information though the
project was completed fairy and successfully there are still some that need to take place in order for
it to achieve its goal completely. It is better if the pick hour penalizing system is add to this GSM
power meter reader for minimizing the power usage at pick hour. It is better to deploy the GSM
power meter reader with GPS system that have virtually full coverage of all housing and building
areas across the country. We recommend to someone who want to do on this GSM based power
theft monitoring system by using GPS to the whole distribution system area to localize which
region, zone and specific area that power theft is occurred. Additionally, we have design GSM
based power theft monitoring on the popular tampering ways but we recommend to someone to
design better and wonderful system including all the power theft mechanisms such as direct taping
we have not included in this project.

JIT.ECE Page 37
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

References
[1] Terry Chandler,” The Technology Department of Automated Metering and Monitoring System”,
the 7th International Power Engineering Conference, pp.147-150, Nov.2005
[2] M.A.O liveira and C.C. Barioni, “Technical loss calculation by distribution system segment
with corrections from measurements”, Proc.20th international Conference and Exhibition on
Electricity Distribution, Prague, Czech Republic, June 2009,
[3] H.G.Rodney, Tan IEEE, C.H.Lee and V.H.Mok, 2007. Automatic Power Meter Reading System
using GSM Network. The 8th International Power Engineering Conference, PP: 465-469
[4] T.Chandler, The Technology Development of automatic metering and monitoring systems,
IEEE International Power Engineering Conference, Dec 2005
[6] C. J. Bandim, E. R. Alves ., A. V. Pinto, F. C. Souza, M. R. B. Loureiro, C. A. Magalhges and
F. Galvez-Durand, “Identification of Energy Theft and Tampered Meters Using a Central Observer
Meter: A Mathematical Approach”, Transmission and distribution conference and exposition, 2003
IEEE PES, vol. 1, pp. 163-168,2003.
[7] T. B. Smith, “Electricity Theft: a ComparativeAnalysis”, Energy Policy, Volume 32, Issue 18,
December 2008; 2003,
[8] http://www.arduino.cc

Source code

Magnetic tampering code

#include <LiquidCrystal.h>

#include<SoftwareSerial.h>

SoftwareSerial mySerial(9,10);

JIT.ECE Page 38
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

// initialize the library with the numbers of the interface


pins

LiquidCrystal lcd(12, 11, 5, 4, 3, 2);

int ldrPin=A2;

int const relaypin=6;

int const ledpin=7;

float v;

void setup() {

// put your setup code here, to run once:

Serial.begin(9600);

mySerial.begin(9600);

pinMode(A2,INPUT);

pinMode(6,OUTPUT);

JIT.ECE Page 39
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

//pinMode(10,OUTPUT);

pinMode(7,OUTPUT);

lcd.begin(16,2);

void loop() {

// put your main code here, to run repeatedly:

v=analogRead(A2);

v=map(analogRead(A2),0,1023,0,1);

lcd.setCursor(3,0);

lcd.print("LDR:");

lcd.print(v);

JIT.ECE Page 40
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

if(v==0){

lcd.setCursor(2,1);

lcd.print(" power theft");

digitalWrite(6,LOW);

delay(100);

digitalWrite(7,LOW);

delay(100);

mySerial.println(" HELO MANAGER OF EELPA");

delay(2000);

mySerial.println("POWER THEFT IS
HAPPENNED!!");

delay(2000);

JIT.ECE Page 41
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

else if (v==1 ) {

{lcd.setCursor(2,1);

lcd.print(" NO power theft");

digitalWrite(6,HIGH);

delay(100);

digitalWrite(7,HIGH);

delay(100);

JIT.ECE Page 42
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

Tampering code

#include <LiquidCrystal.h>

#include<SoftwareSerial.h>

SoftwareSerial mySerial(9,10);

// initialize the library with the numbers of the interface


pins

LiquidCrystal lcd(12, 11, 5, 4, 3, 2);

int voltagePin=A0;

int currentPin=A1;

int const relaypin=6;

int const ledpin=7;

float CT1,CT2;

JIT.ECE Page 43
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

void setup()

Serial.begin(9600);

mySerial.begin(9600);

pinMode(6,OUTPUT);

//pinMode(10,OUTPUT);

pinMode(7,OUTPUT);

pinMode(A0,INPUT);

pinMode(A1,INPUT);

lcd.begin(16,2);

void loop()

{ CT1=analogRead(A0);

JIT.ECE Page 44
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

CT1=map(analogRead(A0),0,1023,0,5);

lcd.setCursor(0,0);

lcd.print("CT1:");

lcd.print(CT1);

CT2=analogRead(A1);

CT2=map(analogRead(A1),0,1023,0,5);

lcd.setCursor(9,0);

lcd.print("CT2:");

lcd.print(CT2);

if(CT1==CT2){

lcd.setCursor(2,1);

lcd.print("no power theft");

digitalWrite(6,HIGH);

delay(100);

JIT.ECE Page 45
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

digitalWrite(7,LOW);

delay(100);

else if(CT1>=CT2)

{lcd.setCursor(2,1);

lcd.print("power theft");

digitalWrite(6,LOW);

delay(100);

digitalWrite(7,HIGH);

delay(100);

mySerial.println("HELO MANAGER OF EEPCO");

delay(2000);

mySerial.println("POWER THEFT IS
HAPPENNED!!");

JIT.ECE Page 46
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

delay(2000);

else if(CT1<=CT2)

{lcd.setCursor(2,1);

lcd.print("power theft");

digitalWrite(6,LOW);

delay(100);

digitalWrite(7,HIGH);

delay(100);

mySerial.println("HELO MANAGER OF EEPCO");

delay(2000);

mySerial.println("POWER THEFT IS
HAPPENNED!!");

delay(2000);

JIT.ECE Page 47
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC

JIT.ECE Page 48

You might also like