Professional Documents
Culture Documents
Wireless Power Theft Monitoring
Wireless Power Theft Monitoring
MONITORING
SUBMITTED BY:
RUPALI PATRA
0901106017
7TH SEM,EE
SUBMITTED TO:
MR.RANJAN .K. JENA
MR.ABHIMANYU MOHAPAT
DEPARTMENT OF
ELECTRICAL
ENGINEERING
CONTENTS:
INTRODUCTION
i.POWER THEFT :DEFINITION
ii.HOW IT OCCURS ?
DIFFERENT WAYS OF MONITORING POWER THEFT
MICROCONTROLLER BASED POWER THEFT
MONITORING
i.PROPOSED ARCHITECTURE
BLOCK DIAGRAM DESCRIPTION
WORKING
ADVANTAGES
LIMITATIONS
Contract
HOW IT OCCURS?
1.SLOWING DOWN THE
METER:
A common
method of tampering
older meters is to attach magnets to
the outside of the meter.
When this happens, the rotor disc is
exposed to a high magnetic field.
Hence, the resultant opposing
magnetic field to the rotor is highly
increased leading to slowing down of
rotor or perfect stopping of the disc
rotation.
The electricity meter is thus
manipulated and ultimately power is
consumed without being paid for. exneodymium magnets.
DIFFERENT WAYS OF
MONITORING POWER THEFT:
GSM
monitoring
Power
PLC.
MICRO-CONTROLLER BASED
POWER THEFT MONITORING:
OVERVIEW:
The
THE PROPOSED
ARCHITECTURE:
The Architecture Consists Of Four Modules
Namely:
Controlling
Station (CS)
Transmission
Wireless
ARCHITECTURE
Each
ZIGBEE:
We are using XBee-PRO OEM RF
Module whish uses the zigbee
technology.
It
MICROCONTROLLE
R:
The
Due
LCD:
LCD
As
WORKING OF WIRELESS
SENSOR NETWORK:
The
The
Normally
Large value of dmc indicates a line fault and small value of dmc
indicate a power theft .
ADVANTAGES:
The
LIMITATIONS:
One
CONCLUSION:
This
Also
This
THANK YOU