15
A Technical Idea on MICROCONTROLLER BASED POWER THEFT IDENTIFICTION By, TABISH AFTAB B.TECH (E.C.) U.P.T,U LUCKNOW 1

MicroController based Power Theft Identification

Embed Size (px)

DESCRIPTION

This is an Idea about how electricity theft can be Identified and thus can be minimized using technical metods i.e. with the use of Microcontroller...

Citation preview

  • A Technical Idea on MICROCONTROLLER BASED POWER THEFT IDENTIFICTIONBy, TABISH AFTAB B.TECH (E.C.) U.P.T,U LUCKNOW*

  • WHY THIS IDEA ARISES?Now-a-days, theft of power becomes very easy and day-by-day this is becoming a major problem for Government Power Corporations.

    COMMON MODES OF POWER THEFT-

    Bogus seals and tampering of seals.

    Meter tampering, meter tilting, meter interface and meter bypassing.

    Changing connection.

    Direct tapping from line.*

  • VARIOUS METHODS OF DETECTING POWER THEFT IDENTIFICATION

    Tamper proof seals and labels.

    Meter leaders.

    Tamper resistant screws / locks.

    Check meter and remote meter readers.

    Tamper alarms and sensors.*

  • What Is Micro Controller?

    Amicrocontroller is a singleintegrated circuitcontaining a processor, memory, and programmableinput/outputperipherals.

    Microcontrollers are generally design for embedded applications(embedded system means to install a program into the microcontroller).

    The main application of Microcontrollers is that, they are used to automatically control the products and devices.*

  • HOW MICROCONTROLLER IS USED AS POWER THEFT IDENTIFIER ?

    Firstly, The disc revolutions of consumers energy meter are converted into pulses by the microcontroller.

    These pulses are frequency division multiplexed and transmitted through power line by the microcontroller.

    These signals are individually picked and counted at the receiver end by the microcontroller.

    If the difference of the sum of the consumers readings and that of distribution transformer exceeds the preset value, which is set by considering transmission loss, the power theft is said to occur.*

  • PROCESS The Method Of Power Theft Identification By The Use Of Microcontroller Is Divided Into Four Sections-

    Transmitting Section

    Receiving Section

    Processing Section

    Counter Section *

  • 1. TRANSMITTING SECTION:The first and foremost requirements for a transmitter section are the -The sensing unitPhase locked loopCMOS analog switchBufferIntermediate Frequency Transformer

    Block Diagram Of Transmitting Section*

  • 2. RECEIVING SECTION:The basic components in the receiving section are :-Intermediate Frequency TransformerClipperPhase locked loop

    Block Diagram Of Receiving Section*

  • 3. COUNTER CUM DISPLAY SECTION:It counts the no. of pulses at the receiver end.It converts the no. of pulses into units.Then, it displays the no. of units with the help of 7-segment L.E.D. display which is connected with the counter part.

    Block diagram of counter cum display section*

  • 4. PROCESSING SECTION:This section first stores the total units distributed and the total units consumed whose information is received in form of pulses.It compares the two values.If the two values are not equal than, it means loss or theft of power is occurring, Which is indicated by the alarm.*

  • About the microcontroller used for Power theft identification-

    The microcontroller used is IC 89c51.IC 89c51 is 8-bit 40 pin microcontroller.It includes EPROM of 4 kilobytes.The data memory space is read-write memory space.It has I/O ports to carry 8 bit information to and fro, simultaneously.

    *

  • About IC 89c51

    PORT 1 & 3 (1-8,10-17)- A 8-Bit Bi-Directional I/O port with internal Pull-Ups. It receives lower order address bytes during Flash Programming.

    PORT O (22-29)- A 8-Bit Bi-Directional I/O port. It is configured to be the multiplexedlow order Address or Data Bus during accesses to external program and data memory.

    PORT 2 (33-40)- It performs the same function as the port 1 in addition it receives some control signals during flash programming.*

  • MERITS:

    Due to the availability of digital energy meter, this implementation can be easily performed for power theft identification.Highly accurate, low loss and economical one.Its maintenance is easy.Our implementation may gives a big hand to vigilance squad to control theft quickly and easily.Using this same logic, instead of micro controller we can adapt computer for more number of uses.In day-to-day conventional methods, its possible to identify the theft but the extent of theft cannot be identified but its possible with our Check meter and remote meter readers.Compact size, Reliability, lightweight for quick operation and high accuracy makes the system more effective.*

  • Conclusion-

    Initially, It is designed for industrial purposes, but now it is extended for domestic purposes also.It gives a big hand to vigilance squad to control power theft quickly and easily.With its more usage, the crime of stealing power may be brought to an end and thereby it gives a new bloom in the economy of our Motherland.*

  • Thank youHave a Good Day*