Seminar Presentation Electrical Power Theft Detection: Akhlesh Kumar Jindal 13085008 B.Tech. (Part-4)
Seminar Presentation Electrical Power Theft Detection: Akhlesh Kumar Jindal 13085008 B.Tech. (Part-4)
Seminar Presentation Electrical Power Theft Detection: Akhlesh Kumar Jindal 13085008 B.Tech. (Part-4)
Introduction
Electricity theft is at the centre of focus all over the world but electricity theft in
India has a significant effect on the Indian economy, as this figure is considerably
high.
It is the use of electrical power without a contract with a supplier with total or
partial bypassing metering system.
According to study conducted in 2015 by the Northeast Group, LLC, the world loses
US$89.3 billion annually to electricity theft. The highest losses were in India ($16.2
billion), followed by Brazil ($10.5 billion) and Russia ($5.1 billion).
L1, L2
Single phase loads
M1, M2 Digital energy meters
P Pole based system (installed on a
distribution pole)
Algorithm
Digital energy meter (M1) will measure a consumed power by load (L1) over a
period. It will send a data in proportion with consumed power to receiver with the
help of wireless digital data transmitter. Receiver on the pole system will receive a
data sent by transmitter in a load side meter. Receiver will send it to
microcontroller.
Also energy meter on pole will measure power sent over line1 and provide
appropriate data to microcontroller. Now microcontroller has two readings one is
power calculated on pole itself and another is power consumed by load (L1).
Suppose there is tapping done by any unauthorized person on the line to connect
his appliance as shown in previous figure . Over a certain period there will be
difference between meter reading (M1) and pole based reading.
Continued
Microcontroller will compare these two values and if the measured value on pole is more
than value send by meter (M1) by some tolerance then power theft is happening on line1.
This theft signal generated on pole system can be transmitted to substation by power line
communication technique or by wireless technique whichever is suitable an economical.
Tolerance should be provided for losses of line. Because over a long period there will be
difference in reading of meter on load side and pole side due to loss of line between pole and
load.
In this technique the radio communication principles are employed and also the
technology of Microcontrollers is utilized to find out the user trying for pilferage
of power i.e., by displaying the respective consumer meter number and address.
For the complete operation, the system can be sub-divided into two major
sections, one is the transmitting section and the other is the receiving section.
The transmitting section has to be incorporated at the consumers end and the
receiver section has to be placed at the electrical sub-station.
Block Diagram
ADVANTAGES:
The system consumes very little power for its operation.
System operation is independent of time (24 hours functioning).
Automatic user identification.
LIMITATIONS:
Wide range of frequencies is required to facilitate large number of users. To overcome
this, carrier levels can be changed from region to region.
APPLICATIONS:
The system can be incorporated for almost all types of users.
The concept is well suited especially for villages and interior areas.
Conclusions
References
1. M.A.O liveira and C.C. Barioni, Technical loss calculation by distribution system
segment with corrections
from measurements, Proc.20th international Conference and Exhibition on
Electricity Distribution, Prague, Czech Republic, June 2009, pp. 14.
2. C.L.Wadhwa, Electrical Power Systems, 4 th ed, New Age International
Publishers, 2005.
3. C. J. Bandim, E. R. Alves ., A. V. Pinto, F. C. Souza, M. R. B. Loureiro, C. A.
Magalhges and F. Galvez-Durand, Identification of Energy Theft and Tampered
Meters Using a Central Observer Meter: A Mathematical Approach, Transmission
and distribution conference and exposition, 2003 IEEE PES, vol. 1, pp. 163168,2003.
Thank You!