presentation on POWER THEFT IDENTIFICATION SYSTEM
-
Upload
gaurav-shukla -
Category
Engineering
-
view
298 -
download
6
Transcript of presentation on POWER THEFT IDENTIFICATION SYSTEM
![Page 1: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/1.jpg)
NRI INSTITUTE OF INFORMATION SCIENCE & TECHNOLOGY
DEPARTMENT OF ELECTRICAL & ELECTRONICS ENGINEERING
SEMINAR PRESENTATION ON- “POWER THEFT IDENTIFICATION SYSTEM”
![Page 2: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/2.jpg)
CONTENTS>Introduction-Power theft Definition-How it occurs>Different ways of monitoring power theft >Microcontroller Based power theft monitoring-proposed architecture>Block diagram>Advantages>Disadvantages>Conclusion
![Page 3: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/3.jpg)
INTRODUCTION (POWER THEFT)>it is the use of electrical power without a contract with a supplier with total or partial bypassing of the metering system or interfering with this system in such a way so as to adulterate its measurements,>contract is understood here as a valid oblingation to deliver power and to pay for it.
![Page 4: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/4.jpg)
HOW IT OCCURS ????? 1-(SLOWING DOWN THE METER)>A common method of tempering older meters is to attach magnets to the outside of the meter.>when this happens, the rotor disc is exposed to a high magnetic field. Hence the resultant isopposing magnetic field to the rotor highly increased leading to slowing down of rotor or perfect stopping of the disc rotation.>The electricity meter is thus manipulated and ultimately power is consumed without being paid. Ex-Neodymium magnets
![Page 5: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/5.jpg)
2-(INVERTING THE METER/FEEDER) Another common form of electricity
theft is to invert the meter (pull the meter out of the socket & plug the meter back in upside down, which causes the meter to run backwards & the kWh register to count down instead of up).
![Page 6: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/6.jpg)
![Page 7: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/7.jpg)
![Page 8: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/8.jpg)
MICRO-CONTROLLER BASED POWER THEFT MONITORING OVERVIEW-
The whole system architecture is based on integrating wireless network with existing electrical grid.
The proposed module also incorporates different data aggregation algorithms & effective solutions needed for the different pathways of the electricity distribution system.
![Page 9: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/9.jpg)
![Page 10: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/10.jpg)
![Page 11: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/11.jpg)
![Page 12: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/12.jpg)
![Page 13: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/13.jpg)
![Page 14: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/14.jpg)
![Page 15: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/15.jpg)
PLC (PROGRAMMABLE LOGIC CONTROLLER)
It is a digital computer used for automation of elecctromechanical process.
The PLC’s are designed for multiple input and multiple output.
Program to control machine operation are typically stored in non-volatile memory.
It is an example of a hard real time system since output results must be produced in response to input conditions within bounded time.
![Page 16: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/16.jpg)
PROGRAMMING OF PLC Early PLC’s were programmed by using specific
purpose programming terminals.
The programs were stored in cassette tape cartridges.
Facilities of printing and documentation were very minimal due to lack of memory.
The very old PLC used is non-volatile magnetic core memory.
Modern PLC’s used are EEPROM or EPROM as a memory.
![Page 17: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/17.jpg)
PROGRAMMING OF PLC
![Page 18: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/18.jpg)
MODERN PLC’S.
![Page 19: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/19.jpg)
![Page 20: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/20.jpg)
![Page 21: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/21.jpg)
![Page 22: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/22.jpg)
![Page 23: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/23.jpg)
![Page 24: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/24.jpg)
![Page 25: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/25.jpg)
![Page 26: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/26.jpg)
![Page 27: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/27.jpg)
THANK YOU!
![Page 28: presentation on POWER THEFT IDENTIFICATION SYSTEM](https://reader034.fdocuments.net/reader034/viewer/2022050914/5884dbcb1a28ab4b778b5131/html5/thumbnails/28.jpg)
ANY DOUBT…