International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014 ISSN 2278-7763 193 ANTI ELECTRICAL THEFTING AND TROUBLE SHOOTING THROUGH MOBILE 1. ABSTRACT The proposed project work aims on the design and development of electrical energy theft prevention aspect. This project envisages the development of electrical theft identification. Aiming at the disadvantage of current anti-theft technology, a PLC based anti electrical theft monitoring system is proposed in this paper. This design incorporates effective solutions for problems faced by India’s electricity distribution system such as power theft, and transmission line fault. The problem of illegal usage of electricity must be solved electronically, without any human control. PLC will play an important role in placing anti-theft power system. Power theft is prevented by installing HD-PLC-mounted power meters on a high position on power poles, while the amount of power used in each household can still be checked. IJOART Antitheft security system utilizes an embedded system design with Dual Tone Multi Frequency (DTMF). By simply dialing the phone number of the mobile phone attached to the circuit and sending a code after the phone has automatically been answered, puts the system to either “active or inactive” state, and on any attempt of theft the system sends a text message to the user. KEYWORD: 1.MONITORING SYSTEM 2. ANALOG PLC 3. SCADA 4. DTMF 5. KEYPAD 1.1 ADVANTAGES AND LIMITATIONS: The advantages are: • The proposed system provides the solution for some of the main problems faced by the existing Indian grid system, such as wastage of energy, power theft, manual billing system, and transmission line fault. • This method will reduce the energy wastage and save a lot of energy for future use. • We can detect the location from where the power is being stolen which was not possible before. • Optimized use of energy. • Real time theft monitoring. The limitations are: • One major disadvantage of this project is that it is not capable of detecting the exact location from where the power is being stolen. • Cannot determine who is stealing, but no any other existing system is capable. • If implemented on a large scale it may take a lot of time and manual input. Copyright © 2014 SciResPub. IJOART International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014 ISSN 2278-7763 194 1.2 RECENT TRENDS AND DEVELOPMENTS: The National Electricity Policy aims at laying guidelines for accelerated development of the power sector, providing supply of electricity to all areas and protecting interests of consumers and other stakeholders keeping in view availability of energy resources, technology available to exploit these resources, economics of generation using different resources, and energy security issues. The National Electricity Policy aims at achieving the following objectives: Access to Electricity – Available for all households in next five years. Availability of Power – Demand to be fully met by 2012. Energy and peaking shortages to be overcome and adequate spinning reserve to be available. IJOART Supply of Reliable and reasonable rates. Quality Power of specified standards in an efficient manner and at Per capita availability of electricity to be increased to over 1000 units by 2012. Minimum lifeline consumption of1 unit/household/day as a merit good by year 2012. Financial Turnaround and Commercial Viability of Electricity Sector. Protection of consumers‟ interests “. 2. INTRODUCTION: Many developing countries confront widespread theft of electricity from government owned power utilities. In India electricity theft leads to annual losses estimated at US$4.5 billion, about 1.5 percent of GDP. Who are the losers? Honest consumers, poor people, and those without connections, who bear the burden of high tariffs, system inefficiencies, and inadequate and unreliable power supply. The government has set a specific goal to raise the distribution rate of electrical power supply, which is now around 70% to 80% to 100%. Power companies are plagued by power theft. The theft of the electricity is the major concern of the transmission and distribution losses in the supply of the electricity worldwide. Electrical power by altering, slowing, resetting, swapping, or disconnecting an electric meter. Theft also may occur by rewiring circuits to avoid an electric meter, or by tapping into another customer’s electrical lines. The fraudster might use devices to Copyright © 2014 SciResPub. IJOART International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014 ISSN 2278-7763 195 program the theft of power only during certain periods of the day or week. A fraudster may rewire their property to illegally use power from cheaper sources of power, or from meters that are billed at lower rates. Mainly the electricity is being stolen via bypassing the energy meter therefore this wireless system is utilizes to overcome this type of the theft of the electricity and is very beneficial for the authorized agency to control its revenue loss as all of us know that the cost of fuel is increasing day by day hence the intensity of stealing the electricity and using it as a substitute is also increasing therefore it is needed much to design a system that can detect the theft of the electricity. Line faults may be caused due to over current or earth fault. If there happens to be a connection between two phase lines then over current fault occurs. Earth fault occurs due to the earthing of phase line through cross arm or any other way. Now in India, there is not any technique to detect the specific location of the fault immediately. Power theft is another major problem faced by Indian electrical system. 2.1 BLOCK DIAGRAM: IJOART Copyright © 2014 SciResPub. IJOART International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014 ISSN 2278-7763 196 2.2 HARDWARE REQUIREMENTS: 1. Contactor…………………………………………………………………….3 2. Current Transformer………………………………………………………....2 3. Current Transducer…………………………………………………………..2 4. Micrologix 1000 Analog……………………………………………………..1 5. Numeric keypad ……………………………………………………………..1 6. DTMF IC……………………………………………………………………..1 7. Bread Board…………………………………………………………………..1 8. 0-order PCB…………………………………………………………………..1 9. Crystal oscillator……………………………………………………………...1 10. 3.5 Audio Jack……………………………………………………………….1 11. Thimble …………………………………………………………………..100 12. Phay Rool…………………………………………………………………...70 13. Multimeter ……………………………………………………………………1 IJOART Copyright © 2014 SciResPub. IJOART International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014 ISSN 2278-7763 197 IJOART Fig 2.2 (a),(b),(c) project working model Copyright © 2014 SciResPub. IJOART International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014 ISSN 2278-7763 198 3. PLC (Programmable Logic Controller): PLC monitors inputs and other variable values, make decision based on stored program and control outputs to automate process. The basic elements of PLC are input module, central processing unit, output module and programming device. This paper includes discrete type of input module .The primary function of a PLC‟s input circuitry is to convert the signal provided by switches and sensors into logic signal that can be used by the CPU. Output modules convert control signal from CPU to values that can be used to control output devices. Programming device is used to enter and change PLC program and electronic communication lines replace much of the interconnecting wires required by the hard wired control. 3.1 SCADA Unit: SCADA system offers the online support for the management of the process events and triggers the signals according to the status change and elaborates the time controlled procedures. SCADA is compose of collecting the information from central site, carrying out any necessary analysis and control and display the information on operators screen. The automation is enhanced by constant monitoring using SCADA screen which is connected to the PLC by means of communication cable. By setting tag values to various variables in SCADA entire process is controlled as per the requirement. IJOART 3.2 DTMF: Dual-Tone Multi-Frequency (DTMF) is perhaps the most widely known method of Multi Frequency Shift Keying (MSFK) data transmission technique. DTMF was developed by Bell Labs to be used in the telephone system. Most telephones today uses DTMF dialing (or “tone” dialing). The DTMF standards define the overlaying of two pure sinusoidal waves by additive combination. The DTMF technique outputs distinct representation of 16 common alphanumeric characters (0-9, A-D, *, #) on the telephone. The lowest frequency used is 697Hz and the highest frequency used is 1633Hz, DTMF dialing uses a keypad with 12/16 buttons.Each key pressed on the phone generates two tones of specific frequencies, so a voice or a random signal cannot imitate the tones. One tone is generated from a high frequency group of tones and the other from low frequency group. Copyright © 2014 SciResPub. IJOART International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014 ISSN 2278-7763 199 4. CONCLUSION: This paper is aimed at reducing the heavy power and revenue losses that occur due to power theft by the customers. By this design it can be concluded that power theft can be effectively curbed by detecting where the power theft occurs and informing the authorities. Also an automatic circuit breaker may be integrated to the unit so as to remotely cut off the power supply to the house or consumer who tries to indulge in power theft. The ability of the proposed system to inform or send data digitally to a remote station using wireless radio link adds a large amount of possibilities to the way the power supply is controlled by the electricity board. The system design mainly concentrates on single phase electric distribution system, especially. The proposed system provides the solution for some of the main problems faced by the existing Indian grid system, such as wastage of energy, power theft, and transmission line fault. IJOART 1. By using this system we can identify which particular home address is being theft and we can control power on theft node at a distance(Remote Location). 2. By using this system the user is also allowed to control the power at the thefting node by putting a password to PLC or through mobile using DTMF technology. 3. Here using SCADA on this system we can generate some report alarm regarding the failure of your test equipment whatever u installed in that system. 4. By using some historian on SCADA,we can easily known which particular node is more affected from theft and how much type it is being theft. 5. By using this system we are controlling the theft on a node without interrupting supply to your user. Copyright © 2014 SciResPub. IJOART International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014 ISSN 2278-7763 200 BIBLIOGRAPHY: [1]. Muhammad Ali Mazidi and Janice Gillispie Mazadi (www.asadali.tk)” the 8051 microcontroller and embedded systems”. [2]A. R. Devidas, M. V. Ramesh, “Wireless Smart Grid Design for Monitoring and Optimizing Electric Transmission in India,” IEEE 2010 Fourth International .Conference on Sensor Technologies and Applications . [3] “Electrical Power Supply System for India,” www.wikipedia.org, February 2010 . [4] “National Electricity Policy,” The Gazette of India, EXTRAORDINARY PART I - Section 1, Ministry of Power, New Delhi, Dated the 12th, February, 2005, RESOLUTION No. 23/40/2004-R&R (Vol.II) . [5] “Electricity Crisis in India,” www.ElectriciyInIndia.com . IJOART [6]Louis J. Romeo, “Electronic Theft Detection Systems: A Survey”, Library & Archival Security, Volume 3, Issue 3 & 4 January 1982 , pages 1 – 22. Copyright © 2014 SciResPub. IJOART