Document 14671579

advertisement
International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014
ISSN 2278-7763
193
ANTI ELECTRICAL THEFTING AND TROUBLE SHOOTING
THROUGH MOBILE
1. ABSTRACT
The proposed project work aims on the design and development of electrical energy theft
prevention aspect. This project envisages the development of electrical theft identification.
Aiming at the disadvantage of current anti-theft technology, a PLC based anti electrical theft
monitoring system is proposed in this paper.
This design incorporates effective solutions for problems faced by India’s electricity distribution
system such as power theft, and transmission line fault.
The problem of illegal usage of electricity must be solved electronically, without any human
control. PLC will play an important role in placing anti-theft power system. Power theft is
prevented by installing HD-PLC-mounted power meters on a high position on power poles,
while the amount of power used in each household can still be checked.
IJOART
Antitheft security system utilizes an embedded system design with Dual Tone Multi Frequency
(DTMF). By simply dialing the phone number of the mobile phone attached to the circuit and
sending a code after the phone has automatically been answered, puts the system to either “active
or inactive” state, and on any attempt of theft the system sends a text message to the user.
KEYWORD: 1.MONITORING SYSTEM 2. ANALOG PLC 3. SCADA
4. DTMF 5. KEYPAD
1.1 ADVANTAGES AND LIMITATIONS:
The advantages are:
• The proposed system provides the solution for some of the main problems faced by the existing
Indian grid system, such as wastage of energy, power theft, manual billing system, and
transmission line fault.
• This method will reduce the energy wastage and save a lot of energy for future use.
• We can detect the location from where the power is being stolen which was not possible before.
• Optimized use of energy.
• Real time theft monitoring.
The limitations are:
• One major disadvantage of this project is that it is not capable of detecting the exact location
from where the power is being stolen.
• Cannot determine who is stealing, but no any other existing system is capable.
• If implemented on a large scale it may take a lot of time and manual input.
Copyright © 2014 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014
ISSN 2278-7763
194
1.2 RECENT TRENDS AND DEVELOPMENTS:
The National Electricity Policy aims at laying guidelines for accelerated development of the
power sector, providing supply of electricity to all areas and protecting interests of consumers
and other stakeholders keeping in view availability of energy resources, technology available to
exploit these resources, economics of generation using different resources, and energy security
issues.
The National Electricity Policy aims at achieving the following objectives:
 Access to Electricity – Available for all households in next five years.
 Availability of Power – Demand to be fully met by 2012. Energy and peaking shortages to be
overcome and adequate spinning reserve to be available.
IJOART
 Supply of Reliable and
reasonable rates.
Quality Power of specified standards in an efficient manner and at
 Per capita availability of electricity to be increased to over 1000 units by 2012.
 Minimum lifeline consumption of1 unit/household/day as a merit good by year 2012.
 Financial Turnaround and Commercial Viability of Electricity Sector.
 Protection of consumers‟ interests “.
2. INTRODUCTION:
Many developing countries confront widespread theft of electricity from government owned
power utilities. In India electricity theft leads to annual losses estimated at US$4.5 billion, about
1.5 percent of GDP. Who are the losers? Honest consumers, poor people, and those without
connections, who bear the burden of high tariffs, system inefficiencies, and inadequate and
unreliable power supply.
The government has set a specific goal to raise the distribution rate of electrical power supply,
which is now around 70% to 80% to 100%. Power companies are plagued by power theft.
The theft of the electricity is the major concern of the transmission and distribution losses in the
supply of the electricity worldwide. Electrical power by altering, slowing, resetting, swapping,
or disconnecting an electric meter. Theft also may occur by rewiring circuits to avoid an electric
meter, or by tapping into another customer’s electrical lines. The fraudster might use devices to
Copyright © 2014 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014
ISSN 2278-7763
195
program the theft of power only during certain periods of the day or week. A fraudster may
rewire their property to illegally use power from cheaper sources of power, or from meters that
are billed at lower rates. Mainly the electricity is being stolen via bypassing the energy meter
therefore this wireless system is utilizes to overcome this type of the theft of the electricity and is
very beneficial for the authorized agency to control its revenue loss as all of us know that the
cost of fuel is increasing day by day hence the intensity of stealing the electricity and using it as
a substitute is also increasing therefore it is needed much to design a system that can detect the
theft of the electricity.
Line faults may be caused due to over current or earth fault. If there happens to be a connection
between two phase lines then over current fault occurs. Earth fault occurs due to the earthing of
phase line through cross arm or any other way. Now in India, there is not any technique to detect
the specific location of the fault immediately. Power theft is another major problem faced by
Indian electrical system.
2.1 BLOCK DIAGRAM:
IJOART
Copyright © 2014 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014
ISSN 2278-7763
196
2.2 HARDWARE REQUIREMENTS:
1. Contactor…………………………………………………………………….3
2. Current Transformer………………………………………………………....2
3. Current Transducer…………………………………………………………..2
4. Micrologix 1000 Analog……………………………………………………..1
5. Numeric keypad ……………………………………………………………..1
6. DTMF IC……………………………………………………………………..1
7. Bread Board…………………………………………………………………..1
8. 0-order PCB…………………………………………………………………..1
9. Crystal oscillator……………………………………………………………...1
10. 3.5 Audio Jack……………………………………………………………….1
11. Thimble …………………………………………………………………..100
12. Phay Rool…………………………………………………………………...70
13. Multimeter ……………………………………………………………………1
IJOART
Copyright © 2014 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014
ISSN 2278-7763
197
IJOART
Fig 2.2 (a),(b),(c) project working model
Copyright © 2014 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014
ISSN 2278-7763
198
3. PLC (Programmable Logic Controller):
PLC monitors inputs and other variable values, make decision based on stored program and
control outputs to automate process. The basic elements of PLC are input module, central
processing unit, output module and programming device. This paper includes discrete type of
input module .The primary function of a PLC‟s input circuitry is to convert the signal provided
by switches and sensors into logic signal that can be used by the CPU. Output modules convert
control signal from CPU to values that can be used to control output devices.
Programming
device is
used
to enter
and
change PLC program
and electronic communication lines replace much of the interconnecting wires required by the
hard wired control.
3.1 SCADA Unit:
SCADA system offers the online support for the management of the process events and triggers
the signals according to the status change and elaborates the time controlled procedures. SCADA
is compose of collecting the information from central site, carrying out any necessary analysis
and control and display the information on operators screen. The automation is enhanced by
constant monitoring using SCADA screen which
is connected to the PLC by means of
communication cable. By setting tag values to various variables in SCADA entire process is
controlled as per the requirement.
IJOART
3.2 DTMF:
Dual-Tone Multi-Frequency (DTMF) is perhaps the most widely known method of Multi
Frequency Shift Keying (MSFK) data transmission technique. DTMF was developed by Bell
Labs to be used in the telephone system. Most telephones today uses DTMF dialing (or “tone”
dialing). The DTMF standards define the overlaying of two pure sinusoidal waves by additive
combination. The DTMF technique outputs distinct representation of 16 common alphanumeric
characters (0-9, A-D, *, #) on the telephone. The lowest frequency used is 697Hz and the highest
frequency used is 1633Hz, DTMF dialing uses a keypad with 12/16 buttons.Each key pressed on
the phone generates two tones of specific frequencies, so a voice or a random signal cannot
imitate the tones. One tone is generated from a high frequency group of tones and the other from
low frequency group.
Copyright © 2014 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014
ISSN 2278-7763
199
4. CONCLUSION:
This paper is aimed at reducing the heavy power and revenue losses that occur due to power theft
by the customers. By this design it can be concluded that power theft can be effectively curbed
by detecting where the power theft occurs and informing the authorities. Also an automatic
circuit breaker may be integrated to the unit so as to remotely cut off the power supply to the
house or consumer who tries to indulge in power theft. The ability of the proposed system to
inform or send data digitally to a remote station using wireless radio link adds a large amount of
possibilities to the way the power supply is controlled by the electricity board. The system design
mainly concentrates on single phase electric distribution system, especially. The proposed
system provides the solution for some of the main problems faced by the existing Indian grid
system, such as wastage of energy, power theft, and transmission line fault.
IJOART
1. By using this system we can identify which particular home address is being theft and we can
control power on theft node at a distance(Remote Location).
2. By using this system the user is also allowed to control the power at the thefting node by
putting a password to PLC or through mobile using DTMF technology.
3. Here using SCADA on this system we can generate some report alarm regarding the failure of
your test equipment whatever u installed in that system.
4. By using some historian on SCADA,we can easily known which particular node is more
affected from theft and how much type it is being theft.
5. By using this system we are controlling the theft on a node without interrupting supply to your
user.
Copyright © 2014 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014
ISSN 2278-7763
200
BIBLIOGRAPHY:
[1]. Muhammad Ali Mazidi and Janice Gillispie Mazadi (www.asadali.tk)” the 8051
microcontroller and embedded systems”.
[2]A. R. Devidas, M. V. Ramesh, “Wireless Smart Grid Design for Monitoring and Optimizing
Electric Transmission in India,” IEEE 2010 Fourth International .Conference on Sensor
Technologies and Applications .
[3] “Electrical Power Supply System for India,” www.wikipedia.org, February 2010 .
[4] “National Electricity Policy,” The Gazette of India, EXTRAORDINARY PART I - Section
1, Ministry of Power, New Delhi, Dated the 12th, February, 2005, RESOLUTION No.
23/40/2004-R&R (Vol.II) .
[5] “Electricity Crisis in India,” www.ElectriciyInIndia.com .
IJOART
[6]Louis J. Romeo, “Electronic Theft Detection Systems: A Survey”, Library & Archival
Security, Volume 3, Issue 3 & 4 January 1982 , pages 1 – 22.
Copyright © 2014 SciResPub.
IJOART
Download