Power Theft Detection
Power Theft Detection
com/site/surendra204/
Paper presentation on
Abstract:
http://sites.google.com/site/surendra204/
http://sites.google.com/site/surendra204/
1. Introduction
http://sites.google.com/site/surendra204/
http://sites.google.com/site/surendra204/
The following sections will describe the proposed detection and control
system for illegal electricity usage using the power lines.
http://sites.google.com/site/surendra204/
http://sites.google.com/site/surendra204/
In this way, the current does not pass through the current coil of the
meter, so the meter does not record the energy consumption.
http://sites.google.com/site/surendra204/
http://sites.google.com/site/surendra204/
The AMR system starts at the meter. Some means of translating readings
from rotating meter dials, or cyclometer style meter dials, into digital form is
necessary in order to send digital metering data from the customer site to a
central point. In most cases, the meter that is used in an AMR system is the
same ordinary meter used for manual reading but the difference with
conventional energy meter is the addition of some device to generate pulses
relating to the amount of consumption monitored, or generates an electronic,
digital code that translates to the actual reading on the meter dials. One such
technique using optical sensor is shown in Figure 1.
http://sites.google.com/site/surendra204/
http://sites.google.com/site/surendra204/
Power line carrier communications take place over the same lines that
carrier onto the power line and modulating this carrier with data
via power lines without use of extra cables. AMR is a very important
application in these possibilities due to every user connected each other via
power lines. In this power network, every user connected to each other via
modems with data originating from the remote meter or central station.
http://sites.google.com/site/surendra204/
http://sites.google.com/site/surendra204/
Under normal service conditions, they can be broadly divided into open-
loop systems, each with a single opening, and tree systems with radial arranged
lines. In the case of tree systems, connection points for adjacent systems are
provided in order that paths/loads may be switched when necessary for
operation. Additionally, in terms of distribution line types, there are
underground cables and overhead power distribution lines. Where transformers
are concerned, they can be divided into pole-mounted transformers, pad-
mounted transformers and indoor transformers.
http://sites.google.com/site/surendra204/
http://sites.google.com/site/surendra204/
http://sites.google.com/site/surendra204/
http://sites.google.com/site/surendra204/
The recorded data in kilowatt-hour meters for every subscriber are sent to
host PLC modem via PLC modems, which is placed in subscriber’s locations.
On the other hand, energy meter chips are located at the connection points and
read the energy in kilowatt-hours and also send the data to host PLC unit. This
proposed detector system has two recorded energy data in host PLC unit, one,
which comes from the AMR-PLC, and the other, which comes from the PLC
modem at the connection points. These two recorded energy data are compared
in the host PLC; if there is any difference between two readings, an error signal
is generated. This means that there is an illegal usage in the network. After that,
the subscriber address and error signal are combined and sent to the central
control unit. If it is requested, a contactor may be included to the system at
subscriber locations to turn off the energy automatically, as in the case of illegal
usage.
http://sites.google.com/site/surendra204/
http://sites.google.com/site/surendra204/
http://sites.google.com/site/surendra204/
http://sites.google.com/site/surendra204/
3.1 Simulation
http://sites.google.com/site/surendra204/
http://sites.google.com/site/surendra204/
http://sites.google.com/site/surendra204/
http://sites.google.com/site/surendra204/
http://sites.google.com/site/surendra204/
http://sites.google.com/site/surendra204/
metering chips and some circuit elements; the control and logic units
compare and generate the error signal in the illegal usage. The system software
has two parts: assembler program for the micro controller and the operating
software for the management of the overall system. Operating software may be
downloaded from a PC and should be placed in the main center of the system.
http://sites.google.com/site/surendra204/
http://sites.google.com/site/surendra204/
1) Every user has two PLC modems; one is for AMR and the
other is used to send the data from second energy meter
chip to host PLC modem.
4) The host PLC modems and its controller must include two
addresses per every user: one is the AMR and the other
for the energy meter. These two addresses must be
selected sequentially.
http://sites.google.com/site/surendra204/
http://sites.google.com/site/surendra204/
Figure 7: Bit-error probability with frequency and load impedance for 1000-m [2] line [21].
http://sites.google.com/site/surendra204/
http://sites.google.com/site/surendra204/
5. Conclusion
6. Acknowledgements
7. References:
http://sites.google.com/site/surendra204/