0% found this document useful (0 votes)
23 views19 pages

Tech_Seminar[1][1]

The document presents a technical seminar on a Power Theft Detection System, designed by P. Mohan Reddy under the guidance of D. Saroja. It outlines the importance of detecting electricity theft, the system's architecture, components, operational modes, and simulation methods, emphasizing the use of IoT technology for real-time monitoring and alerting. The project aims to enhance efficiency and reduce power loss in electrical networks by utilizing advanced circuit configurations and communication modules.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views19 pages

Tech_Seminar[1][1]

The document presents a technical seminar on a Power Theft Detection System, designed by P. Mohan Reddy under the guidance of D. Saroja. It outlines the importance of detecting electricity theft, the system's architecture, components, operational modes, and simulation methods, emphasizing the use of IoT technology for real-time monitoring and alerting. The project aims to enhance efficiency and reduce power loss in electrical networks by utilizing advanced circuit configurations and communication modules.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 19

A

TECHNICAL SEMINAR
on
POWER THEFT DETECTION SYSTEM

BACHELOR OF TECHNOLOGY
in
ELECTRICAL & ELECTRONICS ENGINEERING
Submitted
by

P. MOHAN REDDY 217Y1A0206

Under the Guidance


of

D. SAROJA
Asst. professor

DEPARTMENT OF ELECTRICAL & ELECTRONICS

ENGINEERING MARRI LAXMAN REDDY

INSTITUTE OF TECHNOLOGY AND MANAGEMENT

(AUTONOMOUS)

(Affiliated to JNTU-H, Approved by AICTE New Delhi and Accredited by NBA & NAAC With ‘A’ Grade)

TECHNICAL SEMINAR (2021 – 2025 BATCH) Dept. of EEE, MLRITM i


CERTIFICATE

This is to certify that the technical seminar titled “POWER THEFT DETECTION SYSTEM”
is being submitted by P. MOHAN REDDY (217Y1A0206) in IV B.Tech II Semester
Electrical & Electronics Engineering is a record bonafide work carried out by them. The
results embodied in this report have not been submitted to any other University for the award
of any degree.

INTERNAL GUIDE HEAD OF THE DEPARTMENT

D. SAROJA DR. A. VINOD


Assistant professor M. Tech, Ph. D

TECHNICAL SEMINAR (2021 – 2025 BATCH) Dept. of EEE, MLRITM ii


DECLARATION

We hereby declare that the Technical Seminar entitled, “ POWER THEFT DETECTION
SYSTEM” submitted for the B. Tech degree is entirely my work and all ideas and references
have been duly acknowledged. It does not contain any work for the award of any other
degree.

Date:

P. MOHAN REDDY

(217Y1A0206)
ABSTRACT

The power theft detection which aims to detect any theft related to electricity .Electrical energy is
very important for everyday life. The objective of this project is to design a system to avoid the
thefting. This model reduces the manual manipulation work and theft control. We must first
properly understand the working of different parts that is to be combined together. The technology
which we are going to use in our project and the implementation of this system will save a large
amount of electricity.
CHAPTER 1
INTRODUCTION
The Smart Electric Bill is a complicated platform to the manner we acquire power nowadays. In earlier
times the demand for electricity was substantial compared thereto presently. Since the demand for
electricity has tremendously increased, a redesign of the present grid system is far needed. With the
technology available in these times , the smart grid might be designed in such a fashion , that it uses
digital technology to detect and react to local changes in usage. The system will feature a two-way
dialog where electricity and knowledge are often exchanged between the buyer and utility. This can
increase or decrease the quantity of energy a consumer needs by analyzing the feedback of the two-
way dialog.In this system a practical energy meter is installed in every consumer unit and a server is
maintained on the service provider side.both the meter and the server are prepared with which enables
communication among the 2 ends using Server. The Arduino receives the tariff records from the
energy meter and sends the received information to the server. The server in the transmission system is
connected with the cloud, through this we are able to monitor and control the EB lines of every
consumer through the Internet. This system also serves to shut off the EB Line to the consumers who
aren't paying their monthly bills properly. The process can be easy and maintenance then even more
secure this system also helps the 4consumers to monitor their daily usage current through the Internet.
The transfer of electricity and knowledge between consumer and utility would increase efficiency,
reliability and security.The Smart grid also enables renewable electricity technology to be integrated
into the device for a greener, greater environmentally.

EXISTING SYSTEM
In existing systems errors may occur due to less concentration. It requires Huge Man power . The
system monitoring work gets delayed due to external conditions. Due to this Manual operation there is
a high wastage of Power. Controlling the home appliance through Bluetooth, GSM is an already
existing system .Bluetooth is having the distance parameter and there is no more monitoring. By using
the GSM module it just sends the units consumption to the mobile but not to store any kind of
data.nowadays the sector is facing such an environment that gives demanding situations. Energy crisis
is the main problem that our society faces. A relevant system control and monitor power usage is one
of the solutions to this problem. One approach which is today’s energy crisis that can be addressed
through reduction of power usage in households.
CHAPTER 2
CIRCUIT CONFIGURATION AND OPERATIONS MODES

Electrical power theft is a major problem in power system networks all over the
world,which is illegal and should be strictly prohibited.Power theft can be defined as the
usage of electrical power without any contract with the supplier. In order to eliminate
power theft,the location of power theft is to be known so that appropriate 8 action will be
taken on the legal offenders. Circuit consists of an arduino,GSM,ESP8266 and Current
transformer. Meters cannot be used for high currents so current sensing is done by current
transformers.Three current transformers are used two is at load side measure of current of
load and one is connected at supplier end. Using IOT power theft detectors or kits has been
implemented..

Basic Circuit Configuration

In a Power Theft Detection System, the circuit configuration and operational modes are designed to
detect unauthorized or illegal usage of electrical energy, such as tampering with meters or bypassing
energy consumption recordings. These systems are widely used by electricity distribution companies
to minimize revenue loss. Here's a breakdown of the circuit configuration and operation modes
typically found in such systems:

A Power Theft Detection System usually involves the following key components in its circuit:
1. Microcontroller / Processor
 Acts as the brain of the system (e.g., Arduino, PIC, or STM32).
 Interfaces with sensors and communication modules.
 Performs data logging and decision-making based on programmed logic.

2. Current and Voltage Sensors


 CT (Current Transformer) for current measurement.
 PT (Potential Transformer) or voltage divider for voltage measurement.
 Used to measure power consumption accurately.

3. Energy Meter IC
 Specialized IC like ADE7757 or ADE7758 used for precise energy calculation.
 It calculates real-time energy usage and sends data to the microcontroller.

4. GSM / IoT Module (e.g., SIM800, ESP8266)


 For remote monitoring and alerting.
 Sends SMS or updates to a cloud server when power theft is detected.

5. Tamper Detection Circuit


 Detects meter cover opening, magnetic field influence, reverse polarity, or bypassing attempts.
 May use reed switches, Hall sensors, or relay-based logic.

6. Display Unit
 LCD or LED display to show real-time usage or alerts.

7. Power Supply
 SMPS or transformer-based power supply to power the system.

OPERATION MODES
1. Normal Mode
 The system continuously monitors voltage, current, and calculates power usage.
 Displays consumption data and logs it to memory or cloud.

2. Tamper Detection Mode

Triggered when:

 A sudden drop in load is detected but power supply remains ON.


 Magnetic tampering is sensed (via Hall effect sensors).
 Current is detected without corresponding voltage or vice versa.
 Phase-neutral reversal is observed.

Action:

 Logs the anomaly.


 Sends alert via GSM/IoT module.
 Triggers an alarm (buzzer or visual alert).

3. Power Theft Alert Mode


 When conditions suggesting unauthorized consumption (bypass or direct tapping) are met.
 System locks the data and notifies the control center.
 May optionally shut off the supply (if relay is included).

4. Remote Monitoring Mode


 Communicates with a central server/cloud.
 Enables real-time monitoring for utilities or consumers.
 Can include mobile app integration.

CHAPTER 3

SIMULATION THEORY

GENERAL

Arduino Integrated Development Environment (IDE) The Arduino IDE supports the
languages C and C++ using unique regulations of code structuring. The Arduino IDE
supplies a software program library from the Wiring challenge, which presents many
commonplace input and output strategies. user-written code best calls for simple
capabilities, for beginning the cartoon and the main program loop, which might be
compiled and related with a program stub predominant into an executable cyclic
government software with the GNU toolchain, also protected with the IDE distribution. The
Arduino IDE employs this machine arduino to convert the executable code into a text
report in hexadecimal encoding that is loaded into the Arduino board by means of the usage
of a loader software program in the board's firmware. With the aid of default, arduino is
used as the uploading tool to flash the consumer code onto reputable Arduino boards.

In a Power Theft Detection System, the circuit configuration is designed to accurately


monitor and detect unauthorized electricity consumption. The system typically comprises a
microcontroller (e.g., Arduino, PIC) as the central control unit, which interfaces with
several key components. These include current sensors (such as current transformers or
Hall effect sensors) and voltage sensors (e.g., potential transformers or voltage dividers) to
continuously measure the real-time energy usage. An energy metering IC is often employed
for precise power calculation, and the system can include a tamper detection mechanism,
such as reed switches or Hall sensors, to detect any physical interference or tampering
attempts on the meter. A communication module like GSM, Wi-Fi, or IoT-based modules
(e.g., ESP8266) is used to send alerts and data to a central server or monitoring system. The
system’s display unit (LCD or LED) shows current power usage and alerts when
abnormalities are detected.

In terms of operation modes, the system typically functions in normal mode during regular
monitoring of power consumption, where it records data and ensures correct energy
measurement. In tamper detection mode, the system identifies any anomalies such as
unusual current draw without corresponding voltage, meter tampering, or interference from
external magnetic fields, which could suggest power theft. Upon detection, the system
switches to power theft alert mode, where it logs the event, triggers an alert (e.g., SMS or
email), and can even disconnect power if necessary. Additionally, the remote monitoring
mode allows for continuous tracking of power usage from a central location, while the self-
test mode ensures that all sensors and components are functioning correctly during
installation or routine maintenance. This layered approach ensures that the system is
effective in real-time detection and prevention of electricity theft.

For tamper detection, the system often integrates Hall effect sensors, reed switches, or
magnetic field sensors to detect external interference, such as tampering with the meter’s
physical components or magnetic manipulation of the meter’s internal components. The
system may also include relay circuits that can automatically disconnect power in the event
of detected theft, reducing losses to the utility provider. A display unit (e.g., an LCD
screen) provides real-time feedback on power consumption, and alerts are triggered by
visual signals or audible alarms in the case of anomalies. Furthermore, to communicate
events or theft incidents to a centralized location, the system is often equipped with a GSM
module (such as the SIM800) or an IoT communication module (e.g., ESP8266 or ESP32)
to send SMS alerts or update the cloud server in real time.

CHAPTER 4

SIMULATIONS
Simulation plays a critical role in designing and validating the components and operational
modes of a Power Theft Detection System. It involves creating digital models of the
system’s circuits, sensors, and control algorithms. By simulating various scenarios,
designers can observe how the system responds to different power usage patterns,
tampering attempts, and environmental conditions. Some of the key aspects of simulation
in this context include:

1. Circuit Simulation:

o Electronic Circuit Simulators such as LTSpice, Proteus, or Multisim are


commonly used to model the behavior of components like current
transformers, voltage sensors, energy metering ICs, and relays. By simulating
the entire circuit, engineers can test the response of the system under various
load conditions and detect issues like signal distortion, inaccurate power
measurement, or faulty component interactions.

o For instance, a simulation might show how the energy metering IC behaves
when exposed to a certain voltage or current, or how the tamper detection
circuit reacts to simulated tampering conditions like opening the meter cover
or applying a magnetic field.

2. Power Consumption Simulation:

o Simulating real-world power consumption patterns is essential for detecting


theft. Virtual models of electrical loads (residential, industrial, or
commercial) are created, simulating the usual power consumption as well as
scenarios where tampering occurs (e.g., bypassing the meter, altering current
flow).

o This can include varying the load over time to simulate different types of
energy theft. For instance, the system might simulate a current drop without a
corresponding change in voltage, which could indicate a power theft attempt,
or simulate an irregular consumption pattern to detect illegal tapping or
bypassing.

3. Tamper Detection Simulation:

o Simulation tools can model tamper scenarios such as the introduction of


external magnetic fields, reverse polarity, or illegal bypasses. In these cases,
engineers can test whether the tamper detection system, which could include
Hall sensors, reed switches, or magnetic field sensors, responds accurately
and triggers the right alert or shutdown mechanism.

o Simulation also helps in adjusting the sensitivity of these sensors, optimizing


their response to tampering while minimizing false positives.

4. Communication Simulation:
o The system’s ability to communicate alerts and transmit data remotely to a
central server or monitoring system is another important part of the
simulation. Using tools like MATLAB/Simulink or Omnet++, engineers can
simulate the GSM, Wi-Fi, or IoT modules that send alerts to the control
center when theft is detected.

o It’s also possible to simulate network conditions, including delayed or


dropped signals, to ensure that the communication system works effectively
even under challenging conditions. This is critical when ensuring real-time
alerting and system reliability.

5. Control Algorithm Simulation:

o The microcontroller or embedded system's logic that processes input from


sensors, makes decisions (e.g., detecting theft), and controls outputs (e.g.,
sending alerts, disconnecting power) can be simulated using embedded
software simulators. MATLAB/Simulink, Proteus, or specific microcontroller
simulators allow developers to test the logic algorithms before deployment.

o Algorithms for detecting abnormal behavior or power theft can be fine-tuned


and tested under different scenarios. For example, the system might simulate
different levels of power consumption with and without theft, allowing
engineers to adjust thresholds for alerts.

6. Real-time Performance Simulation:

o Advanced simulations can include real-time performance analysis, where


multiple systems (e.g., several meters, sensors, and communication units) are
simulated in parallel. This allows the system to simulate real-time power theft
detection in a multi-unit environment, mimicking how the system would
perform in an actual deployment.

o Performance metrics like response time, system latency, and data


transmission speed can be evaluated to ensure the system reacts quickly to
theft incidents and provides timely alerts to authorities.
CHAPTER 5

HARDWARE DESCRIPTION

INTRODUCTION

The hardware of the proposed system is implemented using Internet Of Things (IOT). The
software system like C++ is used for the system design for coding the program.

5.2 SOFTWARE REQUIREMENTS

5.2.1 INTERNET OF THINGS

The internet of factors (IOT) is the inter-networking of physical devices, vehicles


(additionally referred to as "related gadgets" and "clever devices"), buildings, and one of a
kind gadgets embedded with electronics, software, sensors ,actuators, and network
connectivity which allow these gadgets to acquire and alternate records. In 2013 the global
necessities Initiative on internet of factors (IOTGSI) defined the IOT as "a international
infrastructure for the statistics society, allowing advanced offerings by way of
interconnecting (physical and digital) topics primarily based on existing and evolving
interoperable facts and communique networks" and for the ones purposes a "component" is
"an object of the bodily global (physical things) or the records global (digital matters),
which capable of being recognized and included into communique networks". The IOT lets
in gadgets to be sensed or controlled remotely throughout modern-day network
infrastructure, growing possibilities for extra direct integration of the bodily international
into computer primarily based systems, and resulting in improved efficiency, accuracy and
monetary gain in addition to reduced human intervention. whilst IOT is augmented with
sensors and actuators, the era becomes an example of the more preferred beauty of cyber-
bodily structures, which 24 additionally encompasses technologies which include clever
grids, clever houses, smart transportation and smart cities. each issue is uniquely
identifiable through its embedded computing device but is able to interoperate within the
modern-day internet infrastructure. experts estimate that the IOT will encompass about 30
billion gadgets by using 2020. usually, IOT is anticipated to offer advanced connectivity of
devices, structures, and offerings that goes beyond gadget-to-system (M2M)
communications and covers a spread of protocols, domain names, and packages. The
interconnection of those embedded gadgets (which includes clever gadgets), is anticipated
to herald automation in almost all fields, whilst moreover allowing superior packages like a
smart grid, and increasing to regions which include smart towns. "matters'', within the IOT
feel, can speak to a great sort of devices which incorporates coronary heart monitoring
implants, biochip transponders on farm animals, electric powered clams in coastal waters,
motors with built-in sensors, DNA analysis devices for environmental/meals/pathogen
tracking, or discipline operation gadgets that help hearth opponents in search and rescue
operations. criminal pupils recommend concerning "matters" as an "inextricable
combination of hardware, software program, statistics and provider". these devices collect
useful facts with the help of numerous present era and then autonomously glide the records
among other devices. present day marketplace examples consist of domestic automation
(moreover known as clever domestic devices) along with control and automation of
lighting, heating (like clever thermostat), air flow, air conditioning (HVAC) structures, and
domestic gadget such as washer/dryers, robotic vacuums, air purifiers, ovens, or
refrigerators/freezers that use wi-fi for far off tracking. in addition to the enlargement of
internet-linked automation right into a plethora of latest software areas, IOT is likewise
anticipated to generate big amounts of records from numerous places, with the consequent
necessity for brief aggregation of the information, and an boom inside the need to index,
hold, and way such facts more correctly. IOT is one of the platforms of modern day clever
city, and smart energy management gadget. 25 5.2.2 APPLICATIONS According to
Gartner, Inc. (an era research and advisory enterprise), there could be nearly 20.8 billion
devices on the internet of things by 2020. ABI studies estimates that more than 30 billion
devices might be wirelessly linked to the internet of factors by the year 2020. As in step
with a 2014 survey and study carried out through Pew research internet mission, a big
majority of the generation experts and engaged net customers who replied—83 percent—
agreed with the belief that the net/Cloud of things, embedded and wearable computing (and
the corresponding dynamic systems could have massive and useful consequences by 2025.
As such, it is clear that the IOT will encompass a totally large variety of devices being
connected to the internet. In an energetic circulation to accommodate new and emerging
technological innovation, the United Kingdom authorities, in their 2015 finances, allotted
£40,000,000 towards research into the internet of things. the former British Chancellor of
the Exchequer George Osborne, posited that the internet of things is the next stage of the
data revolution and referenced the inter-connectivity of everything from city shipping to
scientific devices to household appliances. The potential to network embedded gadgets
with limited CPU, memory and power sources method that IOT unearths applications in
almost every area. [48] Such structures might be in the price of collecting statistics in
settings starting from natural ecosystems to buildings and factories, thereby locating
applications in fields of environmental sensing and urban making plans. Then again, IOT
systems may also be liable for appearing actions, now not just sensing things. smart buying
structures, for example, could screen specific customers' purchasing habits in a store by
means of monitoring their specific cellular telephones. Those users may want to then be
supplied with unique gifts on their favorite merchandise, or even region of items that they
need, which their refrigerator has automatically conveyed to the phone. additional
examples of sensing and actuating are contemplated in packages that deal with heat, water,
energy and power management, as well as cruise-helping transportation structures. Other
programs that the net of factors can offer is enabling extended home protection features and
domestic automation. The concept of an "internet of living things" has been proposed to
explain networks of organic sensors 26 that would use cloud-based total analyses to permit
customers to examine DNA or other molecules. but, the utility of the IOT is not best
confined to those areas. other specialized use instances of the IOT may exist. An overview
of some of the most outstanding software areas is furnished right here.
CONCLUSION

In the era of smart city development, this assignment is concentrated on the connectivity
and networking component of the IOT .on this device, an power consumption calculation
primarily based on the counting of calibration pulses are designed and implemented using
the ATMEGA328P Microcontroller unit in the embedded gadget domain. in the proposed
work, IOT and 44 MMC based totally meter studying system is designed to continuously
reveal the meter reading and provider provider can Disconnect the energy source on every
occasion the customer does now not pay the month-to-month bill and additionally it
eliminates the human Involvement, delivers powerful meter analyzing, prevent the billing
mistake. The assignment has completed following goals: Ease of getting access to
information for purchasers from energy meters via IOT. robbery detection at customers
leads to actual time. a liquid crystal display displays power consumption gadgets and
temperature. Disconnection of provider from far flung server

FUTURE WORK

This basic system we can upgrade to a great level by introducing the GPS module in the
system. If we introduced the GPS in the system, then it would become easy to identify the
perfect energy theft area. Thing Speak Cloud also provides the Map in their charts to
display the locations of systems. So to improve the performance of the system more
efficiently we have to connect the GPS module to the Particle photon board and the
location we have to send on the cloud location chart.
REFERENCES:

[1] Landi, C.; Dipt. Dining. dell''Inf., Seconda Univ. di Napoli, Aversa, Italy ; Merola, P. ;
Ianniello, G, “ARM-based energy management system using smart meter and Web server”,
IEEE Instrumentation and Measurement Technology ConferenceBinjiang, pp. 1 – 5, May
2011

[2] Garrab, A.; Bouallegue, A.; Ben Abdallah, “A new AMR approach for energy saving in
Smart Grids using Smart Meter and partial Power Line Communication”, IEEE First
International Conference on Renewable Energies and Vehicular Technology (REVET), pp.
263 – 269, march 2012

[3] B. S. Koay, S. S. Cheah, Y. H. Sng, P. H. Chong, P. Shum, Y. C. Tong, X. Y. Wang, Y.


X. Zuo and H. W. Kuek, "Design and implementation of Bluetooth energy 45 meter", IEEE
Proceedings of the 4th International Joint Conference of the ICICS, vol. 3, pp. 1474-1477,
Dec,2003.

[4] K. Li, J. Liu, C. Yue and M. Zhang, "Remote power management and meterreading
system based on ARM microprocessor", IEEE Precision Electromagnetic Measurements
Digest CPEM, pp. 216-217, June, 2008.

[5] Steven Lanzisera, Member, IEEE, Andrew R. Weber, Anna Liao, Dominic Pajak, and
Alan K. Meier, “Communicating Power Supplies: Bringing the Internet to the Ubiquitous
Energy Gateways of Electronic Devices”, IEEE Internet of Things Journal, vol. 1, no. 2,
pp.153-160, march 2014.

[6] Andrea Zanella, Senior Member, IEEE, Nicola Bui, Angelo Castellani , Lorenzo
Vangelista, Senior Member, IEEE, and Michele Zorzi, Fellow, IEEE, “Internet of Things for
Smart Cities”, IEEE Internet of Things Journal, vol. 1, no. 1, pp. 22-32, February 2014.

[7] Poonam Borle, Ankitha Saswadhar, Deepali Hiwarkar, Rupali S Kali, “Automatic Meter
Reading for Electricity”,International Journal of Advanced Research in Electrical,
Electronics and Instrumentation Engineering, Vol. 2, no. 3,pp. 982-987, March 2013.

[8] http://wiki.iteadstudio.com/ESP8266_Serial_WIFI_Module.

[9] Microchip, “High-Performance Microcontrollers with XLP Technology PIC18


(L)F2X/4XK22”, DS41412F Data Sheet, 2010-2012.

[10] Microchip, “Microcontrollers with 10-Bit A/D and NanoWatt Technology


PIC18F2420/2520/4420/4520”, DS39631E Data Sheet, 2008.

[11] K. Li, J. Liu, C. Yue and M. Zhang, "Remote power management and meterreading
system based on ARM microprocessor", IEEE Precision Electromagnetic Measurements
Digest CPEM, pp. 216-217, June, 2008.

[12] Steven Lanzisera, Member, IEEE, Andrew R. Weber, Anna Liao, Dominic Pajak, and
Alan K. Meier, “Communicating Power Supplies: Bringing the Internet to 46 the Ubiquitous
Energy Gateways of Electronic Devices”, IEEE Internet of Things Journal, vol. 1, no. 2,
pp.153-160, march 2014.

[13] Andrea Zanella, Senior Member, IEEE, Nicola Bui, Angelo Castellani, Lorenzo
Vangelista, Senior Member, IEEE, and Michele Zorzi, Fellow, IEEE, “Internet of Things for
Smart Cities”, IEEE Internet of Things Journal, vol. 1, no. 1, pp. 22-32, February 2014.

[14] Poonam Borle, Ankitha Saswadhar, Deepali Hiwarkar, Rupali S Kali, “Automatic
Meter Reading for Electricity”,International Journal of Advanced Research in Electrical,
Electronics and Instrumentation Engineering, Vol. 2, no. 3,pp. 982-987, March 2013.

You might also like