POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY.pdf (Size: 516.84 KB / Downloads: 722)
POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY
PROJECT TEAM MEMBERS
P.VIJAYARAJ , A.MANIKANADAN, H.NAGARAJAN, R.SAKTHIVEL ,
PAAVAI COLLEGE OF ENGG,
>The main objective of this project is to indicate electric power theft to electricity board. This project is carried over through
embedded technology. In this project we use wireless method to find out the electric theft.
BLOCK DIAGRAM(POWER THEFT)
BLOCK DIAGRAM(MAXIMUM DEMAND)
> In this project we compare a particular poles input and output current by using current transformer.
> Is there any negative value means we indicate that particular pole has drawn more current as theft.
> Here we place one current transformer in input side of the post line. Other current transformers are placed at the distribution
points of the house lines.
> The output of current transformer values is given as input to PIC microcontroller. PIC microcontroller converts these analog inputs
into digital using inbuilt ADC converter.
> Then PIC compares the input current and the sum of output currents. If compared result has any negative
value then this particular post is detected as theft point.
> This compared value is transmitted to electricity board through RF transmitter. RF receiver is placed in electricity board
> This RF receiver receives this value and given as input to PIC. PIC displays this value in LCD display.
ERROR SIGNAL= MAXIMUM DEMAND
Â¢ High- performance RISC CPU
Â¢ Only 35 single word instructions to learn
Â¢ Operating speed: DC - 20 MHz clock input
DC - 200 ns instruction cycle
Â¢ Up to 8K x 14 words of Flash Program Memory, Up to 368 x 8 bytes of Data Memory (RAM) Up to 256 x 8 bytes of EEPROM data memory
Â¢ Interrupt capability (up to 14 internal/external
Â¢ Eight level deep hardware stack
Â¢ Direct, indirect, and relative addressing modes Power- on Reset (POR)
Power- up Timer (PWRT) and Oscillator Start - up Timer (OST) Watchdog Timer (WDT) with its own on - chip RC Oscillator for reliable
operation Programmable code - protection
> GSM was designed with a moderate level of service security.
> The system was designed to authenticate the subscriber using a pre-shared key and challenge-response.
> The development of UMTS introduces an optional Universal Subscriber Identity Module (USIM), that uses a longer authentication
key to give greater security, as well as mutually authenticating the network and the user - whereas GSM only authenticates the user to
the network (and not vice versa).
> Communications between the subscriber and the base station can be encrypted.
> The security model therefore offers confidentiality and authentication, but limited authorization capabilities, and no non-
> Current Transformers (CT's) can be used for monitoring current or for transforming primary current into reduced secondary.
> current used for meters, relays, control equipment and other instruments. CT's that transform current isolate the high voltage
primary, permit grounding of the secondary, and step-down the magnitude of the measured current to a standard value that can be safely
handled by the instrument.
> Maintaining maximum demand.
> To avoiding power theft.
> Improving efficiency of the power system.
> SPB limited, Cauvery R.S,Erode-7.
> TNEB, Panjappatty sub-station.
> Power System Operation, Nagoor gani.