Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)


Tags: POWER, THEFT, IDENTIFICATION, WITH, MAINTAINING, MAXIMUM, DEMAND, USING, TEHNOLOGY, POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY, POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY ppt, POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY pdf, power theft identification, power theft identification pdf, microcontroller based power theft identification, microprocessor based power theft identification, microcontroller based power theft identification ppt,
 
 
Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY
Post: #1


.pdf  POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY.pdf (Size: 516.84 KB / Downloads: 722)
POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY


PROJECT TEAM MEMBERS

P.VIJAYARAJ , A.MANIKANADAN, H.NAGARAJAN, R.SAKTHIVEL ,
PAAVAI COLLEGE OF ENGG,
NAMAKKAL.


OBJECTIVE:



>The main objective of this project is to indicate electric power theft to electricity board. This project is carried over through

embedded technology. In this project we use wireless method to find out the electric theft.

BLOCK DIAGRAM(POWER THEFT)

BLOCK DIAGRAM(MAXIMUM DEMAND)

DESCRIPTION

> In this project we compare a particular poles input and output current by using current transformer.
> Is there any negative value means we indicate that particular pole has drawn more current as theft.
> Here we place one current transformer in input side of the post line. Other current transformers are placed at the distribution

points of the house lines.

> The output of current transformer values is given as input to PIC microcontroller. PIC microcontroller converts these analog inputs

into digital using inbuilt ADC converter.
> Then PIC compares the input current and the sum of output currents. If compared result has any negative

value then this particular post is detected as theft point.

> This compared value is transmitted to electricity board through RF transmitter. RF receiver is placed in electricity board

office.
> This RF receiver receives this value and given as input to PIC. PIC displays this value in LCD display.


ERROR SIGNAL= MAXIMUM DEMAND
UTILIZATION LOAD


Pic Microcontroller
CORE FEATURES:

¢ High- performance RISC CPU
¢ Only 35 single word instructions to learn
¢ Operating speed: DC - 20 MHz clock input
DC - 200 ns instruction cycle
¢ Up to 8K x 14 words of Flash Program Memory, Up to 368 x 8 bytes of Data Memory (RAM) Up to 256 x 8 bytes of EEPROM data memory
¢ Interrupt capability (up to 14 internal/external
¢ Eight level deep hardware stack
¢ Direct, indirect, and relative addressing modes Power- on Reset (POR)
Power- up Timer (PWRT) and Oscillator Start - up Timer (OST) Watchdog Timer (WDT) with its own on - chip RC Oscillator for reliable

operation Programmable code - protection
GSM TECHNOLOGY:



> GSM was designed with a moderate level of service security.
> The system was designed to authenticate the subscriber using a pre-shared key and challenge-response.
> The development of UMTS introduces an optional Universal Subscriber Identity Module (USIM), that uses a longer authentication

key to give greater security, as well as mutually authenticating the network and the user - whereas GSM only authenticates the user to

the network (and not vice versa).

> Communications between the subscriber and the base station can be encrypted.



> The security model therefore offers confidentiality and authentication, but limited authorization capabilities, and no non-

repudiation.


CURRENT TRANSFORMER:

> Current Transformers (CT's) can be used for monitoring current or for transforming primary current into reduced secondary.
> current used for meters, relays, control equipment and other instruments. CT's that transform current isolate the high voltage

primary, permit grounding of the secondary, and step-down the magnitude of the measured current to a standard value that can be safely

handled by the instrument.

ADVANTAGES:

> Maintaining maximum demand.
> To avoiding power theft.
> Improving efficiency of the power system.



References:

> SPB limited, Cauvery R.S,Erode-7.
> TNEB, Panjappatty sub-station.
> Power System Operation, Nagoor gani.
Post: #2
can you please send me more details of this project
Post: #3
can u pls give the full details n circiut diagrams pls mail me to vmanjunathroy2008[at]gmail.com
Post: #4
please... send me your full project report of POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY based on current utilisation in transmission line, with in 2 days.

with block diagram,circuit diagram,gsm interfacing with microcontroller,current transformer connection.[/size][/font]
 

Marked Categories : diagrams of power theft, electricity thefting controller using pic microcontroller, electrical thieft identified using gsm, power theft block diagrams, power theft control, power theft identification pdf, maximum demand ppt, references of gsm based power theft identifier, power theft identification ppt, ct transformer pic program, ppt on electric power theft in distribution system, power theft detection ppt, gsm based automatic meter reading and power theft detection, power theft identification system in distribution lines using differential power measurement ppt, power theft identification system in distribution lines using differential power measurement,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
Information washing machine using 8085 Guest 0 0 Today 12:08 PM
Last Post: Guest
Star gsm based distribution transformer monitoring Guest 0 0 22-04-2017 11:37 PM
Last Post: Guest
  simulation of venturini modulation technique for matrix converter using simulink Guest 0 0 22-04-2017 07:31 PM
Last Post: Guest
  object tracking using wireless sensor network in matlab Guest 0 0 22-04-2017 01:17 PM
Last Post: Guest
  windmill mini project using opengl with source code Guest 0 0 21-04-2017 08:20 PM
Last Post: Guest
  transportation problem using fuzzy logic pdf Guest 1 197 21-04-2017 04:25 PM
Last Post: jaseela123
  image compression using discrete cosine transform Guest 1 0 21-04-2017 02:07 PM
Last Post: jaseela123
  source code for aquarium in computer graphics using opengl Guest 2 0 21-04-2017 01:57 PM
Last Post: jaseela123
  automatic vehicle security system using alcohol sensor Guest 1 172 21-04-2017 11:35 AM
Last Post: jaseela123
  speed detection of moving vehicle using speed cameras abstract Guest 1 0 21-04-2017 10:32 AM
Last Post: jaseela123
This Page May Contain What is POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY And Latest Information/News About POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY,If Not ...Use Search to get more info about POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY Or Ask Here

Options: