Power Theft Detection

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 16

POWER THEFT

DETECTION
\

1
CONTENT
01 02 03 04
WAYS OF POWER THEFT
WHY POWER POW
Introduction POWER THEFT CHALLENGES
THEFT
IN INDIA IN INDIA
OCCURS?

05 06 07 08
POWER THEFT ROADMAP
METHODS OF POWER THEFT DETECTION FOR POWER
POWER THEFT DETECTION USING THEFT
DETECTION USING GSM ELECTRONIC
DETECTION
METER

2
ELECTRICITY
PRODUCTION IN
INDIA
India’s absolute installed power capacity was 416,100 megawatts (MW) on 31 March 2023. At present shares of
installed capacity are 49% state sector, 35% central sector and 16% private sector. According to the Power
Performance Corporation (PFC) Ltd. report, the average aggregate technical & and commercial (AT&C) loss has been
25.15% in 2014–15 and 23.98% in 2015–16 [2]. It also reports the highest losses in the eastern and northeastern
regions. These losses refer to the amount of power supplied to the transmission and distribution grids, which is not
accounted for. More than 70–80% of AT&C losses occur at distribution stages and a major segment of this loss is due
to commercial loss, which could be due to power theft or wrong billing. The AT&C losses which measure the
distribution sector’s operational and financial performance have been estimated to be 1.5% of India’s GDP CEA,
2014.
t

3
WHY POWER
THEFT OCCURS?
THEIR ARE VARIOUS REASONS FOR POWER THEFT SOME
OF THE REASONS ARE:-
1.Socioeconomic and Governance Factors
2.Extreme Temperature
3.Lack of Proper Monitoring
4.Lack of Stringent Act and Its Implementation
5.Corruption in the System

4
TODAY'S Persisting Problem and Some Solution

5
WAYS OF POWER THEFT
PRACTISED IN INDIA
1. Meter Tampering and Short Circuiting
• Most common modus operandi, the source side and the load side of the energy
meter are shorted out thereby short-circuiting the energy meter.
• Sometimes consumers damage, interfere or upset the function of the energy meter
which is called tampering of energy meter.
• Tampering and bypassing allow for the reduction in the energy meter reading.

2.Direct Tapping into Service Cable


• In the second method, loads are connected in the unauthorized section of the
service wire, i.e.the section between the pole and the energy meter.
• This is called direct tapping in service line cable.
• In this case, home appliances are connected in a concealed manner before the
input of the energy meter.

6
• POWER THEFT BY BYPASSING METER

2.POWER THEFT BY DIRECT TAMPERING OF SERVICE LINES


7
WAYS OF POWER THEFT
PRACTISED IN INDIA
3.Hooking in Power Distribution Line
• Usually in rural sectors an 11-kV power supply comes into power stations where a
transformer (ratings in the range of 63 kVA, 100 kVA, etc.) steps down the 11 kV to 440 V.
The output of the transformer is supposed to be connected to the loads in a balanced way
throughout the households where the loads are predominantly single-phase.
• This balance is disturbed because of rampant hooking in the power lines. As a result, there
is substantial overloading and unbalance resulting into neutral shifting and subsequent
under and over voltages.
• Frequent transformer failures have been reported in the villages. Even though it is
unlawful, hardly there is any persecution because of local political interferences.

8
POWER THEFT BY DIRECT HOOKING

9
POWER THEFT CHALLENGES IN
INDIA
1.Unplanned and Large Infrastructure
Due to the network’s unplanned growth, the Indian distribution system is characterized by inefficiency, resulting in
high losses (technical and commercial), frequent interruptions and low power supply voltages, and consumer
dissatisfaction.

2.Lack of Centralized Metering


There is no centralized metering infrastructure in India because of the early established unplanned infrastructure.
Centralized metering is defined as the system where information is centralized from many smart energy meters at a
master station via wireless, cable or power line medium. This is a real-time data acquisition, anal- ysis and processing
system which are collection of com- puter hardware and software with digital communication technology.

3.Very Expensive to Install New Infrastructure


Installation of such new large infrastructure will be very expensive. For installing new infrastructure, the issue is the
cost-viability of centralized metering compared with other technology alternatives available, and whether cen-
tralized metering offers sufficient advantage in the marketplace. The level of investment associated with
building completely new infrastructure is extremely hard for the occupants to legitimize.

10
POWER THEFT DETECTION USING GSM
Power theft is normally done by two methods that is bypassing or hooking. So to detect it, a system (current measuring and
comparing) is proposed in which the household distribution of current is done indirectly from the electric pole to an intermediate
distributor box and then to the individual houses. The current is measured periodically in the distributor box and is posted to the
server database for each house using GSM/GPRS module. Similarly, for each house electric meter is designed which can measure
the value of the current and post the same to the server database periodically using GSM/GPRS module. At the time of the
installation of the electric meter the details of the users are stored in the database through a user friendly mobile application
including the address, latitude, longitude using mobile GPS and the photograph of the user's house/area. Upon successful
comparison between the current values from the distributor box and electric meter in the server if we get a marginal difference
between the currents then the theft is detected. Finally, the details of the user are shared with the authorized mobile application
including the address and photograph of the area. The latitude and longitude are also used to show the area of theft in Google maps.
And hence the required steps are taken. The same process is used for hooking but on the individual electric poles.

11
Using IR-PHOTODIODE SENSOR

A photodiode is placed on the shaft of the rotating disk on the meter and is illuminated with IR light from the IR LED. In normal operation, the output of the photodiode gives a logic low
signal to the Microcontroller. However when the meter tampers, i.e. the disk rotation is obstructed or the meter cover is removed, an obstacle is created between the LED and the photodiode,
resulting in a logic high signal to the Microcontroller. The Microcontroller detects this change in logic signal and based on this, sends a message to the GSM modem through the level shifter
Max 232. The GSM modem then sends the message about energy meter being tampered at the particular location, to the power distribution grid, and appropriate action is taken accordingly.
Either the power supply to the organization of the house is cut off or the energy meter is replaced in case of any damage.

12
Electronic Energy Meter
Power tapping can be detected by comparing the power distributed to the line and the power actually consumed by the load.
This is done by installing an electronic energy meter at the load side and the meter readings are sent wirelessly to the
distribution unit. This reading is received by the wireless receiver and is compared with the actual power given to the load.
The difference in readings indicates the error and this error signal is given to a controller which in turn controls the secondary
voltage of the transformer, thus causing the transformer to stop the supply of power. Thus power theft by tapping is detected
and it is prevented by halting the power to the line totally.

13
ROADMAPS FOR THE INDIAN
POWER THEFT PREVENTION
1.Smart Meters
2.On-time Bill Payment Offers
3.Financial Rewards
4.Periodic Checks
5.Technical Interruptions
6.Enforcement Of Law
7.Electronic tamper Detection Meter
8.Plastic Meter Encasement

14
QUESTIONS
PLEASE
15
THANK YOU VERY
MUCH

16

You might also like