Design,implementation And Simulation Of Prepaid Meter, Theft Monitoring System With Sms Alert

 

Abstract

 

A repaid cadence monitoring system with SMS alert is designed simulated and constructed using microcontroller to achieve a unique transmission of SMS dispatches to designated mobile phone figures. The work is a response to the need to thwart marketable energy losses in mileage electrical distribution system. The system utilizes a typically openmicro-switch incorporated into the monitoring system to descry when the repaid cadence cover is opened. The system triggers a series of conduct which ultimately lead to the transferring of an SMS alert communication to the GSM mobile phones at the marketable unit of the mileage Electricity Distribution Company which contains the cadence number and address where the tamper/ theft originates. The system also triggers an alarm system to warn the existent within the vicinity that an meddler has tampered with the cadence in order to commit fraud/ energy theft. The system utilizes the being GSM networks and protocols through the modem interface. When the dispatches are transferred to the designated mobile phones the dispatches are also retained at the memory card connived to the modem which can be recaptured when the need arises. This work discusses in detail the way taken in the process of realizing the set pretensions including the design, simulation, perpetration testing and results. The construction was enforced with dependable and readily available factors in the request. The results showed that the power of the system is 6 watts. The interspersing current input voltage is 220V( AC) at50/60 Hz. The affair current of voltage controller is 500 mama . The system was validated using bar map for comparison of its functionality with the living bones in terms of transmission of SMS dispatches, recording and shadowing of information in real- time and the operation was veritably excellent which is a remarkable enhancement over the being reimbursed cadence monitoring system.

 

 

Chapter One

 

Preface

 

Background of the Study

 

Sule, 2010), described Power System as a network that provides regions, diligence and homes with electrical energy. He also stated that electricity generation, transmission and distribution are three stages of delivering electricity to consumers. This power system is known as the grid and can be astronomically divided into the creators that supply the power, the transmission system that carries the power from the generating centers to the cargo centers and the distribution system that feeds the power to near homes and diligence. The distribution system is a part of power systems which is devoted to delivering electrical energy to the end stoner. The planning and the design of electrical force system are everyday task for masterminds in the electric serviceability companies. The thing of power distribution planning is to satisfy the growing and changing cargo demand within functional constraints and with minimum costs Sharma, etal.,( 2008). It’s necessary for Power Distribution Company to modernize their client’s information that corresponds to their electrical attributes. The database contains useful information that shows liaison with the distribution mills, confluent and substation. It’s also important to design a system that cover the delicacy of consumption at the client end. The design of smart system improves system trustability, hence encourages investments to the assiduity.

 

Electrical distribution enhancement has numerous approaches ranging from confluent optimization, phase balancing and going model for distribution planning. All these are ideas and sweats by numerous scholars in the field of electronics to ameliorate distribution. In Nigeria, the power distribution has constituted seventy percent of electrical mileage problem Titus, etal.,( 2013). Due to crunches in planning and use of wrong result for an linked problem, it’s egregious to note that the major problem of electricity mileage comes from distribution of bulk power that have been transmitted over a long distance and the reason for this is that distribution demands aren’t known and well managed. Against the reverse drop that consumers of electricity aren’t linked grounded on their position, it’s unsolvable to estimate the accurate demand of electricity for guests in similar area. Another major problem is linked as marketable losses that reduces profit, hence discourages investment into the system, Damian etal.,( 2015). The use of estimated cargo has also reduced the system trustability. This is a problem that can not be answered overnight. still, with the right approach, result is certain. The SMS( short communication service) alert can give the result in the operation of mileage by way of detecting marketable loss which is a function of electrical theft.

 

Kaira, 2014) proposed two styles in confluence with the being styles the two styles are linked discriminational scheme and Integration scheme.

 

Linked Differential scheme is achieved by attachment of detectors to heavy appliance similar as fridges air conditioner and other heavy outfit, other loads were attached to one detector. In the case where the total energy measured from individual detector is sum and isn’t equal to that of the cadence, theft is detected, else no theft.

 

In integrated scheme of kindX-bee is bedded into the cadence that communicates with the module present at seeing the total power given out of it. In the case of electrical theft, consumer homes were collectively switched off ever to descry consumer involved in the theft.

 

The limitation of the two styles proposed by Kalra( 2014) is that sequestration of the consumer is abused by installation of multiple detectors in the discriminational scheme. The system is expensive to manage because at every intervals of time check is carried out to descry theft. The right of the client to pierce energy is infringed, in the integrated scheme consumers that aren’t involved in electricity theft are cut off from force for a period of time to descry the demesne where the theft do, this is also infringing on right of some guests who aren’t involve in the unwholesome geste .

 

Non-Technical Loss( NTL) occurs as a result of electricity theft( Dey, etal., 2010). He further stressed types of electrical theft as Fraudulent conditioning of client, Stealing electricity, Irregular bill payment and overdue bill. cadence tampering is classified into analogue and digital. Dey, etal.,( 2010) described Analogue tampering as deficit of phase current coil which caused the current to pass through the shorter path which results to cadence’s unfit to descry current passing through it. Current inflow reversal by switching of cargo and force terminal, hence cadence would be unfit to descry volume of electricity through it. Neutral disposition hence cadence unfit to descry energy through it because of no implicit difference.

 

Magnet is used to decelerate down gyration of the slice in analogue cadence, hence reduction in perceptivity of the cadence to record energy value. Tampering in digital motor is noticed when neutral is removed. Installation of’ current mills at both phase and neutral line to measure currents and teed hack to micro regulator to determine difference in current is proposed Dey, etal.,( 2010).

 

In analogue measures, oil of rotating slice divided into four equal proportions in black and white, with LHD and LDR attached to the slice and powered is proposed. Gyration of the slice indicates no theft as the voltage to the micro regulator varies else theft is detected Dey, et al;( 2010).

 

Electricity Theft Mechanisms

 

Electricity thefts may do in different forms. From available literature and practical diurnal reports in Nigeria, Sayema, et al;( 2014), the common ways include bypassing( illegal tapping of electricity from the confluent), cadence tampering( by resting the neutral line as it doesn’t measure readings) and physical styles to shirk payment of bills. The introductory system of stealing electricity is a direct line- connection to a main power route passing a shop or a house so that electricity can flow to the consumer without crossing the electric cadence installed by a government agency which is responsible for furnishing electrical services to client. There are different types of theft done each over the world. Huge quantum of power theft are done by tapping from line or bypassing the cadence.

 

According to a study, 80 of the aggregate theft detected each over the world is from domestic structures and 20 from marketable and artificial demesne, Suriyamongkol,( 2014).

 

cadence Tampering guests tamper the cadence by resting the neutral line. A tampering unit used for stop of this energy theft it transferred the alert to energy Provider Company when tampering occurs. If any person tries to tamper with energy cadence the tampering unit will be actuated and as SMS alert shoot central garçon of energy provider company.

 

Cadence bypass; The input terminal and affair outstation of the energy cadence have been shorted by a line. This act prevents energy from been registered in the cadence.

 

Illegal terminal gates of overhead lines on the low pressure side of the motor Primarily, electricity theft affects the power sector as a whole, tapping of the low pressure side of the motor result in overfilling which causes tripping and can lead to knockout.

 

Illegal tapping to bare cables or underground lines This is the most habituated system for theft of power as 80 of total power theft each over the world is done by direct tapping from line. The consumer gates into a direct power line from a point ahead of the energy. This energy source is unmeasured in its consumption and carried with or without switches.

 

overdue bills Remittent of bills by individualities, Government Institutions and Untouchable personalities individualities results in mileage running at a loss and a must continually increase in electricity charges.

 

Billing irregularities This incorporates the inaccurate cadence reading taken by bought soldiers and purposeful fixing of the bill by office staffs in exchange of lawless payments from the consumers.

 

Causes of Electricity Theft

 

All energy distribution companies operate with some accepted degree of losses. This is no different from the script in Nigeria. The losses incurred are subdivided into two videlicet Specialized losses and Non-specialized losses.

 

Specialized losses These are naturally being losses and correspond substantially of power dispersion in electrical system factors similar as transmission lines, power mills, dimension systems, among others. They’re caused by the physical parcels of the factors of power systems, Sayema, etal.,( 2014).

 

Non-technical losses These relate to those losses that are independent of specialized losses in the power system. The most prominent forms of non-technical losses in Nigeria are electricity theft and remittent of bills. It can also be viewed as undetected cargo Anyasi, etal.,( 2012). Theft is a serious crime, it creates short fall, increase of cargo, drop of frequence which isn’t respectable, causing cargo slipping and increase of tariff on the legal consumers Khan, etal.,( 2012). Some may argue that the distribution companies furnishing services give over-voltage, poor service and make redundant plutocrat therefore. Some theft won’t affect its operations and profitability. Nigeria’s power system is an illustration of a worst- case situation previous to its privatization in 2013. The distribution companies haven’t upgraded their systems to meet the technological trends in advanced countries. In certain metropolises, still, the post-paid energy measures are gradationally being replaced with the repaid measures, the issue of constant electricity continually persecute the country as this has not been achieved previous to its privatization in the last ten months.

 

Some localized catalyzing factors impacting electricity theft in Nigeria include lack of responsibility in electricity request system, political protection of workers involved in corruption, influential guests who don’t pay their bills, absence of effective laws to abate electricity related crimes and shy and ineffective enforcement of being weak laws and generally negative station of electricity guests. Electricity pilferage has its root in corruption and bad governance. guests station contribute a great deal to profit losses. These stations range from their ill- conceived passions that electricity should be a weal commodity and thus licit to steal from the state, to the conception that the state isn’t incurring losses. They don’t have the fore- knowledge that the plutocrat realized from the payment of bills arere-instated into the power sector for its enhancement and development.

1.4 Being Ways of diving Electricity Theft

 

The first step in electricity theft reduction is to come knowledgeable about the theft problem. Unless the nature and extent of power theft are known in great details, any attempts to deal effectively with the problem are prone to fractured and limited action that has little over-all success, Smith,( 2004). Corruption is one of the delicate problem areas for electricity associations because power theft occurs with the collusion of workers of the power sector. workers should hence, be paid adequately so that the issue of fix collection won’t be their last resort. Power companies are combating theft through the use of smart measures and sophisticated software that continuously records consumption and shoot the data back to them. One advantage of using the smart cadence is that it eliminates contact between the consumers and the power provider’s workers therefore precluding the issue of bribery, Depury, etal.,( 2010).

 

The formerly being styles which may be employed in diving electricity theft in some countries where rehearsed include proper enforcement of electricity nonsupervisory laws, periodic and improvisational checks of consumer homes, electronic tampering discovery cadence and use of repaid cadence. The limitations of using the smart measures are that, consumers feel it discloses sequestration of their homes which aren’t immorally true and that it interferes with radio frequence and produce problems in radio transmission profile, Wang, etal.,( 2013). Periodic checks aren’t 100 effective due to its laborious and sluggish nature. espousing this kind of system in electricity theft reduction will delay accurate and effective reading of the measures in remote areas that arenon-accessible. also, as result of the ever- adding rate of corruption( similar as rapacity and backhanders ) in the Nigeria, the proper enforcement of laws would take a drastically longer time than quested. In the history, panels that were set- up see it as an avenue to amass wealth rather than rigorously discipline defaulters, therefore all these reasons have hindered the growth of our power sector.

 

Electricity Theft Identification in Distribution System

 

Electricity theft takes place in colorful forms and works with the help and support of different parties which include the mileage staff and political leaders grounded on legislated laws and consumers. The major challenges of mileage company are that the plutocrat invested into product of electricity for distribution isn’t recovered as a result of electricaltheft.Kalaivani,( 2014). As a result, the millions have to pay redundant freights in terms of tariff toutility company to compensate for these losses,( Kalaivani, 2014).

 

According to Kalaivani( 2014), electricity consumers steal energy in the following way Unhooking technology, One fire one ground technology, Reverse the heft and the eschewal, Cross cadence to connect line, Exchange fire with zero.( Kalaivani, 2014) proposed a system to cover electricity theft grounded on information from a distribution motor and colorful affair of cadence readings from the colorful consumer’s demesne. In their system, the energy giving out from a motor is measured while colorful reading in the consumer’s demesne is added up with a comparator. The labors of the reading from different consumer’s demesne are feed into a differentiator with affair from the motor. This colorful labors are abated; a difference indicates that there’s power theft. The limitation of this is that, they only measure power theft at the motor, and can not point precisely the consumer demesne that these theft passed, an intelligent system is needed to break the problem.

 

Sagar etal., 2013) used the system of installing communication cadence at both client’s demesne and the electric pole connecting the client’s demesne. The two cadence transferred out information of consumption, which is compared to check the difference. The difference in the two measures indicates power theft. The disadvantage of system is that, the proposed system is post-paid metering which doesn’t support fast profit collection. In addition, the system involves data collection and analysis, hence involves further cost of managing electricity.

 

According to Syed, etal.,( 2012), they proposed that the power distribution and theft control by relating patterns of distribution demand, consumption, loses and force power to areas in need of power at a particular time grounded on the available database of consumer demand, consumption and losses. In view of Syed etal.,( 2012) they linked four kinds of power theft therefore Kunda, Meter reversing, hamper hard haggling and Power cabal.

 

In kunda system of power theft, the mileage poles are veritably near enough to erecting that line can be fluently suspended on them in the form of hook, while in cadence reversing electrical technician can carry out this kind of theft with the consumer and reversing the electrical cadence to give lower reading. Under hand haggling is a system of power theft where the mileage staffs connects consumer’s to power line immorally because they’ve been paid some paycheck. Power crews are groups of largely systematized power thefts, they controls some areas and detects what happens in those areas Syed, etal.,( 2012).

 

Power theft can be combated by mapping area of power demand, cargo shadowing fashion will be used use to cut off area that are prone to power theft and increase power force to area less prone to theft Syed etal.,( 2012). One major disadvantage of this fashion is that it doesn’t give result to power theft at each individual demesne rather it only give a mapping of the area to show distribution planning.

 

Toward power to all A case study of abuse of power in Lucknow India, abuse of power was studied by Triparthi,( 2011). It was observed that consumers don’t turn OFF their lights during the day time because there’s no special billing plan. The billing plans are the same for all time of the day. They proposed that electricity billing plan shouldn’t be the same for all time of the day so that consumers will be forced to turn off their light during ages that light aren’t necessary, Triparthi,( 2011).

 

According to Mohammed,( 2012), GSM base grounded smart cadence distribution system identifies common styles used by consumers for electrical theft. The styles are as follows

 

The use of mechanical objects in this type of system consumers makes use of mechanical objects to stop fragment revolution of the analogue energy cadence in order to alter the speed of the revolution and hence incorrect reading.

 

Use of fixed attraction was also linked as a means consumers use to disturb the electromagnetic field of current coil, for the purpose of affecting the energy records of the cadence.

 

Direct by pass of cadence and hence produce no electric consumption record at all.

 

Switching of energy string of the cadence connection box and this doesn’t allow current passage through the coil; hence there’s no energy record of the cadence.

 

Illegal connection to the distribution lines, in which consumers tap directly to the power lines.

 

Installing of GSM smart miners al both consumer’s demesne and motor supplying to the consumer linked to database installation at central station was proposed by Mohammed,( 2012). The energy consumption at every demesne connected to the motor are transferred to the data base and added up. The total consumption of the houses is compared with mills cargo at interval, in case of difference, electrical theft has passed in a particular interval and vicinity. Consequently the three phases and neutral current were also compared. Limitation of this system is that they considered energy theft in a particular area and hoot in particular demesne, using information from colorful consumer demesne and the motor, hence demanded to be ameliorate upon.

 

Electricity losses do as a result of electrical theft due to cadence tampering, cadence malfunctioning, illegal connections and billing irregularities, Thong, etal.,( 2010). Support Vector Machine( SVM) and fuzzy hindrance System( FlS) are proposed for discovery of nontechnical loses. cadence event log by Remote cadence Reading thirsty Installation examination were used for loss discovery. Limitation of this system is that theft isn’t detected incontinently and data analysis takes a long time before theft can be detected. Another limitation is that too important data is involved and this may bring confusion hence wrong discovery.

 

According to Kalra,( 2014), the following ways are used by consumer to steal electricity. Direct hooking from line, this constitutes 80 percent of the total power theft. It was further stated that consumers valve directly from the point ahead of the energy cadence. Other styles include input, and affair outstations that have been shorted by while in order to disallow energy cadence to registered consumption.

 

Kalra, 2014), also noted that injection of foreign material causes the cadence to act up against the mileage company’s condition and operate to advantage of the client involve in the theft. It was added that hole drilled in electromechanical cadence obstructs free movement of the rotating slice by insertion of foreign material inside the cadence. According to Kalra( 2014) the following styles were in use and couldn’t completely exclude theft discovery.

 

Vector base data bracket system which involves data accession, processing, point birth, bracket training and parameter optimization, bracket, data post processing, and suspected client list generation. In his idea, a data set of client consumption pattern is developed on literal data and applied on Support Vector Machine( SVM). SVM are trained to present all possible form of data. Specification base intrusion discovery fashion, in this fashion, use of covering state to ameliorate the discovery rate over a wireless sense network, collective examination and AMI.

 

Game proposition base discovery probe incitement problem of electricity distribution where client energy operation is imperfectly observable by the distributor. The experimenter also noted that as a result of sequestration protection of each client and this makes it delicate for distributors to observe rightly the precise volume of energy used.

 

Current electrical distribution system in Nigeria requires ferocious approach in order to deliver quality energy to the client. Energy losses are the major factors hindering the delivering of electrical energy. The losses are distributed as specialized and marketable losses. High specialized distribution losses in the system are primarily due to shy investments over the times for system enhancement works, which has rudiments like mills and operators, and lack of acceptable reactive power support, Thakur,( 2004). The marketable losses are substantially due to metering effectiveness, power theft, pilferages under billing and sharp practices of distribution staffs.

 

With the advancement of technology particularly in the field of computer as well as microcontrollers, all the conditioning in our day to day living have come a part of information and we find computers and microcontrollers at each and every operation.

 

currently, the energy consumption and energy distribution have come a big subject for discussion because of huge energy theft. Theft in this case refers to a deliberate attempt to steal considerable quantum of energy by icing no/ low energy recording in the measuring device. Hence, there’s the need to suppose in this line and a result has to be proffered. therefore this design work is taken up to serve the purpose of energy monitoring so that energy theft can fluently be detected and huge penalties can be assessed on these stealers. By detecting energy theft cases, people or electricity consumers will come apprehensive and energy theft can be averted or seriously reduced to the enhancement of the nation’s frugality.

 

This design is distributed into two sections videlicet

 

An energy theft discovery unit( transmitter section) which is located at the consumer’s place.

 

A centralized discovery and display unit using GSM phone( receiver section) located and covered continuously at the centralized energy monitoring section( that is at PHCN office within the position).

 

Aim And Objective

The end is to develop a system used to cover and descry frequentness of power theft in the form of connecting cargo directly to the power line, bypassing the energy cadence, paying lower than what’s consumed and by changing connection of the lines.

The specific objects are as follows

To descry the theft of electrical energy

To help the illegal operation of electrical power

To reduce the pilferage of energy to a considerable extent.

To give a pictorial understanding of the microcontroller as well as it’s interfacing to other factors.

 

Defense For The Study

 

Due to the frequence of cadence tampering and energy theft cases, the need to reason in this line and come up with results arose. Presently, in the country, there are no measures in place to dock this problem. Hence the microcontroller grounded power theft identifier was constructed. This system, formerly enforced will drastically reduce if not completely exclude the problem of energy theft in the country.

 

Compass Of The Study

 

The design is limited to two representations models of electrical energy measures exercising a typically open micro-switch as a detecting device placed inside the measures and using GSM modem to establish a link between the consumer hearthstone and the Electricity power monitoring station and the AT89C52 microcontroller as the control device. The introductory instruction set used by the AT89C52 microcontroller which enables it to perform its introductory function is achieved by writing a working program using Assembly language, and this enables the microcontroller to give a vital link with other factors of the design to be suitable to control their conditioning within the system.

 

Limitations of the Study

 

The exploration is limited to erratic power force current in the country. As the system requires electricity to serve, the absence of power force will hamper its operation.

Leave a Comment