Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY
#1

[attachment=3213]
POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY


PROJECT TEAM MEMBERS

P.VIJAYARAJ , A.MANIKANADAN, H.NAGARAJAN, R.SAKTHIVEL ,
PAAVAI COLLEGE OF ENGG,
NAMAKKAL.


OBJECTIVE:


>The main objective of this project is to indicate electric power theft to electricity board. This project is carried over through

embedded technology. In this project we use wireless method to find out the electric theft.

BLOCK DIAGRAM(POWER THEFT)

BLOCK DIAGRAM(MAXIMUM DEMAND)

DESCRIPTION

> In this project we compare a particular poles input and output current by using current transformer.
> Is there any negative value means we indicate that particular pole has drawn more current as theft.
> Here we place one current transformer in input side of the post line. Other current transformers are placed at the distribution

points of the house lines.

> The output of current transformer values is given as input to PIC microcontroller. PIC microcontroller converts these analog inputs

into digital using inbuilt ADC converter.
> Then PIC compares the input current and the sum of output currents. If compared result has any negative

value then this particular post is detected as theft point.

> This compared value is transmitted to electricity board through RF transmitter. RF receiver is placed in electricity board

office.
> This RF receiver receives this value and given as input to PIC. PIC displays this value in LCD display.

ERROR SIGNAL= MAXIMUM DEMAND
UTILIZATION LOAD


Pic Microcontroller
CORE FEATURES:

High- performance RISC CPU
Only 35 single word instructions to learn
Operating speed: DC - 20 MHz clock input
DC - 200 ns instruction cycle
Up to 8K x 14 words of Flash Program Memory, Up to 368 x 8 bytes of Data Memory (RAM) Up to 256 x 8 bytes of EEPROM data memory
Interrupt capability (up to 14 internal/external
Eight level deep hardware stack
Direct, indirect, and relative addressing modes Power- on Reset (POR)
Power- up Timer (PWRT) and Oscillator Start - up Timer (OST) Watchdog Timer (WDT) with its own on - chip RC Oscillator for reliable

operation Programmable code - protection
GSM TECHNOLOGY:


> GSM was designed with a moderate level of service security.
> The system was designed to authenticate the subscriber using a pre-shared key and challenge-response.
> The development of UMTS introduces an optional Universal Subscriber Identity Module (USIM), that uses a longer authentication

key to give greater security, as well as mutually authenticating the network and the user - whereas GSM only authenticates the user to

the network (and not vice versa).

> Communications between the subscriber and the base station can be encrypted.

> The security model therefore offers confidentiality and authentication, but limited authorization capabilities, and no non-

repudiation.


CURRENT TRANSFORMER:

> Current Transformers (CT's) can be used for monitoring current or for transforming primary current into reduced secondary.
> current used for meters, relays, control equipment and other instruments. CT's that transform current isolate the high voltage

primary, permit grounding of the secondary, and step-down the magnitude of the measured current to a standard value that can be safely

handled by the instrument.

ADVANTAGES:

> Maintaining maximum demand.
> To avoiding power theft.
> Improving efficiency of the power system.



References:

> SPB limited, Cauvery R.S,Erode-7.
> TNEB, Panjappatty sub-station.
> Power System Operation, Nagoor gani.
Reply

#2
please.. send me your full project report of POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY based on current utilisation in transmission line, with in 2 days.

with block diagram,circuit diagram,gsm interfacing with microcontroller,current transformer connection.[/size][/font]
Reply

#3
can u pls give the full details n circiut diagrams pls mail me to [email protected]
Reply

#4

plz mail full detail and microcontroller coding about this project ([email protected])
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.