Sei sulla pagina 1di 11

POWER THEFT IDENTIFICATION

USING MICROCONTROLLER

AUTHORS:

N.SIVASANKARI (ECE).
P.THANGAMANI (ECE).

Mail @ : sivasankari.er@gmail.com
thangamaniengr@gmail.com

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING,


KONGU ENGINEERING COLLEGE,
PERUNDURAI, ERODE-638052,
TAMIL NADU.
ABSTRACT
Science and technology DESCRIPTION OF OUR
with all its miraculous advancements IMPLEMENTATION IDEAS:
has fascinated human life to a great The disc revolutions are sensed into
extent that imagining a world without pulses by optical slot sensor. These
these innovations is hardly possible. pulses are shaped and given as
While technology is on the raising control signal to the CMOS switch
slope, we should also note the which bypasses carrier wave generated
increasing immoral activities. With a by PLL provides as input to
technical view, “Power Theft” is a receiving section where transmitted
non-ignorable crime that is highly signal is selected by the Intermediate
prevalent, and at the same time it frequency transformer. For each lock a
directly affects the economy of a pulse is sent out. The counter section
nation. is designed to send out pulse for
Detecting and eradicating every six input pulse from the
such crimes with the assistance of receiver section. This count is
the developing scientific field is the parallely distributed in a 7-
“Need of the Hour”. With these segmentdisp and then to µc for further
views was this paper conceived and processing. µc performs the function
designed . Our paper provides a of indication and identification. Pin
complete and comprehensive tool to details, features, connections and
prevent power theft which is very software employed of µc89c51 is
simple to understand and easy to described in detail.
implement. It includes four sections – We believe our implementation ideas
transmitting, receiving, counter display is a boon to the electricity board
and processing sections. offering them a chance to accurate
detection of the location and amount
of power theft.

INTRODUCTION:
Electricity is the narrowly defined group of functions.
modern man’s most convenient and Automation has made the art of
useful form of energy without which living comfortable and easy. Embedded
the present social infrastructure would systems have made the process of
not be feasible. The increase in per automation a most successful one.
capita production is the reflection of Here, we have focused on automotive,
the increase in the living standard of an area of embedded controllers, in
people. When importance of electricity which we have dealt with the Power
is on the increasing side, then how theft identification and also about the
much should theft of this energy or remote monitoring of an energy
illegal consumption of power from meter. The microcontroller chip is
the transmission lines be averted? preprogrammed to perform a
Power theft has become a great dedicated or a narrow range of
challenge to the electricity board. The functions as a part of a larger
dailies report that Electricity Board system, usually with minimal end
suffers a total loss of user or operator intervention. Our
8 % in revenue due to power theft paper throws light on automated
every year, which has to controlled. monitoring of theft identification,
Our paper identifies the Power theft which is an application of
and indicates it to the Electricity embedded controllers.
board through Power line. We had MODES OF THEFT:
also dealt about the remote It has been seen
monitoring of an energy meter. that there are 4 common methods of
MICROCONTROLLER BASED power theft they are bogus seals and
AUTOMATION: tampering of seals,meter tampering ,
Embedded systems - a meter tilting, meter interface and meter
combination of software, hardware and bypassing,changing connection,direct
additional mechanical parts that tapping from line. Due to introduction
together forms a component of a of modern electronic metering
larger system, to perform a specific equipments, power thieves are utilizing
function. It’s a technology, more technological methods. Recent
characterized by high reliability, cases of power theft discovered by
restricted memory footprint and real British inspectors included customers
time operation associated with a tunneling out to roadside mains
cables and splicing into the supply, a
garage taking its night time power transformer serving several customer
supply from the nearest lamp post and compared to the sum of all the
and domestic customers drilling holes meter usage. Besides spotting out the
into meter boxes and attempting to line where power theft is suspected
stop the counter wheels from turning to occur, it also detects the amount of
Another method of Power theft is energy stolen. Compact size,
by keeping a strong magnet in front lightweight for quick and high
of the disc in the energy meter and accuracy make the system more
thus arresting the rotation of the disc, effective.
connecting the load directly to the BLOCK DIAGRAM:
power line bypassing the energy Power theft
meter. But, it can be avoided easily identification, in this paper, is done
by providing a non magnetic by converting the disc revolutions
enclosure. of each consumer’s energy meter
MODERN DETECTING TOOLS: and distribution transformer into
There are many modern pulses. These pulses are frequency
tools that assist in power theft division multiplexed and transmitted
identification. Some of them are through power line. These signals
tamper proof seals and labels,meter are individually picked and counted
leaders,tamper resistant screws / at the receiver end. If the
locks,check meter and remote meter difference of the sum of the
reader,tamper alarms and sensors. consumer’s readings and that of
This paper undertakes distribution transformer exceeds the
the Check meter and remote meter preset value, which is set by
readers for power theft identification. considering transmission loss, the
In our case, the consumption recurred power theft is said to occur. The
by the check meter is compared with project can be categorized into 4
the revenue meters consumption. If modules transmitting section, receiving
there is a difference, then it indicates section, processing section, counter
either there is a theft or revenue meter section. The transmitted signal is
malfunction . The check meter can selected at the receiving end by the
also be used to monitor the energy inter-mediate frequency transformer.
used in the secondary of a distribution
DESIGN LAYOUT: infrared light source and a photo
detector. For each revolution of the
7 segment led disp
disc, the sensing unit has to
To tap the signal individually DISPLAY produce pulses which are shaped and
RECEIVER given as control signal to the analog
ALARM
SECTION
CMOS switch. The analog switch
MICRO employed in the circuit is IC 4066
CONTROLLER
which is a quad bilateral switch
µc-processing section
P intended for the transmission of
analog or digital signals. It offers
N
a very low on state resistance
DISTRIBU ENERG
TION Y
CONSUMER and bypasses carrier wave
NO:1
TRANSFO METER
RMER generated by Phase Locked Loop to
CONSUME
TRANSMITTER R NO:2 the next part of the circuit. Here,
SECTION
PLL acts as a carrier signal
generator , which produces carrier
Provide with slot sensor
signals of high frequency of band
TRANSMITTING SECTION: 300 kHz. The IC 567, that has an
. The first and foremost internal voltage-controlled oscillator
requirements for a transmitter section is used. The output carrier
are the sensing unit,phase locked signal is passed on to
loop,CMOS analog switch, Buffer CMOS switch. From there, the
Intermediate frequency,transformer. In modulated high frequency carrier
this section, the disc revolutions signal is passed through a buffer
of the rotating non-magnetic disc of circuit in order to have
the electro magnetic energy meter sufficient drive current and for
are sensed by opto coupler slot isolation purpose.
sensor This slot sensor employs an
Analog.sw

PLL BUF IFT


FER

P.SUPPLY

ENERGY
Transmitter
METER

230 V , AC 50HZ

The buffer used in the through power line. Selected signal


module is IC 4049 which act as at the receiving end is clipped off to
current amplifiers. Then an IFT is a desired value and is demodulated
placed which is a step down by Phase Locked Loop. For every
transformer. It provides current lock condition of the Phase Locked
gain and impedance matching. Loop, a pulse is sent out of the
The carrier wave is current receiver end.
amplified, FM modulated and sent

RECEIVING SECTION:
The FM signal that the transmitter so that only signals of
are transmitted from the tuned value enters into the receiver
transmitter section travels through the circuit. The signal is sent to a simple
power line and reaches the receiving diode clipper which clips off it to a
section, where these signals are tapped value of about 0.7 V. Two diodes
individually. The basic components in IN 4148 are connected back to back
the receiver section are Intermediate so that clipping is done at both
Frequency Transformer, Clipper, Phase positive and negative levels. This
locked loop. The IFT used in this clipped signal is then given us an
section is of the same type as that of input signal of PLL which is a
that transmitter .The frequency range closed loop feedback system. Its
is between 100 – 300 KHz as that function is to lock the output
used in radios. The IFT is externally frequency and phase to the frequency
tuned to the same value as that of and face of an input signal and it
acts as a tone detector. The output of circuit a transistor whereby a pulse
PLL is low whenever it goes into of +8 V is obtained as its output.
‘lock’ state. This low state will open

Receiver
DISPLAY

p.supply
7 Seg.Decoder

12-bit Ripple
IFT PLL Buffer counter
230V,AC 50HZ
LINE

The pulses due to the locking of PLL is is used which acts as an isolator
8V but microcontroller requires only circuit between receiver and micro
+5V.For this purpose an optocoupler controller.
.COUNTER CUM DISPLAY
SECTION:
The energy meter disc 4033 decade counters are connected
rotates faster or slower depending on in cascade to count as well as to
the amount of electrical energy being drive the four digit seven segment
consumed. Whenever a carrier signal LED display. The display enable pin 3
is detected at the receiver, a pulse is of this IC is tied to Vcc. A reset push
passed on to a counter. It counts six button is provided to reset the decade
pulses and gives an output for every counters and thereby the display. In
unit consumed. The output of this IC4026 the carryout pin 5 is
counter is fed to a decimal counter connected to clock input pin 1 of the
cum display unit. Four numbers of IC next stage for cascading
.
decade counters by providing a 3 V
During power out the last reading of battery backup through a diode to the
the display can be retained in the Vdd pin.
PROCESSING SECTION:
This section being the resulted in a giant leap in the
final and the most important part, processing field. Our paper takes up
performs all necessary manipulation the help of the micro controller to
and processing work. This processing obtain quick, swift and accurate
work is done by micro controller, responses. The entire processing work
which performs the final identification is done by micro controller, which
and indication by connecting an performs the final identification and
alarm. The use of micro controller indication.
.
PIN DIAGRAM OF IC 89C51:

PORT 1 & 3 (1-8,10-17)


A 8-BIT BI-DIRECTIONAL I/O
PORT WITH INTERNAL PULL-UPS. IT
RECEIVES LOWER ORDER ADDRESS
BYTES DURING FLASH PROGRAMMING.
PORT O (32-39)
A 8-BIT BI-DIRECTIONAL I/O
PORT. IT IS CONFIGURED TO BE THE
MULTIPLEXED LOW ORDER
ADDRESS/DATA BUS DURING ACCESSES
TO EXTERNAL PROGRAM AND DATA
MEMORY.
PORT 2 (21-28)
IT PERFORMS THE SAME
FUNCTION AS THE PORT 1.

OPERATION OF MICRO
CONTROLLER: layout. The set value can be given
• through port P1 by means of DIP
The different switches. The possible values can be
connections are shown in the design set by it
• given as input individually to pin 12
The pulses from each & 13 and 16 of port 3.
energy meter after being received is
• them. As the program written
The frequency of occupies space less than is 4 kbytes,
operation of the controller can be no external memory is used hence
varied by choosing crystal of desired 31st pin is made high
value. The ceramic crystal is •
connected across 18th and 19th pin of The program is
the IC 8951. High frequency of about written and is down loaded to the IC
8 MHz is chosen 8751 by means of PC. The program
• is written so as to assign the
Power theft function of each pin. Also it initials
identification is done by means of an continuous counting of units and
alarm, which is connected to the 39th simultaneous comparison. If error is
pin of IC. Once the alarm is set on, predicted the buzzer is made to give
the resetting of the controller can be alarm signal
done by connecting a push button to
pin 9 SOFTWARE DESCRIPTION FOR
• IC 89C51:
It can be noted that The program for 89c51 is shown in
the other pins of the ICs are unused this section. We present it in the
and hence no connection are given to form of several blocks to make it
more clear and easily readable.

INITIALISING THE PARAMETERS


CHECKING THE SEVENTH CONDITION

0016 75DOE7 MOV PSW,#0E7H


0019 7581FS MOV SO,#SFH 0079 7C24 CK.FOR.7
001C 758000 MOV P0,#00H 007B 020086 MOV KEY.SET.REG,#036D
001F 7590FF MOV P1,$OFFH 007E BC0705 JMP CHECK.DIFF
0022 75A000 MOV P2,#00H
0025 75B0FF MOV P3,#00FH

INITIALISING THE PULSE REGISTERS


OPCODE TO DIRECT AN ALARM

0028 7800 MOV PULSE.1.REG,#00H


009B 8BAO MOV P2,RES.REG
002A 7900 MOV PULSE.2.REG,#00H
009D D280 SETB ALARM.PIN
002C 7A00 MOV PULSE.3.REG,#00H
009F C2A8 CLR EX0
002E D288 SETB IT0
00A1 C2AA CLR EX1
0030 D28A SETB IT1
EXECUTION OF CHECKING CONDITON CHECK DIFFERENCE FOLLOWED BY ALARM
(CHECKING FIRST CONDITION) 0083 020086 CK.DIFF

0047 98 SUBB A,PULSE.1.REG 0086 MOV KEY.SET.REG,#420


0086 EB JMP CHECK.DIFF
0048 FB MOV RES.REG,A
0087 C3 MOV R,RES.REG
0049 E590 MOV A,P1PULSE.1.REG
0088 9C CLR C
004B 54OF ANL A,#00001111B
0089 5110 SUBB AMKEY.SET.REG
004D FC MOV KEY.SET.REG,A
FREQUENT
008B LOOPINGJNC
8BAO OF SET.ALARM
AN ALARM CKT
004E BC0105 CJNE KEY.SET.REG,#001H,CHE
EXECUTION OF SECOND CHECKING
008D 80AF MOV P2,RES.REG
CONDITON
008F JMP X1
0051 7C06 CK.FOR.2
008F C2A8 CLR EXO
0053 020086 MOV KEY.SET.REG,#006H
0091 08 INC PULSE.1.REG
0056 JMP CHECK.DIFF
0092 D2A8 SETB EXO
0094 32 RET1
0056 BC0205CJNE KEY.SET.REG,#002H,CHE
0095 C2AA
0097 D2 INC
EXECUTION OF THIRD CHECKING CONDITION 0098 AA SETB
009A RETI
0059 7COC CH.FOR.3
005B 020086 MOV KEY.SET.REG,#012
005E CHECK.DIFF
005E BC0305 CJNE KEY.SET.REG,#003H,CHE

MONITORING MEASURES:
• The display need not be • switch whenever required to
kept always on, and can be powered note down the reading.
up using a push switch whenever • Effects of PF improvement
required to note down the reading. capacitors on the line and
• Protection against high distribution transformers may
voltage on the transmitter or receiver interfere with the message
is possible by the usage of special high signal or the effect of
voltage suppressers like gas discharge atmospheric noises is to be
tubes provided with a coupling point analyzed before implementing
with fuses to disconnect respective in a large scale.
transmitter or receiver.
CONCLUDING LINES:
This paper is designed when applied in a large scale,
for industrial purpose, but it can be repeaters can be employed at suitable
extended to domestic purposes also. It intervals. To certain extent the power
gives a big hand to vigilance squad level of the transmitter may be
to control theft quickly and easily. improved. Our paper not only
With its usage, the crime of stealing indicates the place of power theft but
power may be brought to an end and also the amount of energy being
thereby a new bloom may be stolen that is, it gives the best of the
expected in the economy of our expected results. The use of this
motherland. The prime limitation of technique gives a new hope and
the system in the present form is the accuracy for the satisfaction to
distance coverage. To overcome this complete the work.

REFERENCE

 Roy Choudrury and Shail Jain, Linear Integrated Circuits, Wiley

Eastern Ltd., 1991

 AnokSingh, Communication Engineering, S.Chand & Co., 1997.

 K.R.Botkar, Integrated Circuits, Khanna Publishers, 1997.

 Ramesh S. Goankar, Microprocessor Architecture Programming and

Architecture, Prentice Hall, 1996.

 M.Morris Mano, Digital Logic and Computer Design, Prentice Hall

Of India Pvt. Ltd., 1999.

 Charles M.Gilmore, Microprocessors Principles & Applications,

Mc Graw Hill.

 Badriram, Advanced Microprocessors and Interfacing, Tata Mc

Graw Hill Publishers.

 lathish@sacharnet.in

Potrebbero piacerti anche