Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)
Tags: POWER, THEFT, IDENTIFICATION, WITH, MAINTAINING, MAXIMUM, DEMAND, USING, TEHNOLOGY, POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY, POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY ppt, POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY pdf, power theft identification, power theft identification pdf, microcontroller based power theft identification, microprocessor based power theft identification, microcontroller based power theft identification ppt,
Ask More Info Of  A Seminar Ask More Info Of A Project Post Reply  Follow us on Twitter
15-04-2010, 12:36 AM
Post: #1
POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY

.pdf  POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY.pdf (Size: 516.84 KB / Downloads: 707)
POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY


PROJECT TEAM MEMBERS

P.VIJAYARAJ , A.MANIKANADAN, H.NAGARAJAN, R.SAKTHIVEL ,
PAAVAI COLLEGE OF ENGG,
NAMAKKAL.


OBJECTIVE:



>The main objective of this project is to indicate electric power theft to electricity board. This project is carried over through

embedded technology. In this project we use wireless method to find out the electric theft.

BLOCK DIAGRAM(POWER THEFT)

BLOCK DIAGRAM(MAXIMUM DEMAND)

DESCRIPTION

> In this project we compare a particular poles input and output current by using current transformer.
> Is there any negative value means we indicate that particular pole has drawn more current as theft.
> Here we place one current transformer in input side of the post line. Other current transformers are placed at the distribution

points of the house lines.

> The output of current transformer values is given as input to PIC microcontroller. PIC microcontroller converts these analog inputs

into digital using inbuilt ADC converter.
> Then PIC compares the input current and the sum of output currents. If compared result has any negative

value then this particular post is detected as theft point.

> This compared value is transmitted to electricity board through RF transmitter. RF receiver is placed in electricity board

office.
> This RF receiver receives this value and given as input to PIC. PIC displays this value in LCD display.


ERROR SIGNAL= MAXIMUM DEMAND
UTILIZATION LOAD


Pic Microcontroller
CORE FEATURES:

¢ High- performance RISC CPU
¢ Only 35 single word instructions to learn
¢ Operating speed: DC - 20 MHz clock input
DC - 200 ns instruction cycle
¢ Up to 8K x 14 words of Flash Program Memory, Up to 368 x 8 bytes of Data Memory (RAM) Up to 256 x 8 bytes of EEPROM data memory
¢ Interrupt capability (up to 14 internal/external
¢ Eight level deep hardware stack
¢ Direct, indirect, and relative addressing modes Power- on Reset (POR)
Power- up Timer (PWRT) and Oscillator Start - up Timer (OST) Watchdog Timer (WDT) with its own on - chip RC Oscillator for reliable

operation Programmable code - protection
GSM TECHNOLOGY:



> GSM was designed with a moderate level of service security.
> The system was designed to authenticate the subscriber using a pre-shared key and challenge-response.
> The development of UMTS introduces an optional Universal Subscriber Identity Module (USIM), that uses a longer authentication

key to give greater security, as well as mutually authenticating the network and the user - whereas GSM only authenticates the user to

the network (and not vice versa).

> Communications between the subscriber and the base station can be encrypted.



> The security model therefore offers confidentiality and authentication, but limited authorization capabilities, and no non-

repudiation.


CURRENT TRANSFORMER:

> Current Transformers (CT's) can be used for monitoring current or for transforming primary current into reduced secondary.
> current used for meters, relays, control equipment and other instruments. CT's that transform current isolate the high voltage

primary, permit grounding of the secondary, and step-down the magnitude of the measured current to a standard value that can be safely

handled by the instrument.

ADVANTAGES:

> Maintaining maximum demand.
> To avoiding power theft.
> Improving efficiency of the power system.



References:

> SPB limited, Cauvery R.S,Erode-7.
> TNEB, Panjappatty sub-station.
> Power System Operation, Nagoor gani.

Please Use Search http://seminarprojects.com/search.php wisely To Get More Information About A Seminar Or Project Topic
05-02-2011, 08:11 PM
Post: #2
RE: POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY
can you please send me more details of this project
22-02-2011, 05:41 PM
Post: #3
RE: POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY
can u pls give the full details n circiut diagrams pls mail me to vmanjunathroy2008[at]gmail.com
10-02-2012, 12:08 PM
Post: #4
RE: POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY
please..... send me your full project report of POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY based on current utilisation in transmission line, with in 2 days.

with block diagram,circuit diagram,gsm interfacing with microcontroller,current transformer connection.[/size][/font]
Rating POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY Options
Share POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY To Your Friends :- Seminar Topics Bookmark
Post Reply 

Marked Categories : diagrams of power theft, electricity thefting controller using pic microcontroller, electrical thieft identified using gsm, power theft block diagrams, power theft control, power theft identification pdf, maximum demand ppt, references of gsm based power theft identifier, power theft identification ppt, ct transformer pic program, ppt on electric power theft in distribution system, power theft detection ppt, gsm based automatic meter reading and power theft detection, power theft identification system in distribution lines using differential power measurement ppt, power theft identification system in distribution lines using differential power measurement,

[-]
Quick Reply
Message
Type your reply to this message here.


Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  A Laboratory Modeling Of Combined Generation Of Electrical Power Using Solar And Wind jaseelati 0 3 Today 01:33 PM
Last Post: jaseelati
  Optimal Matched Rectifying Surface for Space Solar Power satellite Project Report seminar code 0 11 Today 12:29 PM
Last Post: seminar code
  Artificial Retina Using Thin-Film Transistors Driven by Wireless Power Supply project maker 0 16 Today 11:37 AM
Last Post: project maker
  multi CO-line calling line identification with line monitor project maker 0 19 Today 10:15 AM
Last Post: project maker
  PLC BASED POWER TRANSFORMER COOLING PROTECTION AND CONTROL SYSTEM project maker 0 18 Yesterday 03:49 PM
Last Post: project maker
  SIMULATION OF SOLID STATE VOLTAGE&FREQUENCY CONTROLLER FOR STAND ALONE WIND POWER GEN project maker 0 7 Yesterday 11:59 AM
Last Post: project maker
  A Laboratory Modeling Of Combined Generation Of Electrical Power Using Solar And Wind seminar code 0 17 Yesterday 11:40 AM
Last Post: seminar code
  DESIGN, DEVELOPMENT AND SIMULATION OF UNINTERRUPTED POWER SUPPLY project maker 0 14 Yesterday 11:25 AM
Last Post: project maker
  PROGRESS TOWARD A MICROFABRICATED GAS TURBINE GENERATOR FOR SOLDIER PORTABLE POWER A project maker 0 18 29-09-2014 02:21 PM
Last Post: project maker
  An Ultrasonic Sensor Based Low-Power PHONIC Modem for SUB AQUEOUS Communication project maker 0 26 29-09-2014 02:14 PM
Last Post: project maker
This Page May Contain What is POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY And Latest Information/News About POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY,If Not ...Use Search to get more info about POWER THEFT IDENTIFICATION WITH MAINTAINING MAXIMUM DEMAND USING GSM TEHNOLOGY Or Ask Here

Options: