SlideShare a Scribd company logo
NRI INSTITUTE OF INFORMATION
SCIENCE & TECHNOLOGY
DEPARTMENT OF ELECTRICAL &
ELECTRONICS ENGINEERING
SEMINAR PRESENTATION ON-
“POWER THEFT
IDENTIFICATION SYSTEM”
CONTENTS
>Introduction
-Power theft Definition
-How it occurs
>Different ways of monitoring power
theft
>Microcontroller Based power theft
monitoring
-proposed architecture
>Block diagram
>Advantages
>Disadvantages
>Conclusion
INTRODUCTION
(POWER THEFT)
>it is the use of electrical power without a contract
with a supplier with total or partial bypassing of the
metering system or interfering with this system in
such a way so as to adulterate its measurements,
>contract is understood here as a valid
oblingation to deliver power and
to pay for it.
HOW IT OCCURS ?????
1-(SLOWING DOWN THE METER)
>A common method of tempering older meters is to attach
magnets to the outside of the meter.
>when this happens, the rotor disc is exposed to a high
magnetic field. Hence the resultant is
opposing magnetic field to the rotor
highly increased leading
to slowing down of rotor or perfect
stopping of the disc rotation.
>The electricity meter is thus
manipulated and ultimately power
is consumed without being paid.
Ex-Neodymium magnets
2-(INVERTING THE METER/FEEDER)
 Another common form of electricity theft is
to invert the meter (pull the meter out of the
socket & plug the meter back in upside
down, which causes the meter to run
backwards & the kWh register to count
down instead of up).
presentation on POWER THEFT IDENTIFICATION SYSTEM
presentation on POWER THEFT IDENTIFICATION SYSTEM
MICRO-CONTROLLER BASED
POWER THEFT MONITORING
 OVERVIEW-
 The whole system architecture is based on
integrating wireless network with existing electrical
grid.
 The proposed module also incorporates different
data aggregation algorithms & effective solutions
needed for the different pathways of the electricity
distribution system.
presentation on POWER THEFT IDENTIFICATION SYSTEM
presentation on POWER THEFT IDENTIFICATION SYSTEM
presentation on POWER THEFT IDENTIFICATION SYSTEM
presentation on POWER THEFT IDENTIFICATION SYSTEM
presentation on POWER THEFT IDENTIFICATION SYSTEM
presentation on POWER THEFT IDENTIFICATION SYSTEM
PLC (PROGRAMMABLE LOGIC CONTROLLER)
 It is a digital computer used for automation of
elecctromechanical process.
 The PLC’s are designed for multiple input and
multiple output.
 Program to control machine operation are typically
stored in non-volatile memory.
 It is an example of a hard real time system since
output results must be produced in response to
input conditions within bounded time.
PROGRAMMING OF PLC
 Early PLC’s were programmed by using specific
purpose programming terminals.
 The programs were stored in cassette tape cartridges.
 Facilities of printing and documentation were very
minimal due to lack of memory.
 The very old PLC used is non-volatile magnetic core
memory.
 Modern PLC’s used are EEPROM or EPROM as a
memory.
PROGRAMMING OF PLC
MODERN PLC’S
.
presentation on POWER THEFT IDENTIFICATION SYSTEM
presentation on POWER THEFT IDENTIFICATION SYSTEM
presentation on POWER THEFT IDENTIFICATION SYSTEM
presentation on POWER THEFT IDENTIFICATION SYSTEM
presentation on POWER THEFT IDENTIFICATION SYSTEM
presentation on POWER THEFT IDENTIFICATION SYSTEM
presentation on POWER THEFT IDENTIFICATION SYSTEM
presentation on POWER THEFT IDENTIFICATION SYSTEM
THANK YOU!
ANY DOUBT…

More Related Content

PPTX
Power Theft Detection
PPTX
ELECTRICITY THEFT
PPTX
Power theft detection
PPTX
Electricity theft (1)
PPTX
Wireless power theft monitoring
DOCX
Chandna seminar report 1421105031
PPTX
Ppt power theft identification and detection using gsm
PPTX
Automated Meter Reading System
Power Theft Detection
ELECTRICITY THEFT
Power theft detection
Electricity theft (1)
Wireless power theft monitoring
Chandna seminar report 1421105031
Ppt power theft identification and detection using gsm
Automated Meter Reading System

What's hot (20)

PPTX
Liquid electricity
PPTX
Power theft detection
PDF
Wireless power-theft-monitering-ppt
PDF
Proposal on Power Theft
PPTX
Wireless electricity
PPT
Deregulation in power industry
PPTX
Electricity theft control
PPT
Automatic meter reading
PPTX
Web based power quality monitoring system
PPTX
Electrical Projects
PPTX
prepaid energy meter
PPTX
Power theft detection via plc
PPTX
Wireless power theft monitoring
PPTX
concept of resilience and self healing in smart grid
PPTX
Policies for smart grid
PPTX
Electrical Engineering Final Presentation
PPTX
Smart grid
PPTX
Planning and modern trends in hvdc
PPTX
Faults on Power System
PPTX
Artificial intelligence in Power Stations
Liquid electricity
Power theft detection
Wireless power-theft-monitering-ppt
Proposal on Power Theft
Wireless electricity
Deregulation in power industry
Electricity theft control
Automatic meter reading
Web based power quality monitoring system
Electrical Projects
prepaid energy meter
Power theft detection via plc
Wireless power theft monitoring
concept of resilience and self healing in smart grid
Policies for smart grid
Electrical Engineering Final Presentation
Smart grid
Planning and modern trends in hvdc
Faults on Power System
Artificial intelligence in Power Stations
Ad

Viewers also liked (18)

PPTX
Power theft
PDF
Electricalelectricsl power theft detection
PDF
solar cell by jerox
PPTX
Abhishek seminar
PPT
Tech seminar
PPT
Costly Throw Ups: Electricity Theft and Power Disruptions
PPT
Renewable energy sources
PPTX
Bengali Sign Language
PPTX
E waste.2014.university sulaiamany.biology.dashty rihany
PPTX
Semina4 topic fin
PPT
Biomass supported solar thermal hybrid power plant
PPTX
Green-Aware Network: Keynote Speech for NEST-UI
PDF
Detection and Instantaneous Prevention of Power Theft
PPTX
presentation on thread manufacturing
PPTX
Eddycurrentbrakes
PPT
Seminar
PPTX
solar cell
PDF
Passive sps ed2
Power theft
Electricalelectricsl power theft detection
solar cell by jerox
Abhishek seminar
Tech seminar
Costly Throw Ups: Electricity Theft and Power Disruptions
Renewable energy sources
Bengali Sign Language
E waste.2014.university sulaiamany.biology.dashty rihany
Semina4 topic fin
Biomass supported solar thermal hybrid power plant
Green-Aware Network: Keynote Speech for NEST-UI
Detection and Instantaneous Prevention of Power Theft
presentation on thread manufacturing
Eddycurrentbrakes
Seminar
solar cell
Passive sps ed2
Ad

Similar to presentation on POWER THEFT IDENTIFICATION SYSTEM (20)

PPTX
24. deepti semwal.pptx
PDF
Smart Anti Power Theft System
PPTX
Wirelesspowertheftmonitoringoriginalbyrupalipatra 121126043543-phpapp02
PPTX
Power Theft Detection (1) [Autosaved].pptx
PPTX
Sritish-powertheftdetection.ppt.pptx
PDF
IRJET- Electricity Theft Monitoring and its Consumption Savings
PDF
IRJET- Advanced Metering Infrastructure Tripping System
PDF
IRJET- Smart Energy Meter Theft Detection using IoT
PDF
Electricity Theft: Reason and Solution
PPTX
Theft Detection00000000000000000000000000
PDF
Theft Detection detection of raspberry and Arduino
PDF
35 electrical power
PDF
35_ELECTRICAL POWER
PDF
power electrical
PDF
WIRELESS POWER THEFT MONITORING SYSTEM
PPT
TECHNICAL SEMINAR 1CR19EE017.ppt
PPTX
Final POWER THEFT DETECTION BPC.pptx
PPTX
Power theft detection
PDF
An efficient and improved model for power theft detection in Pakistan
PDF
Design Smart Energy Meter to Prevention of Power Theft and Automatic Billing
24. deepti semwal.pptx
Smart Anti Power Theft System
Wirelesspowertheftmonitoringoriginalbyrupalipatra 121126043543-phpapp02
Power Theft Detection (1) [Autosaved].pptx
Sritish-powertheftdetection.ppt.pptx
IRJET- Electricity Theft Monitoring and its Consumption Savings
IRJET- Advanced Metering Infrastructure Tripping System
IRJET- Smart Energy Meter Theft Detection using IoT
Electricity Theft: Reason and Solution
Theft Detection00000000000000000000000000
Theft Detection detection of raspberry and Arduino
35 electrical power
35_ELECTRICAL POWER
power electrical
WIRELESS POWER THEFT MONITORING SYSTEM
TECHNICAL SEMINAR 1CR19EE017.ppt
Final POWER THEFT DETECTION BPC.pptx
Power theft detection
An efficient and improved model for power theft detection in Pakistan
Design Smart Energy Meter to Prevention of Power Theft and Automatic Billing

More from Gaurav Shukla (6)

DOCX
format of Cv
DOCX
summer training report on multistorey residential buildings
PPTX
multi swing bridges
PPTX
presentation on SUPERCAPACITOR
PPTX
nuclear weapon in india
PPTX
missile technology in india
format of Cv
summer training report on multistorey residential buildings
multi swing bridges
presentation on SUPERCAPACITOR
nuclear weapon in india
missile technology in india

Recently uploaded (20)

PPTX
additive manufacturing of ss316l using mig welding
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Sustainable Sites - Green Building Construction
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Geodesy 1.pptx...............................................
PPT
Project quality management in manufacturing
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Construction Project Organization Group 2.pptx
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Well-logging-methods_new................
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Lecture Notes Electrical Wiring System Components
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
web development for engineering and engineering
DOCX
573137875-Attendance-Management-System-original
PPTX
Internet of Things (IOT) - A guide to understanding
additive manufacturing of ss316l using mig welding
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Sustainable Sites - Green Building Construction
CH1 Production IntroductoryConcepts.pptx
Geodesy 1.pptx...............................................
Project quality management in manufacturing
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Construction Project Organization Group 2.pptx
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Arduino robotics embedded978-1-4302-3184-4.pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Well-logging-methods_new................
Structs to JSON How Go Powers REST APIs.pdf
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Lecture Notes Electrical Wiring System Components
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
web development for engineering and engineering
573137875-Attendance-Management-System-original
Internet of Things (IOT) - A guide to understanding

presentation on POWER THEFT IDENTIFICATION SYSTEM

  • 1. NRI INSTITUTE OF INFORMATION SCIENCE & TECHNOLOGY DEPARTMENT OF ELECTRICAL & ELECTRONICS ENGINEERING SEMINAR PRESENTATION ON- “POWER THEFT IDENTIFICATION SYSTEM”
  • 2. CONTENTS >Introduction -Power theft Definition -How it occurs >Different ways of monitoring power theft >Microcontroller Based power theft monitoring -proposed architecture >Block diagram >Advantages >Disadvantages >Conclusion
  • 3. INTRODUCTION (POWER THEFT) >it is the use of electrical power without a contract with a supplier with total or partial bypassing of the metering system or interfering with this system in such a way so as to adulterate its measurements, >contract is understood here as a valid oblingation to deliver power and to pay for it.
  • 4. HOW IT OCCURS ????? 1-(SLOWING DOWN THE METER) >A common method of tempering older meters is to attach magnets to the outside of the meter. >when this happens, the rotor disc is exposed to a high magnetic field. Hence the resultant is opposing magnetic field to the rotor highly increased leading to slowing down of rotor or perfect stopping of the disc rotation. >The electricity meter is thus manipulated and ultimately power is consumed without being paid. Ex-Neodymium magnets
  • 5. 2-(INVERTING THE METER/FEEDER)  Another common form of electricity theft is to invert the meter (pull the meter out of the socket & plug the meter back in upside down, which causes the meter to run backwards & the kWh register to count down instead of up).
  • 8. MICRO-CONTROLLER BASED POWER THEFT MONITORING  OVERVIEW-  The whole system architecture is based on integrating wireless network with existing electrical grid.  The proposed module also incorporates different data aggregation algorithms & effective solutions needed for the different pathways of the electricity distribution system.
  • 15. PLC (PROGRAMMABLE LOGIC CONTROLLER)  It is a digital computer used for automation of elecctromechanical process.  The PLC’s are designed for multiple input and multiple output.  Program to control machine operation are typically stored in non-volatile memory.  It is an example of a hard real time system since output results must be produced in response to input conditions within bounded time.
  • 16. PROGRAMMING OF PLC  Early PLC’s were programmed by using specific purpose programming terminals.  The programs were stored in cassette tape cartridges.  Facilities of printing and documentation were very minimal due to lack of memory.  The very old PLC used is non-volatile magnetic core memory.  Modern PLC’s used are EEPROM or EPROM as a memory.