Friday, April 5, 2019

Mechanism Of Electromechanical Induction Meter Information Technology Essay

Mechanism Of Electromechanical Induction Meter Information Technology EssayAs the sable economy spawns desperate evaluates, most of the residents of our beloved city, Karachi ar resorting to a hazardous practice which is take galvanizing energy. many utilities say energy stealing has risen sharply during the recent frugal downturn. Culprits include residential customers whose agency is turned come to when they fall behind on the bills and small businesses struggling to keep their doors open. They atomic number 18 victimisation a wide array of tactics. Some run conducting wires from utility lines directly into a roundabout-breaker panel to revolve the electric measuring. Others adhereed cables on either side of a meter, swipe meters from va brookt ho social occasions when theirs atomic number 18 upstage or tamper with meters to lower their electric bills.People from KESC ar finding more and more state argon stealing electricity beca handling of the poor economy, s aid by the sources of electricity supplying breadbasket.It has been investigated that 3,197 cases of stealth in January and February, a 28% jump over the year-ago period.Customers welcome stolen antecedent for decades, costing utilities 1% to 4% of tax or ab turn up RS 49 billion industry wide each year, according to Electric lighten up Power magazine. Losses are borned by early(a) customers. Many thieves operate home- found marijuana farms that use a great deal of lights and exp int.But the line is basically mushrooming. Mean while, consulting firm Detectent has identified a double-digit arise in business thefts the olden six months, many by energy-guzzling restaurants. In Landhi, Deen Baksh, 48, was charged last fall with3 meter rigging. DTE Energy says he helped about 50 downtown businesses cut their gas and electric bills by more than RS.1 million or 30% to 50% each the past several years.The practice is actually dangerous. Touching a power line may burn or eve n kill an untrained person. In Philadelphia this month, an illegal electricity hookup in a row house resulted in a spark a elan that killed a 30-year-old woman and her 8-year-old daughter.Utilities often learn of thefts from meter readers, neighbors or may be abnormal use patterns. They expect to detect fraud earlier as they roll out smart meters that benignantle internationally monitor electricity usage. electricity theft can be in the form of fraud (meter tampering), stealing (illegal connections), boot irregularities, or unpaid bills. Estimates of the extent of electricity theft in a sample of 102 countries for 1980 and 2000 are studied. The evidence shows that theft is change magnitude in most of the regions of the world. The financial impacts of theft has cut income from the sale of electricity and the necessity to charge more to consumers. Electricity theft is closely related to governance indicators, with high peaks of theft in countries without effective accountabil ity, political instability, low government effectiveness and high levels of corruption. Electricity theft can be lowered by applying adept solutions much(prenominal) as tamper-proof meters, managerial methods such as brushup and monitoring, and in whatsoever cases restructuring power systems ownership and regulation.The main purpose of our report is to present solution to economic problems and consequently economy rate volition require higher. And that loss which KESC have to bear repayable to this problem will be decreased.Economically this idea has great benefit both for masses and society. Once the theft of electricity would be detected hence steps will be taken to stop it which will yield in discouraging the people use electricity illegally. Energy will be distributed to every ane correctly thus everyone will be remunerative charges of unless the fall they consume. Energy generating and distributing bodies will non be having extra misdirect over their lines thu s no power trips and break downs will occur so no extra money required for correcting such problems.CHAPTER NO 01ELECTRIC METER1.1 ELECTRIC METERSAn electric meter or energy meter is equipment that can measure the add up of electrical energy consumed by a residence, business, or an electrically powered device. Electric meters are parkly calibrated in billing units the most public is the kilowatt hour. Periodic readings of electric meters take a leak billing cycles and energy use during a cycle. In come outtings when energy savings during certain periods are desired, meters may measure demand which is the maximum use of power in some interval. In some areas, the electric rates are higher during specialised times of day for encouraging reduction in use. Also, in some areas meters have switches to turn off nonessential equipment.Electricity meters work by continuously measuring the instantaneous potential (volts) and certain (amperes) and and then finding the product of these to give instantaneous electrical power (watts) which is afterwards integrated against time to give energy used (joules, kilowatt-hours etc.). Meters for smaller services (for instance small residential customers) can be affiliated directly in-line mingled with source and customer. For larger loads, i.e. more than about 200 amps of load, authoritative transformers are used, so that the meter can be located other than in line with the service conductors.The meters fall into deuce basic categories, electromechanical and electronic.1.1.1 Mechanism of electromechanical induction meter.1. Voltage coil many turns of fine wire encased in plastic, machine-accessible in parallel with load.2. Current coil three turns of thick wire, attached in series with load.3.Stator-concentrates and confines magnetic theatre.4.Aluminum rotor disc.5. Rotor brake magnets.6. Spindle with worm gear.7. ostentation dials note that the 1/10, 10 and 1000 dials boot out clockwise while the 1, 100 and 100 00 dials rotate counter-clockwise.The electromechanical induction meter operates by counting the revolutions of an aluminum disc which is made to rotate at a speed proportionate to the power. The number of revolutions is thus proportional to the energy usage. It consumes a small amount of power, ty flickally around 2 watts.The metallic disc is acted upon by deuce coils. One coil is committed in such a way that it produces a magnetic merge in proportion to the emf and the other produces a magnetic flux in proportion to the legitimate. The field of the voltage coil is detain by 90 degrees using a lag coil.16 This produces wrench currents in the disc and the effect is such that a force is exerted on the disc in proportion to the product of the instantaneous current and voltage. A permanent magnet exerts an opposing force proportional to the speed of rotation of the disc. The equilibrium between these both opposing forces results in the disc rotating at a speed proportional to th e power being used. The disc drives a memorialize mechanism which integrates the speed of the disc over time by counting revolutions, much like the odometer in a car, in order to render a measurement of the extreme energy used over a period of time.The type of meter described here is basically used on a single-phase AC supply. Different phase configurations use additional voltage and current coils in them.1.1.2 up-to-date TRANSFORMER (CT) METERINGHuge businesses or multi storey buildings use so much power that they bevel be connected to the ne dickensrk via the usual methods so in order for these sites to be metered, the load require to be broken down so the meter will be able to cope with it and then be multiplied out again in order to get the full amount of power being used. This is known as CT metering.Actually the load comes into a CT chamber from where it is then distributed from buzz bars containing transformers to CT links and then into the meter. The CT chamber alike g oes into the customers switchboard.The rating of the transformers finds out the multiplier to be applied when calculating true usage.1.1.3 METER USED IN THE PROJECTThe meter used in our final year project is electromechanical induction meter.1.2 UNIT OF touchstone kilowatt hour is the most common unit of measurement on the electricity meter which is friction match to the amount of energy used by a load of one kilowatt over a period of one hour, or 3,600,000 joules. Some electricity companies also use the SI mega joule instead.Remote current and voltage sensors are be read and programmed farly by modem and locally by infra-red. The circle with cardinal dots is the infra-red port give the reading. Tamper-evident seals are also present in some meters.Demand is usually careful in watts, but averaged over a period, most often a quarter or one-half hour1.3 ELECTRICITY THEFTMeters can be controlled to make them under-register, effectively permitting power use without paying for it. Th is theft or fraud can be dangerous and also dishonest.Electricity theft can be in the form ofi)fraud (meter tampering)ii)stealing (illegal connections)iii)billing irregularitiesiv)Unpaid bills.Another common method of tampering on older meters is to attach magnets to the outside of the meter. They magnetically saturate the coils or current transformers, preventing the alternating current from forming eddy currents in the rotor, or inducing voltages in the current transformer. Also rectified DC loads cause mechanical (but not electronic) meters to under-register. DC current does not cause the coils to make eddy currents in the disk so this causes reduced rotation and a lower the bill. Some combinations of capacitive and inductive load can also move with the coils and mass of a rotor and cause reduced or reverse motion.1.3.1 Basic Layout Of The Project Including Electricity Theft PossibilitiesBypass wireBreaker to cut out the meterHomeNeutral Wire, immaterial current iNPhase wire, p hase current iPEarth wireMeter crusade 1If there is no bypassing of the meter and the entire load is OFF.iN (Neutral current) = iP (Phase Current) = 0 solecism 2If there is no bypassing of the meter and the entire load is ON.iN (Neutral Current) = iP (Phase current) = some pryCase 3If there is meter bypassing and the entire load is ON.iP (Phase current ) = 0iN (Neutral Current) = loadThe first target is to sense / measure phase and neutral current. And if case 3 is sustain than it will be a theft case.1.3.2 Outcomes Of Electricity TheftThe evidence shows that theft is vastly increasing in most regions of the world. The financial impacts of theft have resulted in reduced income from the sale of electricity and the necessity to charge more to consumers. Electricity theft is closely concerned to governance indicators, with higher levels of theft in countries without effective accountability, political instability, low government effectiveness and high levels of corruption. Power thef t has surely become an infamously prevalent practice in many split of the country, both rural and urban. Many cases go unreported in various cities and villages, costing a lot to our countries burdened economy. People actually pay some local electrician a little money to reverse the electricity meter of the house and/or slow its pace. Some people also learn the trick from an electrician and help their family/friends steal electricity.1.3.3 astray distributed Methods To Reduce Electricity TheftElectricity theft can be reduced byApplying technical solutions such as tamper-proof meters.Managerial methods such as inspection and monitoring.Restructuring power systems ownership and regulation..A common method of tampering on older meters is to attach magnets to the outside of the meter. These magnetically saturate the coils or current transformers, preventing the alternating current from forming eddy currents in the rotor, or inducing voltages in the current transformer.Rectified DC lo ads cause mechanical (but not electronic) meters to under-register. DC current does not cause the coils to make eddy currents in the disk, so this causes reduced rotation and a lower bill.Some combinations of capacitive and inductive load can interact with the coils and mass of a rotor and cause reduced or reverse motion.CHAPTER NO 02MEASUREMENT OF AC CURRENT2.1 DESCRIPTIONHere we have considered household power is single-phase electric power, with two or three wired contacts at each outlet.The live wire (also known as phase, desirous or active contact), carries alternating current between the power grid and the household.The neutral wire completes the electrical circuit by also carrying alternating current between the power grid and the household. The neutral is staked into the underseal as often as possible, and therefore has the same electrical charge as the earth. This prevents the power circuits from upgrade beyond earth, such as when they are struck by lighting or become disparately charged.The earth wire or ground connects cases of equipment to earth ground as a protection against faults (Electric Shock).2.2 MEASUREMENT OF AC CURRENTIts very difficult to measure ac current and produce voltage proportional to it. For measurement of ac current Hall Effect devices are mostly used. They produce the voltage proportional to the magnetic field in the air gap by inserting Hall Effect magnetic field sensor in the current transformer core air gap. The circuits below measure the ac current without using Hall Effect devices.2.2.1 WORKINGFIG 1An electric current J2 is introduced in the supplemental bend of the coil which is proportional to the primary winding J1.Th secondary current can be controller by means of number of turns on primary and secondary winding. The primary winding either have one turn or a number of turns wrapped around it while the secondary winding has usually multiple turns around it. If the current transformer is ideal then the current in the secondary winding is equal to that in primary winding. But if it is possess non-ideal characteristics then the current in both windings will not be equal due to substantial phase angle, error of ratio, and/or wave shape in its output. They are the function ofThe properties possess by magnetic core.How much burden on it.How much dc component present in the primary current.FIG2Due to burden in the secondary the currents in the secondary and primary arent equal. Fig 2is used to reduce this effect .V4 is the voltage which is proportional to the rate of magnetic flux and is introduced by terminating the sense winding 10 to high impedance the effective burden can be reduced by applying it tin series to the secondary winding after it is being amplified. Now the currents in secondary will be proportional accurately to that in primary since the magnetic flux changes in the core is reduced to zero. Smaller flux changes and higher accuracy will be achieved by higher gains in the amplifier circuit while on the other hand this leads to instability and associated =oscillations in the circuit. This technique is a better measure of ac current but the problem raised may be due to the dc component in the primary currentFIG 3Compensation voltage is generated by using secondary current as input and this voltage is required for driving the secondary current. The voltage generated V1 is proportional to the driving current J2 and the output voltage V3 is produced as an information note. The advantage of above circuit is that instead of using Hall Effect sensors ordinary current transformers can be utilized to measure the ac current with a dc component .The above current sensor has the following properties point in the presence of primary current the current transformer gives accurate output.This circuit uses a relatively trashy and simple magnetic core.Stable over temperature and time.Primary current in in effected by noise.The voltage V3 is utilized further to obtain a dc vo ltage. For this purpose this ac output is passed by a rectifier circuit in order to obtain a dc voltage at the output.CHAPTER 03MICROCONTROLLERS3.1 understructureMicrocontrollers are devices that have CPU, RAM, read-only shop, I/O ports, and timers all on a single chip. In other words all are embedded on a single chip. For applications in which cost and spacericeps femoris are critical issue microcontrollers are preferred for their above mentioned features.Microcontroller is one of the major components of this design as it plays key role of the coordination between all the components. It inputs current signal and evaluates the theft. The result is then sent to remote office by connecting erratic to microcontroller. AT commands are used for communication between alert and microcontroller.Microcontrollers are available with contrastive instruction determine, registers, speed, packaging and costs. at that place are many distinct types of microcontrollers. Freescales 6811, Int el 8051, Zilogs Z8, and PIC 16X from slow down technology are popular 8 enactment microcontrollers. Nowadays 16 indorsement and 32 bit microcontrollers are also available. Microcontrollers are not compatible with each other because each has a different instruction set and registers.Certain important points must be kept in mind while selecting a microcontroller for a particular application.Firstly it must be able to satisfy all computational needs. These computational needs include capacity and speed.Speed While choosing a microcontroller it should be operating at the speed that is required for the applicationCapacity For certain applications programs are too long and they exceed on chip RAM capacity. Therefore it is necessary to consider on chip RAM memory.Secondly it must be compatible with devices used in application. This is an important issue. There are many microcontrollers which support only a particular baud rate and are incompatible with the devices that operate at the higher baud rate.Thirdly it must be available in required quantities and at the required costs.3.2 POPULAR MICROCONTROLLERS both important microcontrollers that are wide used are 8051 and PIC.3.2.1 8051 FamilyThere are many members of 8051 family which are produced by different vendors and have different features.Some of the wellspring known are80518051 was originally produced by Intel corporation .It has 4Kbytes ROM and 128bytes on chip RAM .Other products are 8052 and 8031 microcontrollers. These two have additional features such as increased ROM capacity, speed and timers.AT89C51One of the most widely used 8051 microcontrollers is AT89C51 from Atmel Corporation. It is one of the most widely used from 8051 microcontrollers because of its slatternly availability and low cost.OTP version of 8051One time programmable versions of 8051 are also widely used. Because of its low cost it is used for mass production.3.3 PREVIOUS APPROACHEarlier for project purpose Atmel89C51 was selected and ADC0808 was used along with it to convert current to digital.3.3.1 ATMEL 89C51It is one of the most commonly used controllers. The reasons behind its popularity areIt is widely available.Programming language is very simple.All its education tools are readily available.3.3.1.1 FeaturesIt is low powered and 8 bit microcontroller.32 I/O lines.6 interrupts2 timers.4K flash memorySerial programme is also possible.The figure below shows the pins of Atmel AT89C51.If AT89C51 is used for the current implementation then following points need to be considered3.3.1.2 Interfacing ADC With MicrocontrollersIt does not have built in ADC therefore an external ADC is interfaced to entertain analog inputs. Normally ADC0808 and ADC0848 are used.3.3.1.3 Serial communicationFor attendant communication it has built in UART mode. There is a special serial register known as SBUF.3.3.1.4 ADC0808As current is analog quantity and 8051 can only acknowledge digital inputs therefore an ADC was needed .Fo r this purpose ADC0808 was preferred as it is considerably available in markets and compatible with 8051.Due to the compatibility issue atmel8951 was replaced by pic16F877A.3.3.2 PICPIC stands for programmable port controller and it is made by cow chip technology. PIC is widely preferred for industrial applications due to their low cost, capacity, extensive features and wide availability of development tools like its programmer, compiler etc.3.3.2.1Features Of PICIt follows Harvard architecture that is code and data spaces are separate. They even have a separate bus. This digests program and data to be fetched simultaneously. Code space is implemented as ROM whereas for data space we have general purpose RAM. However addressable data space is small.There is only one accumulator.Most of the PIC controllers are 8-bit microcontroller that all data should be in 8 bits and all operations are also performed in 8 bits chunks.They also support instructions, operations and commands that a llow user to work on single bit.It has predefined instruction set with few changes for different versions .The instruction set includes instructions that support direct memory addressing as well as indirect addressing. It also supports conditions and branching.Newer versions of pic also have built in ADC into the microcontroller.PIC have hardware call stack which cannot be accessed through software. They save return addresses.TYPES OF PIC MICROCONTROLLERSThere are many PIC series of which well known are as followsPIC17 SERIESPIC18 SERIESPIC32 SERIESPIC24 SERIESPIC16 SERIESFor the project PIC16f877A is cover in detail therefore PIC 16 series is discussed briefly.3.3.2.2 PIC16 SeriesPIC16 Series are small, fast, and are available in most of areas. There are many different variants of pic16 series in which some have more I/O pins some have ADC, some have more memory.3.4 CURRENT APPROACH3.4.1 PIC16F877AFor this project pic 16f877A has been used .The reasons behind using it were as follo wsIt is widely available in most of the areas.It has built in 10 bit ADC that was needed for our project.Its compiler and programmer were also easily available.It supports baud rate required for our application and it is compatible with devices that are used.It is relatively easy to program.The details of the pins are provided in the Appendix A3.4.1.1 Features Of PIC16F877AIt is a 40 pin device5 I/O ports A, B, C, D and E some pins are multiplexed so that they can be used for peripheral functions.15 interrupts8 A/D input transmit35 single word instructions and 1 instruction is composed of 14 bits.20 megacycle per second operating speedData memory of 368 bytesEEPROM memory of 256 bytes3 timers2 analog comparators.3.5 HARDWARE SECTIONHardware design of PIC consists of combining different modules and devices with the controller that work together in order to attain information from the E-meter and read into the micro-controller. In this prick ports, oscillators, registers of PIC tha t are used for implementing the design are briefly discussed3.5.1 OscillatorExternal oscillator with a frequency of 12 MHz is used in order to achieve clock speed of 8MHz.The baud rate is set at 9600kbps. Internal oscillator of pic is not used.3.5.2 I/O PortsAs the current has to be sensed through the microcontroller therefore portA is used and is configured for analog input (AN0 to AN7). Its corresponding direction register is TRISA.3.5.3 Analog to Digital Converter ModulePIC16F877A has octet pins for Analog-to-Digital (A/D) Converter module. The conversion of an analog input signal results in a corresponding 10-bit digital number. It can even operate in sleep mode. The A/D clock must be derived from the A/Ds internal RC oscillator. The AD module has four registers adresh, adresl, adcon0 and adcon1. The 10 bit AD result is stored in adresh and adresl registers.ADCON1 is used for configuration of port pins. The operation of AD module is controlled through ADCON0.3.5.4 USARTIn ord er to generate alarm at remote office, controller is connected to mobile. The phone is connected to Universal Synchronous Asynchronous Receiver Transmitter (USART) module which is one of the two serial I/O modules of PIC16F877A. USART is also known as a Serial Communications Interface or SCI. USART uses standard Non-Return to- Zero (NRZ) format (one Start bit, eight or nine data bits and one Stop bit). The USART transmits and receives the LSB first. The transmitter and receiver function independently.3.6 SOFTWARE DESIGN3.6.1 Development ToolsThe code is written in pic basic pro language. The code is then converted to jinx via microcode studio and hex code is loaded into pic16F877A through quad programmer.Microcode studio is used because its free version is easy available on internet. For compiler three header agitates are made. One excite is used by compiler other is used by programmer. The file with the extension .BAS is used by pbp .Pbp then makes .ASM file from it. It then mak es .ASM file from it. If code is error free then assembler required output file with hex code in it. This hex code is loaded in the pic by quad programmer.3.6.2 Program CodeThere are multiple parts of the software design, as the micro-controller plays many parts in the coordination of the instrumentation panel.Firstly internal ADC of the PIC16F877A is configured to sense the current. The next step for the code is to check if input is greater than 0 .If it is greater than 0 then a message is sent to remote office through mobile. For this AT commands are used that are specially made for communication between GSM modules and microcontroller. Other than the mentioned AT commands in the following table are in appendix BCOMMANDS social functionATZAT+CMGF3. AT+CMGS4. AT+CMGLRecall Stored ProfileMessage FormatSend Message hark MessagesCHAPTER NO 04WIRELESS ACCESS TECHNOLOGIES4.1 EVOLVING WIRELESS TECHNOLOGIES IN PAKISTANThere are two important tuner access technologies that can be used wit hin Pakistan and are feasible for our project and that areWIMAXGSM4.2 GSM engineering scienceFor mobile telephony systems in the world, the most popular standard is GSM. The GSM Association estimated that 80% of the global mobile market uses the standard. 1.5 billion People across more than 212 countries and territories uses GSM technology for their benefits. This means that subscribers can use their phones passim the world between mobile network operators, enabled by international wraping arrangements. GSM is considered a second generation (2G) mobile phone system because GSM differs from its predecessor technologies in that both signaling and speech channels are digital. GSM also facilitates the wide-spread implementation of data communication applications into the system.The GSM standard provides an advantage to both consumers, who may benefit from the ability to roam and switch carriers without replacing phones, and also to network operators, who can choose equipment from man y GSM equipment vendors.GSM also pioneered cheapest implementation of the of a sudden message service (SMS), also called text messaging, which has since been supported on other mobile phone standards as well. A worldwide emergency telephone number feature is also provided by this standard.GSM also supports indoor(a)(prenominal) coverage and may be achieved by using an indoor picocell base station, or an indoor habitual criminal with distributed indoor antennas fed through power splitters, to deliver the radio signals from an antenna outdoors to the separate indoor distributed antenna system. When a lot of call capacity is needed indoors then these are typically deployed for example, in airports or shopping centers. However, this is not a prerequisite, since indoor coverage is also achieved by in-building brainstorm of the radio signals from any nearby cell.The modulation technique used in GSM is Gaussian minimum-shift keying (GMSK). It is a kind of continuous-phase frequency shi ft keying. In Gaussian minimum-shift keying, the signal to be modulated onto the carrier is first smoothen with a Gaussian low-pass filter prior to being fed to a frequency modulator, so it greatly reduces the interference to neighboring channels (adjacent-channel interference).4.2.1 GSM CARRIER FREQUENCYGSM networks operate in a number of different carrier frequency ranges (separated into GSM frequency ranges for 2G and UMTS frequency bands for 3G), the most 2G GSM networks operating in the 900MHz or 1800MHz bands. The 850MHz and 1900MHz bands were used instead, Where these bands were already allocated (for example in Canada and the United States). In some countries the cd and 450MHz frequency bands are assigned In rare cases because they were previously used for first-generation systems.In europium Most 3G networks operate in the 2100MHz frequency band.Regardless of the frequency selected by an operator, it is divided into timeslots for individualist phones to use. That is why it allows eight full-rate or sixteen half-rate speech channels per radio frequency. These eight radio timeslots (or eight burst periods) are further grouped into a TDMA frame. In the same timeslot half rate channels use alternate frames. The channel data rate for all 8 channels is 270.833kbit/s, and the frame season is 4.615ms.The transmission power limited in a handset to a maximum of 2 watts in GSM850/900 and 1 watt in GSM1800/1900.4.2.2 NETWORK STRUCTUREThe network is structured into a number of decided sectionsThe Base Station Subsystem (the base stations and their controllers).The Network and Switching Subsystem (the part of the network most alike(p) to a fixed network). This is also called the core network.The GPRS Core Network (the optional part which allows packet based Internet connections).For maintenance of the network, the Operations support system (OSS).4.2.3 SMS MODES IN GSMWe have two types of SMS modes in GSMSMS text ModeSMS PDU ModeThe text mode (It is unavailab le on some phones) is simply an encoding of the bit stream. It is represented by the PDU mode. There are several encoding alternatives when displaying an SMS message and Alphabets may differ. The most common options are PCCP437, PCDN, 8859-1, IRA and GSM. These are

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.