Get the complete project »
- The Complete Research Material is averagely 52 pages long and it is in Ms Word Format, it has 1-5 Chapters.
- Major Attributes are Abstract, All Chapters, Figures, Appendix, References.
- Study Level: BTech, BSc, BEng, BA, HND, ND or NCE.
- Full Access Fee: ₦4,000
1.1 Background of the Study
(Sule, 2010), described Power System as a network that provides regions, Industries and homes with electrical energy. He also stated that electricity generation, transmission and distribution are three stages of delivering electricity to consumers. This power system is known as the grid and can be broadly divided into the generators that supply the power, the transmission system that carries the power from the generating centers to the load centers and the distribution system that feeds the power to nearby homes and industries. The distribution system is a part of power systems which is dedicated to delivering electrical energy to the end user. The planning and the design of electrical supply system are everyday task for engineers in the electric utilities companies. The goal of power distribution planning is to satisfy the growing and changing load demand within operational constraints and with minimal costs Sharma, et al., (2008). It is necessary for Power Distribution Company to update their customer’s information that corresponds to their electrical attributes. The database contains useful information that shows linkages with the distribution transformers, feeder and substation. It is also important to design a system that monitor the accuracy of consumption at the customer end. The design of smart system improves system reliability, hence encourages investments to the industry.
Electrical distribution improvement has many approaches ranging from feeder optimization, phase balancing and costing model for distribution planning. All these are ideas and efforts by many scholars in the field of electronics to improve distribution. In Nigeria, the power distribution has constituted seventy percent of electrical utility problem Titus, et al., (2013). Due to inadequacies in planning and use of wrong solution for an identified problem, it is obvious to note that the major problem of electricity utility comes from distribution of bulk power that have been transmitted over a long distance and the reason for this is that distribution demands are not known and well managed. Against the back drop that consumers of electricity are not identified based on their location, it is impossible to estimate the accurate demand of electricity for customers in such area. Another major problem is identified as commercial losses that reduces revenue, hence discourages investment into the system, Damian et al., (2015). The use of estimated load has also reduced the system reliability. This is a problem that cannot be solved overnight. However, with the right approach, solution is certain. The SMS (short message service) alert can provide the solution in the management of utility by way of detecting commercial loss which is a function of electrical theft.
(Kaira, 2014) proposed two methods in conjunction with the existing methods; the two methods are:
1. identified differential scheme and
2. Integration scheme.
Identified Differential scheme is achieved by attachment of sensors to heavy appliance such as fridges air conditioner and other heavy equipment, other loads were attached to one sensor. In the case where the total energy measured from individual sensor is sum and is not equal to that of the meter, theft is detected, otherwise no theft.
In integrated scheme of sort X-bee is embedded into the meter that communicates with the module present at sensing the total power given out of it. In the case of electrical theft, consumer homes were individually switched off remotely to detect consumer involved in the theft.
The limitation of the two methods proposed by Kalra (2014) is that privacy of the consumer is abused by installation of multiple sensors in the differential scheme. The method is costly to manage because at every intervals of time check is carried out to detect theft. The right of the customer to access energy is infringed, in the integrated scheme consumers that are not involved in electricity theft are cut off from supply for a period of time to detect the premises where the theft occur, this is also infringing on right of some customers who are not involve in the unwholesome behaviour.
Non-Technical Loss (NTL) occurs as a result of electricity theft (Dey, et al., 2010). He further highlighted types of electrical theft as: Fraudulent activities of customer, Stealing electricity, Irregular bill payment and unpaid bill. Meter tampering is classified into analogue and digital. Dey, et al., (2010) described Analogue tampering as Shortage of phase current coil which caused the current to pass through the shorter path which results to meter's unable to detect current passing through it. Current flow reversal by swapping of load and supply terminal, hence meter would be unable to detect quantity of electricity through it. Neutral disconnection hence meter unable to detect energy through it because of no potential difference.
Magnet is used to slow down rotation of the disc in analogue meter, hence reduction in sensitivity of the meter to record energy value. Tampering in digital motor is noticed when neutral is removed. Installation of' current transformers at both phase and neutral line to measure currents and teed hack to micro controller to determine difference in current is proposed Dey, et al., (2010).
In analogue meters, painting of rotating disc divided into four equal proportions in black and white, with LHD and LDR attached to the disc and powered is proposed. Rotation of the disc indicates no theft as the voltage to the micro controller varies otherwise theft is detected Dey, et al; (2010).
1.2 Electricity Theft Mechanisms
Electricity thefts may occur in different forms. From available literature and practical daily reports in Nigeria, Sayema, et al; (2014), the common ways include bypassing (illegal tapping of electricity from the feeder), meter tampering (by grounding the neutral wire as it does not measure readings) and physical methods to evade payment of bills. The basic method of stealing electricity is a direct wire-connection to a main power route passing a shop or a house so that electricity can flow to the consumer without crossing the electric meter installed by a government agency which is responsible for providing electrical services to customer. There are different types of theft done all over the world. Huge amount of power theft are done by tapping from line or bypassing the meter.
According to a study, 80% of the total theft detected all over the world is from residential buildings and 20% from commercial and industrial premises, Suriyamongkol, (2014).
1. Meter Tampering : Customers tamper the meter by grounding the neutral wire. A tampering unit used for stop of this energy theft it sent the alert to energy Provider Company when tampering occurs. If any person tries to tamper with energy meter the tampering unit will be activated and as SMS alert send central server of energy provider company.
2. Meter bypass: The input terminal and output terminal of the energy meter have been shorted by a wire. This act prevents energy from been registered in the meter.
3. Illegal terminal taps of overhead lines on the low tension side of the transformer : Primarily, electricity theft affects the power sector as a whole, tapping of the low tension side of the transformer result in overloading which causes tripping and can lead to blackout.
4. Illegal tapping to bare wires or underground cables : This is the most used method for theft of power as 80% of total power theft all over the world is done by direct tapping from line. The consumer taps into a direct power line from a point ahead of the energy. This energy source is unmeasured in its consumption and procured with or without switches.
5. Unpaid bills : Non-payment of bills by Individuals, Government Institutions and Untouchable personalities Individuals results in utility running at a loss and a must continually increase in electricity charges.
6. Billing irregularities: This incorporates the inaccurate meter reading taken by bribed servicemen and intentional fixing of the bill by office staffs in exchange of illicit payments from the consumers.
1.3 Causes of Electricity Theft
All energy distribution companies operate with some accepted degree of losses. This is no different from the scenario in Nigeria. The losses incurred are subdivided into two namely: Technical losses and Non- technical losses.
1. Technical losses : These are naturally occurring losses and consist mainly of power dissipation in electrical system components such as transmission lines, power transformers, measurement systems, among others. They are caused by the physical properties of the components of power systems, Sayema, et al., (2014).
2. Non-technical losses : These refer to those losses that are independent of technical losses in the power system. The most prominent forms of non-technical losses in Nigeria are electricity theft and non-payment of bills. It can also be viewed as undetected load Anyasi, et al., (2012). Theft is a serious crime, it creates short fall, increase of load, decrease of frequency which is not acceptable, causing load shedding and increase of tariff on the legal consumers Khan, et al., (2012). Some may argue that the distribution companies providing services give over-voltage, poor service and make excess money thus. Some theft will not affect its operations and profitability. Nigeria’s power system is an illustration of a worst-case situation prior to its privatization in 2013. The distribution companies have not upgraded their systems to meet the technological trends in advanced countries. In certain cities, however, the post-paid energy meters are gradually being replaced with the prepaid meters, the issue of constant electricity continually plague the country as this has not been achieved prior to its privatization in the last ten months.
Some localized catalyzing factors influencing electricity theft in Nigeria include lack of accountability in electricity market system, political protection of employees involved in corruption, influential customers who do not pay their bills, absence of effective laws to abate electricity related crimes and inadequate and ineffective enforcement of existing weak laws and generally negative attitude of electricity customers. Electricity pilferage has its root in corruption and bad governance. Customers attitude contribute a great deal to revenue losses. These attitudes range from their ill-conceived feelings that electricity should be a welfare commodity and therefore legitimate to steal from the state, to the generalization that the state is not incurring losses. They do not have the fore-knowledge that the money realized from the payment of bills are re-instated into the power sector for its improvement and development.
1.4 Existing Ways of Tackling Electricity Theft
The first step in electricity theft reduction is to become knowledgeable about the theft problem. Unless the nature and extent of power theft are known in great details, any attempts to deal effectively with the problem are prone to fragmented and limited action that has little over-all success, Smith, (2004). Corruption is one of the difficult problem areas for electricity organizations because power theft occurs with the connivance of employees of the power sector. Employees should hence, be paid adequately so that the issue of bribe collection will not be their last resort. Power companies are combating theft through the use of smart meters and sophisticated software that continuously records consumption and send the data back to them. One advantage of using the smart meter is that it eliminates contact between the consumers and the power provider’s employees thus preventing the issue of bribery, Depury, et al., (2010).
The already existing methods which may be utilized in tackling electricity theft in some countries where practiced include proper enforcement of electricity regulatory laws, periodic and impromptu checks of consumer homes, electronic tampering detection meter and use of prepaid meter. The limitations of using the smart meters are that, consumers feel it discloses privacy of their homes which are not ethically true and that it interferes with radio frequency and create problems in radio transmission profile, Wang, et al., (2013). Periodic checks are not 100% efficient due to its laborious and sluggish nature. Adopting this kind of method in electricity theft reduction will delay accurate and effective reading of the meters in remote areas that are non-accessible. Moreover, as result of the ever-increasing rate of corruption (such as greed and bribes) in the Nigeria, the proper enforcement of laws would take a drastically longer time than stipulated. In the past, committees that were set- up see it as an avenue to amass wealth rather than strictly punish defaulters, thus all these reasons have hindered the growth of our power sector.
1.5 Electricity Theft Identification in Distribution System
Electricity theft takes place in various forms and works with the help and support of different parties which include the utility staff and political leaders based on enacted laws and consumers. The major challenges of utility company are that the money invested into production of electricity for distribution is not recovered as a result of electrical theft.Kalaivani, (2014). As a result, the masses have to pay extra fees in terms of tariff toutility company to compensate for these losses, (Kalaivani, 2014).
According to Kalaivani (2014), electricity consumers steal energy in the following way: Unhooking technology, One fire one ground technology, Reverse the in and the out, Cross meter to connect wire, Exchange fire with zero. (Kalaivani, 2014) proposed a method to monitor electricity theft based on information from a distribution transformer and various output of meter readings from the various consumer’s premises. In their method, the energy giving out from a transformer is measured while various reading in the consumer's premises is summed up with a comparator. The outputs of the reading from different consumer's premises are feed into a differentiator with output from the transformer. This various outputs are subtracted; a difference indicates that there is power theft. The limitation of this is that, they only measure power theft at the transformer, and cannot point precisely the consumer premises that these theft occurred, an intelligent system is required to solve the problem.
(Sagar et al., 2013) used the method of installing communication meter at both customer's premises and the electric pole connecting the customer's premises. The two meter sent out information of consumption, which is compared to check the difference. The difference in the two measurements indicates power theft. The disadvantage of method is that, the proposed method is post-paid metering which does not support fast revenue collection. In addition, the method involves data collection and analysis, hence involves more cost of managing electricity.
According to Syed, et al., (2012), they proposed that the power distribution and theft control by identifying patterns of distribution demand, consumption, loses and supply power to areas in need of power at a particular time based on the available database of consumer demand, consumption and losses. In view of Syed et al., (2012) they identified four kinds of power theft thus: Kunda, Meter reversing, Hinder hard dealing and Power mafia.
In kunda method of power theft, the utility poles are very close enough to building that wire can be easily suspended on them in the form of hook, while in meter reversing electrical technician can carry out this kind of theft with the consumer and reversing the electrical meter to give lower reading. Under hand dealing is a method of power theft where the utility staffs connects consumer's to power line illegally because they have been paid some stipend. Power mafias are groups of highly organized power thefts, they controls some areas and detects what happens in those areas Syed, et al., (2012).
Power theft can be combated by mapping area of power demand, load shading technique will be used use to cut off area that are prone to power theft and increase power supply to area less prone to theft Syed et al.,(2012). One major disadvantage of this technique is that it does not provide solution to power theft at each individual premises rather it only provide a mapping of the area to show distribution planning.
Toward power to all: A case study of misuse of power in Lucknow India, misuse of power was studied by Triparthi, (2011). It was observed that consumers do not turn OFF their lights during the day time because there is no special billing plan. The billing plans are the same for all time of the day. They proposed that electricity billing plan should not be the same for all time of the day so that consumers will be forced to turn off their light during periods that light are not necessary, Triparthi, (2011).
According to Mohammed, (2012), GSM base based smart meter distribution system identifies common methods used by consumers for electrical theft. The methods are as follows:
1. The use of mechanical objects: in this type of method consumers makes use of mechanical objects to stop disk revolution of the analogue energy meter in order to alter the speed of the revolution and hence incorrect reading.
2. Use of fixed magnet was also identified as a means: consumers use to disturb the electromagnetic field of current coil, for the purpose of affecting the energy records of the meter.
3. Direct by pass of meter and hence create no electric consumption record at all.
4. Switching of energy cable of the meter connection box and this does not allow current passage through the coil; hence there is no energy record of the meter.
5. Illegal connection to the distribution lines, in which consumers tap directly to the power lines.
Installing of GSM smart miners al both consumer's premises and transformer supplying to the consumer linked to database installation at central station was proposed by Mohammed, (2012). The energy consumption at every premises connected to the transformer are sent to the data base and summed up. The total consumption of the houses is compared with transformers load at interval, in case of difference, electrical theft has occurred in a particular interval and vicinity. Accordingly the three phases and neutral current were also compared. Limitation of this method is that they considered energy theft in a particular area and riot in particular premises, using information from various consumer premises and the transformer, hence needed to be improve upon.
Electricity losses occur as a result of electrical theft due to meter tampering, meter malfunctioning, illegal connections and billing irregularities, Thong, et al., (2010). Support Vector Machine (SVM) and fuzzy Interference System (FlS) are proposed for detection of nontechnical loses. Meter event log by Remote Meter Reading arid Installation inspection were used for loss detection. Limitation of this method is that theft is not detected instantly and data analysis takes a long time before theft can be detected. Another limitation is that too much data is involved and this may bring confusion hence wrong detection.
According to Kalra, (2014), the following ways are used by consumer to steal electricity. Direct hooking from line, this constitutes 80 percent of the total power theft. It was farther stated that consumers tap directly from the point ahead of the energy meter. Other methods include input, and output terminals that have been shorted by while in order to disallow energy meter to registered consumption.
(Kalra, 2014), also noted that injection of foreign material causes the meter to misbehave against the utility company's condition and operate to advantage of the customer involve in the theft .It was added that hole drilled in electromechanical meter obstructs free movement of the rotating disc by insertion of foreign material inside the meter. According to Kalra (2014) the following methods were in use and could not totally eliminate theft detection.
Vector base data classification method which involves data acquisition, processing, feature extraction, classification training and parameter optimization, classification, data post processing, and suspected customer list generation. In his idea, a data set of customer consumption pattern is developed on historical data and applied on Support Vector Machine (SVM). SVM are trained to present all possible form of data. Specification base intrusion detection technique, in this technique, use of monitoring state to improve the detection rate over a wireless sense network, mutual inspection and AMI.
Game theory base detection investigate incentive problem of electricity distribution where customer energy usage is imperfectly observable by the distributor. The researcher also noted that as a result of privacy protection of each customer and this makes it difficult for distributors to observe correctly the precise quantity of energy used.
Current electrical distribution
You either get what you want or your money back. T&C Apply
You can find more project topics easily, just search
SIMILAR COMPUTER SCIENCE FINAL YEAR PROJECT RESEARCH TOPICS
1. Design and development of personnel information system (case study of nation population commission» ABSTRACT This work intends to provide a computer based system for the maintenance of personnel records of employees in organization. The work addresse...Continue Reading »
2. THE RELEVANCE OF INFORMATION TECHNOLOGY IN THE MANAGEMENT OF SMALL AND MEDIUM SCALE ENTERPRISE IN NIGERIA» CHAPTER ONE INTRODUCTION 1.1 Background of the study The The dynamic role of Small and Medium Enterprises (SMEs) in developing countries as engines th...Continue Reading »
3. DESIGN AND IMPLEMENTATION OF ONLINE INDUSTRIAL TRAINING FUND PAYMENT SYSTEM (CASE STUDY: FEDERAL COLLEGE OF AGRICULTURE ISHIAGU)» ABSTRACT It is pertinent to say that students are encountering problems in receiving their industrial training allowance. As a computer science studen...Continue Reading »
» CHAPTER ONE 1.1 INTRODUCTION TO THE PROJECT With advancement of technology things are becoming simpler and easier for us. Automation is the use of con...Continue Reading »
» ABSTRACT Computers are known for their wide range of uses especially in scientific and mathematical fields. However little or no thought has been give...Continue Reading »
6. THE INFLUENCE OF SMART PHONES AND SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF SENIOR SECONDARY SCHOOL STUDENTS» ABSTRACT The study investigated the influence of smart phones and social networking sites on the academic performance of secondary school students in ...Continue Reading »
» CHAPTER ONE 1.1 INTRODUCTION The introduction of computer into the information technology has tremendously effect on the information of organizations ...Continue Reading »
» CHAPTER ONE 1.1 INTRODUCTION A Geographical Information System (GIS) is a system of hardware, software and procedures to facilitate the management, ma...Continue Reading »
» CHAPTER ONE INTRODUCTION 1.1 BACKGROUND TO THE STUDY Information and communication technology (ICT) offers the promise of fundamentally changing the l...Continue Reading »
» CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF STUDY Employee records may be defined as "record that contain initial application forms, results of physica...Continue Reading »