2014 IEEE Conference on Energy Conversion (CENCON) 2014
DOI: 10.1109/cencon.2014.6967476
|View full text |Cite
|
Sign up to set email alerts
|

Distribution line monitoring system for the detection of power theft using power line communication

Abstract: Electrical power theft is the main cause of Non Technical Losses (NTL) in the electrical power system. This paper is intended to provide with an innovative scheme for the detection and monitoring of Electrical power theft in the Electricity distribution system based on the principle of Power line Communication. A Narrow band power line carrier signal is injected into the distribution power line along with the power frequency signal (230V, 50Hz). Any illegal utilization of electricity will be detected with the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 5 publications
0
9
0
Order By: Relevance
“…The following is a work of several researchers' on theft detection models: In [23] study employs a method based on the power line communication concept, which is used to identify electricity theft. A high-frequency signal is introduced to the distribution network that fluctuates in amplitude and frequency as the load on the lines rises or falls.…”
Section: Related Workmentioning
confidence: 99%
“…The following is a work of several researchers' on theft detection models: In [23] study employs a method based on the power line communication concept, which is used to identify electricity theft. A high-frequency signal is introduced to the distribution network that fluctuates in amplitude and frequency as the load on the lines rises or falls.…”
Section: Related Workmentioning
confidence: 99%
“…Also, equations ( 17) and ( 18) depict the percentage of range bounds in equations ( 15) and ( 16) for an altered user meter respectively. While for accurate range bounds in relation to (17) and (18), unaltered user meter λt is set to zero.…”
Section: Power Theft Analysis In the Absence Of Meter By-passingmentioning
confidence: 99%
“…By providing proper isolation from the power frequency signal, the system can be implemented without any source for damage to the oscillator and the entire detection circuit [56].…”
Section: Cybercriminals Switched Towards Different Services Such Asmentioning
confidence: 99%