• Login
    View Item 
    •   Mak IR Home
    • College of Engineering, Design, Art and Technology (CEDAT)
    • School of Engineering (SEng.)
    • School of Engineering (SEng.) Collections
    • View Item
    •   Mak IR Home
    • College of Engineering, Design, Art and Technology (CEDAT)
    • School of Engineering (SEng.)
    • School of Engineering (SEng.) Collections
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Development of a Long-range technology based power theft monitoring and control system.

    Thumbnail
    View/Open
    Master's Thesis (2.938Mb)
    Date
    2022-05-04
    Author
    Mabirizi, Nelson
    Metadata
    Show full item record
    Abstract
    Uganda presently experiences rampant power theft and vandalism within the electricity distribution network in some regions of the country. About 16.4 % of the total power that Umeme Ltd, the main power distribution company, gets from the transmission network is lost through power theft and vandalism. This leads to a revenue loss of above Shs. 100 billion annually affecting the energy subsector and the economy at large. These losses have always been passed over to honest consumers indirectly at the time of electricity purchase. Since domestic consumer loads are metered, most of the power theft cases involve meter tampering and destruction to bypass the meter and alter its coding nature. The utility company has actively been employing human resources to manually monitor these meters even when no issues are detected. This comes with high administrative and management costs. The main objective of this study was to design and evaluate a power theft monitoring and detection control system using principles of the system development life cycle. Such a system would aid the utility company in detecting unauthorized activities occurring at the remote power meter. The system design consists of both hardware and software architecture parts. The hardware comprises of two ATmega 328P processors housing the system program logic, a metering unit to measure voltage and current, a sensing unit to detect tampering, a relay module to automatically switch ON and OFF customer loads and a long-range wireless transceiver. The transceiver picks the signal from the site and transmits it to the utility’s database. The software part consists of a windows operating system running an Apache web server, MYSQL database, and Python scripting language. These carry out the database management functions for storage, modification, and logging of tamper data. The software also contains a C++ compiler for coding the processors. A prototype was developed based on a long-range wireless transmission technology operating on a 433-MHz an unlicensed frequency spectrum band. It demonstrated the capability to detect inconsistencies at the meter, read the type of tampering, its location, meter I.D number, date, and time of occurrence of the event. The system was also able to automatically shut down the meter and trigger an alert to the utility’s control office and an area technician during tampering. This approach can be adopted by utility companies to curb power theft and reduce revenue leakage.
    URI
    http://hdl.handle.net/10570/10336
    Collections
    • School of Engineering (SEng.) Collections

    DSpace 5.8 copyright © Makerere University 
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of Mak IRCommunities & CollectionsTitlesAuthorsBy AdvisorBy Issue DateSubjectsBy TypeThis CollectionTitlesAuthorsBy AdvisorBy Issue DateSubjectsBy Type

    My Account

    LoginRegister

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    DSpace 5.8 copyright © Makerere University 
    Contact Us | Send Feedback
    Theme by 
    Atmire NV