ABSTRACT
The magnitude of operational losses
in the supply of electricity in Nigeria has been growing significantly. Issues of theft and illegal
connection pose major challenges in the energy distribution. This has greatly
worsened the current electricity supply in the country; hence, the need for the
design of a robust system for identifying or detecting illegal electricity
consumption.
In this study, an Automated Remote Power Management System (ARPMS) was developed for detection of meter bypassing, tampering and illegal load shedding. ARPMS consisted of embedded microcontroller, Current and Voltage Sensors (CVS), and Global System for Mobile Communication (GSM) module for effective detection of meter tempering. The microcontroller was embedded with microprograms for task regulation and control functions. The CVSs were used to monitor and report deviations from the normal signals. The GSM module was used for remote communication and control. The microcontroller was programmed using embedded C. A user-study experiment, which involved fifty (50) purposively selected electrical engineers, was carried out to evaluate the proposed system. The engineers subjected the system to different scenarios of bypass. A structured questionnaire guide was used to capture responses from the engineers. Descriptive analysis was conducted on the performance data of the ARPMS from the engineers.
The result showed that ARPMS had 100% efficiency, 96% acceptance and a remote communication index of 0.99. This showed that ARPMS had high capability for detecting meter tempering. The result also showed that the real time ARPMS was able to evaluate the amount of consumed energy by a building through remote monitoring and control of domestic energy meter, and gave the information about the meter reading to the utility company through Short Message Services (SMS). ARPMS provided regular status of the meter on a predefined interval, and displayed user’s account update in real time. This system also detected electricity power bypass by consumers. The ARPMS controlled technology demonstrated the capability of providing a better mechanism for collecting power consumption bills in advance.
In conclusion, an efficient ARPMS
for preventing power theft has been developed. It also used GSM based
technology to perform billing related processes at all times. The system is
therefore recommended for electricity Distribution Companies (DISCOs) for
efficient management of energy consumption and prepaid billing.
Keywords: Automated Remote, Monitoring, Microcontroller, GSM Communication, Embedded C
CHAPTER ONE
INTRODUCTION
1.1 Background to the Study
Electricity is very crucial to the socio-economic and technological development of every country. One of the indices used to measure the development of an economy is uninterrupted power supply. It is widely accepted that there is a strong correlation between the availability of electricity and socio-economic development. The supply of electricity in Nigeria incurs substantial capital. The enormity of these costs is growing astronomically across the globe. To decipher the unlawful users of electricity in a bid to enhance the economy of utility company, efficiency and protection of the grid, a novel procedure for scrutinizing electricity usage patterns of customers and recognizing illegal consumers is proposed and implemented. Nigeria electric power network operator, electricity Distribution Companies of Nigeria (DISCOs) has for a long period of time been combating the problem of revenue collation. This is majorly attributed to the fact that electricity bills are sent to consumers after consumption. Consumers are usually unwilling to pay electricity bills as a result of epileptic nature of the electricity supplied which is not usually mirrored in the bills which are basically estimates of power usage and not usually commensurate to the true amount of electricity consumed by the respective consumer.
The low reliability of electric power supply
has little bearing on the network operator because whether power is provided or
not, in the post-paid method, the monthly electricity bills are still sent to
consumers. Hence, the user bears the cost of generating power for their
personal usage as well as that of the electricity that was never provided by
DISCOs. Due to the enormity of the debt accrued by customers, the network
operator initiated a cash collection policy named Revenue Cycle Management
(RCM) which involves collecting monies owed through private establishments.
This failed to give the anticipated results; hence DISCOs came up with the
digital pre-paid meter in 2006 whose operation is somewhat synonymous with the
loading of an airtime voucher in the Global System for Mobile communication
(GSM) handset. If power is available and the pre-paid meter is loaded with
units, the loaded unit diminishes only when the load is connected and stops
when power is interrupted. In the last decade, smart cards evolved from basic memory
cards to complex systems on chips with a processing power that can be expanded.
This became an avenue for the invention of many applications used in the world
today. The smart card, an intelligent token, is a credit card sized plastic
card embedded within an integrated circuit chip. A smart card usually consists
of a Read Only Memory (ROM) or flash memory, Electrical Erasable Programmable
Read Only Memory (EEPROM) and a Central Processing Unit (CPU). The smart card
operating system controls access to data on the card. The card operating system
does not only make the smart card secure for access control, but also has the
capability to store a private key for a public key infrastructure system.
Recently, the industry has come up with 32-bit smart card processors having more than 400Kbytes of EEPROM, and a memory management and protection unit serving as a firewall for the hardware. This hardware firewall enables secure separation of adjacent applications, as well as being the basis for secure downloading of applications. The self-containment of smart card makes it somewhat attack proof as it does not need to be relied upon potentially attack susceptible external resources. Due to this feature, smart cards are often used in diverse applications which require strong security and authentication. In addition to information security, smart cards achieve greater physical security of services and equipment, because a smart card limits access to only authorized users.