scholarly journals "A short overview of IoT based energy metering system Part III IoT based electricity theft detection and bill generating system"

Author(s):  
Monica Sabina Crainic ◽  
◽  
Author(s):  
Somefun T. E ◽  
Awosope C.O.A ◽  
Chiagoro A.

Electricity theft remains a huge loss incurred by electricity distribution companies. This theft arises majorly because of activities carried out by consumers such as energy-meter by-passing, energy-meter tampering etc. This research study offers an approach for handling energy meter by-passing and tampering. The system design is based on the monitoring of the readings of two current sensors by a programmed microcontroller. While one of the current sensors monitors the current drawn by the user’s load, the latter installed before the meter monitors current drawn by all loads. Any discrepancy between the values read, indicates theft. A momentary switch is also installed in the meter to trigger the meter once it is tampered with. Furthermore, the user is provided with a remote access to the energy meter for recharging energy units and for monitoring energy consumption. It was observed that the system accurately measured load consumption and detect any attempt to by-pass or tamper with the energy meter. Lastly, all unscrupulous attempts were reported using GSM technology.


2014 ◽  
Vol 494-495 ◽  
pp. 1457-1461
Author(s):  
Ying Ying Cheng ◽  
Hua Xiao Yang ◽  
Xing Zhe Hou ◽  
Ji Xiao ◽  
Jie Du

Based on the analysis of traditional electric energy metering cubicle, there are still a lot of disadvantages in operation. This paper presents a new type of electric energy metering cubicle. The composite intelligent terminal wiring device, intelligent locking device and image monitoring equipment are applied to the traditional standard electric energy metering cubicle. It is suggested that the new electric energy metering cubicle can effectively ensure the safety of the staff, prevent power loss caused by incorrect wiring and avoid electricity theft.


Author(s):  
Vladimir Yu. Kolosov ◽  
Anders R. Thölén

In this paper we give a short overview of two TEM applications utilizing the extinction bend contour technique (BC) giving the advantages and disadvantages; especially we consider two areas in which the BC technique remains unique. Special attention is given to an approach including computer simulations of TEM micrographs.BC patterns are often observed in TEM studies but are rarely exploited in a serious way. However, this type of diffraction contrast was one of the first to be used for analysis of imperfections in crystalline foils, but since then only some groups have utilized the BC technique. The most extensive studies were performed by Steeds, Eades and colleagues. They were the first to demonstrate the unique possibilities of the BC method and named it real space crystallography, which developed later into the somewhat similar but more powerful convergent beam method. Maybe, due to the difficulties in analysis, BCs have seldom been used in TEM, and then mainly to visualize different imperfections and transformations.


2001 ◽  
Vol 28 (10) ◽  
pp. 943-949 ◽  
Author(s):  
Y. Amemori ◽  
S. Yamashita ◽  
M. Ai ◽  
H. Shinoda ◽  
M. Sato ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document