DESIGN OF AUTOMATED REMOTE POWER MANAGEMENT SYSTEM (ARPMS)

0
838

ABSTRACT

The magnitude of operational losses in the supply of electricity in Nigeria has been growing   significantly. Issues of theft and illegal connection pose major challenges in the energy distribution. This has greatly worsened the current electricity supply in the country; hence, the need for the design of a robust system for identifying or detecting illegal electricity consumption.

In this study, an Automated Remote Power Management System (ARPMS) was developed for detection of meter bypassing, tampering and illegal load shedding. ARPMS consisted of embedded microcontroller, Current and Voltage Sensors (CVS), and Global System for Mobile Communication (GSM) module for effective detection of meter tempering. The microcontroller was embedded with microprograms for task regulation and control functions. The CVSs were used to monitor and report deviations from the normal signals. The GSM module was used for remote communication and control. The microcontroller was programmed using embedded C. A user-study experiment, which involved fifty (50) purposively selected electrical engineers, was carried out to evaluate the proposed system. The engineers subjected the system to different scenarios of bypass. A structured questionnaire guide was used to capture responses from the engineers. Descriptive analysis was conducted on the performance data of the ARPMS from the engineers.

The result showed that ARPMS had 100% efficiency, 96% acceptance and a remote communication index of 0.99. This showed that ARPMS had high capability for detecting meter tempering. The result also showed that the real time ARPMS was able to evaluate the amount of consumed energy by a building through remote monitoring and control of domestic energy meter, and gave the information about the meter reading to the utility company through Short Message Services (SMS). ARPMS provided regular status of the meter on a predefined interval, and displayed user’s account update in real time. This system also detected electricity power bypass by consumers. The ARPMS controlled technology demonstrated the capability of providing a better mechanism for collecting power consumption bills in advance.

In conclusion, an efficient ARPMS for preventing power theft has been developed. It also used GSM based technology to perform billing related processes at all times. The system is therefore recommended for electricity Distribution Companies (DISCOs) for efficient management of energy consumption and prepaid billing.

Keywords:      Automated Remote, Monitoring, Microcontroller, GSM Communication, Embedded C

CHAPTER ONE

INTRODUCTION

1.1 Background to the Study

Electricity is very crucial to the socio-economic and technological development of every country. One of the indices used to measure the development of an economy is uninterrupted power supply. It is widely accepted that there is a strong correlation between the availability of electricity and socio-economic development. The supply of electricity in Nigeria incurs substantial capital. The enormity of these costs is growing astronomically across the globe. To decipher the unlawful users of electricity in a bid to enhance the economy of utility company, efficiency and protection of the grid, a novel procedure for scrutinizing electricity usage patterns of customers and recognizing illegal consumers is proposed and implemented. Nigeria electric power network operator, electricity Distribution Companies of Nigeria (DISCOs) has for a long period of time been combating the problem of revenue collation. This is majorly attributed to the fact that electricity bills are sent to consumers after consumption. Consumers are usually unwilling to pay electricity bills as a result of epileptic nature of the electricity supplied which is not usually mirrored in the bills which are basically estimates of power usage and not usually commensurate to the true amount of electricity consumed by the respective consumer.

The low reliability of electric power supply has little bearing on the network operator because whether power is provided or not, in the post-paid method, the monthly electricity bills are still sent to consumers. Hence, the user bears the cost of generating power for their personal usage as well as that of the electricity that was never provided by DISCOs. Due to the enormity of the debt accrued by customers, the network operator initiated a cash collection policy named Revenue Cycle Management (RCM) which involves collecting monies owed through private establishments. This failed to give the anticipated results; hence DISCOs came up with the digital pre-paid meter in 2006 whose operation is somewhat synonymous with the loading of an airtime voucher in the Global System for Mobile communication (GSM) handset. If power is available and the pre-paid meter is loaded with units, the loaded unit diminishes only when the load is connected and stops when power is interrupted. In the last decade, smart cards evolved from basic memory cards to complex systems on chips with a processing power that can be expanded. This became an avenue for the invention of many applications used in the world today. The smart card, an intelligent token, is a credit card sized plastic card embedded within an integrated circuit chip. A smart card usually consists of a Read Only Memory (ROM) or flash memory, Electrical Erasable Programmable Read Only Memory (EEPROM) and a Central Processing Unit (CPU). The smart card operating system controls access to data on the card. The card operating system does not only make the smart card secure for access control, but also has the capability to store a private key for a public key infrastructure system.

Recently, the industry has come up with 32-bit smart card processors having more than 400Kbytes of EEPROM, and a memory management and protection unit serving as a firewall for the hardware. This hardware firewall enables secure separation of adjacent applications, as well as being the basis for secure downloading of applications. The self-containment of smart card makes it somewhat attack proof as it does not need to be relied upon potentially attack susceptible external resources. Due to this feature, smart cards are often used in diverse applications which require strong security and authentication. In addition to information security, smart cards achieve greater physical security of services and equipment, because a smart card limits access to only authorized users.

DESIGN OF AUTOMATED REMOTE POWER MANAGEMENT SYSTEM (ARPMS)