Theft or pilferage of power by the existing customers, Electrical Engineering

Theft or Pilferage of Power by the Existing Customers

Power theft through the existing consumers is the predominant cause of loss of revenue to the electrical utilities. Almost all categories of consumers are includes in this. It is almost the single cause of all ailments afflicting power utilities. Transformer failures, poor collection of revenue, breakdowns,  financial losses, widespread customer dissatisfaction, recurring crises in summer crop period, poor creditworthiness resulting in the inability to raise funds required for the required growth, increased technical losses and the corroded integrity of employees are all manifestations of power theft. Theft of power is being committed through

1. Totally bypassing the meter

The meter is not tampered. The tapping is made from the supply lines and part or full load is fed from that.

This kind of power theft can be proved only when it is observed at the time of inspection. The consumer can erase all traces of theft if the inspection is known in advance. This is a burning problem in many parts of our country.

2. Tampering the meter

There are numerous methods of tampering the meter. New methods are being constantly evolved and detection of tampering is becoming a major challenge for distribution utilities. Some of them are given below.

Methods Used for Meter Tampering

  • Spiders - small holes are drilled into the meters and live spiders or spiders' eggs crammed into them. The spiders' webs slow down the metering mechanism, giving a false reading.
  • Needles - pins are inserted into a hole, slowing down the meter's recording wheel to give a flash reading or even a zero usage.
  • Magnets - small magnets attached to the outside of the meter casing will stop the meter from registering, or slow it down.
  • Chewing gum - gum is often used to stop the meter completely but it is taken out just before the meter reading is taken.
  • Bypass - meters are removed and power sourced illegally from underground cables and overhead wires.
Posted Date: 2/6/2013 5:00:55 AM | Location : United States







Related Discussions:- Theft or pilferage of power by the existing customers, Assignment Help, Ask Question on Theft or pilferage of power by the existing customers, Get Answer, Expert's Help, Theft or pilferage of power by the existing customers Discussions

Write discussion on Theft or pilferage of power by the existing customers
Your posts are moderated
Related Questions
Q. Basic working of Star Topology? In Star topology, all user nodes are connected to central node point that interconnects all individual users links and nodes. Data flows from

Equivalent Circuit of a Polyphase Induction Machine The inductionmachinemay be regarded as a generalized transformer inwhich energy is converted and electric power is transferr

why we protect dg in islanding condition?

Q. Referring to Figure, let V BN = V RN = 120 V rms magnitude, and V BR = 240 V rms magnitude. Write down expressions for v BN (t), v RN (t), and v BR (t), and sketch them as a

introduction for on ac circuits

Discuss MACRO assembler directive with example. MACRO: A sequence of instructions to that has a name is assigned is termed as macro. Macros and subroutines are the

Describe the term (i) Automation (ii) Automated lines 04 List out the reasons for automation and discuss in detail the process of work part transport.

Q. What do you mean by Exponent? The exponent field needs to represent both negative and positive exponents. To perform this, a bias is added to the actual exponent in order

Design a low noise amplifier using an Infineon RF transistor BFP640. The amplifier is to be used to amplify the L2 GPS signal and so the centre frequency is 1227MHz and bandwidth 4

Q. In the magnetic circuit shown in Figure the center leg has the same cross-sectional area as each of the outer legs. The coil has 400 turns. The permeability of iron may