Theft or pilferage of power by the existing customers, Electrical Engineering

Theft or Pilferage of Power by the Existing Customers

Power theft through the existing consumers is the predominant cause of loss of revenue to the electrical utilities. Almost all categories of consumers are includes in this. It is almost the single cause of all ailments afflicting power utilities. Transformer failures, poor collection of revenue, breakdowns,  financial losses, widespread customer dissatisfaction, recurring crises in summer crop period, poor creditworthiness resulting in the inability to raise funds required for the required growth, increased technical losses and the corroded integrity of employees are all manifestations of power theft. Theft of power is being committed through

1. Totally bypassing the meter

The meter is not tampered. The tapping is made from the supply lines and part or full load is fed from that.

This kind of power theft can be proved only when it is observed at the time of inspection. The consumer can erase all traces of theft if the inspection is known in advance. This is a burning problem in many parts of our country.

2. Tampering the meter

There are numerous methods of tampering the meter. New methods are being constantly evolved and detection of tampering is becoming a major challenge for distribution utilities. Some of them are given below.

Methods Used for Meter Tampering

  • Spiders - small holes are drilled into the meters and live spiders or spiders' eggs crammed into them. The spiders' webs slow down the metering mechanism, giving a false reading.
  • Needles - pins are inserted into a hole, slowing down the meter's recording wheel to give a flash reading or even a zero usage.
  • Magnets - small magnets attached to the outside of the meter casing will stop the meter from registering, or slow it down.
  • Chewing gum - gum is often used to stop the meter completely but it is taken out just before the meter reading is taken.
  • Bypass - meters are removed and power sourced illegally from underground cables and overhead wires.
Posted Date: 2/6/2013 5:00:55 AM | Location : United States







Related Discussions:- Theft or pilferage of power by the existing customers, Assignment Help, Ask Question on Theft or pilferage of power by the existing customers, Get Answer, Expert's Help, Theft or pilferage of power by the existing customers Discussions

Write discussion on Theft or pilferage of power by the existing customers
Your posts are moderated
Related Questions
Illustration of embedded web technology An oven comprise an embedded processor. Owner can use a web ready mobile phone anywhere to control the oven remotely. By accessing a

What are the 8086 interrupt types? Dedicated interrupts Type 0: Divide by zero interrupt Type 1: Single step interrupt Type 2:Non maskable interrupt Type 3: Breakpo

Q. JFET Common Drain Amplifier? The common drain FET amplifier is similar to the common collector configuration of the bipolar transistor. A general common drain JFET amplifier

Q. Calculate the stator input current? The parameters of the equivalent circuit shown in Figure for a three-phase, wye-connected, 220-V, 10-hp, 60-Hz, six-pole induction motor

circuit for the buck boost regulator connected to a ic regulator , my voltae range is 5v to 24v?

Q. Show the procedure of Binary Addition? Rules of Binary Addition 0 + 0 = 0 0 + 1 = 1 1 + 0 = 1 1 + 1 = 0 , and carry 1 to the next more importan

how many points are required to make an parabola in offset method when vertical point has 4 points

Importance of  Microprocessor Now few  questions  may arise in one  mind that  when  advance processor  like  Pentium IV are available  in market why  we are learning 8035 mic

Q. What are the necessary conditions to maintain sustained oscillation? The use of positive feedback that results in a feedback amplifier having closed-loop gain |Af| greater t

Explain index mode and base address mode (with examples) available in microprocessors. Index Mode and Base Address Mode: Address supplied through the instruction is adde