Theft or pilferage of power by the existing customers, Electrical Engineering

Assignment Help:

Theft or Pilferage of Power by the Existing Customers

Power theft through the existing consumers is the predominant cause of loss of revenue to the electrical utilities. Almost all categories of consumers are includes in this. It is almost the single cause of all ailments afflicting power utilities. Transformer failures, poor collection of revenue, breakdowns,  financial losses, widespread customer dissatisfaction, recurring crises in summer crop period, poor creditworthiness resulting in the inability to raise funds required for the required growth, increased technical losses and the corroded integrity of employees are all manifestations of power theft. Theft of power is being committed through

1. Totally bypassing the meter

The meter is not tampered. The tapping is made from the supply lines and part or full load is fed from that.

This kind of power theft can be proved only when it is observed at the time of inspection. The consumer can erase all traces of theft if the inspection is known in advance. This is a burning problem in many parts of our country.

2. Tampering the meter

There are numerous methods of tampering the meter. New methods are being constantly evolved and detection of tampering is becoming a major challenge for distribution utilities. Some of them are given below.

Methods Used for Meter Tampering

  • Spiders - small holes are drilled into the meters and live spiders or spiders' eggs crammed into them. The spiders' webs slow down the metering mechanism, giving a false reading.
  • Needles - pins are inserted into a hole, slowing down the meter's recording wheel to give a flash reading or even a zero usage.
  • Magnets - small magnets attached to the outside of the meter casing will stop the meter from registering, or slow it down.
  • Chewing gum - gum is often used to stop the meter completely but it is taken out just before the meter reading is taken.
  • Bypass - meters are removed and power sourced illegally from underground cables and overhead wires.

Related Discussions:- Theft or pilferage of power by the existing customers

Illustrate the basic use of binary in it, Q. Illustrate the basic use of bi...

Q. Illustrate the basic use of binary in IT ? The binary system is thus useful in IT because not only any number, but any information, can be represented in terms of only 0s an

Example of registers to registers , Example of Registers Example : W...

Example of Registers Example : Write  the instruction to copy  data byte 24H  stored  in register C to register B  Solution : The instruction to copy  data byte  is  a

Dc generator, A 20kw 220v shunt generator has armature resistance of 0.07 a...

A 20kw 220v shunt generator has armature resistance of 0.07 and a shunt field resisitance 900 ohm find field loss?

What is segment displays, Q. What is Segment displays? Seven-segment di...

Q. What is Segment displays? Seven-segment displays are the most commonly used numeric display devices, while 10- and 16-segment (starburst) display devices are also available.

Ac circuits, introduction for on ac circuits

introduction for on ac circuits

3-phase 3 wire meter, 3-Phase 3 Wire Meter A 3-phase 3 wire meter has ...

3-Phase 3 Wire Meter A 3-phase 3 wire meter has 2 elements of each category on the other hand of 3 elements as in the case of 3-phase 4 wire meter. The primary principle of op

Find the voltage drops across the resistors, Consider the network shown in ...

Consider the network shown in Figure (a). (a) Find the voltage drops across the resistors and mark them with their polarities on the circuit diagram. (b) Check whether the KV

How is segmentation implemented in typical microprocessors, How is segmenta...

How is segmentation implemented in typical microprocessors? The first advantage is as memory segmentation has is that only 16 bit registers are needed both to store segment bas

Explain demodulation of dsb, Q. Explain Demodulation of DSB? Demodulati...

Q. Explain Demodulation of DSB? Demodulation of DSB SC AM signals requires a synchronous demodulator, which is also known as coherent or synchronous detector. That is, the demo

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd