Theft or pilferage of power by the existing customers, Electrical Engineering

Assignment Help:

Theft or Pilferage of Power by the Existing Customers

Power theft through the existing consumers is the predominant cause of loss of revenue to the electrical utilities. Almost all categories of consumers are includes in this. It is almost the single cause of all ailments afflicting power utilities. Transformer failures, poor collection of revenue, breakdowns,  financial losses, widespread customer dissatisfaction, recurring crises in summer crop period, poor creditworthiness resulting in the inability to raise funds required for the required growth, increased technical losses and the corroded integrity of employees are all manifestations of power theft. Theft of power is being committed through

1. Totally bypassing the meter

The meter is not tampered. The tapping is made from the supply lines and part or full load is fed from that.

This kind of power theft can be proved only when it is observed at the time of inspection. The consumer can erase all traces of theft if the inspection is known in advance. This is a burning problem in many parts of our country.

2. Tampering the meter

There are numerous methods of tampering the meter. New methods are being constantly evolved and detection of tampering is becoming a major challenge for distribution utilities. Some of them are given below.

Methods Used for Meter Tampering

  • Spiders - small holes are drilled into the meters and live spiders or spiders' eggs crammed into them. The spiders' webs slow down the metering mechanism, giving a false reading.
  • Needles - pins are inserted into a hole, slowing down the meter's recording wheel to give a flash reading or even a zero usage.
  • Magnets - small magnets attached to the outside of the meter casing will stop the meter from registering, or slow it down.
  • Chewing gum - gum is often used to stop the meter completely but it is taken out just before the meter reading is taken.
  • Bypass - meters are removed and power sourced illegally from underground cables and overhead wires.

Related Discussions:- Theft or pilferage of power by the existing customers

Determine the upper limit of tdm signal, A TDM signal of the type is formed...

A TDM signal of the type is formed by samplingM voice signals at fs = 8 kHz. If the TDM signal then modulates the amplitude of a 4-MHz carrier for radio transmission, determine the

Substation preventive maintenance scheduling optimization, Introduction: ...

Introduction: The scheduling system that is followed by the maintenance department is not well established and is dependable on employee's personal judgment. There were a lot o

What is converse-hull property of bezier curve, Describe Bezier Curve ? Wha...

Describe Bezier Curve ? What is Converse-Hull Property of Bezier Curve?

Explain about communication systems, Q. Explain about Communication Systems...

Q. Explain about Communication Systems? Even though most modern communication systems have only been invented and developed during the eighteenth and nineteenth centuries, it i

Transformers, determine the efficience of a 16 KVA transformer for the full...

determine the efficience of a 16 KVA transformer for the full-load,unit power factor

Expression for generated emf in a dc generator, Q.   Derive the expression ...

Q.   Derive the expression for generated emf in a dc generator. Ans. Expression for Generated emf in a DC Generator                We shall now derive an expre

Discuss one application of 8254 programmable interval timer, Discuss any on...

Discuss any one application of 8254 Programmable Interval Timer in detail. Mode1 causes the counter to treat as a retriggerable monostable multivibrator one shot. The G inpu

Complex waveforms and transients in rlc circuits, can you let me know how m...

can you let me know how much it would be for the answer to a question that has 2 parts

#electrical wiring, how to draw electric circuit for staircase wiring using...

how to draw electric circuit for staircase wiring using 3 two way switches?

Explain about frequency shift keying, Q. Explain about Frequency Shift Keyi...

Q. Explain about Frequency Shift Keying? In this scheme frequency of the carrier signal is changed according to the data. Transmitter sends different frequencies for a "I" than

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd