Short Term Task Order – Fast Response Technical Expertise ... · power lines, electrical ......
Transcript of Short Term Task Order – Fast Response Technical Expertise ... · power lines, electrical ......
November 2009 This publication was produced for review by the United States Agency for International Development. under Contract No. EPP-I-03-03-00007-00 Sub Activity
10. “Short Term Task Order – Fast Response Technical Expertise to EGAT/I&E, Optimal Feeder Loss Reduction Toolkit”
Short Term Task Order – Fast Response Technical Expertise to EGAT/I&E
OPTIMAL FEEDER LEVEL CONNECTION TRAINING AND FIELD SUPPORT TOOLKIT
(LONG VERSION)
November 2009This publication was produced for review by the United States Agency for International Development. Information included in this presentation was provided by subcontractor Connie Smyser of Smyser Associates under the direction of Nexant, Inc. under Contract No. EPP-I-03-03-00007-00, Sub Activity 10. “Short Term Task Order – Fast Response Technical Expertise to EGAT/I&E, Optimal Feeder Loss Reduction Toolkit”
DISCLAIMERThe author’s views expressed in this publication do not necessarily reflect the views of the United States Agency for International Development or the United States Government.
Short Term Task Order – Fast Response Technical Expertise to EGAT/I&E
OPTIMAL FEEDER LEVEL CONNECTION TRAINING AND FIELD SUPPORT TOOLKIT
(LONG VERSION)
OPTIMAL FEEDER LEVEL CONNECTION TRAINING AND FIELD SUPPORT TOOLKIT
(LONG VERSION)
USAID/EGAT/ OFFICE OF INFRASTRUCTURE AND ENGINEERING, ENERGY TEAMNovember 2009
This study was produced for the review by the United States Agency for International Developmentby Nexant, Inc. under Contract No. EPP-I-03-00007-00 Work Order 10
Disclaimer
Information presented in this study is based primarily onpublicly available information. Verifications through interviews were conducted when possible. Description of the utilities in Case Studies is not officialinformation released by those particular utilities, butrather data collected through research and interviews.
4
Table of Contents
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
5
How Power Comes to our Homes
7
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Electric Power DistributionA distribution network carries electricity from thetransmission system to the consumers.
8
– The network includes medium-voltage (<110 kV) power lines, electrical substations and pole-mounted transformers, low-voltage (< 1 kV) distribution wiring.
– Typically deliver voltages as high as 34 kV & as low as 120 V to consumers.
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
How Electricity is Measured?
• Volts (V) measure the “pressure” under which electricity flows.
• Amps (A) measure the amount of electric current flow.
• Watts (W) measures amount of power.– 1 watt = 1 amp multiplied by 1 volt
• Electric meters measure energy consumption in Kilo Watt-hour (kWh).– 1kWh energy consumption is equal to 1 kW of power
consumed over a period of one hour.
9
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
What is Electric Utility Business?
• The main function of an Electric Distribution Company is Electricity/Power Service Provisionthrough:– Connection of new customers– Maintaining Customer Database– Metering kWh consumed– Billing and Collections– Disconnection for non-payment and reconnections– Provision of Customer Services by installing, operating and
maintaining the required equipment in a safe manner and by enabling system for dispute resolution
10
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Impact of Electricity Theft on Utilities
• Lack of funds to operate and to manage the facilities• Damaged equipment • Lack of exposure to new technologies• Lack of resources for management and field staff
training • Deep staff complicity• Corruption practices
11
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Impact of Electricity Theft on Economy• In some cases losses from theft can be as high as
70% and cost millions of dollars in lost revenues• Viability of distribution companies is threatened• Poor service quality resulting in safety concerns
for consumers• Reduced overall economic productivity that also
results in negative impact on domestic and foreign investments
• States have to make up the difference in power subsidies, impacting more social investments, such as health and education
12
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
14
Non-Technical Losses
Energy Supplied to the Distribution
Network
Energy Consumed and Paid for by
Customers= -Energy
Losses
Technical Losses
Non-Technical/Commercial Losses
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Where Does Electricity Theft Occur Most Commonly?
15Low voltage linesTransformer Meter
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Electricity Theft Methods • Meters:
– Tampering with meters and seals – By-passing the meters – Damaging or removing meters
• Wires/Cables:– Illegal tapping to bare wires or underground cables
• Transformers:– Illegal terminal taps of overhead lines on the low side of the
transformer
• Billing irregularities, including by meter readers.• Unpaid bills by individuals, government institutions
and “untouchable” VIPs. 16
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Theft Occurs When:
• An illegal consumer (not a registered customer) steals directly from the distribution lines or from another legal customer.
• A legal customer (registered customer) steals either bypassing the meter (connecting around the meter to a live cable on the company side of the meter) or tampering with the meter to make it read less or no consumption.
• There is a collusion between the customer and a company employee to reduce the amount paid to the company (with lower side payments to the employee in return).
17
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Loss Sources
18
Imp / Exp metering errorsTechnical losses (66 & 33KV)Technical losses (11 kV & below)Theft/ illegal connections CT ratio/MF errorStopped meterSlow meterDefective meterMeters not readConsumers not billedUnregistered consumersBills not deliveredMisuse of customer category
Consumers billed but not creditedPartial paymentDeliberate under billingProvisional billingBills on a/c of old meter when changedLine disconnected consumer
Example of Losses Pie from “Delhi Privatization Process” BSES Experience, by J P Chalasani
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
19
Meter Tampering
Placing magnetsMechanical impediment to rotating disk
Meter tilting
Meter by pass by illegally connecting to switch before meter
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Illegal Wiring
20
Circuit wire is disconnected/broken from circuit terminal block
Triple breaker inserted in the circuit
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Other ways to steal electricity
21
Equipment used to falsify meter seals
Falsified meter gear parts
Who needs a meter?
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
22
Wire Tapping
Flying connectionsFishing pole connections
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
How can electricity theft be reduced?
23
Public OutreachUnique
Solutions for each
case
Technical Solutions Non-Technical Solutions
Meters and Meter Enhancements
Cables
Specialized Software and Advanced Technologies
Load Limiters
Unique Configurations and Techniques
Management
Legal and Regulatory
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Terminology is Confusing and InconsistentEach utility or manufacturer comes up with its own terminology for the same or similar concepts!
25
AMM/AMI
AMR/RMR
MDM Concentric Aerial Distribution (DAC)
Theft Detection Devices
Shielded Anti-theft Meter Box/Meter Encasements
Macro Metering/ Power Balancing/ Feeder Metering
Induction Meters/ Electromechanical/ Electromagnetic/Analog Meters
InfoPOD/AMPLA Chip/AMR
Power Cost Monitors/Split Meters/Energy Demand Feedback Device/Power Monitor
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
26
Technology OverviewMeters and Anti-Theft Meter Enhancements
Anti-Theft Cables and Cable Connection Equipment
Load Limiters
Specialized Software and Advanced Technologies
Unique Configurations and Other Techniques
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Section I. Meters and Anti-Theft Meter Enhancements
• Electromechanical• Electronic:
– Tamper Detection Meters– Prepayment Meters– Meters in Automatic Meter Reading (AMR) Systems– Smart Meters/Advanced Metering Infrastructure (AMI)
• Meters: Anti-Theft Meter Enhancements:– Meter/Security Seals– Power Monitors/Split Meters– Plastic Meter Encasements – AMR Compatible Communications Modules
27
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
I. Meters and Meter Enhancements
28
Meters
Electromechanical Electronic
Power Monitors/Split MetersMeter/Security Seals Plastic
Meter Encasements
Automatic Meter Reading (AMR) System Meters
Anti-Theft Meter Enhancements
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Electromechanical Meters
Record total consumption in kW/h as a single number read bya human meter reader and reported to a utility.
29
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Electronic MetersSolid State meters are microprocessor based metersthat register consumption and perform other functions:• Tamper Detection Meters communicate deviation
from the normal usage patterns to the utility.• Prepayment Meters allow credit to be added by token, smart
card or a keypad.• Meters in an Automatic Meter Reading (AMR) System
broadcast meter identification information and consumption totals, and provide remote disconnection.
• Smart Meter in Automated Metering Infrastructure (AMI) is an electronic meter with continuous two-way communication, measures consumption real time, power outage notification, able to remotely disconnect the customer and send price/rate updates. 30
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Electronic Tamper Detection Meters are Enhanced with Communication AbilityMay include automatic detection of:• Meter Tamper• Meter Bypass• Meter Disconnection • Removal of a meter
from a meter socket
31
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Tamper Detection Meters (Continued)
The meter’s tampering detection scheme indicates the fault or missing neutral conditions and allows the meter to continue accurate billing by continuous monitoring of the phase and neutral (return) currents.
• A fault is indicated where these currents differ by more than a fixed % ( for example 6.25%), and billing continues using the larger of the two currents.
• A missing neutral condition is detected when no voltage input is present, and billing is continued based on the active current signal.
32
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
34
Pre-Payment MetersPre-payment Options:1. Credit added to the meter on a keypad.2. Credit is purchased on a rechargeable token or a
card and entered into the meter with disconnection ability.
Meter Configurations:1. Split Keypad – metering and keypad are separate. If
metering part is in an enclosed box or on a pole, there less tamper attempts.
2. Non Split Keypad –metering and keypad are in a single housing. Ready
board meter used in Africa
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Meters in Automatic Meter Reading (AMR) systems
AMR is a system where power and telecommunication infrastructures work together.
A typical AMR system consists of: 1) Meters to measure customer consumption,2) Telecommunication technologies to read
meter data and transfer it (meter readings, tamper detection, disconnection/ connection, and outages) to the utility.
3) Computers and software at the utility to analyze the data and use it to bill customers.
35
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
36
AMR Meter Telecommunication Technologies• Touch Technology is where meter reader carries handheld computer
or data collection device with a wand or probe.
• Radio Frequency Handheld are either two-way RF systems and one-way RF systems that use both licensed and unlicensed RF bands.
• ‘Drive-by’ mobile meter reading is done from a utility vehicle.
• Fixed Network AMR is where a network is permanently installed to capture meter readings from AMR capable meters and get the data to a central computer without a person in the field to collect it.
• Power Line Carrier (PLC) AMR is a method where electronic data is transmitted over power lines back to the central computer.
• GSM based remote metering system with data enabled SIM card which is more secure & has less monthly recurring expenses.
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Example: Costs Associated with AMR upgrade in Dominican Republic
TOTAL COST OF PROJECT: $1,544,800 (US)A. Cost per industrial customer : $515 (US)
B. Cost for residential customerfor remote metering and remote disconnection: $54.00 (US)• Cost of electronic meter: $21.00 • Cost of R/F modem card: $18.00• Cost of disconnection device: $15.00
STAR DDS26E Meter
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
37
Smart Meters/Automated Metering Infrastructure (AMI)
• Smart metering is next step from AMR and is a system that enables a two-way communication, using the meter as the real time sender of meter data and the receptor of control or price signals.
• Smart meters differ from AMR meters because they can communicate directly to the utility and on a continued basis.
38
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Anti-Theft Meter Enhancements:
• Meter/Security Seals• Power Monitors/Split Meters• Plastic Meter Encasements • AMR Compatible Communication Modules
39
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
An Electronic Meter can become a Smart Meter At the heart of the smart meter is a single-chip meter – a microprocessor that does the calculation, sends the information to a display, and stores the information to be sent.Depending on the applications and software, capabilities of electronic meter can be increased from displaying power consumption to:1. Meter polling during outages2. Remote programming 3. Remote disconnects4. Ability to pinpoint the size and source of an outage5. Lower risk to public safety6. Better accuracy in the actual meter readings
40
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Meter/Security SealsA Meter Seal also called Security Seal is a passive, one time locking device, with a unique number/identification/bar-code that provides a reliable indication of tampering (unauthorized removal or attempted removal) or entry.
Seals require inspection to indicate whether tampering has occurred or entry has been attempted. By having unique bar codes on each seal, and scanning them each time they are used, utilities are able to keep a database of when and where each seal was installed, and who used it.
It provides limited resistance to an intentional, pre-meditated attempt to open it and gain access to the meter or metering equipment that is sealed with the seal.
41
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Power Monitors/ Split Meters
• Power Monitors/Split Meters display electricity use in home, minute by minute, in dollars or kW. They consist of:
Sensor Power Consumption Displays
42
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Plastic Meter EncasementsHard plastic encasements are a type of a meter seal. These transparent plastic covers serve as a warning and therefore reduce electricity theft.
43
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
AMR Compatible Meter Communication Modules
Old retrofitted meters or manufacturer installedcommunication modules can make electromechanicalmeters AMR compatible
44
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Electronic Meters v. Electromechanical MetersPros of Electronic Meters:• Remote monitoring• No meter reader is required • Additional tampering detection sensor may be added and act together
with the disconnection of the service in cases of tampering attempts• May take instantaneous reading at any time of day • May be programmed to disconnect if bill not paid within a specified time
and reconnect customer’s service connection• May be programmed for pre-payment• Meter may be connected online to customer’s bank account for
automatic payment of bills • Memory data may be downloaded remotely to study customer
consumption pattern • Technically capable to become “smarter” with additional software
Part II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
45
Electronic Meters v. Electromechanical MetersCons of Electronic Meters:• Relatively costly compared to electromechanical meters• Specific skills required to monitor and analyze the system• Central computer and server station with special software is required• A minimum number of customers may be required to cover the cost of
server and software• Electronic meters have a shorter life (15 years) than electromechanical
meters, which will lead to a higher volume of replacements due to shorter age and a higher cost due to their higher price
• The battery-operated AMR meters which send signals to special hand-carried or vehicle-mounted receivers require battery replacement
• Meter manufacturers and AMR system vendors offer proprietary systems that are often not interoperable; so the selection of one AMR vendor limits options for the use of other vendors’ equipment.
Part II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
46
Section II. Anti-Theft Cables and Cable Connection Equipment• Bare Wires • Aerial Bundled Cables (ABC)• Coaxial Cables • Connection Equipment Associated with Anti-Theft
Cables
47
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Bare Wires
The cheapest option for theutilities, but they are alsothe most easily tapped.
48
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Anti-Theft Cable Types
Two main types of aerial cables: • Bundled and Twisted cables
are one or more single phase cables bundled together with the neutral conductor. They are easier to tap than coaxial, but more difficult than bare wires.
• Coaxial (or Concentric) cables have a neutral conductor that wraps around one or more inside phase conductors.
49
Bundled and twisted
Coaxial
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
• Insulation and twisting makes cables more resistant to weathering, abrasion, tearing, cutting and chemicals
Bundled and Twisted Cables
50
Three phase twisted cable with un-insulated ground wire
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Sealed Cables
• Sealing makes bundled cables more resistant to theft • Internal cover is made of conductor, so illegal
connection to phase conductor provides short-circuit to the neutral conductor
51
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Coaxial Cables
52
• Cable consisting of an inner conductor, surrounded by a tubular insulating layer all of which could be surrounded by another conductive layer, and then finally covered again with a thin insulating layer on the outside.
• Term coaxial comes from the inner conductor and the outer shield sharing the same geometric axis
• Inside cover is made of conductor, so in the case of an illegal connection to the phase conductor, there is a short-circuit to the neutral conductor
• Outside cover provides shielding and additional strength
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Coaxial Cables - Examples
53
Two Phase Coaxial Cable With One Central Conductor
Two Phase Coaxial Cable With Two Central Conductors
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Cable Connection Equipment
• Distribution Boxes for cable connections minimize unauthorized consumer access and give a well-organized appearance to the connection point and also improve service quality and reduce technical losses
54
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Anti-Theft Cables Pros• Key benefit – make illegal connections very difficult• Safety and fewer risks of short-circuit, except for in cases of illegal
tampering • Mechanical strength• Resistance to corrosion and lightning• Installation on walls
Part II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Cons• Substantially more expensive than bare wire
55
Section III. Load Limiters
• Positive Temperature Co-efficient Thermistors (PTCs)
• Fuse • Miniature Circuit Breaker (MCB)• Electronic Current Cut-Out (ECC)• Electronic Circuit Breaker (ECB)• Load Limiting Meter Technology
56
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Load Limiters
• Load Limiters are also called Current Limiters. • They allow a prescribed level of maximum current to
be supplied to the customers. • Useful for households with very small electricity
consumption: – E.g. rural consumers in Nepal, where average demand is
less than 100 W per household.
• The consumer is charged a fixed monthly fee irrespective of the total amount of energy consumed.
57
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Types of Load Limiters
• Basic Load Limiters:– Positive Temperature Co-efficient Thermistors (PTCs)– Fuse – Miniature Circuit Breaker (MCB)– Electronic Current Cut-Out (ECC)
• Advanced Load Limiters– Electronic Circuit Breaker (ECB)– Load Limiting Meter Technology
58
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Positive Temperature Co-Efficient Thermistors (PTCs)
• A PTC is a type of a resistor whose resistance increases with increase in temperature.
• If load increases above the prescribed level, the device heats up, causing its resistance to increase.
• The increase in resistance results in reducing the current flow in the circuit to a level below the prescribed level.
• Only available in 0.01A to 0.7A sizes.
• Useful as load limiters for very low electricity consumption households.
59
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Fuse
• Fuse is a type of an over-current protection device.
• It consists of a metal wire or strip that melts when the current flows through it exceeds its rating, thus disconnecting the circuit.
• The blown fuse has to be replaced with a new one every time a customer exceeds the fuse rating.
• This issue makes fuses difficult to be used as Load Limiters.
60
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Miniature Circuit Breaker (MCB)
• Automatically-operated electrical switch designed to limit the current below its preset value.
• If load exceeds the prescribed level, the circuit breaker disconnects the customer.
• It has to be reset manually to resume normal operation.
61
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Electronic Current Cut-Out (ECC)
• When the switch, S, is closed, the customer load is connected. • The voltage across the resistor R indicates the amount of electricity
consumption and is used to turn off the electronic switch if the current exceeds the prescribed level.
• The customer is automatically connected again when his consumption falls below the prescribed level.
62
• Only available in 0.5A to 3A sizes. • Useful as load limiters for very
low electricity consumption households.
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Electronic Circuit Breaker (ECB)
• Functionality is similar to that of the miniature circuit breaker.
• Capable of automatically reconnecting the load once the consumption falls below the maximum allowable consumption level.
63
Weather proof ECB
Distribution pole mounting minimizes possibility of tampering
Source: http://www.sustainablecontrol.com
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Electronic Circuit Breaker (ECB)
– Utility transmits load limit signal;– The meter informs consumer of
pending degradation;– User disconnects nonessential
appliances until complies;– Failure to comply leads to
disconnection as per normal meter operation;
– Reconnection if some load is subsequently shed.
64
If the maximum limit is exceeded, the meter trips.It is used for reducing maximum consumption:
Source: http://www.sarpa.co.za/events/folder.2008-02-8.4259943945/presentations2008/Gary%20Moor.pdf
User Interface Unit
MeteringDevice
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Load Limiters
Pros:• Lower revenue collection costs• Effective demand side management• Easier Demand Forecasting• Low initial capital cost• Cash up front for the electricity utility• Reduction in theft of electricity• Easier budgeting of payments by consumer
Part I What Constitutes Electricity Theft? Part II Technology OverviewPart III Case StudiesPart IV Lessons Learned
65
Load Limiters
Cons:• Increased opportunities for fraud and theft for easily accessible load
limiters• Lack of acceptance by customers• Poor reliability• Poor accuracy• Limited ability to use electricity which may constrain economic
development
Part I What Constitutes Electricity Theft? Part II Technology OverviewPart III Case StudiesPart IV Lessons Learned
66
Section IV. Specialized Software and Advanced Technologies• Traditional Investigation Methods• Data Mining/Analysis for Detecting Electricity Theft• Meter Data Management (MDM)• Combination of Software and Communication
Technology• Geographic Information System (GIS)
67
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Software Solutions For Theft Detection
• Software is used to expand and automate theft detection processes
• Software is designed to apply data and knowledge gathered from different types of meters regarding customers’ load profiles and consumption to identify, to detect, and to predict behavior irregularities or abnormalities that may be due to electricity theft and to offer solutions to deal with non-payment.
68
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Examples of Software Technologies
• Remote meter control (remote disconnect or demand limiting) for non-payment.
• Prepayment, as a customer service option to help customers manage their cash flows.
• Revenue assurance analysis consisting of several capabilities: • Usage patterns based on history or customer class• Usage analysis for vacant houses, vacation houses etc.• Reverse energy flow where none is expected• Load side for disconnected meters• Notification for tamper indicators and events from meters (such as tilt,
reverse rotation, test mode status, and other tamper indicators) and • Advanced analysis for potential taps in high-incidence areas such as
looking at transformer primary versus secondary energy flow, feeder energy import and export, feeder voltage drop analysis, momentary outage count analysis, etc.
69
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Traditional Investigation Methods
• Peer models compare information about similar customers within similar geographical and environmental settings. Deviation from expected consumption can indicate electricity theft.
• Feature analysis looks for anomalies in a customer’s consumption pattern that might indicate theft. Pattern could be obtained using data-mining techniques, pattern recognition, and statistical techniques.
• Utilities’ IT groups develop specialized software that is designed to utilize collected information.
70
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
71
Data Mining/ Analysis For Detecting Electricity Theft
• Electronic meters in Automated Metering Systems (such as AMI (Advanced Metering Infrastructure)/AMR (Automatic Meter Reading)) provide a number of tamper codes that are designed to identify cases of electricity theft. Sometimes these tamper codes are a result of non-tamper related events.
• Abnormal electrical conditions are detected by meter and other data are inputted into software program.
• Software program analyzes tamper codes and links them with feature detection analysis to provide and report combined tamper scores
• Score allows for the prioritization of probability of theft and to isolate highest value cases
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Meter Data Management (MDM)
• The industry move toward smart metering has established meter data management (MDM) as a critical component to realizing the full potential of advanced metering infrastructure (AMI), especially when implemented prior to a large-scale residential AMI rollout.
• As smart meters or AMI are deployed, the MDM must also handle the storage and distribution of non-billing data and messaging such as: two-way commands, outage alarms, tamper alarms and demand response events.
72
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
MDM Example from Oracle consists of 3 Stages:
1. Data Management, info coming from the meter.
2. Meter Data Processes is when data is analyzed and regrouped.
3. Optional Process which indicates additional further data analysis options.
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
73
Combination of Software & Communication Technologies• Coupling software detection methods, especially
involving meters, with advanced anti-tampering communication systems.
• Anti-tampering system could consist of wireless transmitters, a wireless Central Processing Unit (CPU) module, and a server to manage two-way communication and monitor key data
• Theft detection is achieved by comparing consumption data between high-voltage lines and a smart meter
74
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Combination of Software & Communication Technologies -Advanced Metering Infrastructure (AMI) - Example
• AMI is a hardware and software system that includes meters, communication and data analysis
75
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Combination of Software and Communication Technologies - Example• Output Tampering is evident before 8 a.m. and after 7 p.m.
76
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Geographic Information System (GIS)
• GIS is a tool that combines mapping with electrical network layouts. • GSI allows utilities to visualize the data through intelligent maps in their
multiple systems
77
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Geographic Information System (GIS)
GIS offers utilities a number of advantages including:• Improving outage management response. • Improving service call and fleet management work • Improving 'Customer Complaints' logs in Trouble Call
Management.• Long-standing faults brought to a minimum.• Improving collection & billing system.• Reducing outage time.• Identifying and reducing power theft.• Providing better services to the consumers.• Automating process for everyday work tasks
78
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Software Solutions
Pros:• Data analysis is one of the biggest advantages for utilities in
implementing electronic meters. Meters record the electrical parameters of the system in addition to metering, so utility can use intelligence to detect abnormal electrical conditions. Complete data can be downloaded and studied in the office without the need for site visits and alerting the consumer.
Cons:• This approach is based on the use of expensive electronic meters,
sophisticated software and advanced technologies such as GIS. • Compatibility of communication protocols from different manufacturers
in collecting data may pose a problem. • Data storage and ownership of it may become a source of battles.
Part I What Constitutes Electricity Theft? Part II Technology OverviewPart III Case StudiesPart IV Lessons Learned
79
Section V. Unique Configurations and Other Techniques
• Feeder Meter Power Balancing/Macro Metering• Locked Meter Cabinets• Elevated Metering Systems:
– Elevated Meter Centers (EMC)– Service Drop in Maypole Configuration– Service Drop in Conduit
• Transverse Areal Distribution (DAT)• Placement of LV over MV lines (REDE)
80
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Feeder Level Power Balancing/ Macro MeteringIt is based on balancing of power measurements, identifying and removing illegalconnections until that feeder’s balance is reached:
input = output - technical lossesMeters are installed at three levels: 1. 10 kV feeders that serve several 0.4 kV transformer substations; 2. 0.4 kV transformer substations that serve customers; and3. Individual houses, apartments, and commercial enterprises.
81
0.4 kV transformer substation
110/35 kV metering point10 kV feeder metering point
0.4 kV substation metering points
0.4 – 0.22 kV customer metering points
Three and single phase customers
Level 1
Level 2
Level 3
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Locked Metal Cabinets
82
These metal cabinets reduce the ability of consumers to tamper with the meters inside. However, they do not prevent tampering by meter readers.
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
83
Elevated Metering Centers (EMC)
Conventional meters are raised on poles
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
84
Elevated Metering System with Service Drop in Maypole Configuration
Service drop with maypole
A very tall pole is used to place meters at the top of the pole in difficult to reach residential areas and individual service drop links the meters with individual homes
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Elevated Metering System with Service Drop in ConduitService Drop is used to reduce the distances between the pole with meter and the cables are encased in PVC or other hard conduit to prevent neighbors stealing from each other
Encased Shortest Service Drop
85
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
86
Transverse Aerial Distribution (DAT)
This is a configuration developed by Ampla distribution Company in Brazil designed specifically for difficult to serve areas, and slums in the state of Rio De Janeiro, Brazil.
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
87
Placement of LV lines over MV lines (REDE Ampla)
Interior of Meter “Concentrator”
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Unique Configurations and Other Techniques
Pros:• Simple solutions such as meter relocation into Locked Meter
Cabinets or Elevated Metering Systems may result in noticeable reduction of theft.
• Each configuration is designed specifically for the location and to address the existing problem.
• Configurations can be upgraded to the next level, based on the results achieved or not achieved.
Cons:• Can be expensive, depending on the configuration.• May not work for all locations
Part I What Constitutes Electricity Theft? Part II Technology OverviewPart III Case StudiesPart IV Lessons Learned
88
Case Studies
• AES Eletropaulo, Brazil• Reliance Energy Ltd (REL), India• ESKOM, South Africa• United Energy Distribution Company (UEDC),
Republic of Georgia• Dhaka Electric Distribution Company (DESCO),
Bangladesh • AMPLA, Brazil
90
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
AES ELETROPAULO, BRAZIL
Large informalcommunities ofconsumers illegallyconnected to the grid.Commercialcustomers alsotaking advantage offree electricity.
Almost 100% reduction of theft in the pilot area where technology applied. However, up to halfof new customershad difficulty payingtheir bills in the beginning.In 2009 non-payment was reduced to 11 % for the pilot area with 8.5% of payment defaults over 30 days.
Residential customers: 1. Meters encased in plastic
and sealed2. Re-metering with
electromechanical meters with service drop using bi-concentric coaxial cables
Commercial customers:1. Electronic meters
programmed with remote reading, disconnection and to limit consumption in case of nonpayment.
ResultsTechnology/Strategy Applied
Problem
91
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
RELIANCE ENERGY Ltd (REL), INDIA
In 2002-2003 in someareas of Delhi theftby metered andUnmeteredconsumers washigher that 60%.
Poor metering andbilling overloaded the distribution network.
Two subsidiaries ofREL reduced losseswithin the period of2003-2007:1. BRPL servingMumbai reduced theftfrom 51.5% to27.92%, and 2. BYPL serving Delhireduced theft form63.16% to 36.03 %
1. Installed Locked Meter Cabinets.
2. Re-metering with electronic meters.
3. Applied Data Mining Analysis for theft detection
4. GIS5. Area audits and
regularization and amnesty of illegal customers.
6. Theft Detection Devices (TDD) – AMI.
ResultsTechnology/Strategy Applied
Problem
92
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
ESKOM, SOUTH AFRICA
Eskom's total electricitylosses due to theft equal 10% ofthe current nationaldemand. The challenge was toEnsure utility’s abilityto monitor customersand to maintaincustomer servicefor more than 3.7million customersconnectedto the grid.
In the pilot areasTheft was reducedfrom 60% to 3-5% andwas attributedprimarily to theinstallation of SplitPrepayment meters
1. Split Prepayment Meters2. Aerial bundled and
Coaxial Cables3. Automated Remote
Metering – InfoPOD4. Service Drop in Maypole5. Locked meter boxes with
alarm notification to the utility data centers.
6. Mid-Block Electrification-Feeder Level Check Meter Principle Power Balancing
ResultsTechnology/Strategy Applied
Problem
93
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
UNITED ENERGY DISTRIBUTION COMPANY (UEDC), REPUBLIC OF GEORGIA
The largestutility serving70% of thepopulation had 70% nontechnical losses withcollection rate below20% due to poormanagementPractices and oldequipment.
Since 2002, UEDCreduced losses from70% to 13% in 2007and to 4% in 2009 withcomparatively small investments intechnology, but strong emphasis onenforcement ofthe rules. CollectionsIncreased from below20% to 80%.
1. Re-Metered with electromechanical and electronic meters.
2. Placed meters in Locked Meter Cabinets.
3. Meter/Security Seals installed.4. Feeder Level Power
Balancing.5. Software for Data
Mining/Analysis and billing.6. Communal Metering.7. Tamper detection electronic
meters on non-residential levels.
ResultsTechnology/Strategy Applied
Problem
94
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
DHAKA ELECTRIC SUPPLY COMPANY (DESCO), BANGLADESH
Low electrification.Unauthorizedconnectionsand meter by-pass inlow income areas.Poor customeraccounting.Irregularities in meterreading and billing
Since 1996 DESCOreduced overalltechnical andnon technical losses from 47% to 13.4% in2007 and to 9,55%in 2009.
1. Elevated Metering System with service drop with aerial bundled cables and secure cable connections,
2. Electronic pre-payment meters with meter seals
3. Feeder Level Power Balancing/Macro Metering
ResultsTechnology/Strategy Applied
Problem
95
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
AMPLA, BRAZIL
From 1995 to 2005an 80% increase inconsumption as aresult of large informalcommunities of consumers illegallyconnected to the grid.Non-technicallosses comprised 58% of total losses. 59% of non-technicallosses and 65% ofnon-payments were inslum areas.
Total losses werereduced from 24% of total consumption in2003 to below 20% ofIn 2007.Theft was reducedfrom 59% to 2% in theareas where thetechnology wasapplied. Non payment reducedto from 65% to 1%.
Stage 1: Transverse AerialDistribution (DAT) with Twistedand Shielded cables. Feederlevel power balancingStage 2: REDEAMPLA/Placement of LV linesover MV lines.Stage 3: Ampla Chip/AMR withPower Monitors, and Plastic Meter Encasements fornon-Ampla Chip customers.
ResultsTechnology/Strategy Applied
Problem
96
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Summary Case Studies
97
AES EP REC ESKOM UEDC AMPLA DESCO
Non-Technical (NT) Losses prior
98% 51% 60% 70% 100% 47%
Non-Technical (NT) Resulting Losses
1% 28% 3-5% 4% 1-2% 9.55%
Technology Used
1)Plastic Meter Encasements
2) AMR3) Service Drop
with Coaxial Cables
1) Locked Meter Cabinets2) Theft Detection Devices/AMI 3) Bundled and Shielded Cables4) Data Analytics 5) GIS6) AMI
1) Split Prepayment Metering 2) AMR-InfoPOD3) Aerial Bundled and Coaxial Cables4) Feeder Level Power Balancing
1) Re-metering: ElectromechanicalElectronic and CommunalMetering2) Locked MeterCabinets 3) Meter Seals 4) Feeder LevelPower Balancing
1)TransverseAerial Distribution1)Placement of LV
over MV lines2)AMR 3)Coaxial Cables 4)Power Balancing5)PlasticEncasement of
Meters
1) EMS withService Dropwith ABC andSecure CableConnections, 2) ElectronicPrepayment Meters withMeter Seals3) Feeder LevelPower Balancing
Disclaimer: This table is compiled based on data from various available sources
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Average Monthly Consumption in Studied Utilities
0
50
100
150
200
250
kWh/month
RelianceMumbai ESKOM
UEDC
DESCO
AMPLA
AESBrazil
98
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
99
KPI Category or KPI KPI Category 1: Financial Viability of the Business Model for the Company Investment Requirements Change in revenue (in terms of losses or debt reduction) Payback KPI Category 2: Affordability and Acceptability for the Customer Change in affordability of electricity service Reduction in inefficient consumption achieved Improvement in the reliability of electricity service Improved legal and institutional status within society Improvement in personal safety and physical environment Satisfaction with customer service including Community Agents KPI Category 3: Society and Community Acceptance of the Project Community and Other Stakeholder Acceptance Regulator and Ratepayer Acceptance Improved Area-wide Security and Safety
AES EP Key Performance Indicators (KPI) to measure their progress through three categories - Example
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Example: Chilectra Long Term, Multi-prong Effort Required to Meet Permanent Challenge
100
May 198422.6% Losses
Pilot project on Economic Aerial Distribution
Economic Aerial Distribution (DAE)
Important Client Project
Concentric Aerial Distribution (DAC)
Focus on Problem Areas
Shielded Anti-theft Meter Box with Tamper Shut Down
Work in Slums; Ethnographic Studies
Acme Grid and Company Social Responsibility
12-month indicator of electricity losses at Chilectra (from 1981-October 2007)
Technical Measures Implemented (PIMT)
Source: Chilectra, Chile
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Part IV: Lessons Learned - No One Solution Fits All!
102
Part I What Constitutes Electricity Theft? Part II Technology OverviewPart III Case StudiesPart IV Lessons Learned
• In low income neighborhoods, technology alone is rarely sufficient to stop theft. Integrated anti-theft programs including community outreach, publicity about apprehensions and criminal proceedings against theft, as well as information about how to consume electricity more efficiently and within the budget available to the customer were used.
• Utilities identify the largest source of losses among their consumer categories.
• Each company evaluates the reasons for the sources, types and degree of their non-technical losses and develops a unique strategy for addressing those losses.
Lessons Learned (Cont’d)
103
Part I What Constitutes Electricity Theft? Part II Technology OverviewPart III Case StudiesPart IV Lessons Learned
• Utilities implement their programs in stages, checking at each stage whether it was adequate or whether more technology, management or outreach is needed.
• Utilities reduce their costs by focusing their efforts on the worst cases rather than putting in anti-theft technology system wide.
• Those companies with consumers that have relatively high consumption have more motivation to install anti-theft technology.
Lessons Learned (Cont’d)
104
% of Non-Technical Losses Reduced
ROI on AT tech
Investments in Anti-Theft (AT) Technology
Optimal point of investment in AT
technology
>1
Part I What Constitutes Electricity Theft? Part II Technology OverviewPart III Case StudiesPart IV Lessons Learned
• Optimal Point of Investment in Anti-Theft (AT) Technology Relatively low cost techniques and technologies that yield high ROI could be implemented first. Generally, if there are theft problems associated with larger consumers (e.g. commercial), then technology investments would be prioritized, so that the largest sources of loss are addressed first, as the ROI will most likely be higher.
Benefits of Metering and System Upgrades
Replacing faulty meters and LV lines most often leadsto readings that are larger and more accurate thanprevious meter indicated.
0
50000
100000
150000
200000
250000
300000
November December January February March April
kWh
before the projectafter the project
105
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Benefits of Metering and System Upgrades (continued)
• Therefore the amount billed goes up based on the true consumption.
• Individual actual consumption may either: – decrease over time and the supply purchase requirements
for the company will go down as a result,– or it may increase improving the consumers’ quality of life
and increasing distribution company’s revenues.
106
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Benefits of Metering and System Upgrades (continued)
• Example 1: United Energy Distribution Company (UEDC) in the Republic of Georgia, reported reduced consumption by 30 % that benefited the grid load during peak hours.
• Example 2: 40% of Ampla, Brazil, consumers reduced their consumption while the rest increased by varying amounts (some as much as 50% more). The average increase in consumption per client is 25%. Ampla’s experience shows that customers who used to steal power, increased their consumption, probably because of better power quality and reliability that comes with a legal connection and allows the use of appliances without fear of them burning out.
107
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Technology investments need to be coupled with:
Operational Procedures with Legal and Regulatory SupportUtility staff and customers need to be disciplined to comply with therules and procedures and to know that illegal tapping andtampering will be identified, disconnected, reported and punished.
Management Practices with Customer Oriented ApproachCustomer hot lines, public outreach activities and publishedinformation on electricity services, safety and billing and paymentoptions is an important investment that leads to sustainableconsumer behavior change.
108
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Non-Technology Based SolutionsManagement:• Separating metering, billing and collection functions. • Computerization of consumer accounts, enabling monitoring of each account.• Bill payment through banks.• Incentive and punishment based pay schemes for meter readers.• Government subsidies made transparent.• Spot checks and audits.Legal and Regulatory:• Permitting disconnections for nonpayment, • Requiring 100% billing, imposition of fines and penalties for electricity theft, • Establishment of a dispute resolution system Community Outreach and Public Awareness:• Investing in public education on electricity theft and dangers.• Establishment by utilities an easy communication with their customers on tariffs,
laws and understanding meter readings.109
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Items to Consider in Assessing Expected Commercial Net Benefits and Costs of Investing in Anti-Theft Technologies
Determining the cost-benefit ratio
Regulatory approvalsand how much utilities
can charge
Meter reader retraining and costs associated with it
Ability to dealing with increased customer service
Potential for future upgrades
How long will the investment last and under what conditions
Determining the likelihood and ease of
equipment damage
Number of Customers or kWh needed to make
investments break even
Anti-Theft Technology Investments?
110
Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned
Steps to Sustainable Anti-Theft Programs by Utility Companies
111
Part I What Constitutes Electricity Theft? Part II Technology OverviewPart III Case StudiesPart IV Lessons Learned
5. Set operational procedures with regular monitoring.
6. Introduce new management practices towards a more customer oriented approach.
4. Assess the expected commercial net benefits and costs of investing in anti-theft technologies.
3. Determine if metering and system upgrades are needed.
2. Identify if consumers have a legal or illegal connection.
1. Conduct field assessment/ inspection of the existing infrastructure, such as cables, meters and etc.
7. Implementation.
Appendix A: Acronyms
112
ABC Aerial Bundled CablesAES EP AES Eletropaulo, BrazilAMI Advanced Metering InfrastructureAMM Automated Meter ManagementAMR Automated Meter ReadingAT Anti-TheftCPU Central Processing UnitDAT Transverse Areal DistributionDESCO Dhaka Electric Distribution Company, Bangladesh ECC Electronic Current Cut-OutECB Electronic Circuit BreakerEMC Elevated Meter CentersGIS Geographic information SystemGSM Global System for Mobile CommunicationLV Low Voltage (in the case of cables)MCB Miniature Circuit BreakerMDM Meter Data ManagementMV Medium Voltage (in the case of cables)NT Non-Technical (in the case of losses)PLC Power Line CarrierPTCs Positive Temperature Co-efficient ThermistorsPVC Polyvinyl chlorideREL Reliance Energy Ltd, IndiaRF Radio FrequencyROI Return on InvestmentSIM Subscriber Identity ModuleUEDC United Energy Distribution Company, Republic of Georgia
113
Appendix B: Sources
• Sources – Presentations• Sources – Technology Overview• Sources – Case Studies
114
Appendix C: Sample list of Meter Manufacturers and VendorsElectronic Meters:• Actaris www.actaris.com• Analog Devices
http://www.analog.com/en/index.html• Cashpower Suprima
http://www.za.landisgyr.com/za/prepay/catalogues/vending_catalogue.pdf
• Circuit Breaker Industries www.cbi.co.za• Conlog www.conlog.co.za• Contour Technology www.contour.co.za• EAS Elektronik San Tic http://www.eas-
tr.com/default-en.asp• Elektromed http://www.elektromed.com.tr• Elster Metering http://www.elstermetering.com• http://old.metering.com/archive/014/25_1.htm
Grupa Apator http://www.apator.eu/en/ff_home?set_lang=en
• JDS Uniphase Corporation, http://www.jdsu.com• Landis + Gyr www.cashpower.com
• Laser LaserPoint s.r.l., http://www.laserpoint.it• Laser Probe Inc., http://www.laserprobeinc.com• Malaysian Intelligence Meters www.mim.net.my• Meter Mate http://www.metermate.co.za• MetroLux GmbH, Germany
http://www.metrolux.de• Open Architecture Systems (OAS)
www.oas.co.za• Ophir Optronics Ltd., Israel
http://www.ophiropt.com• PN Energy Services www.pn.co.za• PRI Liberty meter http://www.pri.co.uk• Prism Payment Technologies supplier of the
STS encryption modules. www.prism.co.zaShenzhen Star Instruments Company Limited http://www.szstar.com/english/index.asp
• Syntell http://www.syntell.co.za• Ultima System and Powerhouse Solar• http://www.actaris.com/html/products-1588.html• http: www.alibaba.com
Appendix D: Sample List of Meter Manufacturers and Vendors Prepaid Meter Manufacturers• Actaris www.actaris.com• Cashpower Suprima www.za.landisgyr.com/za/prepay/catalogues/vending_catalogue.pdf• Circuit Breaker Industries www.cbi.co.za• Conlog www.conlog.co.za• Contour Technology www.contour.co.za• EAS Elektronik San Tic www.eas-tr.com/default-en.asp• Elektromed www.elektromed.com.tr• Grupa Apator www.apator.eu/en/ff_home?set_lang=en• Landis + Gyr www.cashpower.com• Malaysian Intelligence Meters www.mim.net.my• Meter Mate www.metermate.co.za• Open Architecture Systems (OAS) www.oas.co.za• PN Energy Services www.pn.co.za• PRI Liberty meter www.pri.co.uk• Prism Payment Technologies supplier of the STS encryption modules. www.prism.co.za
– Shenzhen Star Instruments Company Limited www.szstar.com/english/index.asp– Syntell www.syntell.co.za– Ultima System and Powerhouse Solar old.metering.com/archive/014/25_1.htm
115