Professional Documents
Culture Documents
IoT BASED UG CABLE FAULT DETECTION SYSTEM
IoT BASED UG CABLE FAULT DETECTION SYSTEM
A project report
Submitted in partial fulfillment of the requirements for the award of the degree
of
BACHELOR OF TECHNOLOGY
In
Electrical & Electronics
Submitted By
Associate Professor
Department of EEE
CERTIFICATE
This is to certify that the project entitled “IOT BASED UNDER GROUND FAULT
LOCATION DETECTION SYSTEM” that is being submitted by N.Karthik (20985A0258)
B.Tarun kumar (20985A0216) B.Sai manasa (20985A0213) K.Sitaram (20985A0235) P.Denial living
stone (20985A0269) in the partial fulfillment for the award of Bachelor of Technology in
Electrical and Electronics during 2019-2023 in Raghu Engineering college (autonomous),
affiliated to JNTUK University, is a record of bonafide work carried out by them under our
guidance and supervision. The results embodied in this work have not been submitted to any
other University or Institute for the award of any degree or diploma.
External Examiner
DECLARATION
We hereby declare that this project titled IOT BASED UNDER GROUND FAULT
LOCATION DETECTION SYSTEM is an original and authentic work done in the
Department of Electrical and Electronics, Raghu Engineering College, submitted in the partial
fulfillment of the requirement for the award of the degree of Bachelor of Technology in
Electrical and Electronics, Jawaharlal Nehru Technological University Kakinada. This project
report has not been previously submitted to any University/ Institution for the award of any
other degree.
N. KARTHIK
(20985A0258)
B. TARUN KUMAR
(20985A0216)
B.SAI MANASA
(20985A0213)
K. SITARAM
(20985A0235)
N. KARTHIK (20985A0258)
K. SITARAM (20985A0235)
Abstract (i)
List of Figures (ii)
List of Screens (iv)
1 INTRODUCTION 1-8
1.1 Introduction to IoT 1
1.2 Motivation 7
1.3 Problem Definition 7
1.4 Objective of Project 7
1.5 Limitations of Project 8
1.6 Organization of Documentation 8
3 ANALYSIS 13-32
3.1 Introduction 13
3.2 Software Requirement Specification 14
3.2.1 User Requirement 14
3.2.2 Software Requirement 14
3.2.3 Hardware Requirement 21
3.3 Block Diagram of Project 29
3.4 Flowchart 30
4 DESIGN 33-38
4.1 Introduction 32
4.2 UML diagrams 32
4.3 Module design and organization 35
5 IMPLEMENTATION & RESULTS 40-47
5.1 Introduction 40
5.2 Explanation of Key functions 40
5.3 Method of Implementation 40
5.3.1 Arduino IDE 40
5.3.2 Mode MCU 42
5.4 Output Screens 45
5.5 Result Analysis 46
7 CONCLUSION 62
ABSTRACT
This project is designed using IoT (Internet of Things). The system detects the fault with the
help of potential voltage and resistance that is in the cable wires. Underground cables are
prone to a wide variety of faults due to underground conditions wear and tear, rodents etc.
Fault Detection is a method used to determine the distance of underground cable faults that
occur from the base station in kilometers. The digital way of detecting the faults such as short
circuits, line breakages, open faults which are occurred due to the change in resistance across
the cables are identified because of variation in current that is being passed within the lines. A
set of resistors are used to represent the cables which finds the faults due to change in voltage.
These calculations are taken by microcontroller, so that the fault distance is detected and
displayed on LCD display. Detection of such fault sources is difficult, and to find it out the
entire line has to be dug and check to fix the faults. So here we propose a cable fault detection
over IoT that detects the exact fault position and makes the repairing work easy. The operation
of this experimental model of the device is taken care by microcontroller which is controlled
by an Arduino UNO board. From the microcontroller data is fed to the node MCU and it
shows a message to the user over the blynk cloud application.
(i)
LIST OF FIGURES
3.5 1k Resistor 24
3.8 Switch 26
(ii)
4.9 Power off condition 39
5.3 Connections 47
(iii)
LIST OF SCREENS
2 Home Page 17
4 Hardware selection 18
6 Selecting widgets 19
7 Design framework 20
13 Blynk console 46
(iv)
CHAPTER – 1
INTRODUCTION
CHAPTER-1
INTRODUCTION
Device Management
Integration
Visualization
Applications of IOT
Manufacturing
Environmental monitoring
1
Fig 1.1: Internet of Things schematic showing the end users & application areas.
Where is the term IoT being used?
The term IoT is being used in different contexts, such as the body, homes, cities, industry, and
the global environment.
When talking about the home, IoT is often considered in terms of remote and local
monitoring and management of different home electronics and lights in terms of Home
Automation. In other ways as simply to keep plants in the yard alive by using an
automatic watering system.
In correlation to cities, the term IoT is used to describe systems that effectively gather,
and processinformation generated by various infrastructures, for example monitoring
centers for traffic lights, street lights, camera surveillance and the power grid.
Last, but not least important, Sensors can help protect wildlife, track water usage and
flows, monitor local weather, monitor use of natural resources, to give warnings before
and after natural disasters to prepare people for what is to come.
IoT − Key Features
The most important features of IoT include artificial intelligence, connectivity, sensors, active
engagement, and small device use. A brief review of these features is given below
AI − IoT essentially makes virtually anything “smart”, meaning it enhances every aspect
of life with the power of data collection, artificial intelligence algorithms, and networks.
Connectivity − New enabling technologies for networking, and specifically IoT
networking, mean networks are no longer exclusively tied to major providers.
2
Sensors − IoT loses its distinction without sensors. They act as defining instruments
which transform IoT from a standard passive network of devices into an active system
capable of real-world integration.
Small Devices − Devices, as predicted, have become smaller, cheaper, and more powerful
overtime. IoT exploits purpose-built small devices to deliver its precision, scalability, and
versatility.
Scope and Benefits of IoT
It’s the technology of today which is touching and transforming every aspect of our real-life.
IoT has given a concept of Machine to-Machine (M2M) communication. Companies like
Microsoft and SAP are implementing strategy to capitalize on the Internet of Things so that
you can just stop your business and start making it thrive. IoT is going to have huge impact on
home automation and building automation system where every convenience will be taken care
by the interconnected devices.
It is also deployed on large scale for example in Songdo, South Africa, the first of its own
kind fully equipped and wired smart city is near to completion (known as Ubiquitous City).
With the personal electronics good connected to Internet will enable us to “author” our lives.
In medical science field, IoT has given a privilege to devices and system to sense for coming
disease and to prevent it.
Challenges in IoT
The Internet of Things (IoT) has fast grown to be a large part of how human beings live,
communicate, and do business. Across the world, web-enabled devices are turning our global
rights into a greater switched-on area to live in. There are various types of challenges in front
of IoT.
Security Challenges in IoT
1. Insufficient testing and updating
With the increase in the number of IoT (internet of things) devices, IoT manufacturers are more
to produce and deliver their device as fast as they can without giving security too much.
2. Brute forcing and the risk of default passwords
Weak credentials and login details leave nearly all IoT devices vulnerable to password hacking
and brute force.
3
3. IoT Malware and ransomware
Ransomware uses encryption to effectively lock out users from various devices and platforms
and still use a user’s valuable data and information.
Design challenge in IoT:
1. Battery life is a limitation
Issues in packaging and integration of small-sized chip with low weight and less power
consumption.
2. Increased cost and time to market
Embedded systems are lightly constrained by cost. The need originates to drive better
approaches when designing the IoT devices in order to handle the cost modelling or cost
optimally with digital electronic components.
3. Security of the system
Systems must be designed and implemented to be robust and reliable and must be secure with
cryptographic algorithms and security procedures. It involves different approaches to secure
all the components of embedded systems from prototype to deployment.
Deployment challenges in IoT:
1. Connectivity
It is the foremost concern while connecting devices, applications, and cloud platforms.
Connected devices that provide useful front and information are extremely valuable. But poor
connectivity becomes a challenge where IoT sensors are required to monitor process data and
supply information.
2. Cross platform capability
IoT applications must be developed, keeping in mind the technological changes of the future.
Its development requires a balance of hardware and software functions.
3. Data collection and processing
In IoT development, data plays an important role. Along with security and privacy,
development teams need to ensure that they plan well for the way data is collected, stored, or
processed within an environment.
4
Fig 1.2: Components of IoT Application
The connected device – The actual physical device we want to control and manage. It needs
to be connected somehow, either wired or wireless.
The local user – This is the user who wants to interact directly with the device to either
control it or receive information regarding its operation.
The router – This is the part that connects the device to the Internet. The connection can be
via ADSL, cable, cellular, etc. In some cases, there is no router where we want to place our
device. The cloud solution – A Cloud solution can be simple storage of data flowing from
your connected device or can include complex analytic functions that are performed on the
data from the device.
IoT – Advantages
The advantage of IoT span across every area of lifestyle and business. Here is a list of some of
the advantages that IoT has to offer –
Improved Customer Engagement – Current analytics suffer from blind sports and
significant flaws in accuracy; and as noted, engagement remains passive.
Technology Optimization − The same technologies and data which improve the customer
experience also improve device use, and aid in more potent improvements to technology. IoT
unlocks a world of critical functional and field data.
Reduced Waste − IoT makes areas of improvement clear. Current analytics give us
superficial insight, but IoT provides real-world information leading to more effective
management of resources.
Enhanced Data Collection − Modern data collection suffers from its limitations and its design
5
for passive use. IoT breaks it out of those spaces, and places it exactly where humans really
want to go.
IoT – Disadvantages
Though IoT delivers an impressive set of benefits, it also presents a significant set of
challenges. Security − IoT creates an ecosystem of constantly connected devices
communicating over networks. This leaves users exposed to various kinds of attackers.
Privacy − The sophistication of IoT provides substantial personal data in extreme detail
without the user’s active participation.
Complexity − Some find IoT systems complicated in terms of design, deployment, and
maintenance.
Future scope of IoT
The Internet of things (IoT) is an ecosystem of associated physical gadgets/objects that are
available through the web. IoT is an arrangement of interrelated gadgets, advanced items,
articles, individuals or creatures that are given novel identifiers (UIDs) and the capacity to
move information over an organization without requiring any human collaboration.
6
1.2 MOTIVATION
Until the last decade, cables were designed to be long transmission lines and overhead lines
over top of the ground, and at present, there is a practice of underground cables. The adverse
weather conditions such as storms, snow, torrential rains, and pollution effects the cable lines
that are placed overhead but does not affect underground cables. In the urban areas, the
electrical cable runs in underground instead of overhead lines. Whenever the fault occur the
repairing process becomes difficult. It is very difficult to identify the exact location of the
fault in underground power cable line Now the world has become digitized. So, the project is
to detect exact location of the fault in digital form.
7
1.5 LIMITATIONS OF PROJECT
The entire set up must be prepared and connected to all areas and the base station which is
a bit complex and difficult.
1.6 ORGANIZATION OF
DOCUMENTATION Chapter 1:
In chapter 1, Introduction, motivation, problem definition objective of project, limitations of
project of these subterranean cord faults detection is explained.
Chapter 2:
In chapter 2, Literature survey of subterranean cord fault detection is explained.
Chapter 3:
In chapter 3, Analysis- Introduction, SRS (user, software and hardware), block diagram and
flowcharts of subterranean cord fault detection are explained.
Chapter 4:
In chapter 4, the Design- Introduction, UML diagrams, module design and organization of the
device are explained.
Chapter 5:
In chapter 5, Implementation and Results- Introduction, explanation of key functions,
method of implementation (forms, output screens, result analysis) conclusion of this fault
detection system are explained
Chapter 6:
In chapter 6, Testing &Validation-Introduction, design of test cases and scenarios, validation
of code build for the project is explained.
8
CHAPTER – 2
LITERATURE SURVEY
CHAPTER-2
LITERATURE SURVEY
2.1 INTRODUCTION
Literature survey is the most important step in software development process. Before
developing the tool, it is necessary to determine the time factor, economy and company
strength. Once these things are satisfied, then next steps are to determine which operating
system and language can be used for developing the tool. Once the programmers start
building the tool the programmers need lot of external support. This support can be obtained
from senior programmers, from book or from websites. Before building the system, the above
consideration is taken into account for developing the proposed system.
For the real worldwide operated voltage distribution lines underground cables have been used
from many years. To reduce the sensitivity of distribution network the underground voltage
cables are highly used. Underground cables have been widely used in power distribution
networks due to the advantages of underground connection, more enhanced security than
overhead lines in adverse weather condition, less liable to damage by storms or lightning. It is
less costly for larger distance, eco- friendly and low maintenance cost. But if any fault occurs
in cable, then it is difficult to its type. So, this system is used to detect the location and type of
fault in digital way. The requirement of locating the faulty point in an underground cable in
order is to facilitate quicker repair, improve the system reliability and reduced outage period.
Underground cables are the electric power transmission cables. Becauseof their reliability on
transmitting, they used in urban areas and in thick population areas, where overhead
transmission is dangerous. Underground cables have low maintenance cost, less chances of
faults, smaller voltage drop.
3.1 INTRODUCTION
Systems analysis is a process of collecting factual data, understand the processes involved,
identifying problems, and recommending feasible suggestions for improving the system
functioning. This involves studying the business processes, gathering operational data,
understand the information flow, finding out bottlenecks and evolving solutions for
overcoming the weaknesses of the system so as to achieve the organizational goals. System
Analysis also includes subdividing of complex process involving the entire system,
identification of data store and manual processes, and specifies what system should do.
The major objectives of systems analysis are to find answers for each business process: What
is being done, how is it being done, who is doing it, when is he doing it, why is it being done
and how can it be improved? It is more of a thinking process and involves the creative skills
of the System Analyst. It attempts to give birth to a new efficient system that satisfies the
current needs of the user and has scope for future growth within the organizational
constraints. The result of this process is a logical system design. Systems analysis is an
iterative process that continues until a preferred and acceptable solution emerges.
Purpose
System analysis is conducted for the purpose of studying a system or its parts in order to
identify its objectives. It is a problem-solving technique that improves the system and ensures
that all the components of the system work efficiently to accomplish their purpose. Analysis
specifies what the system should do.
Another definition of system analysis is its evaluation of a particular system to identify the
areas of improvements and make any necessary enhancements, if required.
Objectives
First, it helps to design systems where subsystems may have conflicting objectives.
Also, System analysis helps to achieve inter compatibility and unity of the sub systems
Above all, System analysis gives an advantage of understanding and comparing the sub-
systems functions with complete system.
Benefits
Proper system analysis makes the clear path for web application development by
maximizing the future IT requirements
Efficiency & Flexibility
System analysis will not only reduce the costs and helps to gain flexibility & flexibility in
the system development.
The greater flexibility of SA is to cater almost every future requirement of business by
mitigating the IT requirement.
Blynk Application
Introduction
Everyday life deals with smart world starting from beginning of morning to the end of the
day. Most of them deals with IOT based blynk platforms. This is available in ios and Android
versions. This app works on control panel from your IoT smart devices along with monitoring
the data. This requires energy to add widgets of our own choices in our projects.
It can control Arduino and Raspberry Pi and the likes over the Internet. It shows a digital
dashboard.
Where you can build a graphic interface for your project by simply dragging and dropping
widgets.
Screen 2: Home page
NodeMCU (Esp8266)
12V relay
Bc547 transistor
1K resistors
Fault switches ()
Microcontroller
Arduino is a tool for making computers that can sense and control more of the physical world than
the desktop computer. It's an open-source physical computing platform based on a simple
microcontroller board, and a development environment for writing software for the board. Arduino
can be used to develop interactive objects, taking inputs from a variety of switches orsensors, and
controlling a variety of lights, motors, and other physical outputs. The boards can be assembled by
hand or purchased preassembled; the open-source IDE can be downloaded for free. The Arduino
programming language is an implementation of Wiring, a similar physical computing platform.
Bc547 Transistor
Bc547 is a NPN transistor hence the collector and emitter will be left open (Reverse biased)
when the base pin is held at ground and will be closed (Forward biased) when a signal is
provided to base pin.
Arduino Working
An Arduino board consists of an Atmel 8-bit microcontroller with complementary components
to facilitate programming and incorporation into other circuits. Official Arduino have used the
mega AVR series of chips, specifically the ATmega8, ATmega168, ATmega328,
ATmega1280, and ATmega2560. Most boards include a 5-volt linear regulator and a 16 MHz
An Arduino microcontroller is also pre-programmed with a boot loader that simplifies
uploading of programs to the on-chip flash memory, compared with other devices that
typicallyneed an external programmer. This allows an Arduino to be used by novices and
experts alike without having to go through the difficulties first faced by many when using
electronics by allowing the use of an ordinary computer as the programmer. At a conceptual
level, when usingthe Arduino software stack, all boards are programmed over an RS-232
serial connection, but the way this is implemented varies by hardware version.
Current Arduino boards are programmed via USB, implemented using USB-to-serial adapter
chips such as the FTDI FT232. When used with traditional microcontroller tools instead of the
Arduino IDE, standard AVR ISP programming is used. Arduino board provides 14 digital I/O
pins, six of which can produce pulse-width modulated signals, and other six analog inputs.
The output or inputs can be taken from the boards or given to the board using convenient
connectors.
Both digital and analog inputs and outputs are available in all Arduino boards. The Arduino
boards can also communicate with other devices using standard communication ports like
USART, IIC, and USB etc.
Pin Description
Digital pins:
In addition to the specific functions listed below, the digital pins on an Arduino board can be
used for general purpose input and output via the pinMode(), digitalRead() and digital Write()
commands. Each pin has an internal pull-up resistor which can be turned on and off using
digitalWrite(). When the pin is configured as an input. The maximum current per pin is 40
mA. Analog pins:
In addition to the specific functions listed below, the analog input pins support 10-bit analog-
to- digital conversion using the analogRead() function.
Most of the analog inputs can also be used as digital pins:analog input 0 as digital pin 14
through analog input 5 as digital pin 19.
Analog inputs 6 and 7 – present on the Mini and BT cannot be used as digital pins.I2C: 4 and
5. Support I2C communication using the Wire library.
There are a couple of other pins on the board
AREF:
Reference voltage for the analog inputs. Used with analog Reference ().
Power:
The Arduino Uno can be powered via the USB connection or with an external power supply.
The power source is selected automatically. External power can come either from an AC-to-
DC adapter or battery. The adapter can be connected by plugging a 2.1mm center- positive
plug into the board’s power jack. Leads from a battery can be inserted in the GND and Vin pin
headers of the POWER connector. The board can operate on an external supply of 6 to20 volts.
If supplied with less than 7V, however, the 5V pin may supply less than five volts and the
board may be unstable. If using more than 12V, the voltage regulator may over heat and
damage the board. The recommended range is 7 to 12 volts. The power pins are as follows:
VIN:
The input voltage to the Arduino board when it’s using an external power source as opposed
to 5 volts from the USB connection or other regulated power source. You can supply voltage
through this pin, or, if supplying voltage via the power jack, access it through this pin.
1. GND: Ground pins.
2. 5V: a regulated 5V from the regulator on the board. The board can be supplied with power
either from DC power jack 7-12V, the USB connector 5V, or the VIN pin of the board 7-12V.
Supplying voltage via the 5V or 3.3V pins by passes the regulator
Node MCU working
The ESP8266 is the name of a micro controller designed by Esp8266 if Systems. The
ESP8266 itself is a self-contained Wi-Fi networking solution offering as a bridge from
existing micro controller to Wi-Fi and is also capable of running self-contained applications.
This module comes with a built in USB connector and a rich assortment of pinouts. With a
micro-USB cable, you can connect NodeMCU to your laptop and flash it without any trouble,
just like Arduino. It is also immediately breadboard friendly.
Specification:
Voltage:3.3V.
Wi-Fi Direct (P2P), soft-AP.
Current consumption: 10uA~170mA.
Flash memory attachable: 16MB max (512K normal).
Integrated TCP/IP protocol stack.
Processor: Ten silica L106 32-bit.
Processor speed: 80~160MHz.
RAM: 32K + 80K.
GPIOs: 17 (multiplexed with other functions).
Analog to Digital: 1 input with 1024 step resolution.
+19.5dBm output power in 802.11b mode
802.11 support: b/g/n.
Maximum concurrent TCP connections: 5.
4.1 INTRODUTION
Software design sits at the technical kernel of the software engineering process and is applied
regardless of the development paradigm and area of application. Design is the first step in the
development phase for any engineered product or system. The designer’s goal is to produce a
model or representation of an entity that will later be built. Beginning, once system requirement
have been specified and analyzed, system design is the first of the three technical activities -
design, code and test that is required to build and verify software.
The importance can be stated with a single word “Quality”. Design is the place where quality
is fostered in software development. Design provides us with representations of software that
can assess for quality. Design is the only way that we can accurately translate a customer’s
view into a finished software product or system. Software design serves as a foundation for all
the software engineering steps that follow. Without a strong design we risk building an
unstable system – one that will be difficult to test, one whose quality cannot be assessed until
the last stage.
Sequence Diagram
A sequence diagram emphasizes the time ordering of messages. A type of interaction
diagram, a sequence diagram shows the actor of objects participating in an interaction and
the events they generate arranged in a time sequence. Often, a sequence diagram shows the
event that result from a particular instance of a usecase, but a sequence diagram can also
exist in a more generic form. In the subterranean cord fault detection system, the interaction
between the system follows a sequence of steps in a process in three different ways. A
monitoring system is used for detecting the faults which then interacts with a tracking system
and then gives the input data to the base station or blynk console where we can see the faults.
In the monitoring system, there is continuous evaluation of the hardware device for every
millisecond and an update is given to the tracking system for faults. If a fault is detected, then
an update is sent to the website which acts as a base station for the user because it has a
direct interactionwith the end user. So, now the fault generated has to be resolved and this
change can be monitored again by continuous evaluation in the system.
Fig 4.2 Sequence diagram of subterranean cord fault detection
Class Diagram
The Class diagram in our project represents the static view of an application. The class
diagram describes the attributes and operations of a class and the constraints imposed on the
system. It is the most popular UML diagram in the coder community. Class diagram is not
only used for visualizing, describing, and documenting different aspects of a system but also
for constructing executable code of the software application.
The various hardware devices that are used in this project have a direct interaction with all
the devices in a generalized form. The interaction of the devices starts with a power supply
to the set up and Arduino comes into action, and the system gets enabled.
The continuous monitoring of faults is done with the help of microcontroller that is
connected to the relay driver in an indirect manner. The output of the microcontroller is
given as an input to the NodeMCU which acts as a transaction medium, and it shows the
faults in the hardware kit on a lcd display and also sends the data to the blynk cloud which
shows the faults for the end user. This is how all the hardware components interact and
follow a process flow.
Class diagrams are the blueprints of your system or subsystem. You can use class diagrams to
model the objects that make up the system, to display the relationships between the objects,
and to describe what those objects do and the services that they provide. Class diagrams are
useful
in many stages of system design.
5.1 INTRODUCTION
Implementation is the stage of the project when the theoretical design is turned out into a
working system. Thus, it can be the most critical stage in achieving a successful new system
and in giving the user, confidence that the new system will work and effective. The
implementation stage involves careful planning, investigation of the existing system and its
constraints on implementation, designing of methods to achieve change over.
firstVal =
l.toInt(); secondVal =
m.toInt(); thirdVal =
n.toInt(); fourthVal =
o.toInt();
myString = "";
}
}
}
void sensorvalue1()
{
int sdata = firstVal;
// You can send any value at any time.
// Please don't send more that 10 values per
second. Blynk.virtualWrite(V2, sdata);
}
String getValue(String data, char separator, int index)
{
int found = 0;
int strIndex[] = { 0, 1 };
int maxIndex = data.length() - 1;
6.1 INTRODUCTION
Testing is a critical element of software quality assurance and represents the ultimate review
of specification design and coding. Testing is the process where that test data is prepared and is
used for testing the modules individually and later the validations given for the fields. Then
the testing takes place, which make sure that all components of the system properly function
as a unit by trying to force the system to fail. Testing is best performed when employee
departments are asked to assist in identifying all possible situations that might arise.
a) Testing is a process of executing a program with the intent of finding an error.
b) A good test is one that has high probability of finding an as-yet undiscovered error.
c) A successful test is one that uncovers as-yet undiscovered error.
All tests should be planned long before. Testing should begin “in the small” and progress
toward testing “in the large”. The first tests planned and executed generally focus on
individual program modules. As testing progresses, testing shifts focus in an attempt to find
errors in integrated clusters modules of ultimately in the entire system. Testing of the
debugged program is one of the most critical aspects of computer programming because
without that work, the system will never produce the output for which it is designed. The
philosophy behind testing is to find errors. Hence as successful test is a one that fined errors.
Testing is the state of implementation that is aimed at ensuring that the system works
accurately and efficiently before live operation commences. Any engineered product can be
tested in one of the two ways.
User Interface Testing
The data that is given by the user should lie on the particular range. When the employee given
wrong data, the system will give error message. According to this, the program was
developed. The value of the data should fall on the given range of value. The following are
some of the testing strategies that are carried out during the testing period.
Code Testing
This examines the logic of the program. For example, the logic for calculating profit, rate
taking the percentages entered by employee was tested and verified with the data that was
carried out. 1.Specification Testing
Executing the specification starting what the program should do and how it should perform
under various conditions. Test cases for various situations and combination of condition in all
the modules were tested.
2. Module Testing
To locate errors, focus is given on the modules, independent of other modules. This is known
as module testing. This enables us to detect error and correct it without affecting any other
modules. Whenever the program was not executing the required function, it was corrected to
get required results. Thus, all the modules are tested from bottom to up starting with the
smallest and lowest level modules and proceeding to next level.
3. System Testing
Once individual module testing is completed, modules are assembled and integrated to
perform as a system. Then the top-down testing begins from upper-level to lower-level
module testing was carried out to check whether the entire system is performing satisfactorily.
This is the test done for the whole system integration after completion of the module testing.
4. Test Data and Output
For all types to tests, dummy data were keyed in and after the testing was over live data were
keyed in from the source documents and concerned Department people were followed to key
in and work on the system.
5. Unit Testing
Unit testing focuses verification efforts on the smallest unit of software design the module.
The unit test is always white box oriented, and the step conducted in parallel for multiple
modules. 6.Integration Testing
Integration testing is a systematic technique for constructing the program structure while at
the same time conducting tests to uncover errors associated with interfacing. The objective is
to take unit tested modules and build a program structure that has been dictated by the design.
7. Top–Down Integration
It is an incremental approach to the construction of program structure. Modules are integrated
by moving downward through the control hierarchy, beginning with main control. Modules
subordinate to the main control modules are incorporated into the structure in either depth first
or breadth first manner.
8. Bottom-Up Integration
Bottom-up integration, as suggests, begins construction and testing atomic modules. Since
are integrated from bottom up, processing required for modules subordinates to a given level
is always available and the need for stubs is eliminated.
9. Validation Testing
At the culmination of integration testing, software is completely assembled as a package,
interfacing errors have been uncovered and corrected, and a final series of software testing
validation testing may begin. Validation succeeds when the software function in a manner
that can be reasonably accepted by a customer.
10. Acceptance Testing
Acceptance test is conducted to enable the customer to validate all requirements. It can range
from an informal test drive to a planned and systematically executed series of tests. Alpha
and beta testing at the developer site. The software is used in a natural setting with the
developer. These tests are conducted sites by the software in an environment, which cannot
be controlled by the developer. The function or performance characteristics conform to the
specification and are accepted. A deviation from specification is uncovered and deficiency
list is created. The validation test was carried out on all modules. Most of the characteristics
conformed to the specifications and where a deviation was encountered the appropriated
during software development.
In this project on Underground cable fault detection using Arduino was done and the distance
of the fault from the base station in kilometers was displayed for the three individual phases
R,Y and B.Circuit can be tested with different resistor values to simulate various fault
conditions in this project faults up to a distance of 6 km can be detected. When the fault
switches are operated to fault condition then the phase corresponding to that particular switch
is considered as the faultyphase. So, the faulty section can easily be located. In this project we
are focusing on detection of line-line, line-ground and open loop faults that occur in circuits.
As an extension to this project helps in finding different kinds of faults as a future
enhancement to this, we can extendit for finding out faults by using buzzer sound.
Since there is advancement in technology in many areas, we can make use of line testing
robots which can easily identify the faults and help the repairmen to find out and fix the
faults.In other cases, robots can themselves repair the fault that occurs in cords.
REFERENCES
1. “Underground Cable Fault Location”,B. Clegg. New York: McGraw- Hill, 1993.
2. “A line to ground fault location algorithm for underground cable system”, M.-S. Choi, D.-
S. Lee, and X. Yang. KIEE Trans. Power Eng., pp. 267–273, Jun. 2005
3. “Computerized underground cable fault location expertise”, E. C. Bascom .in Proc. IEEE
Power Eng. Soc.General Meeting, Apr. 10–15, 1994, pp. 376–382. J.
4. “A Treatise on Electricity and Magnetism, 3rded, vol. 2”, Clerk Maxwell. Oxford:
Clarendon, 1892, pp.68–73.
5. “Detection of incipient faults in distribution underground cables”,T. S. Sidhu and Z. Xu,
IEEE Trans. Power Del., vol. 25, no. 3, pp. 1363–1371, Jul. 2010.
6. “Detection of Incipient Faults in Distribution Underground Cables”, IEEE Transactions on
Power Delivery, Tarlochan S. Sidhu, ZhihanXu, Vol. 25, NO. 3, JULY 2010.
7. “Locating Underground Cable Faults: A Review and Guideline for New Development”,
Md. Fakhrul Islam, Amanullah M T Oo, Salahuddin. A. Azad1. 2013 IEEE.