Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 19

Embedded Sensor and IoT Technology Based

Substation Monitoring and Control System

R. Krishnaswamy
Department of Electronics and Communication,
University College of Engineering,
Ariyalur, Tamil Nadu, India.
Outline of presentation

• INTRODUCTION
• LITERATURE REVIEW
• PROPOSED SYSTEM
• RESULTS AND DISCUSSION
• CONCLUSION
• REFERENCES
INTRODUCTION

• The distance between the generators and the demand might be many miles and its
unknown how much enormous power exchange across large distances has occurred
as a result of the lack of nature of electric power [1].
• Because of the increased need for power on the client side, demanding the kind of
force being transferred to the client side has sparked concern [2].
• A substantial quantity of energy is squandered during the transfer of general
power, resulting in a reduction in the idea of force acquired at the substation [3].
• Before working on the nature of force with an alternate arrangement, it is critical to
understand what form of restriction has happened.
• In addition, if there is a flaw in the assurance, testing, and control of a power
system. It's possible that the structure will become erratic [4].
• As a result, an observation framework capable of naturally differentiating,
screening, and ordering current imperatives on electrical lines is required [5].
• Power is now having control power failures and blackouts due to a lack of
automated review and the utility's poor deception over the framework [6]. WSN
will help provide the right viewpoint by gathering data from the matrix's several
sub-frameworks.
• A sensor hub will choose whether to send data to the sink immediately or to
postpone it for a period of time.
1) Sensory data evaluation: we define three levels of requirement in
Operation PB COOP.
2) Belief that a correspondence technique will be used: Need 0-no further
action is taken, need 2-regard is thrown away because it is regarded as sincere and
an admonition should be clearly sent, and need 1-we believe that regard should be
represented in light of the possibility that it will be perceived as a flaw or an issue
that is less pressing than need 2 data [7].
LITERATURE REVIEW

• The most common method of change in the power industry involves the creation of
novel techniques for dealing with a vast number of framework data [8].
• However, there are still significant challenges to overcome. The key issues are:
1.) envisioning the current state of a framework as well as the potentially
enormous number of occurrence states;
2.) imagining not only the result of a single proposed power shift but an
extraordinary number of such exchanges [9].
• An adjustable energy estimation framework is made up of a DSP, sensor, and
communication units [10].
• This framework is employed by cutting-edge power circulation networks, which
are distinguished by a free market of providers, bi-directional energy streams owing
to the scattered age, and a keen interest in the nature of power conveyance [11].
• Several features of the system were explored, including signal management,
correspondence, and robustness. Examples of how these gadgets have been utilized
are also included in their work [12].
• Transient meter was developed and implemented as a checking framework for the
detection, order, and estimation of faults on electrical power frameworks.
• CORBA engineering is used as a correspondence interface in the Transient meter,
wavelet-based approaches for programmed signal arrangement and portrayal, and a
smart trigger circuit for aggravation detection [13].
• An estimating calculation was constructed employing the wavelet change and
wavelet organizations for the anticipated order and estimation of unsettling
consequences [14].
• The transformer looked after a few families, each with a matrix-connected solar
framework, and its power factor was abnormally low.
• This was owing to the fact that, under certain conditions, the frameworks provide a
large amount of the dynamic power required by the families, whilst the network
provided all receptive and mutilation powers [15].
PROPOSED SYSTEM

• Improve the IoT-based continuous inspection system for testing and handling
substations by upping test rates.
• Administrators can check general conditions in steady state and transient force
substation circumstances using this built-in approach.
• Through point data on logging, the web, and separate analysis, high speed and
lossless information were attempting additional emphasis.
• There will be serious repercussions if the transformer's internal components are
damaged.
• Monitoring the internal elements of the transformer is therefore critically required.
• There are many variables in a transformer, but some of the most crucial ones to
monitor are the oil level, temperature, voltage, and current.
• Ultrasonic, temperature, voltage, and current sensors are used in this place to keep
an eye on these parameters.
• A microcontroller is used to combine all of the sensors. These sensed parameters
will be shown through a created Android application.
• Through this process, the health of the transformer may be frequently checked.
• This technology makes use of the Internet of Things to enable remote monitoring of
real-time data received on transformer health. The IoT is the sole foundation of this
platform.
• Using voltage and current from the sensor, it displays a single-phase electrical
structure using a microprocessor built on a Deep Belief Network.
• It then uses another PC to remotely transmit the desired data to the results screen.
Understanding the nature of the limitation requires the use of the Internet of Things
(IoT) to improve the force's nature through substation monitoring and control
optional adjustment.
• The Arduino Uno functions as a microcontroller in the integrated SVCMS system
to compute the voltage and current sensor results.
• The reproduction process in the power sector needs the employment of novel
approaches to show a significant number of device data for a framework for
detecting, organizing, and measuring problems in electrical power systems.
• The transient meter, wavelet-based signal organization and representation
techniques, and a smart trigger circuit for detecting unwelcome impacts are all part
of the package. Figure 1 shows the design of the system.

Power supply
9V

ZMPT101B
Voltage
ESP 8266
sensor
Wi-Fi

ACS712
Current sensor
Cloud
server

Fig 1: Proposed model


• Power quality monitoring frameworks can immediately discover problems using
Mathematical Morphology. Clamor, on the other hand, generally worsens the sign
under examination, resulting in a significantly distorted Mathematical Morphology
output Recognize the brief unpleasant effects in a turbulent atmosphere.
• A Wavelet Transform (WT)-based delicate limit de noising technique was also
applied for correlation considerations. As a consequence; Mathematical
Morphology's utility can be restored.
• The increase in nonlinear and time-shifting loads generates an excess of electrical
disturbances, ranging from excessive deformation of the two flows and voltages to
brief stockpile voltage outages.
• In this method, the electrical company operates as a "secured carrier" of
disruptions, allowing a single customer-caused disturbance to be passed on to other
customers, inflicting significant injury to their devices.
• The substation device needs to improve system dependability and lessen
unscheduled downtime.
RESULTS AND DISCUSSION

• This framework's objective is to obtain remote electrical constraints like voltage,


flow, and recurrence and transfer these continuous properties, along with
temperature, to the power station across the network. Additionally, this method
aims to safeguard electrical equipment during a transfer.
• After The "IoT Based Substation Monitoring and Controlling" project's objective
was to automate the substation in order to increase stability, decrease fault
frequency, and increase transformer life.
• As a result, the system is more efficient. Operations are therefore accurate and
dependable. It will offer rapid, easy, and more effective monitoring than the manual
monitoring of the substation that is now in place.
• A Microcontroller Board, an Esp8266 module, a Digital display, and a number of
sensors are used to construct the model.
• The Arduino Uno needs to be powered by a laptop or battery bank. The electrical
parameters that flow through the two incandescent bulbs used as loads in this
project have been computed.
• When a power source is available, the ESP8266 Wi-Fi Module connects to the portable
hotspot.
• The information gathered by the sensors is updated via the Internet of Things and shown
in their site using this connection.
• Load 1 draws greater current than load 2 because load 2 is switched to when the first
load pulls more current than the threshold current.
• When identical loads are supplied to the equipment, overload switching is prevented
since the current value is below the threshold.

Fig 2: Circuit diagram


• As a consequence, in the event of a crisis, the framework allows us to monitor and
limit dispersion.
• It includes a control framework for slowing down line transfer in the event of a
deficit and then standardizing the line once the issue has been remedied, as well as
a cooling fan to keep the transformer and substation at normal operating
temperatures.
• This system will use a GSM module to compute the boundaries of the force
substation and transformer, as well as transfer data to a remote install wire tight
clamp (IOT). As a result, it can be seen both from afar and at the substation. Table 1
shows the observed readings.
• Additionally, this system is capable of sending regular SMS messages that instantly
log electrical characteristics automatically (using ground in time settings).
• When the relay trips or when the voltage or current exceeds preset limits, this
system can be set up to send SMS messages.
• A microcontroller is used in this design. It is feasible for the controller and the
many detectors to communicate effectively.
Status Current Voltage Power Alert
Normal 3.85 5.03 19.35 OFF
Grid 1.1 1.17 1.287 ON
failure
Open 0.2 4.93 0.986 ON
circuit

TABLE 1: DATA

Fig 3: Observed data


• We attempted to respond to our stated perusing chart, which exhibits open circuit
limits such as typical appropriation, matrix disappointment, and open circuit.
Figure 2 illustrates the data that was discovered.
• The primary goal is to create a completely automated IoT-based sub-station that can
be secured, monitored, and controlled by authorized employees from anywhere in
the globe at a very cheap cost.
• Mathematical morphology can be used to quickly identify issues by power quality
monitoring frameworks.
• On the other hand, clamor typically worsens the sign being studied, producing a
significantly skewed outcome for the mathematical morphology.
• For correlation considerations, a careful limit denoising technique based on
Wavelet Transform (WT) was also used. As a result, the usefulness of mathematical
morphology can be recovered.
CONCLUSION

• Monitoring sub-stations require critical boundaries from the resources of interest.


The collected data can be used to perform investigations and analyses of the state
of the resources, which is particularly beneficial for supporting booking,
disappointing the board, and controlling the system.
• This approach minimizes the number of times people engage with high-voltage
equipment. Most substation equipment runs at high voltage and creates
electromagnetic fields that can impair human health.
• This proposed system is intended primarily for monitoring the status of substation
transformers scattered across a vast territory. A number of boundaries must be
measured and examined regularly.
• The work was effectively completed with a great deal of growth-motivated
assistance. The company was successfully established and tested in this manner.
The system is meant to allow remote control of substations.
• For the area surrounding the substation, field directions may also be transmitted
from the substation.
REFERENCES

[1] S.R. Zeebaree, “ DES encryption and decryption algorithm implementation based
on FPGA,” Indonesian Journal of Electrical Engineering and Computer Science,
vol. 18, no. 2, pp. 774-781, 2020.
[2] M. Khairallah, A. Chattopadhyay, and T. Peyrin, “Looting the LUTs: FPGA
optimization of AES and AES-like ciphers for authenticated encryption,”
International Conference on Cryptology, pp. 282-301,2017.
[3] H. Zodpe, and A. Sapkal, “ An efficient AES implementation using FPGA with
enhanced security features,” Journal of King Saud University-Engineering
Sciences, vol. 32, no. 2, pp. 115-122, 2020.
[4] R. Shashidhar, A.M. Mahalingaswamy, P. Kumar, and M. Roopa, Design of High
Speed AES System for Efficient Data Encryption and Decryption System using
FPGA,” International Conference on Electrical, Electronics, Communication,
Computer, and Optimization Techniques, pp. 1279-1282, 2018.
[5] A.H. Elsafty, M.F. Tolba, L.A. Said, A.H. Madian, and A.G. Radwan, “Fpga speech
encryption realization based on variable s-box and memristor chaotic circuit,”
International conference on microelectronics, pp. 152-155, 2018.
[6] A.H. Elsafty, M.F. Tolba, L.A. Said, A.H. Madian, and A.G. Radwan, “Fpga speech
encryption realization based on variable s-box and memristor chaotic circuit,”
International conference on microelectronics, pp. 152-155, 2018.
[7] H. Kouzehzar, M.N. Moghadam, and P. Torkzadeh, “ A high data rate pipelined
architecture of AES encryption/decryption in storage area networks,” Iranian
Conference on Electrical Engineering, pp. 23-28, 2018.
[8] T.M. Kumar, K.S. Reddy, S. Rinaldi, B.D. Parameshachari, and K. Arunachalam,
“A Low Area High Speed FPGA Implementation of AES Architecture for
Cryptography Application,” Electronics, vol. 10, no. 16, pp.1-22, 2021.
[9] A. Zaky, E. Elmitwalli, M. Hemeda, V Ismail, and K. Salah, “ Ultra Low-Power
Encryption/Decryption Core for Lightweight IoT Applications,” International
Computer Engineering Conference, pp. 39-43,2019.
[10] Y. Yao, Z. Wang, X. Chen, X. Tong, and Q. Luo, “ A dynamic reconfigurable
design of multiple cryptographic algorithms based on FPGA,”International
Conference on Smart Internet of Things, pp. 105-11, 2018.
[11] S. Madhavapandian, and P. MaruthuPandi, “FPGA implementation of highly
scalable AES algorithm using modified mix column with gate replacement
technique for security application in TCP/IP. Microprocessors and Microsystems,
vol. 73,no. 102972,pp.1-12, 2020.
[12] J.H. Kim, B. Grady, R. Lian, J. Brothers, and J.H. Anderson, “FPGA-based CNN
inference accelerator synthesized from multi-threaded C software,” International
System-on-Chip Conference, pp. 268-273, 2017.
[13] V. Vijayaragavan, “Reduction Of Resource Usage In Fpga By Implementing Back
Propagation Algorithm,” International Journal of MC Square Scientific
Research,vol. 9, no. 1, pp. 205-214.
[14] R.P.V. Kappelle, “Addiction: How We Get Stuck and Unstuck in Compulsive
Patterns and Behavior,” Wipf and Stock Publishers.2019.
[15] D.T. Milton, S. Dhingra, and C.E. Stroud, “Embedded Processor Based Built-In
Self-Test and Diagnosis of Logic and Memory Resources in FPGAs,” European
Space Agency, pp. 87-93, 2010.

You might also like