In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these measurements are sent using the internet of thing (IoT) technology to Google Firebase cloud, where the electric consumer's service center is located to store, analyze the measured data, and detect cases of energy penetration when it exceeds 53 and the cases of the electrical energy theft if any below 20 and then take the appropriate decision about it. Finally, an electric smart metering application (ESM-app) is designed and implemented to read and pull data information from the Google firebase cloud and then send the electric bill to the end consumer, and sending alert messages to the thieves and electrical power hackers to prohibit them if something wrong has detected. In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these measurements are sent using the internet of thing (IoT) technology to Google Firebase cloud, where the electric consumer's service center is located to store, analyze the measured data, and detect cases of energy penetration when it exceeds 53 and the cases of the electrical energy theft if any below 20 and then take the appropriate decision about it. Finally, an electric smart metering application (ESM-app) is designed and implemented to read and pull data information from the Google firebase cloud and then send the electric bill to the end consumer, and sending alert messages to the thieves and electrical power hackers to prohibit them if something wrong has detected.
Cooperation spectrum sensing in cognitive radio networks has an analogy to a distributed decision in wireless sensor networks, where each sensor make local decision and those decision result are reported to a fusion center to give the final decision according to some fusion rules. In this paper the performance of cooperative spectrum sensing examines using new optimization strategy to find optimal weight and threshold curves that enables each secondary user senses the spectrum environment independently according to a floating threshold with respect to his local environment. Our proposed approach depends on proving the convexity of the famous optimization problem in cooperative spectrum sensing that stated maximizing the probability of detec
... Show More|
The quadrupole moment of 14B exotic nucleus has been calculated using configuration mixing shell model with limiting number of orbital's in the model space. The core- polarization effects, are included through a microscopic theory which considers a particle-hole excitations from the core and the model space orbits into the higher orbits with 6ħω excitations using M3Y interaction. The simple harmonic oscillator potential is used to generate the single particle wave functions. Large basis no-core shell model with (0+2)ћω truncation is used for 14B nucleus. The effective charges for the protons and neutrons were calculated su |
The present study is to formulate and evaluate Acyclovir (ACV) microspheres using natural polymers like chitosan and sodium alginate. ACV is a DNA polymerase inhibitor used in treating herpes simplex virus infection and zoster varicella infections. Acyclovir is a suitable candidate for sustained-release (SR) administration as a result of its dosage regimen twice or thrice a day and relatively short plasma half-life (approximately 2 to 4 hours). Microspheres of ACV were prepared by an ionic dilution method using chitosan and sodium alginate as polymers. The prepared ACV microspheres were then subjected to FTIR, SEM, particle size, % yield, entrapment efficiency, in vitro dissolution studies and release kinetics mechanism. The FTI
... Show MoreAbstract: Various peoples have contributed to building the Islamic civilization through the achievements and creativity of their scholars. In particular, the Kurdish scholars have provided new and great services to the Holy Qur’an that deserves attention. For example, it is no secret that Sheikh Ahmadian, with his interpretation, rendered a great service to the Glorious Book of God. His style is distinguished by modernity, seriousness and objectivity, and represents a lively response to the needs of the Kurdish Muslim people. Due to the importance of Ahmadian’s interpretation of the Qur’an, therefore, I have demonstrated his approach in this research in terms of dealing with his interpretation of the Qur’an with the Qur’an, the
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreBeata thalassemia
Beta thalassemia syndrome by reduction or absence of B-globin chain synthesis. Without iron chelation therapy (ICT) the regular blood transfusion would increase the iron stores to several times. Endocrine glands are vulnerable to iron overload causing endocrine dysfunction. Iron deposition within the parathyroid gland causes hypoparathyroidism particularly after ten years of age. Pancreatic islets are very susceptible to oxidative damage due to iron overload; their high divalent metal expression makes them highly susceptible to iron-catalyzing oxidative stress. The pathogenicity of osteopathy in is multifactorial comprising environmental (diet and lifestyle), iatrogenic (medicines), genetic and acqui
... Show MoreIn the present work, lead silicate glasses have been prepared with
different amount of lead oxide content. Structure properties such as
X-ray diffraction, AFM, and FTIR analyses have been done. The
exceeding of PbO content more than 25wt% revealed a decreasing in
density. The X- ray revealed that the strongest peak related to
Hexagonal silica dioxide and the other crystal phases formed were
related to silica oxide (SiO2) and lead oxide (PbO). Growth and
decayed phases in X-ray have been observed with changing lead
oxide content. Homogeneous surface was obtained using AFM
analyzer with an average diameter around 100 nm. Infrared spectrum
is characterized by the presence of large absorption band between
120
The aim of this study is to formulate and evaluate ezetimibe nanoparticles using solvent antisolvent technology. Ezetimibe is a practically water-insoluble drug which acts as a lipid lowering drug that selectively inhibits the intestinal absorption of cholesterol and related phytosterols. Ezetimibe prepared as nano particles in order to improve its solubility and dissolution rate.
Thirty formulas were prepared and different stabilizing agents were used with different concentrations such as poly vinyl pyrrolidone (PVPK-30), poly vinyl alcohol (PVA), hydroxy propyl methyl cellulose E5 (HPMC), and poloxamer. The ratios of drug to stabilizers used to prepare the nanoparticles were 1: 2, 1:3 and 1:4.
The prepared nanoparticles
... Show More