In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these measurements are sent using the internet of thing (IoT) technology to Google Firebase cloud, where the electric consumer's service center is located to store, analyze the measured data, and detect cases of energy penetration when it exceeds 53 and the cases of the electrical energy theft if any below 20 and then take the appropriate decision about it. Finally, an electric smart metering application (ESM-app) is designed and implemented to read and pull data information from the Google firebase cloud and then send the electric bill to the end consumer, and sending alert messages to the thieves and electrical power hackers to prohibit them if something wrong has detected. In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these measurements are sent using the internet of thing (IoT) technology to Google Firebase cloud, where the electric consumer's service center is located to store, analyze the measured data, and detect cases of energy penetration when it exceeds 53 and the cases of the electrical energy theft if any below 20 and then take the appropriate decision about it. Finally, an electric smart metering application (ESM-app) is designed and implemented to read and pull data information from the Google firebase cloud and then send the electric bill to the end consumer, and sending alert messages to the thieves and electrical power hackers to prohibit them if something wrong has detected.
A mathematical eco-epidemiological model consisting of harvested prey–predator system involving fear and disease in the prey population is formulated and studied. The prey population is supposed to be separated into two groups: susceptible and infected. The susceptible prey grows logistically, whereas the infected prey cannot reproduce and instead competes for the environment’s carrying capacity. Furthermore, the disease is transferred through contact from infected to susceptible individuals, and there is no inherited transmission. The existence, positivity, and boundedness of the model’s solution are discussed. The local stability analysis is carried out. The persistence requirements are established. The global behavior of th
... Show MoreMany important archaeological sites in Iraq still need to be preserved. Some of these sites were subjected to destruction and negligence. So, exploring these sites represents a priority for its protection. A 2D Electrical Resistivity Imaging (ERI) as a non-invasive geophysical survey method was implemented at a part of the Borsippa archaeological site near Babylon to search for the subsurface archaeological artefacts/structures. Electrical resistivity measurements were carried out using a Dipole-Dipole array. Steps were taken to process and filter using Horizontal profiles, forward modelling, and 2D inverse models to analyze the resistivity measurements. The ERI inversion results show that the superficial conductive zone produced va
... Show MoreModeling the microclimate of a greenhouse located in Baghdad under its weather conditions to calculate the heating and cooling loads by computer simulation. Solar collectors with a V-corrugated absorber plate and an auxiliary heat source were used as a heating system. A rotary silica gel desiccant dehumidifier, a sensible heat exchanger, and an evaporative cooler were added to the collectors to form an open-cycle solar assisted desiccant cooling system. A dynamic model was adopted to predict the inside air and the soil surface temperatures of the greenhouse. These temperatures are used to predict the greenhouse heating and cooling loads through an energy balance method which takes into account the soil heat gain. This is not included in
... Show MoreThe DC electrical conductivity properties of Ge60Se40-xTex alloy with x = 0, 5, 10, 15 and 20). The samples were formed in the form of discs with the thickness of 0.25–0.30 cm and the diameter of 1.5 cm. Samples were pressed under a pressure of 6 tons per cm2 , using a ton hydraulic press. They were prepared after being pressed using a ton hydraulic press using a hydraulic press. Melting point technology use to preper the samples. Continuous electrical conductivity properties were recorded from room temperature to 475 K. Experimental data indicates that glass containing 15% Te has the highest electrical conductivity allowing maximum current through the sample compared to Lu with other samples. Therefore, it is found that the DC co
... Show Moreimportumt educational institution as (kindergartens) need teachers which qualified ownes modalities in their education for children , as Marzanu method in a way of learning and own methods of crisis management, because the teachers that own those styles of learning ginekindergarten children knowledge and the childrenIeaving based on theMeaing and knowledge and integration of their information, And teachers that earn methods of crisis management provide for the children of the kindergarten security within the educational institution which in turn affect the growth and development of the Child and then abilities, health physical, mental, psychological …etc.., The aims of the current research have identified to recognize: 1- the dimension
... Show MoreThe study aims to identify the mechanical and electrical activities of the heart according to the energy systems of advanced players and to detect the differences between the energy systems in terms of the mechanical and electrical activities of the heart for advanced players. It was clear from the results of the significance of the differences between the three groups according to the energy systems of the advanced players in all research variables that (the non-oxygenic system "Lactic"), which represents the advanced players in the arches (800 m, 1500 m) was the first in most tests of mechanical and electrical activities of the heart, which is (Margaria-Kalamen, Wingate, systolic muscle strength of the heart FC, Stroke Volume SV
... Show MoreThe recent advances in technology, the increased dependence on electrical energy and the emergence of the fourth industrial revolution (Industry 4.0) were all factors in the increased need for smart, efficient and reliable energy systems. This introduced the concept of the Smart Grid (SG). A SG is a potential replacement for older power grids, capable of adapting and distributing energy based on demand. SG systems are complex. They combine various components and have high requirements for real time reliable operation. This paper attempts to provide an overview of SG systems, by outlining SG architecture and various components. It also introduces communication technologies, integration and network management tools that are involved in SG sys
... Show MoreThis research aims to test the relationship between "relational leadership as an independent variable and organizational energy as a dependent variable. The current research variables are among the recent and important variables for the development of organizations, and for the purpose of explaining the relationship and influence between the variables, a set of goals has been formulated, including providing the interested and scientific and theoretical information explaining the nature of the variables The research, and the extent to which its causes are reflected in the research sample to increase the interest of the research organization’s organization and make it more appropriate to the required performance in light of a cha
... Show MoreIn parallel with the shell model using the harmonic oscillator's single-particle wave functions, the Hartree-Fock approximation was also used to calculate the neutron skin thickness, the mirror charge radii, and the differences in proton radii for 13O-13B and 13N-13C mirror nuclei. The calculations were done for both mirror nuclei in the psdpn model space. Depending on the type of potential used, the calculated values of skin thickness are affected. The symmetry energy and the symmetry energy's slope at nuclear saturation density were also determined, and the ratio of the density to the saturation density of nuclear matter and the symmetry energy has a nearly linear correlation. The mirror ener
... Show MoreEvery so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph
... Show More