In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these measurements are sent using the internet of thing (IoT) technology to Google Firebase cloud, where the electric consumer's service center is located to store, analyze the measured data, and detect cases of energy penetration when it exceeds 53 and the cases of the electrical energy theft if any below 20 and then take the appropriate decision about it. Finally, an electric smart metering application (ESM-app) is designed and implemented to read and pull data information from the Google firebase cloud and then send the electric bill to the end consumer, and sending alert messages to the thieves and electrical power hackers to prohibit them if something wrong has detected. In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these measurements are sent using the internet of thing (IoT) technology to Google Firebase cloud, where the electric consumer's service center is located to store, analyze the measured data, and detect cases of energy penetration when it exceeds 53 and the cases of the electrical energy theft if any below 20 and then take the appropriate decision about it. Finally, an electric smart metering application (ESM-app) is designed and implemented to read and pull data information from the Google firebase cloud and then send the electric bill to the end consumer, and sending alert messages to the thieves and electrical power hackers to prohibit them if something wrong has detected.
Began the process of re-engineering processes in the private sector as a way to assist organizations in re-thinking how to run the business in order to improve production processes and reduce operational cost, to get to compete on a global level. That was a major restructuring by further evolution in the use of technology to support innovative operations.
Entered the technology in all areas of life and different regulations, This led to use as a change in all aspects The companies achieved success and progress today through the use of resources so as to ensure the wishes of the customers and their needs, and the requirements of the market primarily, Which is reflected on the basis of building strate
... Show MoreThe research aims to determine the role of the practices of green human resources management in achieving requirements of environmental citizenship in the workplace, the General Company for Vegetable Oils was chosen for the application of field-side of research which represent one of the important industrial companies in Iraq, which suffers from poor Green human resources management applications, which reflected negatively on the development Environmental citizenship among Employees. The questionnaire use as a tool to collect data and information as well as field presence of the researcher, The research sample included (30) managers of departments and Division ,and through using statistical program (SPSS) the data has been analys
... Show MoreExperience the Islamic financial industry faces many challenges, most notably the lack of proper risk management tools that meet the requirements of legality and economic efficiency advantage from another side, so it requires the search for innovative ways to manage the risk of Islamic banking, Islamic finance industry is manufacture up-to-date, if compared with the financial industry (traditional), which increases the problematic of risk management in the Islamic financial industry nature of treatment which should be compatible with Islamic law, as well as economic efficiency, thereby Progress came the importance of research to highlight the entrance to Islamic financial engineering and the goals sought to be achieved through the use of
... Show MoreAIM: To analyse our experiences in the management of traumatic retroperitoneal hematoma (RPH), highlighting the various challenges faced and to report on the outcome of these patients. METHODS: From May 2014 to May 2017, all patients with traumatic RPH who underwent surgical treatment were retrospectively analysed. The kind of injury, intraoperative findings, sites of hematoma, postoperative morbidity and the overall outcomes were recorded. RESULTS: Ninety-six patients; 53 with blunt trauma and 43 with penetrating injury, were included in this study. The centre-medial hematoma was observed in 24 (25%) patients, lateral hematoma in 46 (47.9%) patients, pelvic hematoma in 19 (19.8%) patients, and multiple zone hematomas in
... Show MoreAt a time of increasing human potential in the face of crises and risks through the use of technology on a large scale and steadily in various fields of life, and the vulnerability of business organizations as a result of mistakes. The failure of a sudden these errors or omissions or symptoms. Also, some crises occur outside the control of management, others caused by leakage of important information and sometimes secret may be a strategy or a new plan or new project occurs outside the organization to the opposite of what is planned. Therefore, the crisis management are critical to all organizations, because the active management of the crisis helps to ensure the continued prosperity of the organization. Here comes from the resea
... Show MoreWireless sensor networks (WSNs) are emerging in various application like military, area monitoring, health monitoring, industry monitoring and many more. The challenges of the successful WSN application are the energy consumption problem. since the small, portable batteries integrated into the sensor chips cannot be re-charged easily from an economical point of view. This work focusses on prolonging the network lifetime of WSNs by reducing and balancing energy consumption during routing process from hop number point of view. In this paper, performance simulation was done between two types of protocols LEACH that uses single hop path and MODLEACH that uses multi hop path by using Intel Care i3 CPU (2.13GHz) laptop with MATLAB (R2014a). Th
... Show MoreThis work involves theoretical and experimental studies for seven compounds to calculate the electrons spectrum and NLO properties. The theoretical study is done by employing the Time Depending Density Functional Theory TD-DFT and B3LYP/high basis set 6-311++G (2d,2p), using Gaussian program 09. Experimental study by UV/VIS spectrophotometer device to prove the theoretical study. Theoretical and experimental results were applicable in spectrum and energy gap values, in addition to convergence theoretically the energy gap results from ΔEHOMO-LUMO and UV/VIS. spectrum. Consider the theoretical method very appropriate to compounds that absorb in vacuum UV.
Traffic classification is referred to as the task of categorizing traffic flows into application-aware classes such as chats, streaming, VoIP, etc. Most systems of network traffic identification are based on features. These features may be static signatures, port numbers, statistical characteristics, and so on. Current methods of data flow classification are effective, they still lack new inventive approaches to meet the needs of vital points such as real-time traffic classification, low power consumption, ), Central Processing Unit (CPU) utilization, etc. Our novel Fast Deep Packet Header Inspection (FDPHI) traffic classification proposal employs 1 Dimension Convolution Neural Network (1D-CNN) to automatically learn more representational c
... Show MoreIn the present work, the magnetic dipole and electric quadrupole moments for some sodium isotopes have been calculated using the shell model, considering the effect of the two-body effective interactions and the single-particle potentials. These isotopes are; 21Na (3/2+), 23Na (3/2+), 25Na (5/2+), 26Na (3+), 27Na (5/2+), 28Na (1+) and, 29Na (3/2+). The one-body transition density matrix elements (OBDM) have been calculated using the (USDA, USDB, HBUMSD and W) two-body effective interactions carried out in the sd-shell model space. The sd shell model space consists of the active 2s1/2, 1d5/2,
... Show More