Renewable energy technology is growing fast especially photovoltaic (PV) system to move the conventional electricity generation and distribution towards smart grid. However, similar to monthly electricity bill, the PV energy producers can only monitor their energy PV generation once a month. Any malfuntion in PV system components may reduce the performance of the system without notice. Thus, developing a real-time monitoring system of PV production is very crucial for early detection. In addition, electricity consumption is also important to be monitored more frequently to increase energy savings awareness among consumers. Hardware based Internet-of-Thing (IoT) monitoring and control system is widely used. However, the implementation of the actual smart grid system is high in cost. Thus, simulation and modelling of the system is important to see the capability of the actual system before being employed. Since the smart grid and its components are usually modeled using MATLAB/Simulink, the communication between MATLAB/Simulink, IoT platform such as ThingSpeak and mobile application is crucial to be explored to gain a better understanding of the features of the smart grid. To achieve the objectives, there are five main steps which are simulation of grid-connected photovoltaic (PV) system to generate data to be monitored and controlled using HOMER software, then, development of monitoring on ThingSpeak and mobile application using MIT App Inventor 2. Next, the control system is developed on mobile application and the communication on how data are transferred between all the softwares are set up. The results show that all the seletected parameters can be monitored in real-time successfully. The developed mobile application can be used to control the MATLAB/Simulink in two modes. During automatic mode, ThingSpeak controls the MATLAB/Simulink by giving a zero signal (OFF) if load demand is less than the power generated by PV and a one signal (ON) if the load demand is greater than PV power. During manual mode, consumer can send ON or OFF signal to MATLAB/Simulink via the mobile application unconditionally. It is hoped that the proposed system will bring many benefits in modeling a complete smart grid system in MATLAB/Simulink.
The estimation of the initial oil in place is a crucial topic in the period of exploration, appraisal, and development of the reservoir. In the current work, two conventional methods were used to determine the Initial Oil in Place. These two methods are a volumetric method and a reservoir simulation method. Moreover, each method requires a type of data whereet al the volumetric method depends on geological, core, well log and petrophysical properties data while the reservoir simulation method also needs capillary pressure versus water saturation, fluid production and static pressure data for all active wells at the Mishrif reservoir. The petrophysical properties for the studied reservoir is calculated using neural network technique
... Show MoreCalculations of sputtering yield for Lithium,Sodium and Krypton bombarded by the same own ions are achieved by using TRIM program.The relation of angular dependent of sputtering yield for each ion/target is studied. Also, the dependence of the sputtering yield of target on the energy of the same ion is discussed and plotted graphically. Many researchers applied polynomials function to fit the sputtering data from experimental and simulation programs, however, we suggest to use Ior function for fitting the angular distribution of the sputtering yield. A New data for fitting coefficients of the used ion/target are presented by applying used function for the dependence of the sputtering yield on the ion energy.
Vehicular ad hoc network (VANET) is a distinctive form of Mobile Ad hoc Network (MANET) that has attracted increasing research attention recently. The purpose of this study is to comprehensively investigate the elements constituting a VANET system and to address several challenges that have to be overcome to enable a reliable wireless communications within a vehicular environment. Furthermore, the study undertakes a survey of the taxonomy of existing VANET routing protocols, with particular emphasis on the strengths and limitations of these protocols in order to help solve VANET routing issues. Moreover, as mobile users demand constant network access regardless of their location, this study seeks to evaluate various mobility models for vehi
... Show MoreDue to the large size of dealing in the transactions installment sales in durable products, especially real estate given the privacy to enjoy their property, among other products because of the large amount and the length of the repayment period leading to a risk of non-payment by the buyer because of the possibility to change the credit level to him, especially that most of this type of transaction customers are from limited income owners, So it has been proposed the use of other transactions in handling real estate instead of installment sales transactions, a rental sale transactions because of the protection provided by this transaction for a vendor that will be mentioned later.
So proposes to st
... Show MoreThe efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreUnder aerobic and anaerobic conditions, two laboratory-scale reactors were operated. Each reactor
was packed with 8.5 kg of shredded synthetic solid waste (less than 5 cm) that was prepared according to an
average composition of domestic solid waste in the city of Kirkuk. Using an air compressor, aerobic
conditions were created in the aerobic reactor. This study shows that the aerobic reactor was more efficient in
COD and BOD5 removal which were 97.88% and 91.25% while in case of anaerobic reactor, they were
66.53%and 19.11%, respectively.
The approach of the research is to simulate residual chlorine decay through potable water distribution networks of Gukookcity. EPANET software was used for estimating and predicting chlorine concentration at different water network points . Data requiredas program inputs (pipe properties) were taken from the Baghdad Municipality, factors that affect residual chlorine concentrationincluding (pH ,Temperature, pressure ,flow rate) were measured .Twenty five samples were tested from November 2016 to July 2017.The residual chlorine values varied between ( 0.2-2mg/L) , and pH values varied between (7.6 -8.2) and the pressure was very weak inthis region. Statistical analyses were used to evaluated errors. The calculated concentrations by the calib
... Show MoreMetal contents in vegetables are interesting because of issues related to food safety and potential health risks. The availability of these metals in the human body may perform many biochemical functions and some of them linked with various diseases at high levels. The current study aimed to evaluate the concentration of various metals in common local consumed vegetables using ICP-MS. The concentrations of metals in vegetables of tarragon, Bay laurel, dill, Syrian mesquite, vine leaves, thymes, arugula, basil, common purslane and parsley of this study were found to be in the range of, 76-778 for Al, 10-333 for B, 4-119 for Ba, 2812-24645 for Ca, 0.1-0.32 for Co, 201-464 for Fe, 3661-46400 for K, 0.31–1.
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreAssessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,
... Show More