Preferred Language
Articles
/
joe-1459
Efficient Energy Management for a Proposed Integrated Internet of Things-Electric Smart Meter (2IOT-ESM) System
...Show More Authors

In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these measurements are sent using the internet of thing (IoT) technology to Google Firebase cloud, where the electric consumer's service center is located to store, analyze the measured data, and detect cases of energy penetration when it exceeds 53  and the cases of the electrical energy theft if any below 20  and then take the appropriate decision about it. Finally, an electric smart metering application (ESM-app) is designed and implemented to read and pull data information from the Google firebase cloud and then send the electric bill to the end consumer, and sending alert messages to the thieves and electrical power hackers to prohibit them if something wrong has detected.

In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these measurements are sent using the internet of thing (IoT) technology to Google Firebase cloud, where the electric consumer's service center is located to store, analyze the measured data, and detect cases of energy penetration when it exceeds 53  and the cases of the electrical energy theft if any below 20  and then take the appropriate decision about it. Finally, an electric smart metering application (ESM-app) is designed and implemented to read and pull data information from the Google firebase cloud and then send the electric bill to the end consumer, and sending alert messages to the thieves and electrical power hackers to prohibit them if something wrong has detected.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
A Study of Wear Rate Epoxy Resin filled with SiO2 particle and Glass fibers
...Show More Authors

This research is devoted to study the effect of different in weight percentage of Sio2 particles and glass fibers (5, 10, 15, 20) wt. % on the wear rate epoxy resin. The results show that the value of hardness increase with the increase for the weight percentage of reinforcing particles and fibers, while the wear rate decrease with the increase the load level of the reinforcing particles and fibers . The largest value of the hardness, and the lowest value of the wear rate for epoxy reinforced with 20% of SiO2, the wear rate increase in general with increasing the applied load.

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 19 2018
Journal Name
Elmofaker Review
The Secondary Liability of Electronic Auctions Arising from Contributory Trademark Infringement – A Comparative Study
...Show More Authors

Despite the global economic downturn, online e-commerce, especially the sale of counterfeit goods, continues to witness a rise in sales, and one of the important players in e-commerce is the owners of e-commerce auction sites. Although they do not have a direct role in trademark infringement, they still consider them indirectly responsible (secondary liability) for infringing on their trademarks. Thus, many cases have been filed by the owners of the original trademarks (which have been infringed by persons who have sold some of the goods and products that are imitating their marks through some electronic auctions) against the owners of those auctions. In view of the international character of the Internet, in different countries, and despit

... Show More
View Publication
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of Engineering
Evaluating the Moisture Content Variation on Critical Strain of Geo-materials: A Case Study
...Show More Authors

The tunnel’s stability during construction is a very important matter. Some methods have been proposed for stability evaluation, but the hazard warning levels (HWLs) are more applicable among these methods. Despite monitoring and applying HWLs, several collapses in Shibli twin tunnels in Iran have cast doubts on the accuracy of this criterion in the presence of water. In this study, the critical strains under different water contents were measured through uniaxial compressive strength tests on 11 different shale and marl samples. A comparison of laboratory tests and numerical results shows that the influence of the moisture content on the critical strain is negligible. In addition, the results show that there is no dir

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue May 16 2023
Journal Name
Political Sciences Journal
The Dens of Extremism and Terrorism in Syrian Camps (Al-Hol as a model)
...Show More Authors

 

After the defeat of the military terrorist organization "ISIS" and the fall of the throne of its alleged state in the Iraqi city of Nineveh, in Syrian Baghouz, and the end of its control over the land, the Syrian camps, especially "Al-Hol" camp, emerge as an incubator for the ideology of the terrorist organization "ISIS" and a vital base for its consolidation and dissemination, which includes (68,000- 73,000) people. During the years following the military defeat of (ISIS), the camp witnesses the spread of extremist ideas widely at the hands of its residents, including the families of the organizations dead's, extremist detainees, and those who deal with it, taking advantage of the deterioration of the environmental, se

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 23 2022
Journal Name
American Scientific Research Journal For Engineering, Technology, And Sciences
A Review of TCP Congestion Control Using Artificial Intelligence in 4G and 5G Networks
...Show More Authors

In recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne

... Show More
View Publication
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Tue Dec 25 2018
Journal Name
Journal Of Engineering Science And Technology
RIETVELD TEXTURE REFINEMENT ANALYSIS OF LINDE TYPE A ZEOLITE FROM X-RAY DIFFRACTION DATA
...Show More Authors

Scopus (32)
Scopus
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Effect Of Technology Based Learning As A Supplement To Traditional Technology On Student's Achievement
...Show More Authors

This paper describes a practical study on the impact of learning's partners, Bluetooth Broadcasting system, interactive board, Real – time response system, notepad, free internet access, computer based examination, and interaction classroom, etc, had on undergraduate student performance, achievement and involving with lectures. The goal of this study is to test the hypothesis that the use of such learning techniques, tools, and strategies to improve student learning especially among the poorest performing students. Also, it gives some kind of practical comparison between the traditional way and interactive way of learning in terms of lectures time, number of tests, types of tests, student's scores, and student's involving with lectures

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Journal Of Structural Engineering
Experimental and Numerical Evaluation of a Welded Demountable Shear Connector through Horizontal Pushout Tests
...Show More Authors

A novel welded demountable shear connector for sustainable steel-concrete composite structures is proposed. The proposed connector consists of a grout-filled steel tube bolted to a compatible partially threaded stud, which is welded on a steel section. This connector allows for an easy deconstruction at the end of the service life of a building, promoting the reuse of both the concrete slabs and the steel sections. This paper presents the experimental evaluation of the structural behavior of the proposed connector using a horizontal pushout test arrangement. The effects of various parameters, including the tube thickness, the presence of grout infill, and the concrete slab compressive strength, were assessed. A nonlinear finite element mode

... Show More
View Publication
Scopus (22)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Mon Nov 06 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
Effect of hunting cooperation and fear in a food chain model with intraspecific competition
...Show More Authors

Taking into account the significance of food chains in the environment, it demonstrates the interdependence of all living things and has economic implications for people. Hunting cooperation, fear, and intraspecific competition are all included in a food chain model that has been developed and researched. The study tries to comprehend how these elements affect the behavior of species along the food chain. We first examined the suggested model's solution properties before calculating every potential equilibrium point and examining the stability and bifurcation nearby. We have identified the factors that guarantee the global stability of the positive equilibrium point using the geometric approach. Additionally, the circumstances that would gu

... Show More
View Publication Preview PDF
Scopus (7)
Scopus Clarivate Crossref