Preferred Language
Articles
/
AYbjQoYBIXToZYALWoGD
Efficient Energy Management for a Proposed Integrated Internet of Things-Electric Smart Meter (2IOT-ESM) System
...Show More Authors

In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these measurements are sent using the internet of thing (IoT) technology to Google Firebase cloud, where the electric consumer's service center is located to store, analyze the measured data, and detect cases of energy penetration when it exceeds 53  and the cases of the electrical energy theft if any below 20  and then take the appropriate decision about it. Finally, an electric smart metering application (ESM-app) is designed and implemented to read and pull data information from the Google firebase cloud and then send the electric bill to the end consumer, and sending alert messages to the thieves and electrical power hackers to prohibit them if something wrong has detected. In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these measurements are sent using the internet of thing (IoT) technology to Google Firebase cloud, where the electric consumer's service center is located to store, analyze the measured data, and detect cases of energy penetration when it exceeds 53  and the cases of the electrical energy theft if any below 20  and then take the appropriate decision about it. Finally, an electric smart metering application (ESM-app) is designed and implemented to read and pull data information from the Google firebase cloud and then send the electric bill to the end consumer, and sending alert messages to the thieves and electrical power hackers to prohibit them if something wrong has detected.

Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
The Numerical Technique Based on Shifted Jacobi-Gauss-Lobatto Polynomials for Solving Two Dimensional Multi-Space Fractional Bioheat Equations
...Show More Authors

This article deals with the approximate algorithm for two dimensional multi-space fractional bioheat equations (M-SFBHE). The application of the collection method will be expanding for presenting a numerical technique for solving M-SFBHE based on “shifted Jacobi-Gauss-Labatto polynomials” (SJ-GL-Ps) in the matrix form. The Caputo formula has been utilized to approximate the fractional derivative and to demonstrate its usefulness and accuracy, the proposed methodology was applied in two examples. The numerical results revealed that the used approach is very effective and gives high accuracy and good convergence.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Mar 01 2022
Journal Name
International Journal Of Research In Social Sciences & Humanities
Intellectual property rights and its implications for the pharmaceutical industry in Iraq under accession to the World Trade Organization
...Show More Authors

The main risks arising from the WTO Agreement are the inequality and lack of competitiveness of most pharmaceutical goods, as well as the fact that Iraq is a net importer of medicines that are at the core of consumer needs, The subject matter of the Convention on the Protection of Intellectual Property Rights and its implications for the pharmaceutical industry, in particular, coinciding with the situation of financial and administrative corruption, all of which has resulted in drug fraud in the Iraqi market and its impact on public health. The control of medical technology, the persistence of the technological gap and its effects on high price levels, and the fact that domestic drug producers are obliged to obtain production licenses from

... Show More
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Prospects for adopting Takaful Insurance and its role in developing insurance services: Applied research in the Iraqi insurance sector
...Show More Authors

The present research aims to present a theoretical framework for the application of takaful insurance in Iraq, as well as to identify the level of impact on the development of insurance services in the Iraqi market, and to make recommendations and suggestions that lead to increased interest in this area, and thus contribute to the development and integration of insurance service in the Iraqi market,

The research adopted the descriptive analytical method, and the questionnaire was used to survey the opinions of the research sample consisting of department managers and their assistants and some employees of the graduate degrees in addition to employees of the departments of electronic calculator in the Iraqi insurance sector, and t

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Reforming the insurance sector and its role in stimulation gross domestic product in Iraq for the period (2014-2018)
...Show More Authors

The main purpose of the research is to demonstrate the importance of the insurance sector in the economy through its role in providing security for all economic sectors and thus stimulating the gross domestic product and reducing dependence on the output of the oil sector, which may expose the Iraqi economy to several problems and imbalances, I have found that there is a great weakness in the role of the insurance sector in Iraq at the level of government, companies and individuals, and the reason for this is the lack of policies supporting the insurance sector and the lack of work in the strategy of economic diversity and the decrease of security awareness by individuals so became Developing the sector to ensure the urgent need

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Real Time <i>in Situ</i> Remote Monitoring for Cladding Modified SMF Integrating Nanocomposite Based Ammonia Sensors Deploying EDFA
...Show More Authors

View Publication
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Building discriminant function for repeated measurements data under compound symmetry (CS) covariance structure and applied in the health field
...Show More Authors

Discriminant analysis is a technique used to distinguish and classification an individual to a group among a number of  groups based on a linear combination of a set of relevant variables know discriminant function. In this research  discriminant analysis used to analysis data from repeated measurements design. We  will  deal  with the problem of  discrimination  and  classification in the case of  two  groups by assuming the Compound Symmetry covariance structure  under  the  assumption  of  normality for  univariate  repeated measures data.

 

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Environmental Nanotechnology, Monitoring & Management
Sulfonated polyindole coated magnetic zincoxysulfide ([email protected]@SPID) core/shell nanocatalyst for simultaneous photocatalytic H2 production and BPA degradation
...Show More Authors

Photocatalyst composed of core/shell magnetic zincoxysulfide nanocomposite coated with sulfonated polyindole ([email protected]/SPID) has been prepared and used for simultaneous photocatalytic H2 production and Bisphenol A (BPA) degradation. XRD, FE-SEM, EDX, BET surface area, UV-vis DRS and VSM were used to characterize the synthesized nanocomposites. The photocatalytic performance was evaluated using batch reactor under visible light irradiation. The photocatalytic activity of [email protected]/SPID nanocomposite was revealed to exceed that of [email protected] nanocomposite due to the heterojunctions between SPID and [email protected] species. The results exhibited that the effect of BPA initial concentration was found to be effectual on the improvement

... Show More
Crossref (3)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Jordanian Journal Of Computers And Information Technology
BEYOND WORDS: HARNESSING SPEECH SOUND FOR SPEAKER AGE AND GENDER DETECTION USING 1D CNN ARCHITECTURE WITH SELF-ATTENTION MECHANISM
...Show More Authors

Beyond the immediate content of speech, the voice can provide rich information about a speaker's demographics, including age and gender. Estimating a speaker's age and gender offers a wide range of applications, spanning from voice forensic analysis to personalized advertising, healthcare monitoring, and human-computer interaction. However, pinpointing precise age remains intricate due to age ambiguity. Specifically, utterances from individuals at adjacent ages are frequently indistinguishable. Addressing this, we propose a novel, end-to-end approach that deploys Mozilla's Common Voice dataset to transform raw audio into high-quality feature representations using Wav2Vec2.0 embeddings. These are then channeled into our self-attentio

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Physics: Conference Series
Maxwellian-Averaged Neutron Capture Cross-Sections and Thermonuclear Reaction Rates for 56,57,58Fe, 59Co, And 60Ni Isotopes at Astrophysical Energies
...Show More Authors
Abstract<p>Initially-produced isotopes during the course of the <italic>s</italic>-process have a significant impact on the continuity and branching network of this process. Such isotopes can undergo various neutron capture mechanisms, of which (n, <italic>γ</italic>) is important. In this research, the direct, thermal, and Maxwellian-averaged cross section (MACS), as well as the astrophysical reaction rates of the radiative neutron-capture reactions, were calculated for <sup>56,57,58</sup>Fe, <sup>59</sup>Co, and <sup>60</sup>Ni isotopes. At kinetic energies between kT = 0.037 and 482.3 keV, corresponding to astrophysical temperature in the ran</p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Radioelectronics And Communications Systems
Erratum to: “BER Performance Enhancement for Secure Wireless Communication Systems Based on DCSK-MIMO Techniques under Rayleigh Fading Channel”
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed

... Show More
View Publication
Scopus Crossref