In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these measurements are sent using the internet of thing (IoT) technology to Google Firebase cloud, where the electric consumer's service center is located to store, analyze the measured data, and detect cases of energy penetration when it exceeds 53 and the cases of the electrical energy theft if any below 20 and then take the appropriate decision about it. Finally, an electric smart metering application (ESM-app) is designed and implemented to read and pull data information from the Google firebase cloud and then send the electric bill to the end consumer, and sending alert messages to the thieves and electrical power hackers to prohibit them if something wrong has detected. In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these measurements are sent using the internet of thing (IoT) technology to Google Firebase cloud, where the electric consumer's service center is located to store, analyze the measured data, and detect cases of energy penetration when it exceeds 53 and the cases of the electrical energy theft if any below 20 and then take the appropriate decision about it. Finally, an electric smart metering application (ESM-app) is designed and implemented to read and pull data information from the Google firebase cloud and then send the electric bill to the end consumer, and sending alert messages to the thieves and electrical power hackers to prohibit them if something wrong has detected.
Organic Permeable Base Transistors (OPBTs) reach a very high transit frequency and large on-state currents. However, for a later commercial application of this technology, a high operational stability is essential as well. Here, the stability of OPBTs during continuous cycling and during base bias stress is discussed. It is observed that the threshold voltage of these transistors shifts toward more positive base voltages if stressed by applying a constant potential to the base electrode for prolonged times. With the help of a 2D device simulation, it is proposed that the observed instabilities are due to charges that are trapped on top of an oxide layer formed around the base electrode. These charges are thermally released after rem
... Show MoreChristianity has rites and rituals that they should perform, and are indispensible. They say that these are sacred ordinances by Jesus Christ (PBUH) including the secret of priesthood. The origin of this secret as they claim is Christ. He puts the foundation of priesthood in Christianity. He has chosen twelve disciples and then seventeen whom he ordinated to obtain the honor of spreading the message of Christ among people. He appointed among the priests a divine message which the first fathers from the disciplesthemselves. The disciples are ones who take the secret and deliver it to the ones after them. The disciples took that sacred secret from Christ. Therefore, the secret is used when granting any religious position in the church. That s
... Show Morediasotiation compondnds sulphate upon with melting elemental aryl been used in his mouth for a while of studied
The current study aims to identify the organizational values of kindergarten teachers as well as to identify the difference in the organizational values of kindergarten teachers in term of years of service, to do this; the researcher designed a scale to measure the organizational values. The scale was applied on a sample of (400) kindergarten teachers. The resesults revealed that kindergarten teachers have a high level of organizational values within the classroom. The result of the second objective showed significant differences among the organizational values (political,
... Show MoreThis research aims to identify the vigilant personality of University teachers in term of gender. To this end, the researcher used the scale of Al-tememe (2017) for the vigilant personality, the scale was administered to the sample of the study which was (100) male and female teachers. The results have shown that university teachers generally have a vigilant personality, as well as the result showed a difference between male and female teachers on the level of vigilant personality in favor of males. In the light of these results the researcher has come with a number of recommendations and suggestions.
The aim of this research is to measure the logical maturity of kindergarten children. To achieve this aim, the researcher adopted the scale of Gold Schmid and Bentler (1968), which was translated to the Arabic language by Shabili (1988). The scale was administered to a sample of (100) kindergarten children were chosen randomly from a number of kindergartens in Baghdad city for the academic year (2017-2018). SPSS was used to analyze the collected data. The results revealed there is a level of logical maturity among the kindergarten children. The researcher came out with a number of recommendations and suggestions. &
... Show MoreAll modern critical approaches attempt to cover the meanings and overtones of the text, claiming that they are better than others in the analysis and attainment of the intended meanings of the text. The structural approach claims to be able to do so more than any other modern critical approach, as it claimed that it is possible to separate what is read from the reader, on the presumed belief that it is possible to read the text with a zero-memory. However, the studies in criticism of criticism state that each of these approaches is successful in dealing with the text in one or more aspects while failing in one or more aspects. Consequently, the criticism whether the approach possesses the text, or that the text rejects this possession, r
... Show More

