In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these measurements are sent using the internet of thing (IoT) technology to Google Firebase cloud, where the electric consumer's service center is located to store, analyze the measured data, and detect cases of energy penetration when it exceeds 53 and the cases of the electrical energy theft if any below 20 and then take the appropriate decision about it. Finally, an electric smart metering application (ESM-app) is designed and implemented to read and pull data information from the Google firebase cloud and then send the electric bill to the end consumer, and sending alert messages to the thieves and electrical power hackers to prohibit them if something wrong has detected. In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these measurements are sent using the internet of thing (IoT) technology to Google Firebase cloud, where the electric consumer's service center is located to store, analyze the measured data, and detect cases of energy penetration when it exceeds 53 and the cases of the electrical energy theft if any below 20 and then take the appropriate decision about it. Finally, an electric smart metering application (ESM-app) is designed and implemented to read and pull data information from the Google firebase cloud and then send the electric bill to the end consumer, and sending alert messages to the thieves and electrical power hackers to prohibit them if something wrong has detected.
The research aims to identify the social control among kindergarten department students. In order to achieve the objective of the research, a sample of (400) female students: (200) from Baghdad University / Faculty of Education for women and (200) from Mustansiriyha University / Faculty of Basic Education were chosen randomly.
The researchers designed a tool to measure the social control of the study sample. It was exposed to group of specialists in the educational and psychological sciences, measurement and evaluation. In addition to specialists in kindergartens. Two indicators of validity were used. The Alpha-Cronbach method, Pearson correlation coefficient, and independent samples t-test were used to analyze the c
... Show MoreBackground: Laparoscopic cholecystectomy (LC) has become the standard treatment for symptomatic cholelithiasis. Bile duct injury and accidental gallbladder perforation with spillage of bile and stone are common complications of LC. This study was carried out to assess the early complications of gallbladder perforation during LC, and identify the risk factor of that perforation.
Objectives: to evaluate the early complications which may occur after the perforation of the gallbladder during laparoscopic cholecystectomy and to determine the risk factors which are associated with the perforation of the gall bladder.
Subjects and methods: A prospective comparative study o
... Show MoreThe primary purpose of this paper is to introduce the, 2- coprobabilistic normed space, coprobabilistic dual space of 2- coprobabilistic normed space and give some facts that are related of them
There were signs of the first civilization known to humanity for more than 6000 years BC in the north of Iraq have disappeared this civilization to appear after 500 years in southern Iraq, the Sumerian civilization, which was considered as the opinion of scientists or civilizations, exceeds the impact to Asia and the countries that had been in contact (Sumerians) and see them today in other towns and villages. In subsequent periods of time appeared distinct personalities to their nature, religious, social, special clothing with clothes seem especially long. And usually dress is made from raw wool material making them in the Sumerian era. Put the garment on the body and leaves the top of the right shoulder with the survival of an ope
... Show MoreResearch summary
Praise be to God, Lord of the worlds, and prayers and peace be upon the one who was the most eloquent of people in language and the most eloquent of them in eloquence, our Master Muhammad (peace and blessings of God be upon him).
To proceed... There is no doubt that many studies have preceded me in talking about chalk, each according to his own destination and view, and what I do not deny is that I benefited a lot from it, and it provided me with a lot of valuable information, and I liked to be one of those study pens, trying as much as possible To add something new and different in the study, far from similarity and repetition. Especially in the Abbasid study.
The babble in the Abbasid society was d
... Show MoreMachine learning (ML) is a key component within the broader field of artificial intelligence (AI) that employs statistical methods to empower computers with the ability to learn and make decisions autonomously, without the need for explicit programming. It is founded on the concept that computers can acquire knowledge from data, identify patterns, and draw conclusions with minimal human intervention. The main categories of ML include supervised learning, unsupervised learning, semisupervised learning, and reinforcement learning. Supervised learning involves training models using labelled datasets and comprises two primary forms: classification and regression. Regression is used for continuous output, while classification is employed
... Show MoreObjective:
This study aims to asses the patients' compliance with essential hypertension in respect to antihypertensive
medications, follow-up, dietary pattern and health habits, to identify the associated long-term complications, and
to find out the relationship between patient's compliance, and demographic characteristics such as age, gender,
level of education, and duration of disease.
Methodology:
A descriptive study was carried out in Nasiriyah Teaching Hospital to achieve presented objectives .
Results:
The results of the study revealed that there were a significant association between educational level and total
patient's compliance, a significant association was found between the duration of disease and
Background: This review aimed at explaining different methods of canine retraction along the archwire. Methods: Searching for different methods of canine retraction using fixed orthodontic appliances was carried out using different databases, including PubMed Central, Science Direct, Wiley Online Library, the Cochrane Library, Textbooks, Google Scholar, Research Gate, and hand searching from 1930 till February 2022. Results: After excluding the duplicate articles, papers describing the methods of canine retraction along the archwires were included. The most commonly used methods are NiTi closed coil spring and elastic chain. Conclusions: Various methods of canine retraction along the archwires were explained in detail regarding their adv
... Show More