In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these measurements are sent using the internet of thing (IoT) technology to Google Firebase cloud, where the electric consumer's service center is located to store, analyze the measured data, and detect cases of energy penetration when it exceeds 53 and the cases of the electrical energy theft if any below 20 and then take the appropriate decision about it. Finally, an electric smart metering application (ESM-app) is designed and implemented to read and pull data information from the Google firebase cloud and then send the electric bill to the end consumer, and sending alert messages to the thieves and electrical power hackers to prohibit them if something wrong has detected. In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these measurements are sent using the internet of thing (IoT) technology to Google Firebase cloud, where the electric consumer's service center is located to store, analyze the measured data, and detect cases of energy penetration when it exceeds 53 and the cases of the electrical energy theft if any below 20 and then take the appropriate decision about it. Finally, an electric smart metering application (ESM-app) is designed and implemented to read and pull data information from the Google firebase cloud and then send the electric bill to the end consumer, and sending alert messages to the thieves and electrical power hackers to prohibit them if something wrong has detected.
The research aims to identify ways of upgrading the quality level of university education at the Middle Technical University in light of its application for the National Ranking project for the quality of Iraqi universities in order to obtain advanced grades among the Iraqi universities , Which is qualified to enter the Ranking of universities worldwide, through displaying the mechanism of the Application of National Ranking project for the quality of Iraqi universities in the Middle Technical University and its formations consisting of (5) technical colleges and (11) technical institute.
The results of the application showed several observations: The most
... Show MoreThe studying trying to determine the role of Strategic Intelligence on the Process of Green Manufacturing of Sample of Mineral water factories at Dahuk city. The study submit a theoretical frame of Strategic Intelligence and Green Manufacturing, a supposed sample, had been set to reverye the nature of the relations and effect in the study Varity, the study depend on group of the main and branch concurring with the relations and effect between the Strategic Intelligence and Green Manufacturing to answer the following questions about research to problems:
What are the relationships and effects between stra
... Show Moreلا يزال المهتمون بلعبة كرة السلة يبحثون عن إيجاد الوسائل الأكثر أهمية وصولاً إلى ما تطمح إليه الدول لتحقيق افضل المستويات في نواحي اللعبة كافة من خلال التغلب على المعوقات التي تحول دون تقدمها إلى الأمام بالدراسة والبحث. ومن هذا المنطلق انصب البحث في ضرورة معالجة القصور الناتج عن عدم وجود المستويات المعيارية ذات العلاقة باختبارات قدرات اللاعبين وعلى وفق مراكز اللعب ولا سيما المهارية الهجومية، ومما شكل ذلك ضع
... Show MoreObjectives: The study aims to (1) Assess the parents' efficacy for child healthy weight behavior. (2) Identify the difference in parents’ efficacy for child healthy weight behavior between the groups of parent’s gender, family’s socioeconomic status, child’s gender, and child’s birth order, (3) Find out the relationship between parents’ age, child’s age, child’s body mass index, family’s socioeconomic status, the number of children in the family and parents’ efficacy for child healthy weight behavior.
Methodology: A descriptive correlational study is conducted for the period from November 11th, 2018 to March 25th, 2019 to assess the parents' efficacy for child healthy weight behavior. The study was carried-out in (
This research considers the preservation of environment through recycling old toys. This is achieved by transforming the old toys into educational clothing accessories for kindergarten stages. The research methodology adapts both descriptive and applied approaches. The research questionnaire targeted a sample of 35 teachers to collect information about the waste toys in kindergarten. Also, another sample of 30 teachers and mothers were targeted to measure the suitability of the clothing designs for the early childhood stages. The results shows that both teachers and mothers were well satisfied with clothing accessories designed with the toys waste. This concept contributes to limiting the pollution caused by toys and could save time, eff
... Show MoreTo perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreThe orbital motion and longitude for some Jupiter's satellites (Amaletha, Europa, Ganymede and Callisto) were calculated from two different locations Iraq and Syria. A program was designed, the input parameters were the desired year, month, day and the longitude of the location, the output parameters results were applied in form of a file, and this file includes the longitude, orbital motion, and local time of these satellites. A specific date 1-10-2013 was taken, the results of longitude was (20-336) º and orbital motion was (92-331) º for both Iraq and Syria location with observing time (05:24:14-15:18:10) for Iraq and (04:56:33-14:50:30) for Syria. The difference in time between the two locations was constant (00:45:00), these results
... Show MoreThe research deals with Iraq's position of the Lebanese civil war and the Efforts made by Iraq in order to stop the bleeding of this war, the research also deals with the nature of regime in Lebanon and the developments that preceded the war and the positions of the internal and external competing forces, as weu as handling the Iraqi Syrian disagreement and it's impaet on the situation of Lebanon and the war developments.
The research focused on the Iraq's position towards the externd proposed solutions to solve the Lebanese civil war.