Many consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is satisfied. It divides the measured data for actual power (A_p ) of the electrical model into two portions: the training portion is selected for different maximum actual powers, and the validation portion is determined based on the minimum output power consumption and then used for comparison with the actual required input power. Simulation results show the energy expenditure problem can be solved with good accuracy in energy consumption by reducing the maximum rate (A_p ) in a given time (24) hours for a single house, as well as electricity’s bill cost, is reduced.
The progress of science in all its branches and levels made great civilized changes of
our societies in the present day, it's a result of the huge amount of knowledge, the increase of
number of students, and the increase of community awareness proportion of the importance of
education in schools and universities, it became necessary for us as educators to look at
science from another point of view based on the idea of scientific development of curricula
and teaching methods and means of education, and for the studying class environment as a
whole, by computer and internet use in education to the emergence of the term education
technology, which relies on the use of modern technology to provide educational content to<
In this article, we introduce a class of modules that is analogous of generalized extending modules. First we define a module M to be a generalized ECS if and only if for each ec-closed submodule A of M, there exists a direct summand D of M such that is singular, and then we locate generalized ECS between the other extending generalizations. After that we present some of characterizations of generalized ECS condition. Finally, we show that the direct sum of a generalized ECS need not be generalized ECS and deal with decompositions for be generalized ECS concept.
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreA design of a Fabry -Perot interferometer system was constructed
to determine the precise value of the wavelength which is required in spectml studies depending on varying medium pressure where the refractive index was a function of pressure at a constant distance between the two mirrors by using a Hc-Ne laser (632.8) tun as a coherent source .
The (fmee) (t) and the coefficient of finesses (F) and the visbility
of the fringes (V) has been calculated . Image processing \\•as used and its result can be relied on verifying 
... Show MoreOne of the most important techniques for preparing nanoparticle material is Pulsed Laser Ablation in Liquid technique (PLAL). Carbon nanoparticles were prepared using PLAL, and the carbon target was immersed in Ultrapure water (UPW) then irradiated with Q-switched Nd:YAG laser (1064 nm) and six ns pulse duration. In this process, an Nd:YAG laser beam was focused near the carbon surface. Nanoparticles synthesized using laser irradiation were studied by observing the effects of varying incident laser pulse intensities (250, 500, 750, 1000) mJ on the particle size (20.52, 36.97, 48.72, and 61.53) nm, respectively. In addition, nanoparticles were characterized by means of the Atomic Force Microscopy (AFM) test, pH easurement
... Show MoreThe present work deals with five species of parasitic Hymenoptera belonging to Pteromalidae, Eupelmidae and Eurytornidae which have been reared from brachid beetles. A new species, Eurytoma irakensis is described and the species, Bruchocida orientalis Crawford is recorded for the first time from Iraq.
This study confirms the ubiquitin conjugating enzyme 2B (Rad6) plays a significant role in the DNA repair pathway also because the ubiquitin-conjugating pathway. The DNA repair pathway could be a variety of bypass repair mechanism where the broken base pair is bypassed by permitting the replication fork to labor under the site of injury. This is often done by a shift mechanism wherever deoxyribonucleic acid enzyme - δ is switched with DNA enzyme - η (DNAP - η). Site of DNAP - η is massive enough to permit the broken ester to labor under, and so bypass the broken nucleotide. However, this is often potential solely through the involvement of Proliferating cell nuclear antigen (PCNA) that could be a processivity issue and it acts as a plat
... Show MoreThe research summarizes the knowledge of the dimensions and denotations of T.V advertisement; and its constituents for building it through the semiotic approach of an ad sample represented by the announcement of Zain Kuwait Telecom Company which carries the title "Mr. President" using Roland Barth's approach, starting with the designation, implicit, and linguistic reading to reach the narrative features and their denotations. That makes television advertising as a semiotic and pragmatic discourse in view of the still and motion picture with its efficiency and strength to inform and communicate. And what lies in it of aesthetic, artistic elements; informational and effective power in influencing the recipients by focusing on narratives and a
... Show More