Preferred Language
Articles
/
AYbjQoYBIXToZYALWoGD
Efficient Energy Management for a Proposed Integrated Internet of Things-Electric Smart Meter (2IOT-ESM) System
...Show More Authors

In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these measurements are sent using the internet of thing (IoT) technology to Google Firebase cloud, where the electric consumer's service center is located to store, analyze the measured data, and detect cases of energy penetration when it exceeds 53  and the cases of the electrical energy theft if any below 20  and then take the appropriate decision about it. Finally, an electric smart metering application (ESM-app) is designed and implemented to read and pull data information from the Google firebase cloud and then send the electric bill to the end consumer, and sending alert messages to the thieves and electrical power hackers to prohibit them if something wrong has detected. In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these measurements are sent using the internet of thing (IoT) technology to Google Firebase cloud, where the electric consumer's service center is located to store, analyze the measured data, and detect cases of energy penetration when it exceeds 53  and the cases of the electrical energy theft if any below 20  and then take the appropriate decision about it. Finally, an electric smart metering application (ESM-app) is designed and implemented to read and pull data information from the Google firebase cloud and then send the electric bill to the end consumer, and sending alert messages to the thieves and electrical power hackers to prohibit them if something wrong has detected.

Crossref
Publication Date
Mon Oct 14 2019
Journal Name
Open Access Macedonian Journal Of Medical Sciences
Short Term Effectiveness of Gamma Knife Radiosurgery in the Management of Brain Arteriovenous Malformation
...Show More Authors

AIM: To evaluate the short-term effectiveness of Gamma knife radiosurgery as a modality of treatment of brain arteriovenous malformation. METHODS: Sixty-three patients with arteriovenous brain malformations underwent Gamma knife radiosurgery included in this prospective study between April 2017 and September 2018 with clinical and radiological with MRI follow up was done at three months and six months post-Gamma knife radiosurgery. By the end of the 12th-month post-Gamma knife radiosurgery, the patients were re-evaluated using digital subtraction angiography co-registered with M.R.I. During the 12 months follow up, CT scan or MRI was done at any time if any one of the patients᾽ condition deteriorated or developed signs and s

... Show More
View Publication
Scopus (8)
Crossref (7)
Scopus Crossref
Publication Date
Wed Sep 16 2020
Journal Name
Al-kindy College Medical Journal
The importance of anatomical zonal classification in the early management of penetrating neck injuries
...Show More Authors

Background: Penetrating neck injuries are common problem in our country due to increasing violence, terrorist bombing and military operations.
These injuries are potentially life threating and need great attention and proper management.
Objective: The aim of this study is to focus on the importance of anatomical zonal classification of the neck in the management of penetrating injuries of the visceral compartment of the Neck.
Methods :70 patients with various injuries who were managed at causality unit and Otolaryngology department in Al-Kindy Teaching Hospital during aperiod from January 1st 2015 to October 31st 2015.
The study carried on those patient depending on proper clinical examination and their urgent management.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The role of Electronic human resources management practices in the sustainability of knowledge capital
...Show More Authors

Abstract:

The aim of the research is to highlight the role of electronic human resources management practices in the sustainability of knowledge capital as one of its success factors, as well as the diagnosis and interpretation of the relationship between research variables and their dimensions. The research problem is that the University of Babil implements some electronic human resources management practices not in a complete way, The level of its application and the problems it faces, as well as the extent to which these practices reflect the knowledge capital and sustainability in the university, and highlights the importance of research as it is concerned with the electronic aspects and achieve the competitive advant

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The use of management principles to Fayol in the implementation of competitive strategies Porter
...Show More Authors

This paper aims to review the intellectual to the most important thought leaders administrative and strategic They both (Henry Fayol and Michelle Porter), who forward a lot of ideas that have helped countries in the advancement and progress their economies , has been drawing literature theoretical common border in Contributions ( Fayol ) philosophical and between applications ( Porter ), which reversed strategies of the three ( the leadership of the cost, differentiation, and focus ), so browse search how to apply and use the principles of Fayol in the implementation of strategies competitiveness of Porter, and stems from a problem ( ( to what extent a reflection of the principles ( Fayol) fourteen strategies (Porter ) competitiv

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Application of the Holonic Manufacturing System using the Genetic Algorithm : Case Study in Lab 7 of the General Company for the Leather Industry
...Show More Authors

The study aims to achieve several objectives, including follow-up scientific developments and transformations in the modern concepts of the Holistic Manufacturing System for the purpose of identifying the methods of switching to the entrances of artificial intelligence, and clarifying the mechanism of operation of the genetic algorithm under the Holonic Manufacturing System, to benefit from the advantages of systems and to achieve the maximum savings in time and cost of machines Using the Holistic Manufacturing System method and the Genetic algorithm, which allows for optimal maintenance time and minimizing the total cost, which in turn enables the workers of these machines to control the vacations in th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Fabricating a new Rheometer for Concrete
...Show More Authors

A new concrete rheometer is introduced including its innovation, actual design, working rules,
calibration, and reliability. A modified design of Tattersall two-point device is created. Some of
components are purchased from local and foreign markets, while other components and the
manufacturing process are locally fabricated. The matching viscosity method of determining the mixer
viscometer constants is demonstrated and followed to relate torque and rotational speed to yield stress
and viscosity (Bingham parameters). The calibration procedures and its calculation are explained.
Water is used as a Newtonian fluid, while; cement paste (cement + water) with w/c ratio equal to
(0.442) is used as a non-Newtonian fluid. Th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 21 2012
Journal Name
Arabian Journal For Science And Engineering
A Procedure for Analysing Reinforced Embankments
...Show More Authors

View Publication
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Feb 01 2026
Journal Name
Softwarex
A toolbox for real orthogonal polynomials
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref