{"title":"Home Energy Management and Monitoring Using Ubidots Platform","authors":"N. Mohammed, Nasir Hussein Selman","doi":"10.46649/150920-03","DOIUrl":"https://doi.org/10.46649/150920-03","url":null,"abstract":"This paper introduces a practical design for home energy management and monitoring. It has been assumed that the home has a 12 VDC power source and with variable generation power. The virtual house has loads that consisting of four lamps, each with a power of 10 watts and operated on 12VDC. The home can be operated in two modes. The first mode is the grid-tied mode, in which the energy is imported or exported the power to/from the grid depending on whether the home source generation power is greater than or less than its load. The second mode is called the island mode, in which the home depends on its power supply to feed its loads with the required power. The transition between the two operating modes of the home is controlled fully by the Arduino UNO microcontroller according to the main grid status and home status (generation and load demand). The assumption that was set in the designed system is that the maximum current that a home source can supply is 3A. Therefore, when the current that a home needs is more than this value, it imports energy from the main grid and less than that value, it exports energy to the grid. The data of the grid voltage and load current of the home were transferred by the Arduino UNO microcontroller to the Node MCU using RF (HC-12) module. The cases of the main grid and the home power source are monitored in real-time using the Ubidots platform. These cases data raised to the Ubidots platform by using the Wi-Fi- ESP8266 included in the Node MCU board. All cases were tested in practice and the Ubidots platform showed a quick response in updating the data as well as its security","PeriodicalId":389397,"journal":{"name":"Al-Furat Journal of Innovations in Electronics and Computer Engineering","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132452223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation Performance of Two-Dimensional Multi-Diagonal Code Using Polarization and Wavelength of OCDMA System","authors":"H. Z. Dhaam, F. Ali, Ahmed G. Wadday","doi":"10.46649/150920-04","DOIUrl":"https://doi.org/10.46649/150920-04","url":null,"abstract":"In this paper, a new encoder/decoder technique has employed two orthogonal polarization states (vertical and horizontal) of a two-dimensional optical code, which combined polarization and wavelength scheme (p/w). This technique employed in order to increase the number of users in the FTTH network. In addition, Optical Fiber Systems (OFS) and Free Space Optics (FSO) scenarios were utilized with different Spectral Amplitude Coding Optical Code Division Multiple Access (SAC-OCDMA) codes. The FTTH network based on incoherent SAC-OCDMA is tested by using the One and Two Dimensional Multi-Diagonal (1D-MD, 2D-MD) codes and 1D and 2D Zero Cross Correlation (ZCC) codes. The results show that the number of the total supported homes for the 2D codes is doubled as a comparison with 1D codes. As well as, the simulation results show the performance of MD code is better presented than ZCC in both OFS and FSO scenarios","PeriodicalId":389397,"journal":{"name":"Al-Furat Journal of Innovations in Electronics and Computer Engineering","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121394983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach to Hide an Audio File in Image Using LSB Technique","authors":"Mohammed Majid Msallam","doi":"10.46649/150920-01","DOIUrl":"https://doi.org/10.46649/150920-01","url":null,"abstract":"Recently, the world is interested in moving data between various devices. When The data transfer over the internet, maybe it attacks and reads or modifies on containing it. So, Data transmission must be encrypted before sending it to read and interpret by the intended receiver. Thus, information security is more critical than it used to be. This paper reflects the implementation of the two Least Significant Bit (LSB) techniques is named sequential LSB and sorted LSB. It is done by embedding a secret audio file into a cover file of the image using the LSB techniques with an approach to choose the hiding index. The work proposed uses the conventional approach to the LBS techniques under the name sequential LSB as the basic steganography model to compare my algorithm which called sorted LSB. Based on results, the sorted LSB produces is the same sequential LSB in which the stego image is not recognized by human eyes, but the security more complex than the LSB sequential.","PeriodicalId":389397,"journal":{"name":"Al-Furat Journal of Innovations in Electronics and Computer Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121354525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}