Maintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed hardware. The controller controls the feeding and feedback mechanism based on attached sensors. An ultrasonic sensor is programmed with the controller to detect the level of food and waterproof ultrasonic to detect existing fish. The humidity sensor was used to measure the humidity in the food container to control the food freshness. Two servo motors were used to move the waterproof sensor to attract the fish and to dispense the food to the fish when existed. The result presents four measured levels that are the temperature of the food container, the quality of food based on humidity measured, fish detection counter and level of fish food in the container. Data analytics on all the measured levels was presented on the ThingSpeak platform by using Blynk to get data collections from all sensors. This research is significant for fish breeders that support IR4.0 system connected online and mobile apps which also contribute to today’s agriculture.
In this paper the definition of fuzzy normed space is recalled and its basic properties. Then the definition of fuzzy compact operator from fuzzy normed space into another fuzzy normed space is introduced after that the proof of an operator is fuzzy compact if and only if the image of any fuzzy bounded sequence contains a convergent subsequence is given. At this point the basic properties of the vector space FC(V,U)of all fuzzy compact linear operators are investigated such as when U is complete and the sequence ( ) of fuzzy compact operators converges to an operator T then T must be fuzzy compact. Furthermore we see that when T is a fuzzy compact operator and S is a fuzzy bounded operator then the composition TS and ST are fuzzy compact
... Show MoreEmpirical research in the disciplines of art and design has started to escalate and gather consideration within the academic community over the past few decades. However, still, graphic design tends to be a topic extremely under-researched by scholarly persons. Profound research in the field of graphic design extends far beyond the works produced by the designer himself (Khoury, 2009, p.844). In order to develop a clear insight, one needs to delve deep into the subcategories that the diverse field of graphic design is comprised of, including illustration, typography, interaction design, branding and even the impact of notable, eminent institutes from around the world that have taken the budding artists for quite a long time (Walke
... Show MoreThe influx of Arab Qahtani and Nizari tribes continued to the countries of Baluchistan and the Levant in pre-Islamic times until the Levant became open to the Arab-Islamic tide during the first century AH. The Islamic Orient until the early Islamic Arab Army reached the western borders of China. What we will see in the folds of the search.
The current research includes the adsorption of Rhodmine-B Dye on the surface of Citrus Leaves using the technique of UV. Vis spectrophotometer to determine data of quantitative adsorption at various contact time, ionic strength, PH and temperature conditions. As a function of temperatures 25,35,45,55 0C, the dsorption phenomenon was examined, and the results showed that Rhodamine-B adsorption Citrus leaves rose with increasing temperatures on the surface (endothermic process). Using various NaCl solution concentrations, the effect of ionic strength on adsorption has also been studied. Increasing the importance of ionic strength has been shown to improve the amount of adsorption of Rhodamine-B on citrus leaves at constant temp
... Show MoreThis paper studies the effects of stiffeners on shear lag in steel box girders with stiffened flanges. A three-dimensional linear finite element analysis using STAAD.Pro V8i program has been employed to evaluate and determine the actual top flange stress distribution and effective width in steel box girders. The steel plates of the flanges and webs have been modeled by four-node isoparametric shell elements, while the stiffeners have been modeled as beam elements. Different numbers (4, 8, and 15) for the steel stiffeners have been used in this study to establish their effects on the shear lag and longitudinal stresses in the flange. Using stiffeners reduced the magnitude of the top flange longitudinal stresses about 40%, but did
... Show MoreSkull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither non-brain tissues nor
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreVol. 6, Issue 1 (2025)
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show More