Preferred Language
Articles
/
bsj-6672
IoT System on Dynamic Fish Feeder Based on Fish Existence for Agriculture Aquaponic Breeders
...Show More Authors

Maintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed hardware. The controller controls the feeding and feedback mechanism based on attached sensors. An ultrasonic sensor is programmed with the controller to detect the level of food and waterproof ultrasonic to detect existing fish. The humidity sensor was used to measure the humidity in the food container to control the food freshness. Two servo motors were used to move the waterproof sensor to attract the fish and to dispense the food to the fish when existed. The result presents four measured levels that are the temperature of the food container, the quality of food based on humidity measured, fish detection counter and level of fish food in the container. Data analytics on all the measured levels was presented on the ThingSpeak platform by using Blynk to get data collections from all sensors. This research is significant for fish breeders that support IR4.0 system connected online and mobile apps which also contribute to today’s agriculture.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Jordan Higher Bi- Homomorphism and Co- Jordan Higher Bi- Homomorphism on Banach Algebra
...Show More Authors

The concepts of higher Bi- homomorphism and Jordan higher Bi- homomorphism have been introduced and studied the relation between Jordan and ordinary higher Bi- homomorphism also the concepts of Co- higher Bi- homomorphism and  Co- Jordan higher Bi- homomorphism introduced  and the relation between them in Banach algebra have also been studied.

View Publication Preview PDF
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iraqi Journal Of Laser
The Effect of the Concentration of Colloidal Silver Nanoparticles on Optical Limiting Reliability
...Show More Authors

The effect of the concentration of the colloidal nanomaterial on their optical limiting behavior is reported in this paper. The colloids of sliver nanoparticles in deionized water were chemically prepared for the two concentrations (31 ppm and 11ppm). Two cw lasers (473 nm Blue DPSS laser and 532 nm Nd:YAG laser) are used to compare the optical limiting performance for the samples. UV–visible spectrophotometer, transmission electron microscope (TEM) and Fourier Transformation Infrared Spectrometer (FTIR) were used to obtain the characteristics of the sample. The nonlinear refractive index was calculated to be in the order of 10-9 cm2/W. The results demonstrate that the observed limiting response is significant for 532nm. In addition, t

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Variable Selection Using aModified Gibbs Sampler Algorithm with Application on Rock Strength Dataset
...Show More Authors

Variable selection is an essential and necessary task in the statistical modeling field. Several studies have triedto develop and standardize the process of variable selection, but it isdifficultto do so. The first question a researcher needs to ask himself/herself what are the most significant variables that should be used to describe a given dataset’s response. In thispaper, a new method for variable selection using Gibbs sampler techniqueshas beendeveloped.First, the model is defined, and the posterior distributions for all the parameters are derived.The new variable selection methodis tested usingfour simulation datasets. The new approachiscompared with some existingtechniques: Ordinary Least Squared (OLS), Least Absolute Shrinkage

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Analyzing impact of competitive dimensions on the efficiency of e-learning: دراسه استطلاعيه
...Show More Authors

The aim of this research is to diagnose the impact of competitive dimensions represented by quality, cost, time, flexibility on the efficiency of e-learning, The research adopted the descriptive analytical method by identifying the impact of these dimensions on the efficiency of e-learning, as well as the use of the statistical method for the purpose of eliciting results. The research concluded that there is an impact of the competitive dimensions on the efficiency of e-learning, as it has been proven that the special models for each of the research hypotheses are statistically significant and at a level of significance of 5%, and that each of these dimensions has a positive impact on the dependent variable, and the research recommended

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
The Role of Italian Occupation of Ethiopia On the Egyptian- Italian Relations 1935
...Show More Authors

When the Italian fascist party leaded & access to the top of regime, it took Benito
Mussolini as a post of Italian prime minister on 1922, that lead to rise the voices which need
to find colonies of Italy, like other colonial countries, especially that of its colonies in Libya,
Eritrea and Somalia were not achieved its ambitions, was to be the occupation of Ethiopia to
revive her dreams to exert control over the Red sea and the Mediterranean and the
establishment of a vast empire satisfy colonial ambitions.
the Italian invasion of Ethiopia gained particularly important, what led to the
disruption of the balance of political forces is not at the level of local powers in the region,
but at the level of the exten

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 12 2017
Journal Name
Al-academy
The Origins of Chinese Influence on Pottery in the Tang and Song Dynasties
...Show More Authors

This research study of influence of Chinese thought on porcelain in the tang and song period, the study came into four sections, which are:
* First section contains general framework of the research, which include the problem, which is represented by following of questions:
1- Is there intellectual and ideological dimensions in Chinese porcelain?
2-What are the mechanisms and techniques of Chinese porcelain?
.the importance of this research and the need counted as a study providing cognitive addition into the Chinese arts field, especially ceramics of the Chinese. The aim of the research included of areas of artistic creativity in Chinese pottery and ceramics according to the bases of construction and composition. As the impo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Internal audit of spending units and its impact on the efficiency of the federal budget
...Show More Authors

The role of internal control is based on the effectiveness of the budget through an analysis of the reality of the budget in the research sample as it was studied in the preparation and preparation stages and the implementation stage. The sample showed that the sample did not comply with what is stated in the Ministry of Finance publication of instructions and ceilings. In the process of preparing and resulting from the occurrence of deviations in large proportions both in the discussion of the Ministry of Finance or when implementation as a low rate of implementation and the absence of allocations for some items, although there is a need for them as well as the transfer of large proportions of transfers both up or down and the purpose o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Kinetic and Theoretical Study of Removal Gentian Violet from Aqueous Solution Using Stachy Plant
...Show More Authors

     The main parameters and methods influencing the removal of Gentian Violet (GV) dye from aqueous media were investigated using a stachy plant in this study. The surface of the stachy plant was determined using FTIR spectra. Adsorption is influenced by the adsorbent's characteristic groups. The research took into account the usual conditions for GV dye adsorption by the stachy plant, such as the impact of contact time. Mass dosage , after 0.3 g the amount of adsorbed dye declines. Study pH and ionic strength, the results obtained showed that at pH 3 the largest adsorption of (GV) was seen, while at pH 9, the lowest adsorption was observed  at 298 K, the adsorption kinetics and equilibrium constants were achieved, and the equilibr

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Synthesis and Characterization of Derivatives Based on 4, - Dimercaptobiphenyl
...Show More Authors

Starting from 4, - Dimercaptobiphenyl, a variety of phenolic Schiff bases (methylolic, etheric, epoxy) derivatives have been synthesized. All proposed structure were supported by FTIR, 1H-NMR, 13C-NMR Elemental analysis all analysis were performed in center of consultation in Jordan Universty.

View Publication Preview PDF
Crossref
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More