Human-computer interaction (HCI) is a field that has spurred a lot of study and research related to interface evaluation. According to experts in the field, it is an essential tool for spreading the notion that a computer's user interaction should resemble interpersonal interactions and free-form conversations. HCI researchers initially concentrated on enhancing the usability of various computer interfaces. This study conducted knowledge-based information preparation and evaluated the implementation of an online academic management system at the University of Baghdad using the effectiveness, time-based efficiency, and satisfaction rates after task questionnaire procedure. Twenty-four users participated in the usability testing to observe the system's performance. The findings show strong usability abilities, with a participation error rate of 33.3% and an effectiveness rate of 71.43%. Additionally, some recommendations are demonstrated for improving the human-computer interface metrics of our university system.
Applications of nonlinear, time variant, and variable parameters represent a big challenge in a conventional control systems, the control strategy of the fuzzy systems may be represents a simple, a robust and an intelligent solution for such applications.
This paper presents a design of fuzzy control system that consists of three sub controllers; a fuzzy temperature controller (FC_T), a fuzzy humidity controller (FC_H) and a ventilation control system; to control the complicate environment of the greenhouse (GH) using a proposed multi-choice control system approach. However, to reduce the cost of the crop production in the GH, the first choice is using the ventilation system to control the temperature and humidit
... Show MoreIn this paper, a mathematical model consisting of the two harmful
phytoplankton interacting with a herbivorous zooplankton is proposed and studied.
The existence of all possible equilibrium points is carried out. The dynamical
behaviors of the model system around biologically feasible equilibrium points are
studied. Suitable Lyapunov functions are used to construct the basins of attractions
of those points. Conditions for which the proposed model persists are established.
The occurrence of local bifurcation and a Hopf bifurcation are investigated. Finally,
to confirm our obtained analytical results and specify the vital parameters, numerical
simulations are used for a hypothetical set of parameter values.
In the name of God the Merciful
Praise be to God and the Hall and Peace Uncle Prophet Muhammad and blindness Alo and companions
Money is the lifeblood and a reason for living. An individual cannot live without money to make it
It is only through the necessities of life and the state that it can perform its duties and functions only
As money is so important, the state must regulate the balance of revenues
And expenses in order to avoid failure in Mizanitia, but perhaps the country may be exposed to crises
An exception that leads to misappropriation in the general Mizanitia and the Islamic Shari'ah is valid for Makkah
Time and place for all circumstances has created several ways to address the budget defici
As a result of the increase in wireless applications, this led to a spectrum problem, which was often a significant restriction. However, a wide bandwidth (more than two-thirds of the available) remains wasted due to inappropriate usage. As a consequence, the quality of the service of the system was impacted. This problem was resolved by using cognitive radio that provides opportunistic sharing or utilization of the spectrum. This paper analyzes the performance of the cognitive radio spectrum sensing algorithm for the energy detector, which implemented by using a MATLAB Mfile version (2018b). The signal to noise ratio SNR vs. Pd probability of detection for OFDM and SNR vs. BER with CP cyclic prefix with energy dete
... Show MoreThe objective of the research is to evaluate the risk management practices of the variables (risk management structure, risk management methods, key components of risk management) and their relation to the principled behavior of managers behavior(innovation, proactive, risk acceptance) By adopting the questionnaire as a main tool in collecting data from managers in the National and raq insurance companies of (50) officials Department manager, department administrator, unit administrator, and analyzed their answers using the SPSS In calculating arithmetic mean, standard deviation, percentage weight and simple correlation coefficient. The most prominent conclusions were:1.There is a positive trend in the sample in both companies and a high
... Show MoreIn Australia, most of the existing buildings were designed before the release of the Australian standard for earthquake actions in 2007. Therefore, many existing buildings in Australia lack adequate seismic design, and their seismic performance must be assessed. The recent earthquake that struck Mansfield, Victoria near Melbourne elevated the need to produce fragility curves for existing reinforced concrete (RC) buildings in Australia. Fragility curves are frequently utilized to assess buildings’ seismic performance and it is defined as the demand probability surpassing capacity at a given intensity level. Numerous factors can influence the results of the fragility assessment of RC buildings. Among the most important factors that can affe
... Show MoreThe goal of this paper is to study dynamic behavior of a sporadic model (prey-predator). All fixed points of the model are found. We set the conditions that required to investigate the local stability of all fixed points. The model is extended to an optimal control model. The Pontryagin's maximum principle is used to achieve the optimal solutions. Finally, numerical simulations have been applied to confirm the theoretical results.
Recent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app
... Show MoreA high power N2 laser of the three stage-Blumlein circuit designed, which consist two identical electrodes, four capacitors and three spark gaps which designed discharge geometry with minimum inductance. This system gives a maximum energy 18 mJ with a pulse time 6.65 ns and wave length 337.1 nm. The distance between spark gap terminals has large effect on the output energy. The ideal distance were 11 mm between the terminals for the first spark gap and 4 mm between the terminals for the second spark gap, the distance between the terminals of the spark gaps has a significant effect on the resulting energy, where the energy decreases when the distance between the terminals of the first and second s
... Show MoreSome geometric parameters affecting the performance of a wire-plate electrostatic precipitator (ESP) are investigated theoretically. A numerical model was built to investigate the influence of the discharge wire size, wire separation, collector plates spacing, and roughness factor on the ESP performance. The results show that thinner wires emit higher current than larger ones at the same applied voltage, which would be suitable for low voltage power supply to generate the desired current density at the collecting electrodes. The results also show that, as the discharge electrodes get closer, the corona gets suppressed, resulting in a diminished corona current flow. On the other hand, as the distance between elect
... Show More