Human-computer interaction (HCI) is a field that has spurred a lot of study and research related to interface evaluation. According to experts in the field, it is an essential tool for spreading the notion that a computer's user interaction should resemble interpersonal interactions and free-form conversations. HCI researchers initially concentrated on enhancing the usability of various computer interfaces. This study conducted knowledge-based information preparation and evaluated the implementation of an online academic management system at the University of Baghdad using the effectiveness, time-based efficiency, and satisfaction rates after task questionnaire procedure. Twenty-four users participated in the usability testing to observe the system's performance. The findings show strong usability abilities, with a participation error rate of 33.3% and an effectiveness rate of 71.43%. Additionally, some recommendations are demonstrated for improving the human-computer interface metrics of our university system.
This study discusses risk management strategies caused by pandemic-related (Covid-19) suspensions in thirty-six engineering projects of different types and sizes selected from countries in the middle east and especially Iraq. The primary data collection method was a survey and questionnaire completed by selected project crew and laborers. Data were processed using Microsoft Excel to construct models to help decision-makers find solutions to the scheduling problems that may be expected to occur during a pandemic. A theoretical and practical concept for project risk management that addresses a range of global and local issues that affect schedule and cost is presented and results indicate that the most significant delays are due to a
... Show MoreThis paper aims to investigate the flexural behavior of reinforced concrete beams considering fire resistance by adding Lightweight Expanded Clay Aggregates (LECA) to the concrete mix as partial coarse aggregate replacement. LECA is a type of porous clay with a uniform pore structure with fine, closed cells and hard, tightly sintered skin. The experimental work comprised four reinforced self-compacted concrete beams. All the specimens were identical in their geometrical layout of 1600×240×200 mm, reinforcement details, and support condition (simply supported). For all the beams, the main reinforcement was provided by two bars, each having a diameter of 12 mm, while a bar of 6 mm diameter was employed for the top and shear reinforc
... Show MoreBackground: Poly-ether-ether-ketone(PEEK) has been introduced to many dental fields. Recently it was tested as a retainer wire‎ following orthodontic treatment. This study aimed to investigate the effect of changing the bonding spot size and location on the performance of PEEK retainer wires. Methods: A biomechanical study involving four three-dimensional finite element models was performed. The basic model was with a 0.8 mm cylindrical cross-section PEEK wire, bonded at the center of the lingual surface of the mandibular incisors with 4 mm in diameter composite spots. Two other models were designed with 3 mm and 5 mm composite sizes. The last model was created with the composite bonding spot of the canine away from the center
... Show MoreBackground: Poly-ether-ether-ketone(PEEK) has been introduced to many dental fields. Recently it was tested as a retainer wire‎ following orthodontic treatment. This study aimed to investigate the effect of changing the bonding spot size and location on the performance of PEEK retainer wires. Methods: A biomechanical study involving four three-dimensional finite element models was performed. The basic model was with a 0.8 mm cylindrical cross-section PEEK wire, bonded at the center of the lingual surface of the mandibular incisors with 4 mm in diameter composite spots. Two other models were designed with 3 mm and 5 mm composite sizes. The last model was created with the composite bonding spot of the canine away from the center of t
... Show MoreA security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show MoreBackground: War represents a major human crisis; it destroys communities and results in ingrained consequences for public health and well-being
Objective: We set this study to shed light on the public health status in Iraq after the successive wars, sanctions, sectarian conflicts, and terrorism, in light of certain health indicators.
Design: The primary source of data for this analysis comes from the Iraqi Ministry of Health, and The World Health Organization disease surveillance.
Results: Most of the morbidity indicators are high, even those that are relatively declining recently, are still higher than those repor
... Show MoreMassive multiple-input multiple-output (massive-MIMO) is a promising technology for next generation wireless communications systems due to its capability to increase the data rate and meet the enormous ongoing data traffic explosion. However, in non-reciprocal channels, such as those encountered in frequency division duplex (FDD) systems, channel state information (CSI) estimation using downlink (DL) training sequence is to date very challenging issue, especially when the channel exhibits a shorter coherence time. In particular, the availability of sufficiently accurate CSI at the base transceiver station (BTS) allows an efficient precoding design in the DL transmission to be achieved, and thus, reliable communication systems can be obtaine
... Show MoreThis paper describes a new proposed structure of the Proportional Integral Derivative (PID) controller based on modified Elman neural network for the DC-DC buck converter system which is used in battery operation of the portable devices. The Dolphin Echolocation Optimization (DEO) algorithm is considered as a perfect on-line tuning technique therefore, it was used for tuning and obtaining the parameters of the modified Elman neural-PID controller to avoid the local minimum problem during learning the proposed controller. Simulation results show that the best weight parameters of the proposed controller, which are taken from the DEO, lead to find the best action and unsaturated state that will stabilize the Buck converter system performan
... Show MoreTwisted tape insertion in smooth plain tube is one of types of passive methods that is used to enhance heat transfer. Swirl fluid flow inside tube and related heat transfer characteristics are very complex. ANSYS FLUENT (V 16.1) and ASPEN industrial program are used in analyzing this technique for enhancement heat transfer. A circular plain tube has length L=8534mm and 17 mm inner diameter with twisted tape has twist ratio of y = (H/D) = (150/17) =8.8 along with a plain tube were considered for this study. Eight Reynolds numbers (Re) of 784, 1000, 2000, 3000, 4000, 5000, 6000 and 7000 are used to analyze the response of thermal performance. Crude oil API 28 exit temperature, film heat transfer coefficient, Nusselt number
... Show MoreWe wanted to find out how selenium (Se) affects broiler chicken performance, meat physicochemical properties, and selenium deposition in the tissues of broilers. Each of the 96 experimental pens had 30 chickens and included a total of 2,880 one-day-old broilers (Cobb 500 strain). A factorial design of four-by-three (SY + SS) and eight replicates (SY + SS) was used for the 12 experimental treatments, with selenium levels ranging from 0.15 to 0.60 ppm and organic (SY) or inorganic (SS) sources of selenium and their relationship (SY + SS). There were no differences in performance (P > 0.05) across Se levels or sources. 106 g/day of ADFI, 63 g/day of ADG, and 1.6844 kg/kg of FCR were found to be the averaging values for these three parameters:
... Show More