Human-computer interaction (HCI) is a field that has spurred a lot of study and research related to interface evaluation. According to experts in the field, it is an essential tool for spreading the notion that a computer's user interaction should resemble interpersonal interactions and free-form conversations. HCI researchers initially concentrated on enhancing the usability of various computer interfaces. This study conducted knowledge-based information preparation and evaluated the implementation of an online academic management system at the University of Baghdad using the effectiveness, time-based efficiency, and satisfaction rates after task questionnaire procedure. Twenty-four users participated in the usability testing to observe the system's performance. The findings show strong usability abilities, with a participation error rate of 33.3% and an effectiveness rate of 71.43%. Additionally, some recommendations are demonstrated for improving the human-computer interface metrics of our university system.
The paper aims to propose Teaching Learning based Optimization (TLBO) algorithm to solve 3-D packing problem in containers. The objective which can be presented in a mathematical model is optimizing the space usage in a container. Besides the interaction effect between students and teacher, this algorithm also observes the learning process between students in the classroom which does not need any control parameters. Thus, TLBO provides the teachers phase and students phase as its main updating process to find the best solution. More precisely, to validate the algorithm effectiveness, it was implemented in three sample cases. There was small data which had 5 size-types of items with 12 units, medium data which had 10 size-types of items w
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreAn image retrieval system is a computer system for browsing, looking and recovering pictures from a huge database of advanced pictures. The objective of Content-Based Image Retrieval (CBIR) methods is essentially to extract, from large (image) databases, a specified number of images similar in visual and semantic content to a so-called query image. The researchers were developing a new mechanism to retrieval systems which is mainly based on two procedures. The first procedure relies on extract the statistical feature of both original, traditional image by using the histogram and statistical characteristics (mean, standard deviation). The second procedure relies on the T-
... Show MoreNew Schiff base [3-(3-acetylthioureido)pyrazine-2-carboxylic acid][L] has been prepared through 2 stages, the chloro acetyl chloride has been reacting with the ammonium thiocyanate in the initial phase for producing precursor [A], after that [A] has been reacting with the 3-amino pyrazine-2-carboxilic acid to provide a novel bidentate ligand [L], such ligand [L] has been reacting with certain metal ions in the Mn(II), VO(II), Ni(II), Co(II), Zn(II), Cu(II), Hg(II), and Cd(II) for providing series of new metal complexes regarding general molecular formula [M(L)2XY], in which; VO(II); X=SO4,Y=0, Co(II), Mn(II), Cu(II), Ni(II), Cd(II), Zn(II), and Hg(II); Y=Cl, X=Cl. Also, all the compounds were characterized through spectroscopic techniques [
... Show MoreThe problem of rebellion is considered one of the features of rapid changes that a society undergoes in all spheres and directions of life, especially in the realm of social relations, customs, traditions, values, and principles. Rebellion may manifest itself in rebellion against oneself, against values or traditions, or against social or governmental authority. One may find that submission plays a vital role in all of these interactions. This study deals with the problem of rebellion in the works of two renowned authors: The French Gustave Flaubert and the Israeli Amos Oz, through two main characters who share similar qualities and traits. Emma Bovary and Henna Konin demonstrate this through their rebellion against themselves, their relati
... Show MoreInnovative various Schiff bases and their Co(II), Ni(II) and Cu(II) and Hg(II) compounds made by the condensation of 4-amino antipyrine with derived aminobenzoic acid (2-aminobenzoic acid, 3-aminobenzoic acid, and 4-aminobenzoic acid ) have been prepared by conventional approaches. These complexes were described by magnetic sensibility analysis, FT-IR spectra, and molar-conductance and elemental analysis. Analytical values appeared which the mixed-ligand complexes presented ratio about 2:1 (ligand: metal) with the chelation 4 or 6. The prepared compounds offered a good effect on the organisms; bacteria Staphylococcus-aurous, Escherichia-coli and fungi C. albicans, A. niger. Also, the biological products signalize which the mixed compl
... Show MoreSchiff base (methyl 6-(2- (4-hydroxyphenyl) -2- (1-phenyl ethyl ideneamino) acetamido) -3, 3-dimethyl-7-oxo-4-thia-1-azabicyclo[3.2.0] heptane-2-carboxylate)Co(II), Ni(II), Cu (II), Zn (II), and Hg(II)] ions were employed to make certain complexes. Metal analysis M percent, elemental chemical analysis (C.H.N.S), and other standard physico-chemical methods were used. Magnetic susceptibility, conductometric measurements, FT-IR and UV-visible Spectra were used to identified. Theoretical treatment of the generated complexes in the gas phase was performed using the (hyperchem-8.07) program for molecular mechanics and semi-empirical computations. The (PM3) approach was used to determine the heat of formation (ΔH˚f), binding energy (ΔEb), an
... Show MoreQuantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rat
... Show More