Human-computer interaction (HCI) is a field that has spurred a lot of study and research related to interface evaluation. According to experts in the field, it is an essential tool for spreading the notion that a computer's user interaction should resemble interpersonal interactions and free-form conversations. HCI researchers initially concentrated on enhancing the usability of various computer interfaces. This study conducted knowledge-based information preparation and evaluated the implementation of an online academic management system at the University of Baghdad using the effectiveness, time-based efficiency, and satisfaction rates after task questionnaire procedure. Twenty-four users participated in the usability testing to observe the system's performance. The findings show strong usability abilities, with a participation error rate of 33.3% and an effectiveness rate of 71.43%. Additionally, some recommendations are demonstrated for improving the human-computer interface metrics of our university system.
Rheumatoid arthritis is a chronic inflammatory autoimmune disease its etiology is unknown . The classical autoimmune diseases, have adaptive immune genetic associations with autoantibodies and major histocompatibility complex(MHC) class II such as rheumatoid arthritis (RA), diabetes mellitus type two (DM II). Serum of99 males suffering from RA without DMII as group (G1), 45 males suffering from RA with DM II as group (G2) and 40 healthy males as group (G3) were enrolled in this study to estimation of alkaline phosphates (ALP),C-reactive protein(CRP) and Pentraxin-3(PTX). Results showed a highly significant increase in PTX3 levels in G1 and G2 compared to G3 and a significant decrease in G1comparing to G2. Results also revealed a si
... Show MoreDirect determination of trace metals Zn, Mn, Cu and Co were performed in serum
blood samples of two groups diabetic patient type 2 and non diabetes by ICP spectrometric
method. Results show the low levels of these elements Zn, Mn and Co while high level of Cu
detected compared with non diabetes according to these results good evidence can be made to
control these levels through a special diet containing these metals.
4-[(2-Amino-4-phenylazo)-methyl]-cyclo hexane carboxylic acid, a new Azo (LH2) ligand, was synthesized by reaction of the diazonium salt of trans-4-(amino-methyl) cyclo hexane carboxylic acid with 3-amino phenol. The azo ligand was characterized by micro elemental analysis (C.H.N.O.) and TGA as well as spectroscopic techniques (UV-Vis, FTIR, 1H-NMR, and LC-Mass). Atomic absorption, elemental analysis, infrared, LC-Mass, TGA, and UV-Vis spectral methods, as well as conductivity and magnetic susceptibility, were used to characterize the complexes of Ni (II), Pd (II), and Pt (IV). The following general formula has been given for the produced compounds based on the results obtained, which are as followi
... Show MoreThe Manganese doped zinc sulfide nanoparticles of the cubic zinc blende structure with the average crystallite size of about 3.56 nm were synthesized using a coprecipitation method using Thioglycolic Acid as an external capping agent for surface modification. The ZnS:Mn2+ nanoparticles of diameter 3.56 nm were manufactured through using inexpensive precursors in an efficient and eco-friendly way. X-Ray Diffraction (XRD), Scanning Electron Microscopy (SEM) and Fourier Transform Infrared (FTIR) spectroscopy are used to examine the structure, morphology and chemical composition of the nanoparticles. The antimicrobial activity of (ZnS:Mn2+) nanocrystals was investigated by measuring the diameter of inhibition zone using well diffusion mechanism
... Show MoreThis paper is concerned with introducing and studying the M-space by using the mixed degree systems which are the core concept in this paper. The necessary and sufficient condition for the equivalence of two reflexive M-spaces is super imposed. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are introduced. From an M-space, a unique supratopological space is introduced. Furthermore, the m-continuous (m-open and m-closed) functions are defined and the fundamental theorem of the m-continuity is provided. Finally, the m-homeomorphism is defined and some of its properties are investigated.
In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreNowadays, after the technological development in societies, cloud computing has become one of the most important technologies. It provides users with software, hardware, and platform as remote services over the Internet. The increasing number of cloud users has caused a critical problem in how the clients receive cloud services when the cloud is in a state of instability, as it cannot provide required services and, thus, a delay occurs. Therefore, an algorithm was proposed to provide high efficiency and stability to work, because all existing tasks must operate without delay. The proposed system is an enhancement shortest job first algorithm (ESJF) using a time slice, which works by taking a task in the shortest time first and then the l
... Show MoreAuthentication is the process of determining whether someone or something is,
in fact, who or what it is declared to be. As the dependence upon computers and
computer networks grows, the need for user authentication has increased. User’s
claimed identity can be verified by one of several methods. One of the most popular
of these methods is represented by (something user know), such as password or
Personal Identification Number (PIN). Biometrics is the science and technology of
authentication by identifying the living individual’s physiological or behavioral
attributes. Keystroke authentication is a new behavioral access control system to
identify legitimate users via their typing behavior. The objective of thi
Background: Immediate postpartum contraceptive and post abortion contraception methods are effective safe methods and are becoming a standard practice in many countries, yet it is not widely used in Iraq.
Aims: this study: is designed to assess the attitude and willingness of women to immediate contraception after giving birth or abortion and their satisfaction to previous use.
Methods and Material: Four hundred thirty-four women were surveyed in the labor word immediately after giving birth/ abortion. Their knowledge, attitude and contraception use were assessed according to the response they reported to a given questionnaire.
Results: women were not sure abo
... Show More