Human-computer interaction (HCI) is a field that has spurred a lot of study and research related to interface evaluation. According to experts in the field, it is an essential tool for spreading the notion that a computer's user interaction should resemble interpersonal interactions and free-form conversations. HCI researchers initially concentrated on enhancing the usability of various computer interfaces. This study conducted knowledge-based information preparation and evaluated the implementation of an online academic management system at the University of Baghdad using the effectiveness, time-based efficiency, and satisfaction rates after task questionnaire procedure. Twenty-four users participated in the usability testing to observe the system's performance. The findings show strong usability abilities, with a participation error rate of 33.3% and an effectiveness rate of 71.43%. Additionally, some recommendations are demonstrated for improving the human-computer interface metrics of our university system.
The restriction concept is a basic feature in the field of measure theory and has many important properties. This article introduces the notion of restriction of a non-empty class of subset of the power set on a nonempty subset of a universal set. Characterization and examples of the proposed concept are given, and several properties of restriction are investigated. Furthermore, the relation between the P*–field and the restriction of the P*–field is studied, explaining that the restriction of the P*–field is a P*–field too. In addition, it has been shown that the restriction of the P*–field is not necessarily contained in the P*–field, and the converse is true. We provide a necessary condition for the P*–field to obtain th
... Show Morehe dairy industry is one of the industrial activities classified within the food industries in all phases of the dairy industry, which leads to an increase in the amount of wastewater discharged from this industry. The study was conducted in the Abu Ghraib dairy factory, classified as one of the central factories in Iraq, located in the west of Baghdad governorate, with a design capacity of 22,815 tons of dairy products. The characteristics of the liquid waste generated from the factory were determined for the following parameters biological oxygen demand (BOD5), Chemical oxygen demand (COD), total suspended solids (TSS), pH, nitrate, phosphate, chloride, and sulfate with an average value of (1079, 1945, 323, 9.2, 24, 2
... Show MoreBackground: We aimed to investigate the accuracy of salivary matrix metalloproteinases (MMP)-8 and -9, and tissue inhibitor of metalloproteinase (TIMP)-1 in diagnosing periodontitis and in distinguishing periodontitis stages (S)1 to S3. Methods: This study was a case–control study that included patients with periodontitis S1 to S3 and subjects with healthy periodontia (controls). Saliva was collected, and then, clinical parameters were recorded, including plaque index, bleeding on probing, probing pocket depth, and clinical attachment level. Diagnosis was confirmed by assessing the alveolar bone level using radiography. Salivary biomarkers were assayed using an enzyme-linked immunosorbent assay. Results: A total of 45 patients (15
... Show MoreToday many people suffering from health problems like dysfunction in lungs and cardiac. These problems often require surveillance and follow up to save a patient's health, besides control diseases before progression. For that, this work has been proposed to design and developed a remote patient surveillance system, which deals with 4 medical signs (temperature, SPO2, heart rate, and Electrocardiogram ECG. An adaptive filter has been used to remove any noise from the signal, also, a simple and fast search algorithm has been designed to find the features of ECG signal such as Q,R,S, and T waves. The system performs analysis for medical signs that are used to detected abnormal values. Besides, it sends data to the Base-Stati
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreThis paper is concerned with introducing and studying the o-space by using out degree system (resp. i-space by using in degree system) which are the core concept in this paper. In addition, the m-lower approximations, the m-upper approximations and ospace and i-space. Furthermore, we introduce near supraopen (near supraclosed) d. g.'s. Finally, the supra-lower approximation, supraupper approximation, supra-accuracy are defined and some of its properties are investigated.