Human-computer interaction (HCI) is a field that has spurred a lot of study and research related to interface evaluation. According to experts in the field, it is an essential tool for spreading the notion that a computer's user interaction should resemble interpersonal interactions and free-form conversations. HCI researchers initially concentrated on enhancing the usability of various computer interfaces. This study conducted knowledge-based information preparation and evaluated the implementation of an online academic management system at the University of Baghdad using the effectiveness, time-based efficiency, and satisfaction rates after task questionnaire procedure. Twenty-four users participated in the usability testing to observe the system's performance. The findings show strong usability abilities, with a participation error rate of 33.3% and an effectiveness rate of 71.43%. Additionally, some recommendations are demonstrated for improving the human-computer interface metrics of our university system.
In this work the analysis of laser beam profile system ,using a two dimensional CCD (Charge Coupled Device) arrays, is established. The system is capable of producing video graphics that give a two dimensional image of laser beam. The video graphics system creates color distribution that represent the intensity distribution of the laser beam or the energy profile of the beam. The software used is capable of analyzing and displaying the profile in four different methods that is , color code intensity contouring , intensity shareholding, intensity cross section along two dimension x-y, and three dimensional plot of the beam intensity given in the same display.
This research included recent skills of transformed ieadership ,its five aspect and they are(transformed,speech of boos,chorus co-0perative work,behavior adjustment of values,common view point,understanding,and apologizing)Thescale is being made for these five aspects and it done on sample of Baghdad university staff and the sample consist of(424)teacher of both genders.The study found out existence of transformedskills of leadership for girls . &
... Show MoreIn this study, the energy charging mechanism is mathematically modeled to determine the impact of design modifications on the thermofluidic behavior of a phase change material (PCM) filled in a triplex tube containment geometry. The surface area of the middle tube, where the PCM is placed, is supported by single or multi-internal frustum tubes in vertical triplex tubes to increase the performance of the heating and cooling of the system. In addition to the ordinary straight triplex tubes, three more scenarios are considered: (1) changing the middle tube to the frustum tube, (2) changing the inner tube to the frustum tube, and (3) changing both the internal and central tubes to the frustum tubes. The impact of adopting the tube desig
... Show MoreAbstract
Most of the industrial organization in the world became suffering from the problem of the pollution of the poisonous chemicals things, this urged to depend on the principle of the responsible production, because it has the positive role by dealing with these chemical things and to safe the health of the society, due to the main goal of this study is to restrict the role responsible production in accomplishing the system of the environmental management through an actual study in the northern gas company in Kirkuk province, the topic has acquired a big importance bacause there were a limited number of studies and res
... Show MoreThe research problem can be summarized through focusing on the environment that surrounds students and class congestion, how these factors affect directly or indirectly the academic achievement of students, how these factors affect understanding the scientific material that the student receives in this physical environment, how classroom’s components such as seats, space With which the student can move, the number of students in the same class, the lighting, whether natural or artificial, and is this lighting sufficient or not enough, the nature of the wall paint old or modern, is it comfortable for sight, the blackboard if it is Good or exhausted, In addition to air-conditioning sets in summer and winter, this is on the on
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
Objective(s): Assess the effectiveness of osteoporosis prevention instruction program on nursing college students’
knowledge at Baghdad University.
Methodology: A quasi-experimental design was used to assess the effectiveness of osteoporosis prevention
instruction program on nursing college students at University of Baghdad from April 2011 to September 2011. A
random sample consisted of (40) females students from first year of Nursing College \ Baghdad University. The data
was collected by using constructed questionnaire, which consists of three parts. Part one: consists of demographic
information and health characteristics .Part two: consists of students’ daily life behaviors which include, dietary
behaviors, an
The aim of this research is to find the impact of the efficiency of Management information systems (MIS) on the effectiveness of governmental organizations performance.
To achieve the objective of the research, the analytical descriptive method was adopted. A questionnaire was designed consisting of (35) paragraphs, and the sample consisted of (200) individual. The research attemped to answer the following question: To achieve the objective of the research, the analytical descriptive method was adopted. A questionnaire was designed consisting of (35) paragraphs, and the sample consisted of (200) individual. The research tried to answer the following question: What is the actual utilization of modern admi
... Show MoreSensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps
... Show MoreFuture wireless communication systems must be able to accommodate a large number of users and simultaneously to provide the high data rates at the required quality of service. In this paper a method is proposed to perform the N-Discrete Hartley Transform (N-DHT) mapper, which are equivalent to 4-Quadrature Amplitude Modulation (QAM), 16-QAM, 64-QAM, 256-QAM, … etc. in spectral efficiency. The N-DHT mapper is chosen in the Multi Carrier Code Division Multiple Access (MC-CDMA) structure to serve as a data mapper instead of the conventional data mapping techniques like QPSK and QAM schemes. The proposed system is simulated using MATLAB and compared with conventional MC-CDMA for Additive White Gaussian Noise, flat, and multi-path selective fa
... Show More