Research in consumer science has proven that grocery shopping is a complex and distressing process. Further, the task of generating the grocery lists for the grocery shopping is always undervalued as the effort and time took to create and manage the grocery lists are unseen and unrecognized. Even though grocery lists represent consumers’ purchase intention, research pertaining the grocery lists does not get much attention from researchers; therefore, limited studies about the topic are found in the literature. Hence, this study aims at bridging the gap by designing and developing a mobile app (application) for creating and managing grocery lists using modern smartphones. Smartphones are pervasive and become a necessity for everyone today. Hence, a smartphone app that can facilitate the process of creating and managing grocery lists for busy and working people is beneficial. The design and development of the app followed the rapid application development methodology. First, the functional requirements were gathered through interviews and content analysis. Then, a prototype named SMART LIST has been developed based on the gathered requirements, and a field study was carried out to evaluate the usability of the prototype. The results of the evaluation suggested that SMART LIST is useful and easy to use. The respondents also satisfied with the functions for managing grocery lists offered by SMART LIST. The study contributes towards an understanding the system requirements and user interface of a mobile app for managing grocery list. It can be a reference model for developers and researchers in the area to develop similar apps or enhancing the capabilities in creating and managing grocery lists.
The Iraqi outfit is characterized by special features and identity that are closely related to the traditions, customs, religious and social beliefs and other references of the Iraqi environment and its factors affecting the individual and society. Every place in Iraq has its own uniform, which differs in terms of its artistic, aesthetic and functional components from place to place.
The abaya, especially worn by women, is especially distinct in terms of the design of the uniform, the nature of the cloth made of it, as well as the color of the abaya, which is dominated by black in most designs. The Dar Al-Taros Center and Textile Research initiated the construction of theoretical and practical bases in the design of contemporary
... Show MoreThis research is marked by " lighting and processors formalism for spaces of shops selling mobile phones ," aims to " reveal about the relationship between lighting treatments formal designs spaces own internal selling mobile phone in addition to the recognition criteria Altsamama to lighting techniques and processes formality spaces shops competent to sell mobile phone " and lies the importance of this research in the " active role of the lighting in the building processors formalities and processes to prepare designs and show the final form integrated functionally and aesthetically so as to be ready for implementation , taking into consideration the role expressionist in the recipient and to make these spaces more than meet the require
... Show MoreIn this research the performance of 5G mobile system is evaluated through the Ergodic capacity metric. Today, in any wireless communication system, many parameters have a significant role on system performance. Three main parameters are of concern here; the source power, number of antennas, and transmitter-receiver distance. User equipment’s (UEs) with equal and non-equal powers are used to evaluate the system performance in addition to using different antenna techniques to demonstrate the differences between SISO, MIMO, and massive MIMO. Using two mobile stations (MS) with different distances from the base station (BS), resulted in showing how using massive MIMO system will improve the performance than the standar
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreFiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show MoreThe study analyzed the current situation of public hospitals in the capital of Baghdad exclusively and diagnosed the resources available; especially after the high demand for these hospitals as a result of the citizen’s need to review the hospital to take care of them, especially after the Corona pandemic. Eight major hospitals in Baghdad were selected to determine the current reality of providing fire safety tools or equipment and what are the preventive measures needed to reduce it. The results after practical study showed many defects and weaknesses in the current situation due to their reliance on the traditional management to manage and provide all preventive measures and safet
The main aim of conducting this research is to identify the applications of Smart libraries in the Arab world. The Researcher relied on the documentary and Survey approach to collect information and data through the Internet, and to get to know these libraries. Then the Research came in three sections dealing with the first topic: The general framework of the study. The second topic deals with: introducing Smart libraries and indicating their types and characteristics. The Third topic dealt with the requirements of Smart libraries'application by identifying the basic components of it (Smart building, Smart Librarian , Smart devices, systems and software, Smart information sources,and Smart beneficiaries), and dealt with Smart libraries appl
... Show MoreA new proposed technique for secure agent communication is used to transfer data and instructions between agent and server in the local wireless network. The proposed technique depends on the two stages of encryption processing (AES algorithm and proposed Lagrange encryption key generation supported by XOR gate) for packets encryption. The AES key was manipulated by using proposed Lagrange interpolation key generated in order to avoid the weak encryption keys. A good multi encryption operation with a fast encryption time was proposed with a high quality connection operation.
The Khor Mor gas-condensate processing plant in Iraq is currently facing operational challenges due to foaming issues in the sweetening tower caused by high-soluble hydrocarbon liquids entering the tower. The root cause of the problem could be liquid carry-over as the separation vessels within the plant fail to remove liquid droplets from the gas phase. This study employs Aspen HYSYS v.11 software to investigate the performance of the industrial three-phase horizontal separator, Bravo #2, located upstream of the Khor Mor sweetening tower, under both current and future operational conditions. The simulation results, regarding the size distribution of liquid droplets in the gas product and the efficiency gas/liquid separation, r
... Show More