Preferred Language
Articles
/
bsj-3564
Teen-Computer Interaction: Building a Conceptual Model with Thoughts- Emotion-Behaviour
...Show More Authors

Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenCI. Informal and in-person interview were conducted with two experts and a series of focus group discussion with 30 teens have also been conducted to gain their valuable insights. Interestingly, the findings suggest and lead us to considering the theory of psychosocial development towards a holistic model of TeenCI that considers not only emotion but three identifying keys – thoughts-emotion-behaviour. We justify that there is a strong connection between cognition and emotion that influences teen’s behaviour, which would be an important input to be included in TeenCI-related design and development.

Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 18 2020
Journal Name
Rimak International Journal Of Humanities And Social Sciences
STRESS IN ENGLISH AND ARABIC: A CONTRASTIVE STUDY
...Show More Authors

DBN Rashid, Rimak International Journal of Humanities and Social Sciences, 2020

View Publication
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering
Financing Cost Optimization in Construction Sector: A Review
...Show More Authors

The main aim of this research is to introduce financing cost optimization and different financing alternatives. There are many studies about financing cost optimization. All previous studies considering the cost of financing have many shortcomings, some considered only one source of financing as a credit line without taking into account different financing alternatives. Having only one funding alternative powers, restricts contractors and leads to a very specific financing model. Although it is beneficial for the contractor to use a long-term loan to minimize interest charges and prevent a substantial withdrawal from his credit line, none of the existing financial-based planning models have considered long-term loans in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Italian Journal Of Pure And Applied Mathematics
The non-zero divisor graph of a ring
...Show More Authors

Scopus (7)
Scopus
Publication Date
Sun Feb 24 2019
Journal Name
Iraqi Journal Of Physics
Design and evalution of a solar PV system
...Show More Authors

PV connected systems are worldwide installed because it allows consumer to reduce energy consumption from the electricity grid. This paper presents the results obtained from monitoring a 1.1 kWp. The system was monitored for nine months and all the electricity generated was fed to the fifth floor for physics and renewable energy building   220 V, 50 Hz. Monthly, and daily performance parameters of the PV system are evaluated which include: average generated of system Ah per day, average system efficiency, solar irradiation around these months. The average generated kWh per day was 8 kWh/day, the average solar irradiation per day was 5.6 kWh/m2/day, the average inverter efficiency was 95%, the average modules efficien

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 18 2004
Journal Name
Iraqi Journal Of Laser
Quantum Cryptography and a Quantum Key Distribution Protocol
...Show More Authors

In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.

View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Language Academy
A LINGUISTIC INVESTIGATION OF CONTEXTUALIZATION IN RELIGIOUS DISCOURSE
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Application of Finite Element Technique: A Review Study
...Show More Authors

The finite element approach is used to solve a variety of difficulties, including well bore stability, fluid flow production and injection wells, mechanical issues and others. Geomechanics is a term that includes a number of important aspects in the petroleum industry, such as studying the changes that can be occur in oil reservoirs and geological structures, and providing a picture of oil well stability during drilling. The current review study concerned about the advancements in the application of the finite element method (FEM) in the geomechanical field over a course of century.

Firstly, the study presented the early advancements of this method by development the structural framework of stress, make numerical computer solution

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Dec 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Modeling and Simulation of a Fire Tube Boiler
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Jul 01 1990
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
A New Species of Systole Walker (Hymenoptera, Eurytomidae)
...Show More Authors

Systole merazvensis sp. n. from Iraq, is described, figuri4 and differentiated from ,other species of the genus Systok.

View Publication Preview PDF
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF