Preferred Language
Articles
/
jcofarts-1048
Evaluation of user interface designs in official websites "Fine Art Colleges Model"
...Show More Authors

I found that it does not meet some of the requirements, including browsing and organizing structural elements, which is something in which the researcher found a scope for research, and from here she can formulate the problem of her research with the following question: Is there an actual need to develop user interface designs in the websites of Iraqi colleges of fine arts? The research included four chapters (the first chapter - the research problem - the second chapter (theoretical framework), which included three sections, the first is to identify the user interface, the second topic is the structural elements, and the third topic includes the rules of interface design and the dimensions of interaction), as well as the third chapter includes the analysis of models and the separation The fourth contains the results and conclusions.
1. The reliability and ease of searching within destination spaces should be emphasized.
2. Providing freedom of opinion in opinion via social media links.
3. Freedom to use in terms of language selection and settings control icon.
4. Take into account the organization and distribution in the interface spaces and use the space distribution correctly

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 21 2022
Journal Name
Journal Of Planner And Development
The role of municipal councils in achieving and localizing sustainable development in the local community (The municipality of Al-Shafa area in Ajloun governorate in Jordan as a model)
...Show More Authors

Ajloun Governorate is considered the smallest governorate in Jordan in terms of area, and its population density rises to 472.2 people/ km2 and is distributed among five municipalities. The Al-Shafa municipality is one of these municipalities. Al-Shafa is rich in its natural and human resources, and the first municipal council was established in it in 2001.

This study seeks to achieve the following general objective: inventory the natural and human resources that Al-Shafa enjoys, and highlight the role of Al-Shafa municipality in achieving and settling sustainable development for the local community. Certain content, which are: the comprehensive approach to geographical reality, the descriptive

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 18 2018
Journal Name
Proceedings Of The Future Technologies Conference (ftc) 2018
Using Mouse Dynamics for Continuous User Authentication
...Show More Authors

View Publication
Scopus (10)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (7)
Scopus
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
User-Oriented Preference Toward a Recommender System
...Show More Authors

            Nowadays, it is convenient for us to use a search engine to get our needed information. But sometimes it will misunderstand the information because of the different media reports. The Recommender System (RS) is popular to use for every business since it can provide information for users that will attract more revenues for companies. But also, sometimes the system will recommend unneeded information for users. Because of this, this paper provided an architecture of a recommender system that could base on user-oriented preference. This system is called UOP-RS. To make the UOP-RS significantly, this paper focused on movie theatre information and collect the movie database from the IMDb website that provides informatio

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of internal control system over according misleading accounting information
...Show More Authors

Abstract

The economic and financial crises in the world economy series led to increased awareness of the importance of the internal control system, because it is one of the main pillars of any economic unit, as it works to verify the application of policies, regulations and laws and verification of asset protection from theft and embezzlement procedures, it is also working on trust accounting information imparted through the validation of accounting information, analyze and detect the misleading.

The existence the internal control system a factor in many of the accounting practices that limit the ability of the administration to produce misleading financial reporting

The

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
Irony in conceptual art (An analytical study )
...Show More Authors

In the 20th century, the concept of "sarcasm" has relatively prevailed, and in this sense, it is a method in the art of conversation that wants to keep the question about the intended meaning, that is, "saying something and suggesting its opposite."
There are other concepts that indicate that sarcasm is saying something in a way that provokes the recipient of the statement an infinite number of different interpretations, with multiple readers of different interpretations. While the philosophy of irony stands by the standards of things, exaggeration or minimization, this manipulation takes place within the enjoyment. However, it's a method to present sharp criticism in an atmosphere of criticism that differs from generation to gener

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
Transformer Technician in Pop Art (Study in techniques of show)
...Show More Authors

The popular art movement emerged in the mid-fifties in Britain in parallel with its appearance in America.. It was linked to contemporary social reality and what distinguishes this art is the most sophisticated and less aesthetic means and the most blatant in the field of media, ie back to the image used in the media, journalism, magazines, television and photo Which reflect the reality of the neutral artist. This research included the methodological framework represented by the research problem that emerged from pop art as a new experimental vision that emerged in the twentieth century and the importance of the research and its objectives and limits and the definition of terms. The theoretical framework dealt with evolution Technology,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Government slogans and the reflection of visual identity in their designs
...Show More Authors

There is no doubt that development is a human necessity and an urgent technical imperative that science imposes on all aspects of societal life. Especially in the field of graphic design, as logos are among the most prominent graphic achievements of an interactive nature with the requirements of the technical and functional era to serve the recipient and the continuity of interaction with him through a visual message sent to him constantly to remind him of what he interacted with in advance, which is known as visual identity, and during the process of developing logos especially And by providing designs that suit the contemporary technical and functional development, we often see the logo lose its visual identity. Therefore, the research

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 18 2023
Journal Name
Al–bahith Al–a'alami
The uses of social networking applications and websites in promoting the gulf stock markets
...Show More Authors

The study aims to identify the uses and the impact of social networking applications and websites on stock markets and their role in defining the details of dealing with stock movement and trading. The study also aims to highlight the role of these networks by increasing confidence in stock markets and companies as well as encouraging and inciting young people to invest in these markets, the study belongs to the descriptive analytical approach, the study population consisted of all current and potential investors in the stock and financial markets in the United Arab Emirates. The study used a questionnaire that was distributed to a number of followers of social networking pages and websites that deal with trading

... Show More
View Publication Preview PDF
Crossref