Interface evaluation has been the subject of extensive study and research in human-computer interaction (HCI). It is a crucial tool for promoting the idea that user engagement with computers should resemble casual conversations and interactions between individuals, according to specialists in the field. Researchers in the HCI field initially focused on making various computer interfaces more usable, thus improving the user experience. This study's objectives were to evaluate and enhance the user interface of the University of Baghdad's implementation of an online academic management system using the effectiveness, time-based efficiency, and satisfaction rates that comply with the task questionnaire process. We made a variety of interfaces for the system's interface and selected the best ones based on the study's findings. This study will show how user-friendly our interface will be for those with little to no computer experience. 24 participants participated in the usability testing to evaluate the system's functionality. The results demonstrate excellent usability with a participation error rate of 33.3% and an efficacy rate of 71.43%. Furthermore, some suggestions are given for enhancing our university system's human-computer interaction metrics.
This study explains the effect of non-thermal (cold) plasma on wound of diabetic rats by (FE-DBD) system, 3cm probe diameter is used. The output power was ranged from (12-20) W. The effect of non-thermal plasma on wounds of a diabetic was observed with different exposure durations (20,30) sec., the plasma exposure duration decreases the sugar level in blood and the diameter of the wound. These results indicate the cold plasma can be used to enhance the insulin level (i.e., blood sugar) and wounds treatment.
The mediation system is based on settling the dispute amicably through the intervention of a third party by bringing views closer away from the judiciary, which is an amicable way to settle disputes, which disputants resort to voluntarily, but some Western legislation has begun to impose resorting to mediation to settle disputes compulsorily, to take advantage of its advantages, get rid of the disadvantages of resorting to the judiciary in some disputes, and relieve pressure on the courts.
The avoidance strategy of prey to predation and the predation strategy for predators are important topics in evolutionary biology. Both prey and predators adjust their behaviors in order to obtain the maximal benefits and to raise their biomass for each. Therefore, this paper is aimed at studying the impact of prey’s fear and group defense against predation on the dynamics of the food-web model. Consequently, in this paper, a mathematical model that describes a tritrophic Leslie-Gower food-web system is formulated. Sokol-Howell type of function response is adapted to describe the predation process due to the prey’s group defensive capability. The effects of fear due to the predation process are considered in the first two levels
... Show MoreKnowing the Messengers, peace and blessings be upon them, and explaining their obligatory, impossible, and permissible qualities is a legal necessity. It is a rooting of the faith, a means of understanding the Sharia, and a preventer from falling into the scourge of denial and bad manners against them. Therefore, sound belief in their presence is a major reason for the validity of the faith in the aspect of divinity and unseen hearing. Studying the status of prophethood is an urgent necessity in a time in which knowledge is scarce and attachment to the Messenger, may God Almighty’s prayers and peace be upon him, his family, and his companions, is weak, and suspicions and ideas hostile to the faith abound until we begin to hear - unfort
... Show MoreThe role of the ABC system in determining the costs of services in Iraqi banks
The aim of research is to identify the effect of using Waks strategy upon acquiring the psychological concepts and mind habits for students in the college of education. An experimental design with a partial adjustment of two experimental and control groups as well as a posttest were employed. The researcher divided the study sample into two groups: group one consisted of (38) students to represent the experimental group that was taught according to the waks strategy, and group two consisted of (35) students to represent the control group that was taught according to the traditional method. The sample was chosen based on some variables namely (Intelligence, Prior knowledge). The researcher has designed the research tools as th
... Show MoreThe present work aims to study the treatment of oily wastewater by means of forward osmosis membrane bioreactor process. Side stream (external) configuration and submerged (internal) configuration of osmotic membrane bioreactor were performed and investigated. The experimental work for each configuration was carried out continuously over 21 days. The flux behavior of forward osmosis membrane in an osmotic membrane bioreactor (OMBR) was investigated, using NaCl as the draw solution and CTA as FO membrane. The effect of mixed liquor suspended solids (MLSS) concentration and TDS accumulation of bioreactor on water flux and membrane fouling behaviors was detected. The accumulation and rejection of nutrients in the bioreactor (Nitrate, COD,
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreThe necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show More