Journal of Theoretical and Applied Information Technology is a peer-reviewed electronic research papers & review papers journal with aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of IT (Informaiton Technology
The effect of short range correlations on the inelastic Coulomb form factors for excited +2 states (1.982, 3.919, 5.250 and 8.210MeV) and +4 states (3.553, 7.114, 8.960 and 10.310 MeV) in O18 is analyzed. This effect (which depends on the correlation parameterβ) is inserted into the ground state charge density distribution through the Jastrow type correlation function. The single particle harmonic oscillator wave function is used with an oscillator size parameter .b The parameters β and b are adjusted for each excited state separately so as to reproduce the experimental root mean square charge radius of .18O The nucleusO18 is considered as an inert core of C12 with two protons and four neutrons distributed over 212521211sdp−− activ
... Show MoreSummary The aim of this study is the evaluation the resistance of S. marcescence obtained from soil and water to metals chlorides (Zn+2, Hg+2, Fe+2, Al+3, and Pb+2). Four isolates, identified as Serratia marcescence and S. marcescena (S4) were selected for this study according to their resistance to five heavy metals. The ability of S. marcescena (S4) to grow in different concentrations of metals chloride (200-1200 µg/ml) was tested, the highest concentration that S. marcescence (S4) tolerate was 1000 µg/ml for Zn+2, Hg+2, Fe+2, AL+3, pb+2 and 300 µg/ml for Hg+2 through 24 hrs incubation at 37 Co. The effects of temperature and pH on bacteria growth during 72 hrs were also studied. S. marcescence (S4) was affected by ZnCl2, PbCl2, FeC12
... Show MoreAbstract
The economic and financial crises in the world economy series led to increased awareness of the importance of the internal control system, because it is one of the main pillars of any economic unit, as it works to verify the application of policies, regulations and laws and verification of asset protection from theft and embezzlement procedures, it is also working on trust accounting information imparted through the validation of accounting information, analyze and detect the misleading.
The existence the internal control system a factor in many of the accounting practices that limit the ability of the administration to produce misleading financial reporting
The
... Show MoreObjective: To determine the effectiveness of a dietary educational program upon the hypertensive client’s
information.
Methodology: The sample of the study consists of (60) hypertensive clients who attended Al Anbar Health Office –Al
Andalus Health Center during the period of the study from the14th of March 2010 to the 30th of September 2010. The
sample is divided into two groups; study group (30) hypertensive clients who received dietary educational program
and control group (30) hypertensive clients who received a routine care from the center. Three major instruments
were used; these instruments included (1) knowledge test which was applied on both groups pretest and eight weeks
post-test (2) questions to know
With the development of cloud computing during the latest years, data center networks have become a great topic in both industrial and academic societies. Nevertheless, traditional methods based on manual and hardware devices are burdensome, expensive, and cannot completely utilize the ability of physical network infrastructure. Thus, Software-Defined Networking (SDN) has been hyped as one of the best encouraging solutions for future Internet performance. SDN notable by two features; the separation of control plane from the data plane, and providing the network development by programmable capabilities instead of hardware solutions. Current paper introduces an SDN-based optimized Resch
The subject of the information technology system ( ITS ) of the important issues And contemporary thought in management, and various types of organizations seeking to apply and try to
... Show MoreThe Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreThis study sought to investigate the impacts of big data, artificial intelligence (AI), and business intelligence (BI) on Firms' e-learning and business performance at Jordanian telecommunications industry. After the samples were checked, a total of 269 were collected. All of the information gathered throughout the investigation was analyzed using the PLS software. The results show a network of interconnections can improve both e-learning and corporate effectiveness. This research concluded that the integration of big data, AI, and BI has a positive impact on e-learning infrastructure development and organizational efficiency. The findings indicate that big data has a positive and direct impact on business performance, including Big
... Show More