Journal of Theoretical and Applied Information Technology is a peer-reviewed electronic research papers & review papers journal with aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of IT (Informaiton Technology
Abstract: The aim of the current research is to find out the extent to which systems thinking skills are included in the mathematics textbook scheduled for the third intermediate grade for the academic year (2020-2021) by answering the main research question: What are the systems thinking skills included in the mathematics textbook for middle third grade? The analytical descriptive approach was used, and to achieve the goal of the research, a list of the main systemic thinking skills and sub-skills was prepared, and after analyzing the content of the mathematics textbook, the reliability of the analysis was verified through the analysis over time and through others, and it obtained a reliability rate of 98% us
... Show MoreThe current study aims to test the impact of green training and development on sustainable performance and explore its effects within and outside the Iraqi Ministry of Environment. The main research problem revolves around the question of the extent of implementing green training and development and sustainable performance in the ministry (What is the nature of the relationship between green training and development and sustainable performance in the ministry?). To clarify the relationship between the research variables, two main hypotheses were formulated along with sub-hypotheses. The study also aims to assess the level of the ministry's interest in the research variables and provide key recommendations to enhance sustainable performan
... Show MoreThe Arabic grammatical theory is characterized by the characteristics that distinguish it from other languages. It is based on the following equation: In its entirety a homogeneous linguistic system that blends with the social nature of the Arab, his beliefs, and his culture.
This means that this theory was born naturally, after the labor of maintaining an integrated inheritance, starting with its legal text (the Koran), and ends with its features of multiple attributes.
Saber was carrying the founding crucible of that theory, which takes over from his teacher, Hebron, to be built on what it has reached. It is redundant to point to his location and the status of his book.
So came to my research tagged: (c
Records of two regionalized variables were processed for each of porosity and permeability of reservoir rocks in Zubair Formation (Zb-109) south Iraq as an indication of the most important reservoir property which is the homogeneity , considering their important results in criterion most needed for primary and enhanced oil reservoir .Z and F tests that were calculated for the two above mentioned properties of pair units of Zubair Formation have shown the difference in depositional energy and different diagenesis between units IL and AB , DJ and AB , and the similarity in grains size , sorting degree , depositional environment and pressure gradients between IL and AB units , LS and IL units ; also the difference in the properties above betw
... Show MoreReceipt date:2/17/2021 acceptance date:3/16/2021 Publishing date:12/31/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
Objective: This paper investigates the contradictions in the decision-making process of the United States, which historically proven to be successful policies in the short term, but in the long term proven to be wanting and failure. Methodology: The paper uses descriptive, historical, comparative method. A
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreEconomic analysis plays a pivotal role in managerial decision-making processes. This analysis is predicated on deeply understanding economic forces and market factors influencing corporate strategies and decisions. This paper delves into the role of economic data analysis in managing small and medium-sized enterprises (SMEs) to make strategic decisions and enhance performance. The study underscores the significance of this approach and its impact on corporate outcomes. The research analyzes annual reports from three companies: Al-Mahfaza for Mobile and Internet Financial Payment and Settlement Services Company Limited, Al-Arab for Electronic Payment Company, and Iraq Electronic Gateway for Financial Services Company. The paper concl
... Show More