Journal of Theoretical and Applied Information Technology is a peer-reviewed electronic research papers & review papers journal with aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of IT (Informaiton Technology
The present research focuses on the study of the effect of mass transfer resistance on the rate of heat transfer in pool boiling. The nucleate pool boiling heat transfer coefficients for binary mixtures (ethanol-n-butanol, acetone-n-butanol, acetone-ethanol, hexane-benzene, hexane-heptane, and methanol-water) were measured at different concentrations of the more volatile components. The systems chosen covered a wide range of mixture behaviors.
The experimental set up for the present investigation includes electric heating element submerged in the test liquid mounted vertically. Thermocouple and a digital indictor measured the temperature of the heater surface. The actual heat transfer rate being obtained by multiplying the voltme
... Show MoreINTRODUCTION: A range of tools and technologies are at disposal for the purpose of defect detection. These include but are not limited to sensors, Statistical Process Control (SPC) software, Artificial Intelligence (AI) and machine learning (ML) algorithms, X-ray systems, ultrasound systems, and eddy current systems. OBJECTIVES: The determination of the suitable instrument or combination of instruments is contingent upon the precise production procedure and the category of flaw being identified. In certain cases, defects may necessitate real-time monitoring and analysis through the use of sensors and SPC software, whereas more comprehensive analysis may be required for other defects through the utilization of X-ray or ultrasound sy
... Show MoreThe research problem is that most of the construction projects exceed the planned value, due to the failure to implement the plans on time. The current study aims to monitor the implementation of the project and for each of the executed tasks of the table of quantities in order to detect deviations at the time they occur, evaluate the time and cost performance, and then identify the areas of waste and analyze the implementation of each task in order to diagnose the underlying problems and find possible and applicable solutions in the environment Iraqi. The research was applied in one of the companies specialized in the field of construction projects, and one of the most important conclusions reached is the possibility of applying
... Show Moreالمستخلص
يهدف البحث إلى وضع إطار معرفي ومفاهيمي شامل لموضوع البحث, واغناء القارئ والمستفيد بالمعلومات الوافية عنه وتقليص الفجوات المعرفية للمهتمين به وقياس مدى ما هو متوفر وغير متوفر من المتطلبات الأساسية والضرورية لإنشاء صناديق التحوط في البيئة العراقية, وتمثلت صناديق التحوط بالمتغير الرئيس للبحث اما المتغيرات الفرعية فشملت (المتطلبات المالية, المتطلبات البشرية, البيئة التشريعية, الب
... Show MoreThe aim of the study is to assess the risk factors which lead to myocardial infarction and relation to some variables. The filed study was carried out from the 1st of April to the end of Sept. 2005. The Sample of the study consisted of (100) patients in lbn-Albeetar and Baghdad Teaching Hospital. The result of the study indicated the following; 45% of patients with age group (41-50) were more exposed to the disease and there is no significant difference was seen in the level of education, Martial status, weight and height. The result shows that there are significant difference in risk factors like hypertension, cholesterol level in blood and diabetes. When analyzed by T.test at level of P < 0.01 and there are significant difference in smoki
... Show MoreSocial protection meets different aspects of the needs of vulnerable groups, such as the economic, health, education, and family relations and ties in the Iraqi society. This is because vulnerable groups have suffered from social and economic influences that have negative implications on the social reality as a whole. Poverty is a case in point, which paved the way to frequent setbacks that have led to social structure instability. Accordingly, the present study aims to examine the role and effect of the Net of Social Protection Program in equally distributing social protection to curb or mitigate any negative consequnces that might happen to the poor segments and vulnerable people, who are succeptible to shocks, such as: the orphans, un
... Show MoreThis study introduces a highly sensitive trapezium-shaped PCF based on an SPR refractometric sensor with unique design features. The structure of a sensor was designed and analyzed using COMSOL Multiphysics v5.6 based on Finite Element Method (FEM) with a focus on investigating the influence of various geometric parameters on its performance. The two channels were coated with a metallic gold layer to provide chemical stability, and a thin layer of TiO₂ improved the gold's adhesion to the fiber. The findings indicate that the proposed sensor achieves maximum amplitude and wavelength sensitivities of 1,779 RIU⁻¹ and 30,500 nm/RIU, respectively, with corresponding resolutions of 3.2
Live the present companies in a competitive business environment going on and try to achieve excellence in their industry through the marketing of their products and achieve greater market share as possible to ensure its continued existence, and perhaps the concept of time production, which confirms, in essence, on the need to reduce inventory to a minimum in the production process as well as the concept of the marketing information system which asserts, in essence, to document all the events that are related to the marketing of the product provided by the production process, together constitute the subject deserves research and investigation as they have raised well-known in the fields of production management and marketing management.
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreThis study investigates the requirements of total quality management (TQM) and the determinants affecting its application in Al-Zaman newspaper, one of Iraq’s leading private press institutions. The research employed a survey methodology, using a structured questionnaire administered to 30 participants representing journalistic, administrative, and technical staff. Five TQM dimensions, each measured through four indicators, were assessed to capture the perceptions of employees regarding the availability and effectiveness of quality practices. Data were analyzed using the Statistical Package for the Social Sciences (SPSS). The results revealed that while senior management at Al-Zaman demonstrates formal support for TQM, there is a
... Show More