Preferred Language
Articles
/
MheAFJIBVTCNdQwCkZ41
The role of governance mechanisms in trust-building strategies: A comparative analytical study in public and private banks
...Show More Authors

The study aims to build a model that enhances trust-building for public and private banks to compare and determine the significant differences between public and private banks, by testing the impact of governance mechanisms (transparency, accountability, justice, independence, and social responsibility) (Agere, 2000) on trust-building strategies (trust and trust building, people management, work relations, training and development, leadership practices, and communications) (Ngalo, 2011; Stone et al., 2005), to indicate the level of employees’ awareness of the theoretical contents of the two variables and their importance to banking work, with the aim of improving performance. The main question is the role of governance mechanisms in supporting trust-building strategies. The questionnaire was distributed to two stratified random samples, the first in public banks consisting of 62 individuals and the second in private banks consisting of 61 individuals. It followed the descriptive analytical comparative approach. One of the most important results is that there are significant differences between the two samples, and the weight is weighted in favor of public banks in relation to trust-building strategies with customers. Despite the use of outdated working methods, the conclusions pointed to the tangible role of governance mechanisms in supporting trust-building strategies.

Scopus Crossref
View Publication
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Engineering
Deep Learning-Based Segmentation and Classification Techniques for Brain Tumor MRI: A Review
...Show More Authors

Early detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med

... Show More
View Publication Preview PDF
Crossref (12)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (34)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jun 23 2015
Journal Name
Nature Communications
A metabolic stress-inducible miR-34a-HNF4α pathway regulates lipid and lipoprotein metabolism
...Show More Authors

View Publication
Scopus (242)
Crossref (241)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Proceedings Of The 1st International Conference On Frontier Of Digital Technology Towards A Sustainable Society
The most ABO blood group susceptibility to COVID-19 infections in Baghdad city
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Jan 01 2025
Journal Name
World Neurosurgery
The Ventriculoperitoneal Shunt Complication Rate in Baghdad Medical City from 2019 to 2022
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Engineering
Investigate IPD Factors' Effect on Value Engineering for the Communication Sector in Iraq
...Show More Authors

Integrated project delivery is collaboratively applying the skills and knowledge of all participants to optimize the project's results, increase owner value, decrease waste, and maximize efficiency during the design, fabrication, and construction processes. This study aims to determine IPD criteria positively impacting value engineering. To do this, the study has considered 9 main criteria according to PMP classification that already covers all project phases and 183 sub-criteria obtained from theoretical study and expert interviews (fieldwork). In this study, the SPSS (V26) program was used to analyze the main criteria and sub-criteria priorities from top to bottom according to their values of the Relative Importance In

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jan 18 2024
Journal Name
Journal Port Science Research
Verifying The Association Between IL6 -174G/C Polymorphism in Type 2 Diabetes Mellitus
...Show More Authors

Background : Diabetes mellitus, also known as blood sugar, is a series of metabolic disorders described by high blood glucose levels (hyperglycemia), low blood glucose (hypoglycemia), or both, resulting from defects in insulin production, insulin action, or both. Numerous studies have shown that interleukin (IL-6) acts on skeletal muscle cells , liver cells, and pancreas cells to influence glucose balance and metabolism, which directly or indirectly contributes to the development of diabetes. Research in this area is crucial because diabetes is recognized as a major risk factor for many diseases like Diabetic retinopathy, Diabetic nephropathy, Diabetic Neuropathy , heart disease and others.  Patients and methods : In this study, we

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 30 2025
Journal Name
Journal Of Al-farabi For Humanity Sciences
The Challenges Faced by Iraqi EFL Secondary School Teachers in Teaching English Language
...Show More Authors

This paper aimed at specifying the leading obstacles which faced by Iraqi EFL secondary school teachers in teaching English language. According to studies and observations, lack of adequate materials, overcrowding classrooms, lack of infrastructures, and low job satisfaction are the main barriers to English language teaching in Iraq. Data were collected from 130 EFL teachers from Iraqi schools through a standard questionnaire. The data were analyzed using a descriptive statistic to summarize and present it in a meaningful way. The findings supported previous studies regarding the classroom overcrowding, lack of teaching aids and materials, and dilapidated facilities. Furthermore, regarding job dissatisfaction and salary, interesting and eye

... Show More
Preview PDF