The study aims to build a model that enhances trust-building for public and private banks to compare and determine the significant differences between public and private banks, by testing the impact of governance mechanisms (transparency, accountability, justice, independence, and social responsibility) (Agere, 2000) on trust-building strategies (trust and trust building, people management, work relations, training and development, leadership practices, and communications) (Ngalo, 2011; Stone et al., 2005), to indicate the level of employees’ awareness of the theoretical contents of the two variables and their importance to banking work, with the aim of improving performance. The main question is the role of governance mechanisms in supporting trust-building strategies. The questionnaire was distributed to two stratified random samples, the first in public banks consisting of 62 individuals and the second in private banks consisting of 61 individuals. It followed the descriptive analytical comparative approach. One of the most important results is that there are significant differences between the two samples, and the weight is weighted in favor of public banks in relation to trust-building strategies with customers. Despite the use of outdated working methods, the conclusions pointed to the tangible role of governance mechanisms in supporting trust-building strategies.
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreRealizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost
... Show MoreThe report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the problem of the semiotic employment of religious symbols in press reports published in the electronic press across two levels: Reading to perceive the visual message in its abstract form, and the second for re-understanding and interpretation, as this level gives semantics to reveal the implicit level of media messages through a set of semiotic criteria on which it was based to cut texts to reach the process of understanding and interpretation.
The report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the p
... Show MoreThis research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-
... Show MoreA new 4-thiazolidinone, substitutedbenzylidene-thiazolidinone and tetrazole were synthesized from thiosemicarbazone and hydrazone. The thiosemicarbazone was prepared by the reaction of thiosemicarbazide with aldehyde derivative from L-ascorbic acid in absolute ethanol using glacial acetic acid as a catalyst. 1, 3-thiazolidin-4-ones were synthesized from the condensation of thiosemicarbazones with chloroacetic acid in presence of anhydrous sodium acetate. A 1, 3- thiazolidine-4-one was reaction with several 4-substitutedaldehydes to produce new derivatives with a double bond at the position-5 of the 4-thiazolidinone ring. While the tetrazole compounds were synthesized by 1, 3-cycloaddition reaction of sodium azide and hydrazone compounds in
... Show More