نتایج جستجو برای: credit users

تعداد نتایج: 239291  

2010
Scott Schuh Joanna Stavins

Scott Schuh, Oz Shy, and Joanna Stavins Abstract: Merchant fees and reward programs generate an implicit monetary transfer to credit card users from non-card (or “cash”) users because merchants generally do not set differential prices for card users to recoup the costs of fees and rewards. On average, each cash-using household pays $151 to card-using households and each card-using household rec...

Journal: :تحقیقات مالی 0
عزت اله عباسیان دانشیار گروه اقتصاد، دانشکدة اقتصاد و علوم اجتماعی، دانشگاه بوعلی سینا، همدان، ایران سامان فلاحی دانشجوی دکتری علوم اقتصادی دانشکدة اقتصاد، دانشگاه تهران، تهران، ایران عبدالصمد رحمانی دانشجوی دکتری علوم اقتصادی، دانشکدة علوم اداری و اقتصاد، دانشگاه اصفهان، اصفهان، ایران

the credit portfolio management and the optimal credit portfolio selection are identified as one of the most effective factors in banks’ credit risk. two main strategies in this regard include diversification versus concentration. in this study, at first, the status of diversification of iran’s banking sector is analyzed, then the relationship between diversification of the credit portfolio and...

Journal: :مجله مطالعات حقوق تطبیقی 0
همایون مافی دانشیار دانشکدۀ حقوق و علوم سیاسی دانشگاه مازندران احمد محسن زاده دانشجوی دکتری حقوق خصوصی دانشگاه مازندران

the letter of credit as a method of smoothing international payment is a conditional security and obligation to pay the customer bank (issuing bank) to seller (applicant). for this purpose, the letters of credit may be considered as the most usual method of payment of goods price in international trade. the classic form of letters of credit is the commercial letters of credit whose financial ob...

2007
Frithjof Dau

1 Formal Logic with Conceptual Graphs 3 Frithjof Dau 1.

2010

G(u,u',u") = 0, (1) where u = u(x, x,..., x), and u', u" denote all the first and second partial derivatives of u. For simplicity we will assume here that both u and G are scalars and denote by ua, uab, the partial derivatives dau and respectively dahu; a,b =1,2, ..., n+1. Let u (x) be a given solution of (1). Our equation is said to be elliptic or hyperbolic at u°(x) according to whether the (...

Journal: :Journal of Information and Visualization 2021

Adversaries achieved such intrusion via carefully crafted attacks of large magnitude that seek to wreak havoc on network infrastructures with a focus personal gains and rewards. Study proposes spectral-clustering hybrid genetic algorithm trained modular neural detect fraud in credit card transactions. The ensemble seeks equip credit-card users system whose knowledge will altruistically cards. R...

2017
B. Ramadoss

Free-riding is a desperate and a constant menace to many P2P systems, to violate the cooperation among peers. This study proposes a grade-based approach, which expeditiously maintains fairness in the network by encouraging the high contributed peers and altogether wiping out the free-riders. The Network Contribution Ratio determines the contribution of users globally. Besides, the proposed grad...

2016
Adrian Letchford Tobias Preis Helen Susannah Moat Matjaz Perc

Vast records of our everyday interests and concerns are being generated by our frequent interactions with the Internet. Here, we investigate how the searches of Google users vary across U.S. states with different birth rates and infant mortality rates. We find that users in states with higher birth rates search for more information about pregnancy, while those in states with lower birth rates s...

Journal: :Frontiers in sustainable food systems 2022

Smallholder Irrigation Schemes (SIS) are pivotal in sustaining livelihoods and creating employment rural communities of South Africa. However, despite the revitalization rehabilitation SIS by government, performance farmers is still below par. This study evaluates water-users across four KwaZulu-Natal Province (KZN). Technical Efficiency was used as a proxy for Stochastic Meta-Frontier Analysis...

2018
Hikmet Yildiz Babak Hassibi

We consider the problem of designing optimal linear codes (in terms of having the largest minimum distance) subject to a support constraint on the generator matrix. We show that the largest minimum distance can be achieved by a subcode of a Reed-Solomon code of small field size. As a by-product of this result, we settle the GM-MDS conjecture of Dau et. al. in the affirmative.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید