نتایج جستجو برای: credit users
تعداد نتایج: 239291 فیلتر نتایج به سال:
Scott Schuh, Oz Shy, and Joanna Stavins Abstract: Merchant fees and reward programs generate an implicit monetary transfer to credit card users from non-card (or “cash”) users because merchants generally do not set differential prices for card users to recoup the costs of fees and rewards. On average, each cash-using household pays $151 to card-using households and each card-using household rec...
the credit portfolio management and the optimal credit portfolio selection are identified as one of the most effective factors in banks’ credit risk. two main strategies in this regard include diversification versus concentration. in this study, at first, the status of diversification of iran’s banking sector is analyzed, then the relationship between diversification of the credit portfolio and...
the letter of credit as a method of smoothing international payment is a conditional security and obligation to pay the customer bank (issuing bank) to seller (applicant). for this purpose, the letters of credit may be considered as the most usual method of payment of goods price in international trade. the classic form of letters of credit is the commercial letters of credit whose financial ob...
1 Formal Logic with Conceptual Graphs 3 Frithjof Dau 1.
G(u,u',u") = 0, (1) where u = u(x, x,..., x), and u', u" denote all the first and second partial derivatives of u. For simplicity we will assume here that both u and G are scalars and denote by ua, uab, the partial derivatives dau and respectively dahu; a,b =1,2, ..., n+1. Let u (x) be a given solution of (1). Our equation is said to be elliptic or hyperbolic at u°(x) according to whether the (...
Adversaries achieved such intrusion via carefully crafted attacks of large magnitude that seek to wreak havoc on network infrastructures with a focus personal gains and rewards. Study proposes spectral-clustering hybrid genetic algorithm trained modular neural detect fraud in credit card transactions. The ensemble seeks equip credit-card users system whose knowledge will altruistically cards. R...
Free-riding is a desperate and a constant menace to many P2P systems, to violate the cooperation among peers. This study proposes a grade-based approach, which expeditiously maintains fairness in the network by encouraging the high contributed peers and altogether wiping out the free-riders. The Network Contribution Ratio determines the contribution of users globally. Besides, the proposed grad...
Vast records of our everyday interests and concerns are being generated by our frequent interactions with the Internet. Here, we investigate how the searches of Google users vary across U.S. states with different birth rates and infant mortality rates. We find that users in states with higher birth rates search for more information about pregnancy, while those in states with lower birth rates s...
Smallholder Irrigation Schemes (SIS) are pivotal in sustaining livelihoods and creating employment rural communities of South Africa. However, despite the revitalization rehabilitation SIS by government, performance farmers is still below par. This study evaluates water-users across four KwaZulu-Natal Province (KZN). Technical Efficiency was used as a proxy for Stochastic Meta-Frontier Analysis...
We consider the problem of designing optimal linear codes (in terms of having the largest minimum distance) subject to a support constraint on the generator matrix. We show that the largest minimum distance can be achieved by a subcode of a Reed-Solomon code of small field size. As a by-product of this result, we settle the GM-MDS conjecture of Dau et. al. in the affirmative.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید