Credit risk assessment has become an important topic in financial risk administration. Fuzzy clustering analysis has been applied in credit scoring. Gustafson-Kessel (GK) algorithm has been utilised to cluster creditworthy customers as against non-creditworthy ones. A good clustering analysis implemented by good Initial Centres of clusters should be selected. To overcome this problem of Gustafson-Kessel (GK) algorithm, we proposed a modified version of Kohonen Network (KN) algorithm to select the initial centres. Utilising similar degree between points to get similarity density, and then by means of maximum density points selecting; the modified Kohonen Network method generate clustering initial centres to get more reasonable clustering results. The comparative was conducted using three credit scoring datasets: Australian, German and Taiwan. Internal and external indexes of validity clustering are computed and the proposed method was found to have the best performance in these three data sets.
Unsaturated soil can raise many geotechnical problems upon wetting and drying resulting in swelling upon wetting and collapsing (shrinkage) in drying and changing in the soil shear strength. The classical principles of saturated soil are often not suitable in explaining these phenomena. In this study, expansive soil (bentonite and sand) were tested in different water contents and dry unit weight chosen from the compaction curve to examine the effect of water content change on soil properties (swelling pressure, expansion index, shear strength (soil cohesion) and soil suction by the filter paper method). The physical properties of these soils were studied by conducting series of tests in laboratory. Fitting methods
... Show MoreThe research topic (The Impact of the Compulsory Reserve on the Banks Credit-an applied research on a sample of Iraqi banks), was chosen on basis of the Iraqi private Banks attempts to increase their credit activities in hope to gain more profits.This coincided with the CBI aim to back the private banking market.It is thus apparent why the CBI issued its regulation to those banks to increase their capitals up to IDB250. On the other hand,the CBI acted as an obstacle in the way of increasing the private banks of their capitals,that is by implementing the quantitive monetary tool so called the compulsory reserve.This is why we intended to overlook at this contradictional problome
... Show MoreThe aim of this paper is to design artificial neural network as an alternative accurate tool to estimate concentration of Cadmium in contaminated soils for any depth and time. First, fifty soil samples were harvested from a phytoremediated contaminated site located in Qanat Aljaeesh in Baghdad city in Iraq. Second, a series of measurements were performed on the soil samples. The inputs are the soil depth, the time, and the soil parameters but the output is the concentration of Cu in the soil for depth x and time t. Third, design an ANN and its performance was evaluated using a test data set and then applied to estimate the concentration of Cadmium. The performance of the ANN technique was compared with the traditional laboratory inspecting
... Show MoreThe objective of this study is to explain the role of credit policies in agricultural development of Iraq during the period 1979-1989 which were represented by the policy of co-operative agricultural bank the organization that responsible to finance agricultural sector for various reasons. It has been shown that there was no clear credit policy existed during the period concerned due to the differences between loans from year. The loan growth rate was low in general comparing with objectives of the agricultural development plans, a low production rates comparing with loans paid, the growth rate of average number of trees in each donum and the growth rate of livestock number was also low.In conclusion there should be a clear plan for cred
... Show MoreDue to the huge variety of 5G services, Network slicing is promising mechanism for dividing the physical network resources in to multiple logical network slices according to the requirements of each user. Highly accurate and fast traffic classification algorithm is required to ensure better Quality of Service (QoS) and effective network slicing. Fine-grained resource allocation can be realized by Software Defined Networking (SDN) with centralized controlling of network resources. However, the relevant research activities have concentrated on the deep learning systems which consume enormous computation and storage requirements of SDN controller that results in limitations of speed and accuracy of traffic classification mechanism. To fill thi
... Show MoreThis paper focuses on developing a self-starting numerical approach that can be used for direct integration of higher-order initial value problems of Ordinary Differential Equations. The method is derived from power series approximation with the resulting equations discretized at the selected grid and off-grid points. The method is applied in a block-by-block approach as a numerical integrator of higher-order initial value problems. The basic properties of the block method are investigated to authenticate its performance and then implemented with some tested experiments to validate the accuracy and convergence of the method.
Texture synthesis using genetic algorithms is one way; proposed in the previous research, to synthesis texture in a fast and easy way. In genetic texture synthesis algorithms ,the chromosome consist of random blocks selected manually by the user .However ,this method of selection is highly dependent on the experience of user .Hence, wrong selection of blocks will greatly affect the synthesized texture result. In this paper a new method is suggested for selecting the blocks automatically without the participation of user .The results show that this method of selection eliminates some blending caused from the previous manual method of selection.
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show More