Credit risk assessment has become an important topic in financial risk administration. Fuzzy clustering analysis has been applied in credit scoring. Gustafson-Kessel (GK) algorithm has been utilised to cluster creditworthy customers as against non-creditworthy ones. A good clustering analysis implemented by good Initial Centres of clusters should be selected. To overcome this problem of Gustafson-Kessel (GK) algorithm, we proposed a modified version of Kohonen Network (KN) algorithm to select the initial centres. Utilising similar degree between points to get similarity density, and then by means of maximum density points selecting; the modified Kohonen Network method generate clustering initial centres to get more reasonable clustering results. The comparative was conducted using three credit scoring datasets: Australian, German and Taiwan. Internal and external indexes of validity clustering are computed and the proposed method was found to have the best performance in these three data sets.
Moisture induced damage in asphaltic pavement might be considered as a serious defect that contributed to growth other distresses such as permanent deformation and fatigue cracking. This paper work aimed through an experimental effort to assess the behaviour of asphaltic mixtures that fabricated by incorporating several dosages of carbon fiber in regard to the resistance potential of harmful effect of moisture in pavement. Laboratory tests were performed on specimens containing fiber with different lengths and contents. These tests are: Marshall Test, the indirect tensile test and the index of retained strength. The optimum asphalt contents were determined based on the Marshall method. The preparation of asphaltic mixtures involved
... Show MoreOne of the therapeutic effects of nicotine is used as a protective against developing ulcerative colitis . ulcerative colitis is an inflammatory disease of the bowel affecting the superficial lining mucosa in the rectum and large intestine. In this study nicotine tablets were formulated as modified release tablets targeted to the colon. All formulas were studied for drug release , effect of diluent, retardant concentration, avicel grade,and compression force, the selected formula was then further studied for drug release in 3 different pH ( coated tablets) .The kinetic study revealed acceptable shelf life . Finally the selected formula was given to 6 patients in a pre-liminary clinical study which showed that nicotine c
... Show MoreNatural frequency under initial stresses for simply supported cross-ply composite laminated plates (E glass- fiber) are obtained using Refind theory (RPT). This theory accounts for parabolic distribution of the transverse shear strain through the plate thickness and satisfies the zero traction boundary conditions on the surfaces of the plate without using shear correction factors. The governing equations for Eigen value problem under initial stress are derived using Hamilton’s principle and solved using Navier solution for simply supported cross-ply symmetric and antisymmetric laminated plates. The effect of many design factors such as modulus ratio, thickness ratio and number of laminates on the Natural frequency and buckling stresses
... Show MoreIn the petroleum industry, multiphase flow dynamics within the tubing string have gained significant attention due to associated challenges. Accurately predicting pressure drops and wellbore pressures is crucial for the effective modeling of vertical lift performance (VLP). This study focuses on predicting the multiphase flow behavior in four wells located in the Faihaa oil field in southern Iraq, utilizing PIPESIM software. The process of selecting the most appropriate multiphase correlation was performed by utilizing production test data to construct a comprehensive survey data catalog. Subsequently, the results were compared with the correlations available within the PIPESIM software. The outcomes reveal that the Hagedorn and Brown (H
... Show MoreThe traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreAbstracts:
The Central Bank is the backbone of the banking system as a whole, and in order to maintain the banking system, one of the most important functions that the Central Bank performs is the function of supervising and controlling banks, with several tools and methods, and one of the most important of these tools is its creation of the function of a compliance observer, which obligated commercial banks to appoint a person in A bank that performs this function according to certain conditions and granting it some powers that would build a sound and compliant banking system. The function of the compliance observer is to follow up on the bank’s compliance with the instructions and decisions issued by
... Show MoreCredit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c
... Show More