Credit risk assessment has become an important topic in financial risk administration. Fuzzy clustering analysis has been applied in credit scoring. Gustafson-Kessel (GK) algorithm has been utilised to cluster creditworthy customers as against non-creditworthy ones. A good clustering analysis implemented by good Initial Centres of clusters should be selected. To overcome this problem of Gustafson-Kessel (GK) algorithm, we proposed a modified version of Kohonen Network (KN) algorithm to select the initial centres. Utilising similar degree between points to get similarity density, and then by means of maximum density points selecting; the modified Kohonen Network method generate clustering initial centres to get more reasonable clustering results. The comparative was conducted using three credit scoring datasets: Australian, German and Taiwan. Internal and external indexes of validity clustering are computed and the proposed method was found to have the best performance in these three data sets.
In this research, the focus was placed on estimating the parameters of the Hypoexponential distribution function using the maximum likelihood method and genetic algorithm. More than one standard, including MSE, has been adopted for comparison by Using the simulation method
In the city, building space could transform to be as place, because architecture does not include only traditional values such as housing, human protection, stability, etc, but could carry other dimensions beyond the housing or building occupancy or develop urban design. Rivers had vision in motion as a way to show dynamic processes in its flowing slowly, which are simply measured in time and the life of citizens. The research consider the river path in traditional cities as Alley connecting the spaces of the city ... old Baghdad was characterized by this property and it is look like Venice in the past, while traditional European cities were able to preserve this property till now, and capable to take transformation of the city with deve
... Show MoreThe aim of this research is to demonstrate the impact of credit risk on the banks of the study sample on the granting of loans and credit facilities, and try to reduce the size of credit risk to banks as a result of granting loans and credit facilities, credit risk is the oldest form of risk in financial markets. Every financial institution takes a degree of risk when it gives loans and credit facilities to companies and customers, It is exposed to financial losses when some borrowers fail to repay their loans as agreed, and at the same time credit facilities are the most profitable operations of the bank as it is the most profitable banking operations than other operations, so it represents the research communit
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More