Analysis of Urban Commercial Banks In Online Median Problem
نویسندگان
چکیده
منابع مشابه
The Online Median Problem
We introduce a natural variant of the (metric uncapacitated) k-median problem that we call the online median problem. Whereas the k-median problem involves optimizing the simultaneous placement of k facilities, the online median problem imposes the following additional constraints: the facilities are placed one at a time; a facility cannot be moved once it is placed, and the total number of fac...
متن کاملanalysis of power in the network society
اندیشمندان و صاحب نظران علوم اجتماعی بر این باورند که مرحله تازه ای در تاریخ جوامع بشری اغاز شده است. ویژگیهای این جامعه نو را می توان پدیده هایی از جمله اقتصاد اطلاعاتی جهانی ، هندسه متغیر شبکه ای، فرهنگ مجاز واقعی ، توسعه حیرت انگیز فناوری های دیجیتال، خدمات پیوسته و نیز فشردگی زمان و مکان برشمرد. از سوی دیگر قدرت به عنوان موضوع اصلی علم سیاست جایگاه مهمی در روابط انسانی دارد، قدرت و بازتولید...
15 صفحه اولProfitability of Commercial Banks in Bangladesh:A Multivariate Analysis
This paper is in an attempt to examine the financial performance of privatelisted commercial banks in Bangladesh in terms of profitability. The study is based on cross-section data of annual financial statements of 15 listed commercial banks for the period 2008-2012. Five determinants have been chosen for this study. The Correlation matrix shows that profitability, asset quality, operating perf...
متن کاملPerformance of Credit Risk Management in Indian Commercial Banks
For banks and financial institutions, credit risk had been an essential factor that needed to be managed well. Credit risk was the possibility that a borrower of counter party would fail to meet its obligations in accordance with agreed terms. Credit risk; therefore arise from the bank’s dealings with or lending to corporate, individuals, and other banks or financial institutions. Credit risk...
متن کاملVulnerabilities in Online Banks
This paper describes some attacks on online banks that authenticate each customer through the use of a unique user identifier and a Personal Identification Number (PIN). Many user identifiers contain structure which make them easy to generate on a computer. Given a generated set of identifiers it is possible to do a brute-force attack on the PINs. A general attack model is described and some ex...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Technology Journal
سال: 2013
ISSN: 1812-5638
DOI: 10.3923/itj.2013.5276.5280