نتایج جستجو برای: keywords bank

تعداد نتایج: 2029687  

2015
Khaled Nasser ElSayed

this paper proposes a design of an application of multi agent technology on a semantic net knowledge base, to build a smart e-examiner system. This e-examiner could be used in building and grading a personalized special on-line eassessment. The produced e-assessment should cover the majority of examined topics and material. It should cover various levels of difficulties and learners profile(s)....

2017
Saleh S. Saraireh

The security of data exchange is considered a significant problem. It requires the use of various cryptographic algorithms, such as stream cipher and block cipher. The implementation of a secure cryptographic block cipher algorithm requires the generation of strong substitution and permutation layers. These layers should satisfy the principles of security (diffusion and confusion). The proposed...

Journal: :Bioinformatics 2000
Kunchur Guruprasad Maheshuni S. Prasad Gundu R. Kumar

SUMMARY The database of structural motifs in proteins (DSMP) contains data relevant to helices, beta-turns, gamma-turns, beta-hairpins, psi-loops, beta-alpha-beta motifs, beta-sheets, beta-strands and disulphide bridges extracted from all proteins in the Protein Data Bank primarily using the PROMOTIF program and implemented as a web-based network service using the SRS. The data corresponding to...

2012
Dong Liu Youbin Chen

In this paper, we present a co amount recognition system for Chinese b system takes color bank check images as inp three main processing steps: numeral s segmentation & recognition, and post-proce sequentially on: detection and extraction of segmentation and recognition of the stri analysis of recognition results for accepta Information fusion, method compleme hypotheses generation then evaluat...

2015

In this article, we have elaborated a study over the nature of financial intermediation in Islamic banks by comparison to those of conventional ones. We have found a striking difference between two kinds of intermediation. We tried, from another side, to study the relationship between the capital level and deficiency risk relying on econometric model, and we have obtained a positive and signifi...

2002
Chung-Hua Shen Ta-Cheng Chang

Is investment cash-flow sensitivity affected by a country’s capital market imperfection? We take 42 countries as our sample and collect six imperfect capital market measures (ICAM), ie., the stock market capitalization ratio, number of publicly-listed firm, stock turnover ratio, bank loan ratio, long-term debt ratio and the interest spread. Using a two-step approach, negative relationships betw...

2009
Shuyuan Yang

The paper presents a method of designing ultrawide band (UWB) pulse array beamformer in the case of nearfield. Firstly the principle of space-time processing of UWB pulse array is discussed. The radical beampattern transform based on spherical coordinates is employed to solve the nearfield beamforming of UWB pulse array. The frequency invariant technology is considered for the frequency depende...

2012
Daniel Badulescu

Under the difficult access to finance of SMEs, they expect that its relationship with the banks shall constitute a real help to access appropriate financing, at reasonable costs and requirements, given the possibility of mutually beneficial and long lasting relation. The literature, but also the research we have carried on, is centered on such determinants as concentration and the length of the...

2012
Manu Krishnan

In this paper, we discuss the paradigm shift in bank capital from the “gone concern” to the “going concern” mindset. We then propose a methodology for pricing a product of this shift called Contingent Capital Notes (“CoCos”). The Merton Model can determine a price for credit risk by using the firm’s equity value as a call option on those assets. Our pricing methodology for CoCos also uses the c...

Journal: :CoRR 2017
Emeric Bernard-Jones Jeremiah Onaolapo Gianluca Stringhini

We set out to understand the effects of differing language on the ability of cybercriminals to navigate webmail accounts and locate sensitive information in them. To this end, we configured thirty Gmail honeypot accounts with English, Romanian, and Greek language settings. We populated the accounts with email messages in those languages by subscribing them to selected online newsletters. We hid...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید