Search results for: credit allocation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 974

Search results for: credit allocation

824 The Underground Ecosystem of Credit Card Frauds

Authors: Abhinav Singh

Abstract:

Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.

Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem

Procedia PDF Downloads 411
823 Application of Hydrological Model in Support of Streamflow Allocation in Arid Watersheds in Northwestern China

Authors: Chansheng He, Lanhui Zhang, Baoqing Zhang

Abstract:

Spatial heterogeneity of landscape significantly affects watershed hydrological processes, particularly in high elevation and cold mountainous watersheds such as the inland river (terminal lake) basins in Northwest China, where the upper reach mountainous areas are the main source of streamflow for the downstream agricultural oases and desert ecosystems. Thus, it is essential to take into account spatial variations of hydrological processes in streamflow allocation at the watershed scale. This paper adapts the Distributed Large Basin Runoff Model (DLBRM) to the Heihe River Watershed, the second largest inland river with a drainage area of about 128,000 km2 in Northwest China, for understanding the transfer and partitioning mechanism among the glacier and snowmelt, surface runoff, evapotranspiration, and groundwater recharge among the upper, middle, and lower reaches in the study area. Results indicate that the upper reach Qilian Mountain area is the main source of streamflow for the middle reach agricultural oasis and downstream desert areas. Large withdrawals for agricultural irrigation in the middle reach had significantly depleted river flow for the lower reach desert ecosystems. Innovative conservation and enforcement programs need to be undertaken to ensure the successful implementation of water allocation plan of delivering 0.95 x 109 m3 of water downstream annually by the State Council in the Heihe River Watershed.

Keywords: DLBRM, Northwestern China, spatial variation, water allocation

Procedia PDF Downloads 279
822 A Breakthrough Improvement Brought by Taxi-Calling APPs for Taxi Operation Level

Authors: Yuan-Lin Liu, Ye Li, Tian Xia

Abstract:

Taxi-calling APPs have been used widely, while brought both benefits and a variety of issues for the taxi market. Many countries do not know whether the benefits are remarkable than the issues or not. This paper established a comparison between the basic scenario (2009-2012) and a taxi-calling software usage scenario (2012-2015) to explain the impact of taxi-calling APPs. The impacts of taxi-calling APPs illustrated by the comparison results are: 1) The supply and demand distribution is more balanced, extending from the city center to the suburb. The availability of taxi service has been improved in low density areas, thin market attribute has also been improved; 2)The ratio of short distance taxi trip decreased, long distance service increased, the utilization of mileage increased, and the rate of empty decreased; 3) The popularity of taxi-calling APPs was able to reduce the average empty distance, cruise time, empty mileage rate and average times of loading passengers, can also enhance the average operating speed, improve the taxi operating level, and reduce social cost although there are some disadvantages. This paper argues that the taxi industry and government can establish an integrated third-party credit information platform based on credit evaluated by the data of the drivers’ driving behaviors to supervise the drivers. Taxi-calling APPs under fully covered supervision in the mobile Internet environment will become a new trend.

Keywords: taxi, taxi-calling APPs, credit, scenario comparison

Procedia PDF Downloads 230
821 Continuous-Time Convertible Lease Pricing and Firm Value

Authors: Ons Triki, Fathi Abid

Abstract:

Along with the increase in the use of leasing contracts in corporate finance, multiple studies aim to model the credit risk of the lease in order to cover the losses of the lessor of the asset if the lessee goes bankrupt. In the current research paper, a convertible lease contract is elaborated in a continuous time stochastic universe aiming to ensure the financial stability of the firm and quickly recover the losses of the counterparties to the lease in case of default. This work examines the term structure of the lease rates taking into account the credit default risk and the capital structure of the firm. The interaction between the lessee's capital structure and the equilibrium lease rate has been assessed by applying the competitive lease market argument developed by Grenadier (1996) and the endogenous structural default model set forward by Leland and Toft (1996). The cumulative probability of default was calculated by referring to Leland and Toft (1996) and Yildirim and Huan (2006). Additionally, the link between lessee credit risk and lease rate was addressed so as to explore the impact of convertible lease financing on the term structure of the lease rate, the optimal leverage ratio, the cumulative default probability, and the optimal firm value by applying an endogenous conversion threshold. The numerical analysis is suggestive that the duration structure of lease rates increases with the increase in the degree of the market price of risk. The maximal value of the firm decreases with the effect of the optimal leverage ratio. The results are indicative that the cumulative probability of default increases with the maturity of the lease contract if the volatility of the asset service flows is significant. Introducing the convertible lease contract will increase the optimal value of the firm as a function of asset volatility for a high initial service flow level and a conversion ratio close to 1.

Keywords: convertible lease contract, lease rate, credit-risk, capital structure, default probability

Procedia PDF Downloads 55
820 Trajectory Design and Power Allocation for Energy -Efficient UAV Communication Based on Deep Reinforcement Learning

Authors: Yuling Cui, Danhao Deng, Chaowei Wang, Weidong Wang

Abstract:

In recent years, unmanned aerial vehicles (UAVs) have been widely used in wireless communication, attracting more and more attention from researchers. UAVs can not only serve as a relay for auxiliary communication but also serve as an aerial base station for ground users (GUs). However, limited energy means that they cannot work all the time and cover a limited range of services. In this paper, we investigate 2D UAV trajectory design and power allocation in order to maximize the UAV's service time and downlink throughput. Based on deep reinforcement learning, we propose a depth deterministic strategy gradient algorithm for trajectory design and power distribution (TDPA-DDPG) to solve the energy-efficient and communication service quality problem. The simulation results show that TDPA-DDPG can extend the service time of UAV as much as possible, improve the communication service quality, and realize the maximization of downlink throughput, which is significantly improved compared with existing methods.

Keywords: UAV trajectory design, power allocation, energy efficient, downlink throughput, deep reinforcement learning, DDPG

Procedia PDF Downloads 117
819 Analysis of Technical Efficiency and Its Determinants among Cattle Fattening Enterprises in Kebbi State, Nigeria

Authors: Gona Ayuba, Isiaka Mohammed, Kotom Mohammed Baba, Mohammed Aabubakar Maikasuwa

Abstract:

The study examined the technical efficiency and its determinants of cattle fattening enterprises in Kebbi state, Nigeria. Data were collected from a sample of 160 fatteners between June 2010 and June 2011 using the multistage random sampling technique. Translog stochastic frontier production function was employed for the analysis. Results of the analysis show that technical efficiency indices varied from 0.74 to 0.98%, with a mean of 0.90%, indicating that there was no wide gap between the efficiency of best technical efficient fatteners and that of the average fattener. The result also showed that fattening experience and herd size influenced the level of technical efficiency at 1% levels. It is recommended that credit agencies should ensure that credit made available to the fatteners is monitored to ensure appropriate utilization.

Keywords: technical efficiency, determinants, cattle, fattening enterprises

Procedia PDF Downloads 411
818 Spectrum Allocation Using Cognitive Radio in Wireless Mesh Networks

Authors: Ayoub Alsarhan, Ahmed Otoom, Yousef Kilani, Abdel-Rahman al-GHuwairi

Abstract:

Wireless mesh networks (WMNs) have emerged recently to improve internet access and other networking services. WMNs provide network access to the clients and other networking functions such as routing, and packet forwarding. Spectrum scarcity is the main challenge that limits the performance of WMNs. Cognitive radio is proposed to solve spectrum scarcity problem. In this paper, we consider a cognitive wireless mesh network where unlicensed users (secondary users, SUs) can access free spectrum that is allocated to spectrum owners (primary users, PUs). Although considerable research has been conducted on spectrum allocation, spectrum assignment is still considered an important challenging problem. This problem can be solved using cognitive radio technology that allows SUs to intelligently locate free bands and access them without interfering with PUs. Our scheme considers several heuristics for spectrum allocation. These heuristics include: channel error rate, PUs activities, channel capacity and channel switching time. Performance evaluation of the proposed scheme shows that the scheme is able to allocate the unused spectrum for SUs efficiently.

Keywords: cognitive radio, dynamic spectrum access, spectrum management, spectrum sharing, wireless mesh networks

Procedia PDF Downloads 502
817 Cross-Layer Design of Event-Triggered Adaptive OFDMA Resource Allocation Protocols with Application to Vehicle Clusters

Authors: Shaban Guma, Naim Bajcinca

Abstract:

We propose an event-triggered algorithm for the solution of a distributed optimization problem by means of the projected subgradient method. Thereby, we invoke an OFDMA resource allocation scheme by applying an event-triggered sensitivity analysis at the access point. The optimal resource assignment of the subcarriers to the involved wireless nodes is carried out by considering the sensitivity analysis of the overall objective function as defined by the control of vehicle clusters with respect to the information exchange between the nodes.

Keywords: consensus, cross-layer, distributed, event-triggered, multi-vehicle, protocol, resource, OFDMA, wireless

Procedia PDF Downloads 307
816 Bank's Role in Economic Growth: Case of Africa

Authors: S. Khalifa, R. Chkoundali

Abstract:

The specific role of banks in economic development varies, depending on scope. Firstly, the participation of banks in economic development focus around providing credit and services to generate revenues, which are then invested back into a local, national or international community. The specific roles banks play in the economic development of a small community differ from the role banks play in national or international economic development. Although the role can vary, factors such as access to credit and bank investment policies or practices remain constant, no matter the scope of economic development. This paper provides an overview of the economic situation of Africa and its short-term outlook. He referred to the progress made in the implementation of the Medium-Term Strategy (2008-2012) and some major achievements of the Bank, as the speed and flexibility with which she responded to the oil crisis, food and financial.

Keywords: economic growth, bank, Africa, economic development

Procedia PDF Downloads 439
815 Improved Multi–Objective Firefly Algorithms to Find Optimal Golomb Ruler Sequences for Optimal Golomb Ruler Channel Allocation

Authors: Shonak Bansal, Prince Jain, Arun Kumar Singh, Neena Gupta

Abstract:

Recently nature–inspired algorithms have widespread use throughout the tough and time consuming multi–objective scientific and engineering design optimization problems. In this paper, we present extended forms of firefly algorithm to find optimal Golomb ruler (OGR) sequences. The OGRs have their one of the major application as unequally spaced channel–allocation algorithm in optical wavelength division multiplexing (WDM) systems in order to minimize the adverse four–wave mixing (FWM) crosstalk effect. The simulation results conclude that the proposed optimization algorithm has superior performance compared to the existing conventional computing and nature–inspired optimization algorithms to find OGRs in terms of ruler length, total optical channel bandwidth and computation time.

Keywords: channel allocation, conventional computing, four–wave mixing, nature–inspired algorithm, optimal Golomb ruler, lévy flight distribution, optimization, improved multi–objective firefly algorithms, Pareto optimal

Procedia PDF Downloads 292
814 Prioritization in Modern Portfolio Management - An Action Design Research Approach to Method Development for Scaled Agility

Authors: Jan-Philipp Schiele, Karsten Schlinkmeier

Abstract:

Allocation of scarce resources is a core process of traditional project portfolio management. However, with the popularity of agile methodology, established concepts and methods of portfolio management are reaching their limits and need to be adapted. Consequently, the question arises of how the process of resource allocation can be managed appropriately in scaled agile environments. The prevailing framework SAFe offers Weightest Shortest Job First (WSJF) as a prioritization technique, butestablished companies are still looking for methodical adaptions to apply WSJF for prioritization in portfolios in a more goal-oriented way and aligned for their needs in practice. In this paper, the relevant problem of prioritization in portfolios is conceptualized from the perspective of coordination and related mechanisms to support resource allocation. Further, an Action Design Research (ADR) project with case studies in a finance company is outlined to develop a practically applicable yet scientifically sound prioritization method based on coordination theory. The ADR project will be flanked by consortium research with various practitioners from the financial and insurance industry. Preliminary design requirements indicate that the use of a feedback loop leads to better team and executive level coordination in the prioritization process.

Keywords: scaled agility, portfolio management, prioritization, business-IT alignment

Procedia PDF Downloads 173
813 Determinants of Non-Performing Loans: An Empirical Investigation of Bank-Specific Micro-Economic Factors

Authors: Amir Ikram, Faisal Ijaz, Qin Su

Abstract:

The empirical study was undertaken to explore the determinants of non-performing loans (NPLs) of small and medium enterprises (SMEs) sector held by the commercial banks. Primary data was collected through well-structured survey questionnaire from credit analysts/bankers of 42 branches of 9 commercial banks, operating in the district of Lahore (Pakistan), for 2014-2015. Selective descriptive analysis and Pearson chi-square technique were used to illustrate and evaluate the significance of different variables affecting NPLs. Branch age, duration of the loan, and credit policy were found to be significant determinants of NPLs. The study proposes that bank-specific and SME-specific microeconomic variables directly influence NPLs, while macroeconomic factors act as intermediary variables. Framework exhibiting causal nexus of NPLs was also drawn on the basis of empirical findings. The results elaborate various origins of NPLs and suggest that they are primarily instigated by the loan sanctioning procedure of the financial institution. The paper also underlines the risk management practices adopted by the bank at branch level to averse the risk of loan default. Empirical investigation of bank-specific microeconomic factors of NPLs with respect to Pakistan’s economy is the novelty of the study. Broader strategic policy implications are provided for credit analysts and entrepreneurs.

Keywords: commercial banks, microeconomic factors, non-performing loans, small and medium enterprises

Procedia PDF Downloads 236
812 Civil Liability for Digital Crimes

Authors: Pál Mészáros

Abstract:

The aim of this research topic is to examine civil law consequences caused by crimes committed in the digital space. During the commission of certain crimes, not only the rights of one person are violated, but also the rights of an entire institution, for example, if the information system of a university is attacked. The consequences of these crimes committed in the digital space may also be that the victim himself is liable to other third parties, for example, in the event that health data comes into the possession of unauthorized persons, and it can be proved that the service provider's IT system was inadequate. An interesting question may also be the civil liability of credit institutions if someone becomes a victim of fraud but is not expected from him/her to notice the fraud. In such a case, the liability of the credit institution may arise if they do not respond in time in the case of unauthorized bank transactions. Based on the above, the main topic of the research is the civil liability of the victim, or another person or company related to the victim in the case of damages caused by crimes.

Keywords: civil liability, digital crimes, transfer of responsibility, civil law

Procedia PDF Downloads 39
811 Determinants of Access to Finance to All Enterprise

Authors: Dilang Thouk Tharjiath

Abstract:

This study seeks to examine determinants of access to finance: the case of micro and small enterprises in bonga town. It identifies the sector as the key to unlocking the economic potentials of the country. For the achievement of the objective of the study simple random and stratified sampling has been used to select 179 respondents, primary and secondary data were used, primary data were collected through face to face interview and preparing questionnaire and secondary data were collected through reviewing firms record and reports, quantitative research approach were used and the data obtained were analyzed using descriptive research design. Access to finance is one of the key obstacles of MSE’s not only when starting the business project but also when operating. Identifying the major determinants of access to finance is therefore quite crucial. Based on descriptive result the financiers specially formal financiers tend to grant credit easily for enterprises which are located near to town, having operators with higher educational level, experienced and with a positive attitudes towards or fulfill their lending procedures, and a firm having collateralized asset, prepare business plan, maintain accounting practice ,large and old enough. Finally the study recommended that As Educational level of entrepreneurs has significant effect on access to credit from bank and the managers or owners education level is low in Bonga town the concerned bodies of both the government and non-governmental institutions in collaboration with Bonga town MSE development office are recommended to create awareness and facilitate the provision of additional training for those with lower educational level.

Keywords: credit, entrepreneur, enterprise, manager

Procedia PDF Downloads 69
810 Congestion Control in Mobile Network by Prioritizing Handoff Calls

Authors: O. A. Lawal, O. A Ojesanmi

Abstract:

The demand for wireless cellular services continues to increase while the radio resources remain limited. Thus, network operators have to continuously manage the scarce radio resources in order to have an improved quality of service for mobile users. This paper proposes how to handle the problem of congestion in the mobile network by prioritizing handoff call, using the guard channel allocation scheme. The research uses specific threshold value for the time of allocation of the channel in the algorithm. The scheme would be simulated by generating various data for different traffics in the network as it would be in the real life. The result would be used to determine the probability of handoff call dropping and the probability of the new call blocking as a way of measuring the network performance.

Keywords: call block, channel, handoff, mobile cellular network

Procedia PDF Downloads 373
809 Optimization of Electric Vehicle (EV) Charging Station Allocation Based on Multiple Data - Taking Nanjing (China) as an Example

Authors: Yue Huang, Yiheng Feng

Abstract:

Due to the global pressure on climate and energy, many countries are vigorously promoting electric vehicles and building charging (public) charging facilities. Faced with the supply-demand gap of existing electric vehicle charging stations and unreasonable space usage in China, this paper takes the central city of Nanjing as an example, establishes a site selection model through multivariate data integration, conducts multiple linear regression SPSS analysis, gives quantitative site selection results, and provides optimization models and suggestions for charging station layout planning.

Keywords: electric vehicle, charging station, allocation optimization, urban mobility, urban infrastructure, nanjing

Procedia PDF Downloads 63
808 The Management of Radio Spectrum Resources in Thailand

Authors: Pongsawee Supanonth

Abstract:

This research is the study of Spectrum Management and the increase in efficiency of Spectrum Utilization. It also proves that Cognitive Radio is a newer technology that will change the face of e-communications network today. This study used qualitative research methods by using in-depth interviews to collect data from a sample specific to those who work in Radio channel from 6 key informant and literature review from the related documents in online database. The result is the technique of Dynamic Spectrum Allocation that is the most suitable for Thailand. We conduct in-depth research for future purposes. Moreover, we can also develop a model that can be used in regulating and managing spectrum that is most suitable for Thailand. And also develop an important tool which can be of importance to allocation of spectrum as a natural resource appropriately. It will also guarantee quality and high benefit in a substantial way.

Keywords: cognitive radio, management of radio spectrum, spectrum management, spectrum scarcity

Procedia PDF Downloads 290
807 Recent Volatility in Islamic Banking Sector of Bangladesh: Nexus Between Economy, Religion and Politics

Authors: Abdul Kader

Abstract:

This paper attempts to investigate several contributory factors to recent volatility in the Islamic Banking sector of Bangladesh. In particular, the study explores corporate governance, credit management, credit regulations, inept board of directors, using religious sentiment as a means to deceive general people, and the degree of political interference as potential contributory factors. To find the correlation among different variables, semi-structured questionnaires were distributed among the clients, bank managers, some Banking scholars and ex-members of the board of directors of three Islamic Banks in Bangladesh. Later, ten interviews were collected from key informants to gain in-depth information about the present mismanagement of Islamic Banks in Bangladesh. After then, data were analyzed using statistical software and substantiated by secondary sources like newspapers, reports and investigative reports aired in screen media. The paper found a correlation between almost all contributory factors and recent unstable conditions in the Islamic banking sector. After performing regression analysis, this paper found a more significant relationship between some of the contributory factors with Banking volatility than others. For instance, credit management, inept board of directors, depriving customers of proving no profit in the name of business—no interest-- and political interference have a strong significant positive correlation with the present poor condition of Islamic Banking. This paper concludes that while internal management is important in recovering the losses, the government needs to ensure framing better policy for the Islamic Banking system, Central Bank needs to supervise and monitor all Islamic banks meticulously and loan receivers must go through the impartial evaluation and approved by the representatives of the Central Shariah Board. This paper also recommends that there is a need to strengthen the auditing system and improve regulatory oversight of the Islamic Banks in Bangladesh. Policy recommendations that this paper put forward could provide an outline for dealing with the existing challenging condition of Islamic Banks and these could be applied to similar problems in other countries where the Islamic Banking model exists.

Keywords: Islamic bank, volatility in banking sector, shariah law, credit management, political interference

Procedia PDF Downloads 50
806 Pareto Optimal Material Allocation Mechanism

Authors: Peter Egri, Tamas Kis

Abstract:

Scheduling problems have been studied by the algorithmic mechanism design research from the beginning. This paper is focusing on a practically important, but theoretically rather neglected field: the project scheduling problem where the jobs connected by precedence constraints compete for various nonrenewable resources, such as materials. Although the centralized problem can be solved in polynomial-time by applying the algorithm of Carlier and Rinnooy Kan from the Eighties, obtaining materials in a decentralized environment is usually far from optimal. It can be observed in practical production scheduling situations that project managers tend to cache the required materials as soon as possible in order to avoid later delays due to material shortages. This greedy practice usually leads both to excess stocks for some projects and materials, and simultaneously, to shortages for others. The aim of this study is to develop a model for the material allocation problem of a production plant, where a central decision maker—the inventory—should assign the resources arriving at different points in time to the jobs. Since the actual due dates are not known by the inventory, the mechanism design approach is applied with the projects as the self-interested agents. The goal of the mechanism is to elicit the required information and allocate the available materials such that it minimizes the maximal tardiness among the projects. It is assumed that except the due dates, the inventory is familiar with every other parameters of the problem. A further requirement is that due to practical considerations monetary transfer is not allowed. Therefore a mechanism without money is sought which excludes some widely applied solutions such as the Vickrey–Clarke–Groves scheme. In this work, a type of Serial Dictatorship Mechanism (SDM) is presented for the studied problem, including a polynomial-time algorithm for computing the material allocation. The resulted mechanism is both truthful and Pareto optimal. Thus the randomization over the possible priority orderings of the projects results in a universally truthful and Pareto optimal randomized mechanism. However, it is shown that in contrast to problems like the many-to-many matching market, not every Pareto optimal solution can be generated with an SDM. In addition, no performance guarantee can be given compared to the optimal solution, therefore this approximation characteristic is investigated with experimental study. All in all, the current work studies a practically relevant scheduling problem and presents a novel truthful material allocation mechanism which eliminates the potential benefit of the greedy behavior that negatively influences the outcome. The resulted allocation is also shown to be Pareto optimal, which is the most widely used criteria describing a necessary condition for a reasonable solution.

Keywords: material allocation, mechanism without money, polynomial-time mechanism, project scheduling

Procedia PDF Downloads 301
805 Strengthening Regulation and Supervision of Microfinance Sector for Development in Ethiopia

Authors: Megersa Dugasa Fite

Abstract:

This paper analyses regulatory and supervisory issues in the Ethiopian micro finance sector, which caters to the needs of those who have been excluded from the formal financial sector. Micro-finance has received increased importance in development because of its grand goal to give credits to the poor to raise their economic and social well-being and improve the quality of lives. The micro-finance at present has been moving towards a credit-plus period through covering savings and insurance functions. It thus helps in reducing the rate of financial exclusion and social segregation, alleviating poverty and, consequently, stimulating development. The Ethiopian micro finance policy has been generally positive and developmental but major regulatory and supervisory limitations such as the absolute prohibition of NGOs to participate in micro credit functions, higher risks for depositors of micro-finance institutions, lack of credit information services with research and development, the unmet demand, and risks of market failures due to over-regulation are disappointing. Therefore, to remove the limited reach and high degree of problems typical in the informal means of financial intermediation plus to deal with the failure of formal banks to provide basic financial services to a significant portion of the country’s population, more needs to be done on micro finance. Certain key regulatory and supervisory revisions hence need to be taken to strengthen the Ethiopian micro finance sector so that it can practically provide majority poor access to a range of high quality financial services that help them work their way out of poverty and the incapacity it imposes.

Keywords: micro-finance, micro-finance regulation and supervision, micro-finance institutions, financial access, social segregation, poverty alleviation, development, Ethiopia

Procedia PDF Downloads 366
804 Climate Related Financial Risk on Automobile Industry and the Impact to the Financial Institutions

Authors: Mahalakshmi Vivekanandan S.

Abstract:

As per the recent changes happening in the global policies, climate-related changes and the impact it causes across every sector are viewed as green swan events – in essence, climate-related changes can often happen and lead to risk and a lot of uncertainty, but needs to be mitigated instead of considering them as black swan events. This brings about a question on how this risk can be computed so that the financial institutions can plan to mitigate it. Climate-related changes impact all risk types – credit risk, market risk, operational risk, liquidity risk, reputational risk and other risk types. And the models required to compute this has to consider the different industrial needs of the counterparty, as well as the factors that are contributing to this – be it in the form of different risk drivers, or the different transmission channels or the different approaches and the granular form of data availability. This brings out the suggestion that the climate-related changes, though it affects Pillar I risks, will be a Pillar II risk. This has to be modeled specifically based on the financial institution’s actual exposure to different industries instead of generalizing the risk charge. And this will have to be considered as the additional capital to be met by the financial institution in addition to their Pillar I risks, as well as the existing Pillar II risks. In this paper, the author presents a risk assessment framework to model and assess climate change risks - for both credit and market risks. This framework helps in assessing the different scenarios and how the different transition risks affect the risk associated with the different parties. This research paper delves into the topic of the increase in the concentration of greenhouse gases that in turn cause global warming. It then considers the various scenarios of having the different risk drivers impacting the Credit and market risk of an institution by understanding the transmission channels and also considering the transition risk. The paper then focuses on the industry that’s fast seeing a disruption: the automobile industry. The paper uses the framework to show how the climate changes and the change to the relevant policies have impacted the entire financial institution. Appropriate statistical models for forecasting, anomaly detection and scenario modeling are built to demonstrate how the framework can be used by the relevant agencies to understand their financial risks. The paper also focuses on the climate risk calculation for the Pillar II Capital calculations and how it will make sense for the bank to maintain this in addition to their regular Pillar I and Pillar II capital.

Keywords: capital calculation, climate risk, credit risk, pillar ii risk, scenario modeling

Procedia PDF Downloads 107
803 A Cognitive Approach to the Optimization of Power Distribution across an Educational Campus

Authors: Mrinmoy Majumder, Apu Kumar Saha

Abstract:

The ever-increasing human population and its demand for energy is placing stress upon conventional energy sources; and as demand for power continues to outstrip supply, the need to optimize energy distribution and utilization is emerging as an important focus for various stakeholders. The distribution of available energy must be achieved in such a way that the needs of the consumer are satisfied. However, if the availability of resources is not sufficient to satisfy consumer demand, it is necessary to find a method to select consumers based on factors such as their socio-economic or environmental impacts. Weighting consumer types in this way can help separate them based on their relative importance, and cognitive optimization of the allocation process can then be carried out so that, even on days of particularly scarce supply, the socio-economic impacts of not satisfying the needs of consumers can be minimized. In this context, the present study utilized fuzzy logic to assign weightage to different types of consumers based at an educational campus in India, and then established optimal allocation by applying the non-linear mapping capability of neuro-genetic algorithms. The outputs of the algorithms were compared with similar outputs from particle swarm optimization and differential evolution algorithms. The results of the study demonstrate an option for the optimal utilization of available energy based on the socio-economic importance of consumers.

Keywords: power allocation, optimization problem, neural networks, environmental and ecological engineering

Procedia PDF Downloads 450
802 The Risk and Prevention of Peer-To-Peer Network Lending in China

Authors: Zhizhong Yuan, Lili Wang, Chenya Zheng, Wuqi Yang

Abstract:

How to encourage and support peer-to-peer (P2P) network lending, and effectively monitor the risk of P2P network lending, has become the focus of the Chinese government departments, industrialists, experts and scholars in recent years. The reason is that this convenient online micro-credit service brings a series of credit risks and other issues. Avoiding the risks brought by the P2P network lending model, it can better play a benign role and help China's small and medium-sized private enterprises with vigorous development to solve the capital needs; otherwise, it will bring confusion to the normal financial order. As a form of financial services, P2P network lending has injected new blood into China's non-government finance in the past ten years, and has found a way out for idle funds and made up for the shortage of traditional financial services in China. However, it lacks feasible measures in credit evaluation and government supervision. This paper collects a large amount of data about P2P network lending of China. The data collection comes from the official media of the Chinese government, the public achievements of existing researchers and the analysis and collation of correlation data by the authors. The research content of this paper includes literature review; the current situation of China's P2P network lending development; the risk analysis of P2P network lending in China; the risk prevention strategy of P2P network lending in China. The focus of this paper is to try to find a specific program to strengthen supervision and avoid risks from the perspective of government regulators, operators of P2P network lending platform, investors and users of funds. These main measures include: China needs to develop self-discipline organization of P2P network lending industry and formulate self-discipline norms as soon as possible; establish a regular information disclosure system of P2P network lending platform; establish censorship of credit rating of borrowers; rectify the P2P network lending platform in compliance through the implementation of bank deposition. The results and solutions will benefit all the P2P network lending platforms, creditors, debtors, bankers, independent auditors and government agencies of China and other countries.

Keywords: peer-to-peer(P2P), regulation, risk prevention, supervision

Procedia PDF Downloads 142
801 The Redistributive Effects of Debtor Protection Laws

Authors: Hamid Boustanifar, Geraldo Cerqueiro, María Fabiana Penas

Abstract:

We exploit state-level changes in the amount of personal wealth individuals can protect under Chapter 7 to analyze the causal effect of debtor protection on income inequality. We find that an increase in state exemptions significantly increases inequality by reducing income for low-income individuals and by increasing income for high-income individuals. The increase in inequality is four times larger among the self-employed than among wage earners, and it is due mainly to a growing income gap between skilled (i.e., individuals with a college degree) and unskilled entrepreneurs. We also find that the employment rate of skilled entrepreneurs significantly increases, while the employment rate of unskilled wage earners falls. Our results are consistent with a recent literature that shows that higher exemptions redistribute credit from low-wealth to high-wealth entrepreneurs, affecting the performance of their businesses.

Keywords: debtor protection, credit markets, income inequality, debtor protection laws

Procedia PDF Downloads 411
800 Data Envelopment Analysis of Allocative Efficiency among Small-Scale Tuber Crop Farmers in North-Central, Nigeria

Authors: Akindele Ojo, Olanike Ojo, Agatha Oseghale

Abstract:

The empirical study examined the allocative efficiency of small holder tuber crop farmers in North central, Nigeria. Data used for the study were obtained from primary source using a multi-stage sampling technique with structured questionnaires administered to 300 randomly selected tuber crop farmers from the study area. Descriptive statistics, data envelopment analysis and Tobit regression model were used to analyze the data. The DEA result on the classification of the farmers into efficient and inefficient farmers showed that 17.67% of the sampled tuber crop farmers in the study area were operating at frontier and optimum level of production with mean allocative efficiency of 1.00. This shows that 82.33% of the farmers in the study area can still improve on their level of efficiency through better utilization of available resources, given the current state of technology. The results of the Tobit model for factors influencing allocative inefficiency in the study area showed that as the year of farming experience, level of education, cooperative society membership, extension contacts, credit access and farm size increased in the study area, the allocative inefficiency of the farmers decreased. The results on effects of the significant determinants of allocative inefficiency at various distribution levels revealed that allocative efficiency increased from 22% to 34% as the farmer acquired more farming experience. The allocative efficiency index of farmers that belonged to cooperative society was 0.23 while their counterparts without cooperative society had index value of 0.21. The result also showed that allocative efficiency increased from 0.43 as farmer acquired high formal education and decreased to 0.16 with farmers with non-formal education. The efficiency level in the allocation of resources increased with more contact with extension services as the allocative efficeincy index increased from 0.16 to 0.31 with frequency of extension contact increasing from zero contact to maximum of twenty contacts per annum. These results confirm that increase in year of farming experience, level of education, cooperative society membership, extension contacts, credit access and farm size leads to increases efficiency. The results further show that the age of the farmers had 32% input to the efficiency but reduces to an average of 15%, as the farmer grows old. It is therefore recommended that enhanced research, extension delivery and farm advisory services should be put in place for farmers who did not attain optimum frontier level to learn how to attain the remaining 74.39% level of allocative efficiency through a better production practices from the robustly efficient farms. This will go a long way to increase the efficiency level of the farmers in the study area.

Keywords: allocative efficiency, DEA, Tobit regression, tuber crop

Procedia PDF Downloads 265
799 Credit Card Fraud Detection with Ensemble Model: A Meta-Heuristic Approach

Authors: Gong Zhilin, Jing Yang, Jian Yin

Abstract:

The purpose of this paper is to develop a novel system for credit card fraud detection based on sequential modeling of data using hybrid deep learning models. The projected model encapsulates five major phases are pre-processing, imbalance-data handling, feature extraction, optimal feature selection, and fraud detection with an ensemble classifier. The collected raw data (input) is pre-processed to enhance the quality of the data through alleviation of the missing data, noisy data as well as null values. The pre-processed data are class imbalanced in nature, and therefore they are handled effectively with the K-means clustering-based SMOTE model. From the balanced class data, the most relevant features like improved Principal Component Analysis (PCA), statistical features (mean, median, standard deviation) and higher-order statistical features (skewness and kurtosis). Among the extracted features, the most optimal features are selected with the Self-improved Arithmetic Optimization Algorithm (SI-AOA). This SI-AOA model is the conceptual improvement of the standard Arithmetic Optimization Algorithm. The deep learning models like Long Short-Term Memory (LSTM), Convolutional Neural Network (CNN), and optimized Quantum Deep Neural Network (QDNN). The LSTM and CNN are trained with the extracted optimal features. The outcomes from LSTM and CNN will enter as input to optimized QDNN that provides the final detection outcome. Since the QDNN is the ultimate detector, its weight function is fine-tuned with the Self-improved Arithmetic Optimization Algorithm (SI-AOA).

Keywords: credit card, data mining, fraud detection, money transactions

Procedia PDF Downloads 104
798 Global Health, Humanitarian Medical Aid, and the Ethics of Rationing

Authors: N. W. Paul, S. Michl

Abstract:

In our globalized world we need to appreciate the fact that questions of health and justice need to be addressed on a global scale, too. The way in which diverse governmental and non-governmental initiatives are trying to answer the need for humanitarian medical aid has long since been a visible result of globalized responsibility. While the intention of humanitarian medical aids seems to be evident, the allocation of resources has become more and more an ethical and societal challenge. With a rising number and growing dimension of humanitarian catastrophes around the globe the search for ethically justifiable ways to decide who might benefit from limited resources has become a pressing question. Rooted in theories of justice (Rawls) and concepts of social welfare (Sen) we developed and implemented a model for an ethically sound distribution of a limited annual budget for humanitarian care in one of the largest medical universities of Germany. Based on our long lasting experience with civil casualties of war (Afghanistan) and civil war (Libya) as well as with under- and uninsured and/or stateless patients we are now facing the on-going refugee crisis as our most recent challenge in terms of global health and justice. Against this background, the paper strives to a) explain key issues of humanitarian medical aid in the 21st century, b) explore the problem of rationing from an ethical point of view, c) suggest a tool for the rational allocation of scarce resources in humanitarian medical aid, d) present actual cases of humanitarian care that have been managed with our toolbox, and e) discuss the international applicability of our model beyond local contexts.

Keywords: humanitarian care, medical ethics, allocation, rationing

Procedia PDF Downloads 378
797 Sensing to Respond & Recover in Emergency

Authors: Alok Kumar, Raviraj Patil

Abstract:

The ability to respond to an incident of a disastrous event in a vulnerable area is very crucial an aspect of emergency management. The ability to constantly predict the likelihood of an event along with its severity in an area and react to those significant events which are likely to have a high impact allows the authorities to respond by allocating resources optimally in a timely manner. It provides for measuring, monitoring, and modeling facilities that integrate underlying systems into one solution to improve operational efficiency, planning, and coordination. We were particularly involved in this innovative incubation work on the current state of research and development in collaboration. technologies & systems for a disaster.

Keywords: predictive analytics, advanced analytics, area flood likelihood model, area flood severity model, level of impact model, mortality score, economic loss score, resource allocation, crew allocation

Procedia PDF Downloads 292
796 A Multi-Objective Programming Model to Supplier Selection and Order Allocation Problem in Stochastic Environment

Authors: Rouhallah Bagheri, Morteza Mahmoudi, Hadi Moheb-Alizadeh

Abstract:

This paper aims at developing a multi-objective model for supplier selection and order allocation problem in stochastic environment, where purchasing cost, percentage of delivered items with delay and percentage of rejected items provided by each supplier are supposed to be stochastic parameters following any arbitrary probability distribution. In this regard, dependent chance programming is used which maximizes probability of the event that total purchasing cost, total delivered items with delay and total rejected items are less than or equal to pre-determined values given by decision maker. The abovementioned stochastic multi-objective programming problem is then transformed into a stochastic single objective programming problem using minimum deviation method. In the next step, the further problem is solved applying a genetic algorithm, which performs a simulation process in order to calculate the stochastic objective function as its fitness function. Finally, the impact of stochastic parameters on the given solution is examined via a sensitivity analysis exploiting coefficient of variation. The results show that whatever stochastic parameters have greater coefficients of variation, the value of the objective function in the stochastic single objective programming problem is deteriorated.

Keywords: supplier selection, order allocation, dependent chance programming, genetic algorithm

Procedia PDF Downloads 291
795 The Analysis of Education Sector and Poverty Alleviation with Benefit Incidence Analysis Approach Budget Allocation Policy in East Java

Authors: Wildan Syafitri

Abstract:

The main purpose of the development is to embody public welfare. Its indication is shown by the increasing of the public prosperity in which it will be related to the consumption level as a consequence of the increasing of public income. One of the government’s efforts to increase public welfare is to create development equity in order to alleviate poor people. Poverty’s problem is not merely about the number and percentage of the poor people, but also it includes the gap and severity of poverty.the analysis method used is Benefit Incidence Analysis (BIA) that is an analysis method used to disclose the impact of government policy or individual access based on the income distribution in society. Further, the finding of the study revealed is that the highest number of the poor people in the village is those who are unemployed and have family members who are still in the Junior High School. The income distribution calculation shows a fairly good budget allocation applied with good mass ratio that is 0.31. In addition, the finding of this study also discloses that Indonesian Government policy to subsidize education cost for Elementary and Junior High School students has reached the right target. It is indicated by more benefits received by Elementary and Junior High School students who are poor and very poor than other income group.

Keywords: benefit incidence analysis, budget allocation, poverty, education

Procedia PDF Downloads 364