Results 1 to 10 of about 1,284,248 (301)

Blockchain technology for enterprise credit information sharing in supply chain finance

open access: yesJournal of Innovation & Knowledge, 2022
Credit data barriers, such as incomplete credit records, false credit information, and low security of credit data, exist in the supply chain financial credit system, rendering it difficult to support the closure of the whole financing chain's credit ...
Kangning Zheng   +6 more
doaj   +1 more source

Support Vector Machines for Credit Scoring and discovery of significant features [PDF]

open access: yes, 2008
The assessment of risk of default on credit is important for financial institutions. Logistic regression and discriminant analysis are techniques traditionally used in credit scoring for determining likelihood to default based on consumer application and
Baesens   +18 more
core   +2 more sources

Pricing Strategy of Electric Power Data Credit Product Based on Customer Value

open access: yesDiscrete Dynamics in Nature and Society, 2022
With the improvement of the intelligence level of the power network and the gradual improvement of the information and communication of the power system, the application of power big data to the corporate credit market is not only an important supplement
Zhimin Wang, Di Wang
doaj   +1 more source

Credit procyclicality and financial regulation in South Africa

open access: yesSouth African Journal of Economic and Management Sciences, 2016
This study assesses the behaviour of credit extension over the business cycle in South Africa for the period 2000 to 2012. This is motivated by the proposal of the Basel Committee on Banking Supervision to look at credit extension over the business cycle
James Bernstein   +2 more
doaj   +1 more source

A Critical Evaluation of the Use of Sanctions Clauses in Letters of Credit

open access: yesPotchefstroom Electronic Law Journal, 2022
With the sharp increase in sanctions-related compliance requirements and expectations over the last decade, banks have sought various methods to mitigate the legal risk of engaging sanctioned persons or entities.
Cayle Lupton
doaj   +1 more source

Innovative Risk Early Warning Model Based on Internet of Things Under Big Data Technology

open access: yesIEEE Access, 2021
An innovative financial risk early warning model based on the Internet of Things (IoT) big data technology is proposed to maintain the long-term stable development of Internet finance.
Changlin Wang, Siting Liu
doaj   +1 more source

Giving Credit: Citations and References [PDF]

open access: yesClinical Chemistry, 2011
You are nearing the end of the process of writing your scientific paper. You have carefully written a concise introduction, provided a detailed description of your methods, reported your results clearly, and discussed the meaning of your results. You may even have the perfect title and abstract ready to go. But the need to keep your focus and attention
openaire   +2 more sources

Re-thinking the regulatory environment of credit reporting: Could legislation stem privacy and discrimination concerns? [PDF]

open access: yes, 2006
This paper examines the activities carried out in the UK by Credit Reference Agencies, current business practices, and the legal standing of credit reporting. It suggests areas and issues for further legal debate and policy consideration.
Ferretti, F
core   +1 more source

Does the green credit policy promote the technological innovation of clean energy enterprises? Empirical evidence from China

open access: yesFrontiers in Energy Research, 2023
The technological innovation of clean energy enterprises is conducive to the transformation of energy structure, and the green credit policy is just a potential opportunity for clean energy enterprises to seek financing convenience. This paper constructs
Xuesong Gu, Zehua Tian
doaj   +1 more source

Degeneralization Algorithm for Generation of Büchi Automata Based on Contented Situation

open access: yesJournal of Applied Mathematics, 2015
We present on-the-fly degeneralization algorithm used to transform generalized Büchi automata (GBA) into Büchi Automata (BA) different from the standard degeneralization algorithm.
Laixiang Shan   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy