Results for 'credit scoring model'

1000+ found
Order:
  1.  29
    Credit Score Classification Using Machine Learning.Mosa M. M. Megdad & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (5):1-10.
    Abstract: Ensuring the proactive detection of transaction risks is paramount for financial institutions, particularly in the context of managing credit scores. In this study, we compare different machine learning algorithms to effectively and efficiently. The algorithms used in this study were: MLogisticRegressionCV, ExtraTreeClassifier,LGBMClassifier,AdaBoostClassifier, GradientBoostingClassifier,Perceptron,RandomForestClassifier,KNeighborsClassifier,BaggingClassifier, DecisionTreeClassifier, CalibratedClassifierCV, LabelPropagation, Deep Learning. The dataset was collected from Kaggle depository. It consists of 164 rows and 8 columns. The best classifier with unbalanced dataset was the LogisticRegressionCV. The Accuracy 100.0%, precession 100.0%,Recall100.0% and the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Phương pháp thống kê xây dựng mô hình định mức tín nhiệm khách hàng thể nhân.Vương Quân Hoàng - 2006 - Vietnam Journal of Mathematical Applications 4 (2):1-16.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  3. Credit Risk Modeling Using Default Models: A Review.George Jumbe & Ravi Gor - 2022 - IOSR Journal of Economics and Finance 13 (3):28-39.
    Credit risk, also known as default risk, is the likelihood of a corporation losing money if a business partner defaults. If the liabilities are not met under the terms of the contract, the firm may default, resulting in the loss of the company. There is no clear way to distinguish between organizations that will default and those that will not prior to default. We can only make probabilistic estimations of the risk of default at best. There are two types (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. A Merton Model of Credit Risk with Jumps.Hoang Thi Phuong Thao & Quan-Hoang Vuong - 2015 - Journal of Statistics Applications and Probability Letters 2 (2):97-103.
    In this note, we consider a Merton model for default risk, where the firm’s value is driven by a Brownian motion and a compound Poisson process.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  5.  63
    CREDIT RISK ASSESSMENT USING DEFAULT MODELS: A REVIEW.George Jumbe & Ravi Gor - 2022 - Vidya – a Journal of Gujarat University 1 (2):1-14.
    Credit risk, also known as default risk, is the likelihood of a corporation losing money if a business partner defaults. If the liabilities are not met under the terms of the contract, the firm may default, resulting in the loss of the company. There is no clear way to distinguish between organizations that will default and those that will not prior to default. We can only make probabilistic estimations of the risk of default at best. There are two types (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Is the Jump-Diffusion Model a Good Solution for Credit Risk Modeling? The Case of Convertible Bonds.Tim Xiao - 2015 - International Journal of Financial Markets and Derivatives 4 (1):1-25.
    This paper argues that the reduced-form jump diffusion model may not be appropriate for credit risk modeling. To correctly value hybrid defaultable financial instruments, e.g., convertible bonds, we present a new framework that relies on the probability distribution of a default jump rather than the default jump itself, as the default jump is usually inaccessible. As such, the model can back out the market prices of convertible bonds. A prevailing belief in the market is that convertible arbitrage (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Scoring Imprecise Credences: A Mildly Immodest Proposal.Conor Mayo-Wilson & Gregory Wheeler - 2016 - Philosophy and Phenomenological Research 92 (1):55-78.
    Jim Joyce argues for two amendments to probabilism. The first is the doctrine that credences are rational, or not, in virtue of their accuracy or “closeness to the truth” (1998). The second is a shift from a numerically precise model of belief to an imprecise model represented by a set of probability functions (2010). We argue that both amendments cannot be satisfied simultaneously. To do so, we employ a (slightly-generalized) impossibility theorem of Seidenfeld, Schervish, and Kadane (2012), who (...)
    Download  
     
    Export citation  
     
    Bookmark   31 citations  
  8. The credit incentive to be a maverick.Remco Heesen - 2019 - Studies in History and Philosophy of Science Part A 76:5-12.
    There is a commonly made distinction between two types of scientists: risk-taking, trailblazing mavericks and detail-oriented followers. A number of recent papers have discussed the question what a desirable mixture of mavericks and followers looks like. Answering this question is most useful if a scientific community can be steered toward such a desirable mixture. One attractive route is through credit incentives: manipulating rewards so that reward-seeking scientists are likely to form the desired mixture of their own accord. Here I (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  9. An Accurate Solution for Credit Valuation Adjustment (CVA) and Wrong Way Risk.Tim Xiao - 2015 - Journal of Fixed Incom 25 (1):84-95.
    This paper presents a Least Square Monte Carlo approach for accurately calculating credit value adjustment (CVA). In contrast to previous studies, the model relies on the probability distribution of a default time/jump rather than the default time itself, as the default time is usually inaccessible. As such, the model can achieve a high order of accuracy with a relatively easy implementation. We find that the valuation of a defaultable derivative is normally determined via backward induction when their (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  10. The Impact of Default Dependency and Collateralization on Asset Pricing and Credit Risk Modeling.Tim Xiao - manuscript
    This article presents a comprehensive framework for valuing financial instruments subject to credit risk. In particular, we focus on the impact of default dependence on asset pricing, as correlated default risk is one of the most pervasive threats in financial markets. We analyze how swap rates are affected by bilateral counterparty credit risk, and how CDS spreads depend on the trilateral credit risk of the buyer, seller, and reference entity in a contract. Moreover, we study the effect (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  11. The Valuation of Credit Default Swap with Counterparty Risk and Collateralization.Tim Xiao - manuscript
    This article presents a new model for valuing a credit default swap (CDS) contract that is affected by multiple credit risks of the buyer, seller and reference entity. We show that default dependency has a significant impact on asset pricing. In fact, correlated default risk is one of the most pervasive threats in financial markets. We also show that a fully collateralized CDS is not equivalent to a risk-free one. In other words, full collateralization cannot eliminate counterparty (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Acceptance, Aggregation and Scoring Rules.Jake Chandler - 2013 - Erkenntnis 78 (1):201-217.
    As the ongoing literature on the paradoxes of the Lottery and the Preface reminds us, the nature of the relation between probability and rational acceptability remains far from settled. This article provides a novel perspective on the matter by exploiting a recently noted structural parallel with the problem of judgment aggregation. After offering a number of general desiderata on the relation between finite probability models and sets of accepted sentences in a Boolean sentential language, it is noted that a number (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  13. Giving Credit When Credit Is Due.Edward Song - 2011 - International Journal of Applied Philosophy 25 (1):1-13.
    Issues of academic authorship pose few problems for philosophers or those in the humanities, yet raise a host of issues for medical researchers, engineers and scientists, where multiple authors is the norm and journal articles sometimes list hundreds of authors. At issue here are abstract questions about desert, as well as practical problems regarding the distribution of goods attached to authorship—tenure, prestige, research grants, etc. This paper defends a version of the author/contributor model, where the specific contributions of authors (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. How Models Fail.Eckhart Arnold - 1st ed. 2015 - In Catrin Misselhorn (ed.), Collective Agency and Cooperation in Natural and Artificial Systems. Springer Verlag.
    Simulation models of the Reiterated Prisoner's Dilemma (in the following: RPD-models) are since 30 years considered as one of the standard tools to study the evolution of cooperation (Rangoni 2013; Hoffmann 2000). A considerable number of such simulation models has been produced by scientists. Unfortunately, though, none of these models has empirically been verified and there exists no example of empirical research where any of the RPD-models has successfully been employed to a particular instance of cooperation. Surprisingly, this has not (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  15. Constraints to Accessing Micro Credit and Loan Scheme of Bank of Agriculture among Farmers in Enugu State, Nigeria Implications for Extension Service Delivery.N. Mbah Evangeline, R. Jiriko & M. O. Agada - 2017 - International Journal of Trend in Scientific Research and Development 1 (4):53-58.
    The study examined constraints to accessing micro credit loan scheme of Bank of Agriculture BOA among farmers in Enugu State, Nigeria Implications for extension service delivery. Purposive and simple random sampling techniques were used in selecting one hundred 100 respondents for the study. Data were collected using structured interview schedule questionnaire and analyzed using frequency, percentage, mean scores and standard deviation. The study revealed that micro credit loan scheme 88.6 were the most patronized among the rural farmers. Others (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Bilateral Defaultable Financial Derivatives Pricing and Credit Valuation Adjustment.Tim Xiao - manuscript
    The one-side defaultable financial derivatives valuation problems have been studied extensively, but the valuation of bilateral derivatives with asymmetric credit qualities is still lacking convincing mechanism. This paper presents an analytical model for valuing derivatives subject to default by both counterparties. The default-free interest rates are modeled by the Market Models, while the default time is modeled by the reduced-form model as the first jump of a time-inhomogeneous Poisson process. All quantities modeled are market-observable. The closed-form solution (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Pricing Financial Derivatives Subject to Multilateral Credit Risk and Collateralization.Tim Xiao - manuscript
    This article presents a new model for valuing financial contracts subject to credit risk and collateralization. Examples include the valuation of a credit default swap (CDS) contract that is affected by the trilateral credit risk of the buyer, seller and reference entity. We show that default dependency has a significant impact on asset pricing. In fact, correlated default risk is one of the most pervasive threats in financial markets. We also show that a fully collateralized CDS (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. g as bridge model.Devin Sanchez Curry - 2021 - Philosophy of Science 88 (5):1067-1078.
    Psychometric g—a statistical factor capturing intercorrelations between scores on different IQ tests—is of theoretical interest despite being a low-fidelity model of both folk psychological intelligence and its cognitive/neural underpinnings. Psychometric g idealizes away from those aspects of cognitive/neural mechanisms that are not explanatory of the relevant variety of folk psychological intelligence, and it idealizes away from those varieties of folk psychological intelligence that are not generated by the relevant cognitive/neural substrate. In this manner, g constitutes a high-fidelity bridge (...) of the relationship between its two targets and, thereby, helps demystify the relationship between folk and scientific psychology. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  19. A Wolf in Sheep's Clothing: Idealisations and the aims of polygenic scores.Davide Serpico - 2023 - Studies in History and Philosophy of Science Part A 102 (C):72-83.
    Research in pharmacogenomics and precision medicine has recently introduced the concept of Polygenic Scores (PGSs), namely, indexes that aggregate the effects that many genetic variants are predicted to have on individual disease risk. The popularity of PGSs is increasing rapidly, but surprisingly little attention has been paid to the idealisations they make about phenotypic development. Indeed, PGSs rely on quantitative genetics models and methods, which involve considerable theoretical assumptions that have been questioned on various grounds. This comes with epistemological and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. A New Model for Pricing Collateralized Financial Derivatives.Tim Xiao - 2017 - Journal of Derivatives 24 (4):8-20.
    This paper presents a new model for pricing OTC derivatives subject to collateralization. It allows for collateral posting adhering to bankruptcy laws. As such, the model can back out the market price of a collateralized contract. This framework is very useful for valuing outstanding derivatives. Using a unique dataset, we find empirical evidence that credit risk alone is not overly important in determining credit-related spreads. Only accounting for both collateral arrangement and credit risk can sufficiently (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  21. Evaluation of Ukrainian banks’ business models by the structural and functional groups analysis method.Olena Zarutska, Lyudmila Novikova, Roman Pavlov, Tatyana Pavlova & Oksana Levkovich - 2022 - Financial and Credit Activity Problems of Theory and Practice 4 (45):8-20.
    A method of identifying banks’ business models and studying the features of their risk profile, considering the system of indicators featuring the structure of assets, liabilities, income, expenses, and other qualitative indicators based on monthly statistical reporting. Kohonen's self-organizing maps (SOM) are used to process large data sets, revealing objects’ hidden features by forming homogeneous groups according to similar values of a large system of indicators. The choice of the system of indicators that play the most significant role in describing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. The Valuation of Financial Derivatives Subject to Counterparty Risk and Credit Value Adjustment.Tim Xiao - manuscript
    This article presents a generic model for pricing financial derivatives subject to counterparty credit risk. Both unilateral and bilateral types of credit risks are considered. Our study shows that credit risk should be modeled as American style options in most cases, which require a backward induction valuation. To correct a common mistake in the literature, we emphasize that the market value of a defaultable derivative is actually a risky value rather than a risk-free value. Credit (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Main characteristics of business models and risk profile of Ukrainian banks.E. Zarutska, Roman Pavlov, Tatyana Pavlova, D. Pawliszczy & B. Kuchmacz - 2020 - Financial and Credit Activity: Problems of Theory and Practice 2 (33):15-22.
    The article investigates the main characteristics of the financial stability of Ukrainian banks, their risk profile, structure of assets, liabilities, income, expenses based on the monthly reporting data for 2004-2020 (number of observations – 3 813). The Kohonen self-organizing map (SOM) toolkit is used to form homogeneous groups of banks based on a large number of financial indicators. The selected toolkit provides a convenient visualization of the results. Each bank occupies a specific place on the SOM. The close location of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. A Simple and Precise Method for Pricing Convertible Bond with Credit Risk.Tim Xiao - 2013 - Journal of Derivatives and Hedge Funds 19 (4):259-277.
    This paper presents a new model for valuing hybrid defaultable financial instruments, such as, convertible bonds. In contrast to previous studies, the model relies on the probability distribution of a default jump rather than the default jump itself, as the default jump is usually inaccessible. As such, the model can back out the market prices of convertible bonds. A prevailing belief in the market is that convertible arbitrage is mainly due to convertible underpricing. Empirically, however, we do (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Measuring Openness and Evaluating Digital Academic Publishing Models: Not Quite the Same Business.Giovanni De Grandis & Yrsa Neuman - 2014 - The Journal of Electronic Publishing 17 (3).
    In this article we raise a problem, and we offer two practical contributions to its solution. The problem is that academic communities interested in digital publishing do not have adequate tools to help them in choosing a publishing model that suits their needs. We believe that excessive focus on Open Access (OA) has obscured some important issues; moreover exclusive emphasis on increasing openness has contributed to an agenda and to policies that show clear practical shortcomings. We believe that academic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. AI Human Impact: Toward a Model for Ethical Investing in AI-Intensive Companies.James Brusseau - manuscript
    Does AI conform to humans, or will we conform to AI? An ethical evaluation of AI-intensive companies will allow investors to knowledgeably participate in the decision. The evaluation is built from nine performance indicators that can be analyzed and scored to reflect a technology’s human-centering. When summed, the scores convert into objective investment guidance. The strategy of incorporating ethics into financial decisions will be recognizable to participants in environmental, social, and governance investing, however, this paper argues that conventional ESG frameworks (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27. INTERNALISASI NILAI-NILAI PENDIDIKAN KI HADJAR DEWANTARA DALAM MODEL PEMBELAJARAN DI PERGURUAN TINGGI (Studi Eksperimen di Jurusan Tadris Matematika).Widodo Winarso - 2016 - Jurnal Math Educator Nusantara 2 (2):150-175.
    Department of Mathematics education curriculum implementation Based KKNI who have not provided the container development of character education for students. This can be seen from the learning process in college that still relies on aspects of increased knowledge. Achievement of learning on aspects of attitudes / values ​​still are administrative without being pushed on the feasibility of value investment education daily life. Applied learning models are still oriented to conventional learning eg discussions, lectures, discussion and assignment. It is necessary to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Against the countable transitive model approach to forcing.Matteo de Ceglie - 2021 - In Martin Blicha & Igor Sedlár (eds.), The Logica Yearbook 2020. College Publications.
    In this paper, I argue that one of the arguments usually put forward in defence of universism is in tension with current set theoretic practice. According to universism, there is only one set theoretic universe, V, and when applying the method of forcing we are not producing new universes, but only simulating them inside V. Since the usual interpretation of set generic forcing is used to produce a “simulation” of an extension of V from a countable set inside V itself, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Encoder-Decoder Based Long Short-Term Memory (LSTM) Model for Video Captioning.Adewale Sikiru, Tosin Ige & Bolanle Matti Hafiz - forthcoming - Proceedings of the IEEE:1-6.
    This work demonstrates the implementation and use of an encoder-decoder model to perform a many-to-many mapping of video data to text captions. The many-to-many mapping occurs via an input temporal sequence of video frames to an output sequence of words to form a caption sentence. Data preprocessing, model construction, and model training are discussed. Caption correctness is evaluated using 2-gram BLEU scores across the different splits of the dataset. Specific examples of output captions were shown to demonstrate (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  30. Digital-Based Roundtable Cooperative Learning Model on Narrative Text Teaching Materials.Ari Palupi, Miftakhul Huda & Dini Pratiwi - 2023 - In Ari Palupi, Miftakhul Huda & Dini Pratiwi (eds.), Proceedings of the International Conference on Learning and Advanced Education (ICOLAE 2022). pp. 259-279.
    This study aims to (1) describe the application of the roundtable cooperative model on narrative text teaching materials, (2) describe students’ responses to the application of the roundtable cooperative model on narrative text teaching materials, (3) describe the increase in students’ knowledge of narrative text teaching materials. The type of research used was classroom action research. Data collection techniques were observation, interviews, questionnaires, tests, and documentation. The data in this study were in the form of application, response, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Beyond Structure: Using the Rational Force Model to Assess Argumentative Writing.Ylva Backman, Alina Reznitskaya, Viktor Gardelli & Ian A. G. Wilkinson - 2023 - Written Communication 40 (2):555–585.
    Current approaches used in educational research and practice to evaluate the quality of written arguments often rely on structural analysis. In such assessments, credit is awarded for the presence of structural elements of an argument, such as claims, evidence, and rebuttals. In this article, we discuss limitations of such approaches, including the absence of criteria for evaluating the quality of the argument elements. We then present an alternative framework, based on the Rational Force Model (RFM), which originated from (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  32.  88
    Statistical Item Analysis of Basic & Integrated Science Process and Skill Test (BISPST) Using Rasch Model and SPSS.Rommel de Gracia & Melanie Gurat - 2016 - International Journal of Research and Review (Ijjr) 3 (11):89-97.
    Item analysis is a general term that refers to the specific methods used in education to evaluate test items, typically for the purpose of test construction and revision. Construction and analysis of science examinations in high school curricula needs the integration of integrated process and skill type which help students develop their rational and logical thinking. This exploratory study aimed to investigate the comparative results of item analyses using Rasch Model Analysis and SPSS. It examined the reliability, mean difficulty, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Financial Performance Of Axis Bank And Kotak Mahindra Bank In The Post Reform Era: Analysis On CAMEL Model.Kishore Meghani, Deepti Tripathi & Swati Mahajan - 2014 - IJBEMR 1 (2):108-141.
    The objective of this study is to Analyze the Financial Position and Performance of the Axis and Kotak Mahindra Bank in India based on their financial characteristics. We have chosen the CAMEL model and t-test which measures the performance of bank from each of the important parameter like capital adequacy, asset quality, management efficiency, earning quality, liquidity and Sensitivity. The present study is conducted analyze the consistency of the profitability of the Axis and Kotak Mahindra bank’s. It is analyses (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34. A Field Research On The Implementation Of The Lesson Of Arabic Language Teaching Program (Tekirdağ (Turkey)/Süleymanpaşa district as a model).Osman Arpaçukuru - 2018 - Tasavvur - Tekirdag Theology Journal 4 (1):167 - 190.
    Imam Hatip schools (religious vocational schools) in Turkey have been taught teaching Arabic for many years. However, the objectives of learning Arabic have not yet been realized. The Education Council of the Ministry of Education prepares educational plans and programs for Arabic lessons in order to increase the quality of Arabic language teaching, the first of these programs was in 1973. This research is a field study carried out in 2016 on how to implement the educational programs prepared in 2011 (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Coherence and correspondence in the network dynamics of belief suites.Patrick Grim, Andrew Modell, Nicholas Breslin, Jasmine Mcnenny, Irina Mondescu, Kyle Finnegan, Robert Olsen, Chanyu An & Alexander Fedder - 2017 - Episteme 14 (2):233-253.
    Coherence and correspondence are classical contenders as theories of truth. In this paper we examine them instead as interacting factors in the dynamics of belief across epistemic networks. We construct an agent-based model of network contact in which agents are characterized not in terms of single beliefs but in terms of internal belief suites. Individuals update elements of their belief suites on input from other agents in order both to maximize internal belief coherence and to incorporate ‘trickled in’ elements (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Computational Transformation of the Public Sphere: Theories and Cases.S. M. Amadae (ed.) - 2020 - Helsinki: Faculty of Social Sciences, University of Helsinki.
    This book is an edited collection of original research papers on the digital revolution of the public and governance. It covers cyber governance in Finland, and the securitization of cyber security in Finland. It investigates the cases of Brexit, the 2016 US presidential election of Donald Trump, the 2017 presidential election of Volodymyr Zelensky, and Brexit. It examines the environmental concerns of climate change and greenwashing, and the impact of digital communication giving rise to the #MeToo and Incel movements. It (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. The Impact of Banking Sector Development on Economic Growth: The Case of Vietnam’s Transitional Economy.Phuc Tran Nguyen - 2022 - Journal of Risk and Financial Management 15 (8):358.
    The objective of this paper is to examine the role of the banking system in the growth of the Vietnamese economy in the process of the transition that started in the early 1990s. An ARDL approach-based multivariate regression technique is applied to shed light on the impact on the growth of banking development, which is measured by broad money and bank credit. The empirical findings confirm a positive long-term effect of banking development on growth, reflecting the important role of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Celebrity Admiration and Its Relationship to the Self-Esteem of Filipino Male Teenagers.Ann Jesamine P. Dianito, Jayfree A. Chavez, Rhanarie Angela Ranis, Brent Oliver Cinco, Trizhia Mae Alvez, Nhasus D. Ilano, Amor Artiola, Wenifreda Templonuevo & Jhoselle Tus - 2023 - Psychology and Education: A Multidisciplinary Journal 7 (1):305-313.
    Fan culture has grown immensely over the past few years. People are constantly looking up to celebrities and personalities as role models for their fashion, identity, and success. During the stage of adolescence, it is normal for teenagers to admire well- known people and form fan attachments as part of their identity formation. However, this admiration of a specific media figure can be associated with one's personality, cognitive processes, and psychological well-being. Thus, the current study aims to investigate the correlation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Brazil-Portugal Transcultural Adaptation of the UWES-9: Internal Consistency, Dimensionality, and Measurement Invariance.Jorge Sinval, Sonia Pasian, Cristina Queirós & João Marôco - 2018 - Frontiers in Psychology 9.
    The aim of this paper is to present a revision of international versions of the Utrecht Work Engagement Scale and to describe the psychometric properties of a Portuguese version of the UWES-9 developed simultaneously for Brazil and Portugal, the validity evidence related with the internal structure, namely, Dimensionality, measurement invariance between Brazil and Portugal, and Reliability of the scores. This is the first UWES version developed simultaneously for both countries, and it is an important instrument for understanding employees' work engagement (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  40. A plant disease extension of the Infectious Disease Ontology.Ramona Walls, Barry Smith, Elser Justin, Goldfain Albert, W. Stevenson Dennis & Pankaj Jaiswal - 2012 - In Walls Ramona, Smith Barry, Justin Elser, Albert Goldfain & Stevenson Dennis W. (eds.), Proceeedings of the Third International Conference on Biomedical Ontology (CEUR 897). pp. 1-5.
    Plants from a handful of species provide the primary source of food for all people, yet this source is vulnerable to multiple stressors, such as disease, drought, and nutrient deficiency. With rapid population growth and climate uncertainty, the need to produce crops that can tolerate or resist plant stressors is more crucial than ever. Traditional plant breeding methods may not be sufficient to overcome this challenge, and methods such as highOthroughput sequencing and automated scoring of phenotypes can provide significant (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  41.  83
    Impact Evaluation of the Specific Regulations for Bachelors in Education (2015-2017) on the Results of the Saber Pro tests.Alejandro Farieta - 2024 - Documentos de Trabajo Saber Investigar, No. 13.
    This paper presents an impact evaluation of the policies for teacher education programs within the framework of the National Development Plan 2014-2018. The programs were compelled to obtain high-quality accreditation, increase the credits in school practices, and the English level, among other requirements. Relying on multivariable regression, it shows that, for the year 2021, there is no association between high-quality accreditation in most modules of the Saber Pro tests, or it is negative in the global score and quantitative reasoning. In (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Accident, Evidence, and Knowledge.Jonathan Vogel - 2017 - In Rodrigo Borges, Claudio de Almeida & Peter David Klein (eds.), Explaining Knowledge: New Essays on the Gettier Problem. Oxford, United Kingdom: Oxford University Press. pp. 117-133.
    I explore and develop the idea that (NA) knowledge is non-accidentally true belief. The applicable notion of non-accidentality differs from that of ‘epistemic luck’ discussed by Pritchard. Safety theories may be seen as a refinement of, or substitute for, NA but they are subject to a fundamental difficulty. At the same time, NA needs to be adjusted in order to cope with two counterexamples. The Light Switch Case turns on the ‘directionof-fit’ between a belief and the facts, while the Meson (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  43. An Economic Examination of Collateralization in Different Financial Markets.Tim Xiao - manuscript
    This paper attempts to assess the economic significance and implications of collateralization in different financial markets, which is essentially a matter of theoretical justification and empirical verification. We present a comprehensive theoretical framework that allows for collateralization adhering to bankruptcy laws. As such, the model can back out differences in asset prices due to collateralized counterparty risk. This framework is very useful for pricing outstanding defaultable financial contracts. By using a unique data set, we are able to achieve a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Sarcasm Detection in Headline News using Machine and Deep Learning Algorithms.Alaa Barhoom, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (4):66-73.
    Abstract: Sarcasm is commonly used in news and detecting sarcasm in headline news is challenging for humans and thus for computers. The media regularly seem to engage sarcasm in their news headline to get the attention of people. However, people find it tough to detect the sarcasm in the headline news, hence receiving a mistaken idea about that specific news and additionally spreading it to their friends, colleagues, etc. Consequently, an intelligent system that is able to distinguish between can sarcasm (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  45. Sarcasm Detection in Headline News using Machine and Deep Learning Algorithms.Alaa Barhoom, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (4):66-73.
    Abstract: Sarcasm is commonly used in news and detecting sarcasm in headline news is challenging for humans and thus for computers. The media regularly seem to engage sarcasm in their news headline to get the attention of people. However, people find it tough to detect the sarcasm in the headline news, hence receiving a mistaken idea about that specific news and additionally spreading it to their friends, colleagues, etc. Consequently, an intelligent system that is able to distinguish between can sarcasm (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  46. Knowledge-based systems that determine the appropriate students major: In the faculty of engineering and information technology.Samy S. Abu Naser & Ihab S. Zaqout - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (10):26-34.
    In this paper a Knowledge-Based System (KBS) for determining the appropriate students major according to his/her preferences for sophomore student enrolled in the Faculty of Engineering and Information Technology in Al-Azhar University of Gaza was developed and tested. A set of predefined criterions that is taken into consideration before a sophomore student can select a major is outlined. Such criterion as high school score, score of subject such as Math I, Math II, Electrical Circuit I, and Electronics I taken during (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  47. Predicting Audit Risk Using Neural Networks: An In-depth Analysis.Dana O. Abu-Mehsen, Mohammed S. Abu Nasser, Mohammed A. Hasaballah & Samy S. Abu-Naser - 2023 - International Journal of Academic Information Systems Research (IJAISR) 7 (10):48-56.
    Abstract: This research paper presents a novel approach to predict audit risks using a neural network model. The dataset used for this study was obtained from Kaggle and comprises 774 samples with 18 features, including Sector_score, PARA_A, SCORE_A, PARA_B, SCORE_B, TOTAL, numbers, marks, Money_Value, District, Loss, Loss_SCORE, History, History_score, score, and Risk. The proposed neural network architecture consists of three layers, including one input layer, one hidden layer, and one output layer. The neural network model was trained and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Smoke Detectors Using ANN.Marwan R. M. Al-Rayes & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (10):1-9.
    Abstract: Smoke detectors are critical devices for early fire detection and life-saving interventions. This research paper explores the application of Artificial Neural Networks (ANNs) in smoke detection systems. The study aims to develop a robust and accurate smoke detection model using ANNs. Surprisingly, the results indicate a 100% accuracy rate, suggesting promising potential for ANNs in enhancing smoke detection technology. However, this paper acknowledges the need for a comprehensive evaluation beyond accuracy. It discusses potential challenges, such as overfitting, dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Gender Prediction from Retinal Fundus Using Deep Learning.Ashraf M. Taha, Qasem M. M. Zarandah, Bassem S. Abu-Nasser, Zakaria K. D. AlKayyali & Samy S. Abu-Naser - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (5):57-63.
    Deep learning may transform health care, but model development has largely been dependent on availability of advanced technical expertise. The aim of this study is to develop a deep learning model to predict the gender from retinal fundus images. The proposed model was based on the Xception pre-trained model. The proposed model was trained on 20,000 retinal fundus images from Kaggle depository. The dataset was preprocessed them split into three datasets (training, validation, Testing). After training (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  50. Web page phishing detection Using Neural Network.Ahmed Salama Abu Zaiter & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (9):1-13.
    Web page phishing is a type of phishing attack that targets websites. In a web page phishing attack, the attacker creates a fake website that looks like a legitimate website, such as a bank or credit card company website. The attacker then sends a fraudulent message to the victim, which contains a link to the fake website. When the victim clicks on the link, they are taken to the fake website and tricked into entering their personal information.Web page phishing (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000