Credit assessment is a method used by banks or other financial institutions that are useful to determine whether a prospective debtor is feasible or not get a loan. The way is to collect customer data taken from the application data customer lending other than by using a statistical program that contains a history of loan among other things on how the payment cycle is billing the customer, if the customer pays bills on time or not, how many credits are still in progress. This assessment helps the banks to analyze credit applications besides other qualitative factors. If the customer has a problem in the smooth payment, the information will be known by funders. Profile Matching is the decision support system method to rank the client feasibility. It can assess based on particular parameters given. There are several parameters to be considered. It helps banks or other financial agents to pass the client borrowing money.
SBI personal loan scheme offers personal loans at the low interest rate, minimum processing fees, no prepayment penalties and lots more to help customers to support their genuine requirements.
More Info : https://www.afinoz.com/sbi-personal-loan
Consumer durable loans are loans given for buying television, microwave, food processors, washing machines among others.
The quantum of loan advanced may vary from Rs 5,000 to Rs 1,00,000. Normally 90% of the value is advanced and the repayment period is between 12 months to 36 months. Although this type of loan is largely unsecured but some of the equipments like computers, refrigerators and music system is hypothecated. Nationalised banks charge lesser rate of interest than the other banks
SBI personal loan scheme offers personal loans at the low interest rate, minimum processing fees, no prepayment penalties and lots more to help customers to support their genuine requirements.
More Info : https://www.afinoz.com/sbi-personal-loan
Consumer durable loans are loans given for buying television, microwave, food processors, washing machines among others.
The quantum of loan advanced may vary from Rs 5,000 to Rs 1,00,000. Normally 90% of the value is advanced and the repayment period is between 12 months to 36 months. Although this type of loan is largely unsecured but some of the equipments like computers, refrigerators and music system is hypothecated. Nationalised banks charge lesser rate of interest than the other banks
Causes of Non-Performing Loan: A Study on State Owned Commercial Bank of Bang...Dhaka university
Research Objectives and Possible Research Questions, Classified Loan, Theories: Ethical theory, Moral Hazard, Political Power, Transaction Cost, Stakeholder, Conceptual framework, Research Position, References and Reviewed Literature
Personal loan is the one among all the credit products which remains in demand throughout the year. It is the best-selling financial product for which most of the people went for in last two years
Blog: https://financebuddha.com/blog/hdfc-bank-personal-loans-makes-worthy-choice
Causes of Non-Performing Loan: A Study on State Owned Commercial Bank of Bang...Dhaka university
Research Objectives and Possible Research Questions, Classified Loan, Theories: Ethical theory, Moral Hazard, Political Power, Transaction Cost, Stakeholder, Conceptual framework, Research Position, References and Reviewed Literature
Personal loan is the one among all the credit products which remains in demand throughout the year. It is the best-selling financial product for which most of the people went for in last two years
Blog: https://financebuddha.com/blog/hdfc-bank-personal-loans-makes-worthy-choice
Personal loans have grown in popularity in recent years, as many individuals seek financial help for various purposes, such as debt consolidation and home renovations. There is a widespread perception that personal loans are easily accessible to those in need. However, it's important to grasp the reality of loan accessibility and the factors that influence the approval process. In this article, we will explore the truth about personal loan accessibility, shedding light on the intricacies of approval and exploring alternative options for different borrower profiles.
What is Loan?
How Loan works ?
Why Loan is required ?
What are the problems salesperson facing in Auto Loan ?
What are the customer problems which are interested in Auto Loan?
How to make customers buying decision easier by Auto Loan?
Loans are like a helping hand when you need money for different things in life. In India, there are many types of loans, each designed for a specific need. Let's dive into the world of loans and understand what they are all about.
1. Personal Loans: These are like a magic wand for sudden expenses. No need to give anything valuable as security. Just show your income and pay it back with interest.
2. Home Loans: Dreaming of your own home? Home loans can make it happen. You use your house as a promise to pay back the loan, and you get a long time to do it.
3. Car Loans: Want to own a car? Car loans can make it real. The car itself is like a guarantee that you'll pay the money back.
4. Education Loans: For students, education loans can be a lifesaver. They help pay for your studies, and you can pay them back after you start working.
5. Business Loans: If you want to start or grow a business, these loans can be your best friend. Depending on your plan, you might need to give something as security.
6. Gold Loans: Have some gold jewelry? You can get a loan by keeping it as security. It's quick and easy.
7. Loan Against Property: If you own a valuable property, you can use it to get a big loan. You promise to pay back, and they give you the money.
8. Loan Against Securities: If you have investments like stocks or bonds, you can use them to get a loan. It's like a win-win.
9. Agricultural Loans: Farmers get help too! These loans are for buying farming stuff. The government also has special schemes.
10. Government-Sponsored Loans: The government wants to help people in different areas like small businesses. They offer loans with special benefits.
So, there you go! These are the main types of loans in India. Remember, each loan has its own rules, so make sure to check with the bank or lender about how it works before you decide which one is right for you. Loans can be a great help, but it's important to use them wisely and repay them on time.
Short term loans are essentially cash advances that are given to people in times of immediate need of cash and that is one of the main reasons why these loans are becoming increasingly popular.
The security and speed of data transmission is very important in data communications, the steps that can be done is to use the appropriate cryptographic and compression algorithms in this case is the Data Encryption Standard and Lempel-Ziv-Welch algorithms combined to get the data safe and also the results good compression so that the transmission process can run properly, safely and quickly.
The problem of electric power quality is a matter of changing the form of voltage, current or frequency that can cause failure of equipment, either utility equipment or consumer property. Components of household equipment there are many nonlinear loads, one of which Mixer. Even a load nonlinear current waveform and voltage is not sinusoidal. Due to the use of household appliances such as mixers, it will cause harmonics problems that can damage the electrical system equipment. This study analyzes the percentage value of harmonics in Mixer and reduces harmonics according to standard. Measurements made before the use of LC passive filter yield total current harmonic distortion value (THDi) is 61.48%, while after passive filter use LC the THDi percentage becomes 23.75%. The order of harmonic current in the 3rd order mixer (IHDi) is 0.4185 A not according to standard, after the use of LC passive filter to 0.088 A and it is in accordance with the desired standard, and with the use of passive filter LC, the power factor value becomes better than 0.75 to 0.98.
This paper examines the long-term simultaneous response between dividend policy and corporate value. The main problem studied is that the dividend policy is responded very slowly to the final goal of corporate value. Analysis of Data was using Vector Autoregression (VAR). The result of the discussion concludes the effect of different simultaneous response every period between dividend policy with corporate value, short-term, medium-term, and long-term. The strongest response to dividend changes comes from free cash flow whereas the highest response to corporate value comes from market book value.
Whatsapp is a social media application that is currently widely used from various circles due to ease of use and security is good enough, the security at the time of communicating at this time is very important as well with Whatsapp. Whatsapp from the network is very secure but on the local storage that contains the message was not safe enough because the message on local storage is not secured properly using a special algorithm even using the software Whatsapp Database Viewer whatsapp message can be known, to improve the security of messages on local storage whatsapp submitted security enhancements using the Modular Multiplication Block Cipher algorithm so that the message on whatsapp would be better in terms of security and not easy to read by unauthorized ones.
Consumers are increasingly easy to access to information resources. Consumers quickly interact with whatever they will spend. Ease of use of technology an impact on consumer an attitude are increasingly intelligent and has encouraged the rise of digital transactions. Technology makes it easy for them to transact on an e-commerce shopping channel. Future e-commerce trends will lead to User Generated Content related to user behavior in Indonesia that tends to compare between shopping channels. The purpose of this study was to examine the direct and indirect effects of Perceived Ease of Use on Behavioral Intention to transact in which Perceived Usefulness is used as an intervening variable. The present study used the descriptive exploratory method with causal-predictive analysis. Determination method of research sample used purposive sampling. The enumerator team assists in the distribution of questionnaires. The results of the study found that the direct effect of perceived ease of use on behavioral intention to transact is smaller than that indirectly mediated by perceived usefulness variables.
Performance is a process of assessment of the algorithm. Speed and security is the performance to be achieved in determining which algorithm is better to use. In determining the optimum route, there are two algorithms that can be used for comparison. The Genetic and Primary algorithms are two very popular algorithms for determining the optimum route on the graph. Prim can minimize circuit to avoid connected loop. Prim will determine the best route based on active vertex. This algorithm is especially useful when applied in a minimum spanning tree case. Genetics works with probability properties. Genetics cannot determine which route has the maximum value. However, genetics can determine the overall optimum route based on appropriate parameters. Each algorithm can be used for the case of the shortest path, minimum spanning tree or traveling salesman problem. The Prim algorithm is superior to the speed of Genetics. The strength of the Genetic algorithm lies in the number of generations and population generated as well as the selection, crossover and mutation processes as the resultant support. The disadvantage of the Genetic algorithm is spending to much time to get the desired result. Overall, the Prim algorithm has better performance than Genetic especially for a large number of vertices.
Implementation of Decision Support System for various purposes now can facilitate policy makers to get the best alternative from a variety of predefined criteria, one of the methods used in the implementation of Decision Support System is VIKOR (Vise Kriterijumska Optimizacija I Kompromisno Resenje), VIKOR method in this research got the best results with an efficient and easily understood process computationally, it is expected that the results of this study facilitate various parties to develop a model any solutions.
Edge detection is one of the most frequent processes in digital image processing for various purposes, one of which is detecting road damage based on crack paths that can be checked using a Canny algorithm. This paper proposed a mobile application to detect cracks in the road and with customized threshold function in the requests to produce useful and accurate edge detection. The experimental results show that the use of threshold function in a canny algorithm can detect better damage in the road
The security and confidentiality of information becomes an important factor in communication, the use of cryptography can be a powerful way of securing the information, IDEA (International Data Encryption Algorithm) and WAKE (Word Auto Key Encryption) are some modern symmetric cryptography algorithms with encryption and decryption function are much faster than the asymmetric cryptographic algorithm, with the combination experiment IDEA and WAKE it probable to produce highly secret ciphertext and it hopes to take a very long time for cryptanalyst to decrypt the information without knowing the key of the encryption process.
Employees are the backbone of corporate activities and the giving of bonuses, job titles and allowances to employees to motivate the work of employees is very necessary, salesman on the company very much and to find the best salesman cannot be done manually and for that required the implementation of a system in this decision support system by applying the TOPSIS method, it is expected with the implementation of TOPSIS method the expected results of top management can be fulfilled.
English is a language that must be known all-digital era at this time where almost all information is in English, ranging from kindergarten to college learn English. elementary school is now also there are learning and to help introduce English is prototype application recogni-tion of common words in English and can be updated dynamically so that updates occur information to new words and sentences in Eng-lish to be introduced to students.
The selection of the best employees is one of the process of evaluating how well the performance of the employees is adjusted to the standards set by the company and usually done by top management such as General Manager or Director. In general, the selection of the best employees is still perform manually with many criteria and alternatives, and this usually make it difficult top managerial making decisions as well as the selection of the best employees periodically into a long and complicated process. Therefore, it is necessary to build a decision support system that can help facilitate the decision maker in determining the best choice based on standard criteria, faster, and more objective. In this research, the computational method of decision-making system used is Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS). The criteria used in the selection of the best employees are: job responsibilities, work discipline, work quality, and behaviour. The final result of the global priority value of the best employee candidates is used as the best employee selection decision making tool by top management.
Rabin Karp algorithm is a search algorithm that searches for a substring pattern in a text using hashing. It is beneficial for matching words with many patterns. One of the practical applications of Rabin Karp's algorithm is in the detection of plagiarism. Michael O. Rabin and Richard M. Karp invented the algorithm. This algorithm performs string search by using a hash function. A hash function is the values that are compared between two documents to determine the level of similarity of the document. Rabin-Karp algorithm is not very good for single pattern text search. This algorithm is perfect for multiple pattern search. The Levenshtein algorithm can be used to replace the hash calculation on the Rabin-Karp algorithm. The hash calculation on Rabin-Karp only counts the number of hashes that have the same value in both documents. Using the Levenshtein algorithm, the calculation of the hash distance in both documents will result in better accuracy.
Cybercrime is a digital crime committed to reaping profits through the Internet as a medium. Any criminal activity that occurs in the digital world or through the internet network is referred to as internet crime. Cybercrime also refers to criminal activity on computers and computer networks. This activity can be done in a certain location or even done between countries. These crimes include credit card forgery, confidence fraud, the dissemination of personal information, pornography, and so on. In ancient times there was no strong law to combat cybercrime. Since there are electronic information laws and transactions, legal jurisdiction of computer crime has been applied. Computer networks are not only installed in one particular local area but can be applied to a worldwide network. It is what makes cybercrime can occur between countries freely. This issue requires universal jurisdiction. A country has the authority to combat crimes that threaten the international community. This jurisdiction is applied without determining where the crime was committed and the citizen who committed the cybercrime. This jurisdiction is created in the absence of an international judicial body specifically to try individual crimes. Cybercrime cannot be totally eradicated. Implementing international jurisdiction at least reduces the number of cybercrimes in the world.
Competitive market competition so the company must be smart in managing finance. In promoting the selling point, marketing is the most important step to be considered. Promotional routine activity is one of the marketing techniques to increase consumer appeal to marketed products. One of the important agendas of promotion is the selection of the most appropriate promotional media. The problem that often occurs in the process of selecting a promotional media is the subjectivity of decision making. Marketing activities have a taxation fund that must be issued. Limited funds are one of the constraints of improving market strategy. So far, the selection of promotional media is performed by the company manually using standardized determination that already applies. It has many shortcomings, among others, regarding effectiveness and efficiency of time and limited funds. Markov Chain is very helpful to the company in analyzing the development of the company over a period. This method can predict the market share in the future so that company can optimize promotion cost at the certain time. Implementation of this algorithm produces a percentage of market share so that businesses can determine and choose which way is more appropriate to improve the company's market strategy. Assessment is done by looking at consumer criteria of a particular product. These criteria can determine consumer interest in a product so that it can be analyzed consumer behavior.
The transition of copper cable technology to fiber optic is very triggering the development of technology where data can be transmitted quickly and accurately. This cable change can be seen everywhere. This cable is an expensive cable. If it is not installed optimally, it will cost enormously. This excess cost can be used to other things to support performance rather than for excess cable that should be minimized. Determining how much cable use at the time of installation is difficult if done manually. Prim's algorithm can optimize by calculating the minimum spanning tree on branches used for fiber optic cable installation. This algorithm can be used to shorten the time to a destination by making all the points interconnected according to the points listed. Use of this method helps save the cost of fiber optic construction.
An image is a medium for conveying information. The information contained therein may be a particular event, experience or moment. Not infrequently many images that have similarities. However, this level of similarity is not easily detected by the human eye. Eigenface is one technique to calculate the resemblance of an object. This technique calculates based on the intensity of the colors that exist in the two images compared. The stages used are normalization, eigenface, training, and testing. Eigenface is used to calculate pixel proximity between images. This calculation yields the feature value used for comparison. The smallest value of the feature value is an image very close to the original image. Application of this method is very helpful for analysts to predict the likeness of digital images. Also, it can be used in the field of steganography, digital forensic, face recognition and so forth.
Compression is an activity performed to reduce its size into smaller than earlier. Compression is created since lack of adequate storage capacity. Data compression is also needed to speed up data transmission activity between computer networks. Compression has the different rule between speed and density. Compressed compression will take longer than compression that relies on speed. Elias Delta is one of the lossless compression techniques that can compress the characters. This compression is created based on the frequency of the character of a character on a document to be compressed. It works based on bit deductions on seven or eight bits. The most common characters will have the least number of bits, while the fewest characters will have the longest number of bits. The formation of character sets serves to eliminate double characters in the calculation of the number of each character as well as for the compression table storage. It has a good level of comparison between before and after compression. The speed of compression and decompression process possessed by this method is outstanding and fast.
Technological developments in computer networks increasingly demand security on systems built. Security also requires flexibility, efficiency, and effectiveness. The exchange of information through the internet connection is a common thing to do now. However, this way can be able to trigger data theft or cyber crime which resulted in losses for both parties. Data theft rate is getting higher by using a wireless network. The wireless system does not have any signal restrictions that can be intercepted Filtering is used to restrict incoming access through the internet. It aims to avoid intruders or people who want to steal data. This is fatal if not anticipated. IP and MAC filtering is a way to protect wireless networks from being used and misused by just anyone. This technique is very useful for securing data on the computer if it joins the public network. By registering IP and MAC on a router, this will keep the information unused and stolen. This system is only a few computers that can be connected to a wireless hotspot by IP and MAC Address listed.
Catfish is one type of freshwater fish. This fish has a good taste. In the cultivation of these fish, many obstacles need to be faced. Because living in dirty water, this type of fish is susceptible to disease. Many symptoms arise during the fish cultivation process; From skin disease to physical. Catfish farmers do not know how to diagnose diseases that exist in their livestock. This diagnosis serves to separate places between good and sick catfish. The goal is that the sale value of the fish is high. Catfish that have diseases will be sold cheaper to be used as other animal feed while healthy fish will be sold to the market or exported to other countries. Diagnosis can be done by expert system method. The algorithm of certainty factor is one of the good algorithms to determine the percentage of possible fish disease. This algorithm is very helpful for farmers to improve catfish farming.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
2024.06.01 Introducing a competency framework for languag learning materials ...
Credit Assessment in Determining The Feasibility of Debtors Using Profile Matching
1. International Journal of Business and Management Invention
ISSN (Online): 2319 – 8028, ISSN (Print): 2319 – 801X
www.ijbmi.org || Volume 6 Issue 1 || January. 2017 || PP—73-79
www.ijbmi.org 73 | Page
Credit Assessment in Determining The Feasibility of Debtors
Using Profile Matching
Husni Muharram Ritonga1
, Hasrul Azwar Hasibuan2
,
Andysah Putera Utama Siahaan3
1,2
Faculty of Economics and Business, 3
Faculty of Computer Science Universitas Pembangunan Panca Budi
Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia
ABSTRACT: Credit assessment is a method used by banks or other financial institutions that are useful to
determine whether a prospective debtor is feasible or not get a loan. The way is to collect customer data taken
from the application data customer lending other than by using a statistical program that contains a history of
loan among other things on how the payment cycle is billing the customer, if the customer pays bills on time or
not, how many credits are still in progress. This assessment helps the banks to analyze credit applications
besides other qualitative factors. If the customer has a problem in the smooth payment, the information will be
known by funders. Profile Matching is the decision support system method to rank the client feasibility. It can
assess based on particular parameters given. There are several parameters to be considered. It helps banks or
other financial agents to pass the client borrowing money.
Keywords: Financial, Creditor, Debtor, Profile Matching
I. INTRODUCTION
Bank is a business entity that collects funds from the public in deposits and distributes to the public in
the credits. Speaking about the credit, can not be separated from the purpose of the banks themselves. The
purpose of banks is lending to a third party, public or debtor. Although people became the main target, in this
case, not all credit applications from prospective borrowers approved by the banks. Parties that determine
whether or not credit is agreed is a credit analyst team. Prospective debtors may have experienced rejection in
the credit application. Why is the credit application rejected when banks had qualified it? Many factors go into a
credit analyst before providing recommendations to agree or disagree to the debtor. They have filled the format
and method in writing with the form, format, and the depth of the specified bank. Also, the analysis was not
based on subjective considerations of the credit application.
Analysts have their way to provide an assessment of the feasibility to potential debtors. In the study, the
author tries to give examples of credit ratings with the Profile Matching method. This method has the aspects
and sub-aspects that have ratios respectively. Analysts can set the level comparison in every aspect. This method
gives a great influence to the admissibility of an application for credit. On a monthly basis, there are many
applications in creditors but not every application will be approved. This method aims to select some of all
entries in the given period. Bank expects that this method has a good contribution in choosing which candidates
are eligible to get a loan. By applying this method, an error in selecting consumer and bad credit could be
avoided.
II. THEORIES
2.1 Credit
The term credit comes from the Italian word "credare". It means "trust," is the confidence of the lender
(creditor) that the borrower (debtor) will recover the funds borrowed and interest thereon by the agreement
going on between the two sides [1]. A creditor will trust the debtors that they will not be bogged down in the
refund loans. Based on the Banking Law of the Republic of Indonesia Number 7 of 1992 that credit is the
provision of money under contracts or the borrowing and lending between banks and other parties who require
the borrower to repay the debt after a certain period with the amount of interest remuneration or profit sharing.
The existence of credit in the economy affair is already used since a long time ago. It is often heard or even
directly related to the credit in everyday life. The term loan is to be things that often we encounter in society.
The easiest example is an electronics store, where many of its products are sold not only by the cash purchase
system but also with the credit. Creditor right is to obtain payment, or the debtor's obligation is to make
payments at the time requested or in the future because of the delivery of money at present.
In the credit, there is the principle of trust and prudence. Indicators of these beliefs are based on moral
beliefs, commercial, financial, and assurance. While confidence in the credit can be divided into two, pure and
reserve trust. Pure trust is when lenders extend credit to the debtor based only on trust without any warranty of
any kind [6][7]. For example, the debtor to borrow money from friends and was not accompanied by any
2. Credit Assessment in Determining The Feasibility of Debtors Using Profile Matching
www.ijbmi.org 74 | Page
collateral, only based on mutual trust. While the reserve trust, the lender providing credit or loans to borrowers
not only by faith alone but accompanied by a collateral matter. In lending at banks that are taking precedence is
collateral for the loan, so not only based on the principle of trust alone.
Humans require credit because humans have needs that sometimes must be purchased by installments. Human
needs are varied by the dignity that is always rising, while the ability to achieve something is limited. This
causes the human need assistance to meet the desires and ideals. To improve business or usability of goods,
people need material assistance from creditors. Provision of credit facilities has several objectives that must not
be separated from the mission of the company is established. Credit has several functions as follows:
1. Improve usability exchange
Credit can improve the usability of money. If the money just kept alone, it will not produce anything useful.
The money is to be useful to produce goods or services by credit recipients.
2. Improve traffic circulation of money.
In this case, the money given or distributed will circulate from one area to another so that a region strapped
with obtaining credit this region will receive additional money from other areas.
3. Improve usability of goods.
Loans granted by the bank's money will be used by the debtor to process into useful items that are not
useful or helpful.
4. Improve circulation of goods.
Credit can also add or facilitate the flow of goods from one area to another, so that the amount of goods
circulating from one area to another or credit increases may also increase the amount outstanding.
5. Maintain economic stability
By providing credit, it can be considered as economic stability because of the presence of loans will
increase the number of items required by the community. Then the credits can also help in exporting goods
from domestic to overseas thus increase foreign exchange.
6. Rise excitement of trying
The recipient will be able to increase the credits of the excitement of trying, especially for the customers
who have limited capital.
7. Improve distribution of income
The more loans, the better, especially regarding increasing revenue. If a credit is given to build the plant,
then the plant would require a workforce so, it may reduce unemployment. Besides, for the surrounding
community will also have to increase revenue such as kiosks or rent a house for rent or other services.
8. Improve international relations.
Regarding international loans will be able to increase mutual need between the recipient of the loan with the
lender. Lending by other countries will enhance cooperation in other fields.
Credit has several elements. The elements contained in the provision of credit facilities are as follows:
1. Trust
Confidence is a belief against the lender for granted received back in the future according to the credit
period. The Bank provides trust from underlying why a credit can be brave in the drizzle.
2. Agreement
Agreement in an agreement that each party signed the rights and obligations of each. Agreements are in a
credit agreement and signed by both parties before the credit is disbursed.
3. Period
From the period that has been agreed on of lending by banks and credit repayment by the debtor.
4. Risks
In avoiding bad risks in the credit agreement, binding agreements have previously performed the guarantees
that are charged to the debtor or borrower.
5. Achievement
Achievement is an object of interest on an agreed fee by the bank and the debtor.
2.2 Profile Matching
Profile matching is a method often used as a mechanism for decision-making by assuming that there is an ideal
level of predictor variables that must be met by the subjects studied, instead of the minimum rate that must be
met or passed [2..5]. Here are some steps and formulation of the calculation method of profile matching:
1. Weighting
This phase will be determined the weight value of each aspect of using weights gap. Gap is the difference
between the value of the aspect and the target value. It can be obtained by this formula.
3. Credit Assessment in Determining The Feasibility of Debtors Using Profile Matching
www.ijbmi.org 75 | Page
2. Core and Secondary Factor
This stage determines the weight value gap necessary criteria, each criterion grouped into two groups: core
factor and the secondary factor.
a. Core Factor
Core factor is the aspect most needed. The formula below is to calculate the core factor.
NCF : Core Factor Value
NC : Total Weight Core Factor
IC : Total Item Core Factor
b. Secondary Factor
Secondary factors are the items other than that of the core aspects of factors. The formula for calculating the
secondary factor is as follows:
NSF : Secondary Factor Value
NS : Total Weight Secondary Factor
IS : Total Item Secondary Factor
3. Total Value Calculation
From the core calculation factors and secondary factors of every aspect, and then calculated the total value
of each aspect of the estimated effect on the performance of each profile. To calculate the total value of
each aspect, the following formula is used.
N : Total value of each aspect
NCF : Average Core Factor
NSF : Average Secondary Factor
X% : Percentage value is entered
4. Ranking
The final result of the profile matching process is a ranking which refers to the calculation results shown by
this formula:
R : Rank value
NCF : Core Factor value
NSF : Secondary Factor value
III. PROPOSED WORK
3.1 Assessment Criteria
Before a credit facility granted, the bank must be sure that the loans should be completely paid [8].
Confidence is gained from the study of credit before the credit was disbursed. Research of credit by banks can
be done in various ways to gain the confidence of its customers, such as through a correct assessment procedure
and earnest. In conducting the criteria and aspects assessments remain the same. Usually, the common criteria
assessment should be made by banks to get customers who deserve to be given.
1. Character
The character is the nature or character of the individual. The nature or character of the person who will be
given the credit really should be trusted. In this case, the bank believes is true that the prospective debtor
has a good reputation, it always means keeping promises and not involved matters relating to crime, for
example, a gambler, a drunkard, or a swindler. To be able to read the nature or character of prospective
borrowers can be seen from the customer background, both the background and the work of a personal
nature as a way of life or enslaving lifestyle, family situation, hobbies, and social life.
4. Credit Assessment in Determining The Feasibility of Debtors Using Profile Matching
www.ijbmi.org 76 | Page
2. Capacity
Capacity is an analysis to determine the ability of customers to pay for the credit. Banks should know with
certainty on the ability of prospective borrowers by analyzing its business from time to time. Revenue
increases are expected in the future are always able to make the repayment on credit. Meanwhile, when an
estimated incapable, the bank may reject the request of prospective borrowers. The name of capability often
is called capacity.
3. Capital
Capital is the condition of property owned by the company that managed the prospective borrowers. Banks
must examine the debtor in addition to the amount of capital is also its structure. To see whether the
effective use of capital, it can be seen from the financial statements presented by performing such
measurements regarding liquidity and solvency, profitability and other sizes.
4. Condition
Financing provided also need to consider the economic conditions associated with the prospective
customer's business prospects. Condition assessment and business fields financed should have good
prospects, so the possibility of problematic loans is relatively small.
5. Behaviour
Behaviour is to assess the customer regarding personality every day and his personality in the past.
Personality assessment also includes attitudes, emotions, behavior and actions of customers in the face of a
problem and resolve it.
6. Party
The party is to classify customers into classifications or certain groups based capital, loyalty, and character
so that customers can be categorized into specific groups and will get different credit facilities from banks.
7. Purpose
The purpose is the aim of the customer in taking credit, including credit desired types of customers. The
purpose lines of credit can vary as needed. For example, whether for working capital, investment,
consumption, productive and others.
8. Prospect
Prospect is assessing the customer's business in the future whether favorable or not, in other words, have a
prospect or vice versa. It is important because if a credit facility financed without having prospects, not only
banks but also the loss of customers.
9. Payment
Payment is a measure of how customers return the loans that have been taken or from any source of funds
for repayment of credit. The more sources of income of the debtor, the better. So that if other businesses
will cover one attempt losers.
10. Profitability
Profitability is to analyze how the client's ability to seek profit. Profitability measured from period to
period, whether it will remain the same or will increase, especially with the extra credits that will be earned.
11. Protection
The goal is to keep the loans get guaranteed protection, so the loans completely safe. The protection
provided by the debtor may be a guarantee of goods or people or insurance.
3.2 Assessment Instrument
The intended instrument is a device that meets the requirements, so it can be used as a tool to measure an object
measuring or collecting data about a variable. In the field of research, the instrument is defined as a tool to
collect data on the variables of research for research needs. In the economic field, the instrument used to
measure the level of credit capacity; factors suspected to have a relationship or effect on credit quality. Table 1
shows the modeling of the instruments used.
Table 1 Assessment instrument
Variable Instrument
Ability (A) Character
(B) Capacity
(C) Capital
(D) Condition
Personality (E) Behaviour
(F) Party
(G) Purpose
Feasibility (H) Prospect
(I) Payment
(J) Profitability
(K) Protection
5. Credit Assessment in Determining The Feasibility of Debtors Using Profile Matching
www.ijbmi.org 77 | Page
Table 2 Scoring system
REMARK SCORE
Disagree 1
Neutral 2
Agree 3
Table 2 shows the scoring system using Likert scale. There are three options in answering the questionnaire.
They are DISAGREE, NEUTRAL, and AGREE.
IV. EVALUATION
This section is the test of the provided instrument obtained earlier. The assessment must be converted
into the Likert scale from "1" to "3". For this test, there will be five debtors who have different parameters.
Table 3 shows the debtors data in three categories.
Table 3 Scoring data
DEBTORS
ABILITY
A B C D
CF SF SF CF
1 DEBTOR 1 2 3 1 2
2 DEBTOR 2 3 2 1 2
3 DEBTOR 3 1 2 3 3
4 DEBTOR 4 2 3 1 3
5 DEBTOR 5 1 2 3 2
DEBTORS
PERSONALITY
E F G
CF CF SF
1 DEBTOR 1 3 2 1
2 DEBTOR 2 1 2 2
3 DEBTOR 3 1 3 3
4 DEBTOR 4 2 2 2
5 DEBTOR 5 1 2 1
DEBTORS
FEASIBILITY
H I J K
SF SF CF CF
1 DEBTOR 1 2 3 3 1
2 DEBTOR 2 2 2 3 1
3 DEBTOR 3 2 2 3 1
4 DEBTOR 4 2 3 3 1
5 DEBTOR 5 2 3 3 1
Table 4 : Target Value
TARGET
A B C D
2 2 2 2
E F G
1 1 1
H I J K
2 2 2 2
Table 4 shows the target value of each parameter. Data is categorized into three aspects, Ability,
Personality, and Feasibility. There area eleven parameters. Each of them is filled with the previous score and
compared with the existing target value. Table 5 shows the gap value obtained.
6. Credit Assessment in Determining The Feasibility of Debtors Using Profile Matching
www.ijbmi.org 78 | Page
Table 5 Gap value
DEBTORS
ABILITY
A B C D
CF SF SF CF
1 DEBTOR 1 0 1 -1 0
2 DEBTOR 2 1 0 -1 0
3 DEBTOR 3 -1 0 1 1
4 DEBTOR 4 0 1 -1 1
5 DEBTOR 5 -1 0 1 0
DEBTORS
PERSONALITY
E F G
CF CF SF
1 DEBTOR 1 2 1 0
2 DEBTOR 2 0 1 1
3 DEBTOR 3 0 2 2
4 DEBTOR 4 1 1 1
5 DEBTOR 5 0 1 0
DEBTORS
FEASIBILITY
H I J K
SF SF CF CF
1 DEBTOR 1 0 1 1 -1
2 DEBTOR 2 0 0 1 -1
3 DEBTOR 3 0 0 1 -1
4 DEBTOR 4 0 1 1 -1
5 DEBTOR 5 0 1 1 -1
After the gap values are retrieved, those values will be converted into Profile Matching rule using the gap rule as
seen in Table 6. The Core and Secondary Factors are retrieved from the values by using the earlier formulas. It
must have determined which are the core factors and secondary factors.
Table 6 Gap rule
GAP VALUE
0 4
1 4,5
-1 3,5
2 5
-2 3
Table 7 Core Factor and Secondary Factor of Ability
WEIGHT PERFORMANCE CF SF
1 DEBTOR 1 4,00 4,50 3,50 4,00 4,00 4,00
2 DEBTOR 2 4,50 4,00 3,50 4,00 4,25 3,75
3 DEBTOR 3 3,50 4,00 4,50 4,50 4,00 4,25
4 DEBTOR 4 4,00 4,50 3,50 4,50 4,25 4,00
5 DEBTOR 5 3,50 4,00 4,50 4,00 3,75 4,25
Table 8 Core Factor and Secondary Factor of Personality
WEIGHT MOTIVATION CF SF
1 DEBTOR 1 5,00 4,50 4,00 4,75 4,00
2 DEBTOR 2 4,00 4,50 4,50 4,25 4,50
3 DEBTOR 3 4,00 5,00 5,00 4,50 5,00
4 DEBTOR 4 4,50 4,50 4,50 4,50 4,50
5 DEBTOR 5 4,00 4,50 4,00 4,25 4,00
Table 9 Core Factor and Secondary Factor of Feasibility
WEIGHT JOB TRAINING CF SF
1 DEBTOR 1 4,00 4,50 4,50 3,50 4,00 4,25
2 DEBTOR 2 4,00 4,00 4,50 3,50 4,00 4,00
3 DEBTOR 3 4,00 4,00 4,50 3,50 4,00 4,00
4 DEBTOR 4 4,00 4,50 4,50 3,50 4,00 4,25
5 DEBTOR 5 4,00 4,50 4,50 3,50 4,00 4,25
7. Credit Assessment in Determining The Feasibility of Debtors Using Profile Matching
www.ijbmi.org 79 | Page
Table 7 to 9 are the calculation of all aspects. There are core and secondary factors inside. As the values are
obtained, the average value of the ratio of 6:4 (adjustable) between the core and secondary factor is initiated.
The following table shows the N1, N2 and N3 as the aspect values.
Table 10 Aspect Values
N1 N2 N3
1 DEBTOR 1 4,00 4,45 4,10
2 DEBTOR 2 4,05 4,35 4,00
3 DEBTOR 3 4,10 4,70 4,00
4 DEBTOR 4 4,15 4,50 4,10
5 DEBTOR 5 3,95 4,15 4,10
The aspect ratio is 4:2:4 (adjustable). The rank is calculated based on this ratio. The final score is the average of
the N1, N2 and N3. Table 11 shows the final score of this case.
Table 11 Result of Final Score
RANKING
VALUES
N1 N2 N3 R
1 DEBTOR 1 4,00 4,45 4,10 4,13
2 DEBTOR 2 4,05 4,35 4,00 4,09
3 DEBTOR 3 4,10 4,70 4,00 4,18
4 DEBTOR 4 4,15 4,50 4,10 4,20
5 DEBTOR 5 3,95 4,15 4,10 4,05
Table 11 illustrates the results of the Profile Matching method. DEBTOR 4 gained the highest opportunity to get
the loan. For example, if the bank let three applicants, DEBTOR 2 and DEBTOR 5 are not nominated.
V. CONCLUSION
Credit loans are very useful for the general public. However, there are some requirements that must be
met for the loan successfully obtained. Profile Matching Method is a good technique to see who will qualify for
the mortgage loan. This method can examine some aspects related to the debtor. Analysts can set the desired
target value. The drawback of this system is the absence of tolerance humanly to consider a debtor to obtain a
loan.
REFERENCES
[1]. Jogiyanto, Analisis dan Desain Sistem Informasi : Pendekatan Terstruktur, Teori dan Praktek Aplikasi Bisnis, vol. 23, Yogyakarta:
Andi Offset, 2005, p. 107–115.
[2]. Z. Tharo and A. P. U. Siahaan, "Profile Matching in Solving Rank Problem," IOSR Journal of Electronics and Communication
Engineering, vol. 11, no. 5, pp. 73-76, 2016.
[3]. A. P. U. Siahaan, "Fuzzification of College Adviser Proficiency Based on Specific Knowledge," International Journal of Advanced
Research in Computer Science and Software Engineering, vol. 6, no. 7, pp. 164-168, 2016.
[4]. Kusrini, Konsep dan Aplikasi Sistem Pendukung Keputusan, Yogyakarta: Andi Offset, 2007.
[5]. D. J. Power, Decision Support Systems : Concepts and Resources For Manager, USA: Greenwood, 2002.
[6]. S. Leksono, "The Implementation of Kredit Usaha Rakyat Granting on Market Traders Who Are the Customers of Bank Rakyat
Indonesia in Tawangalun Banyuwangi," Journal of Marketing and Consumer Research, vol. 19, no. 1, pp. 63-69, 2016.
[7]. "Usaha Mikro, Kecil, dan Menengah dan Bank," Undang-Undang Republik Indonesia, vol. 20, 2008.
[8]. H. A. Hasibuan, R. B. Purba and A. P. U. Siahaan, "Productivity Assessment (Performance, Motivation, and Job Training) Using
Profile Matching," SSRG International Journal of Economics and Management Studies, vol. 3, no. 6, pp. 73-77, 2016.