Strategic planning is an effective tool for long-term planning and utilized by organizations and industries to achieve competitive advantage. Addressing difficulties that the European banking sector has been struggling since the global financial crisis (GFC), this paper raises serious questions about the sustainability of the sector and offers competitive strategy formulations for what European policy makers might consider to focus on. Empirical findings are accomplished by applying a three phase analysis: (i) SWOT to identify strengths, weaknesses, opportunities and threats, (ii) an integrated model of DEMATEL-ANP (DANP) to determine weights of the SWOT factors, and (iii) fuzzy TOPSIS technique to rank and choose the best strategy. Empirical findings from the SWOT analysis suggest a total of twelve factors, which are then used to formulate four strategies. The DANP illustrates that opportunities dimension has the highest impact and strengths has the lowest among others. The fuzzy TOPSIS results demonstrate that “the European Banking Union (EBU) is expected to remove divergence in the Euro area banking sector” is the most important strategy, whilst “the non risk based leverage ratio (LR) requirement by Basel III” has the weakest importance among the strategy preferences.
We present an overview of privacy preserving data mining, one of the most popular directions in the data mining research community. In the first part of the chapter, we presented approaches that have been proposed for the protection of either the sensitive data itself in the course of data mining or the sensitive data mining results, in the context of traditional (relational) datasets. Following that, in the second part of the chapter, we focused our attention on one of the most recent as well as prominent directions in privacy preserving data mining: the mining of user mobility data. Although still in its infancy, privacy preserving data mining of mobility data has attracted a lot of research attention and already counts a number of methodologies both with respect to sensitive data protection and to sensitive knowledge hiding. Finally, in the end of the chapter, we provided some roadmap along the field of privacy preserving mobility data mining as well as the area of privacy preserving data mining at large.
ABSTRACT- Childhood is the first and most important stages of life and an introduction in transforming the adult human character. The psychological needs in childhood is one of the complicated needs; therefore, recognition of children in Child Psychology is an essential issue. The most natural groups that can satisfy the human needs is the family. The family’s task is to take care of the child, their education, members communicate securely with each other and contribute to the independence of children. Therefore, the mother is considered as linchpin of balance and tranquility and progress of family and community. Providing criteria and methods of design, architecture and living space that is congruent with the mother and child conditions is essential. Since with mother\'s mental health, children also can be trained and grown in a favorable Environment. The goal is to create a guideline for designing an environment that influences both mothers and their child’s. The first priority of these spaces is their connection with the urban context. Using investigative methodology, this research identified the factors that influence the architectural design for children and mothers. The results reveal that including the integration and continuity of internal and external spaces, the creation of interactions between mothers and children, and landscape design elements, improving the quality of space. Using these guidelines could help the designers obtaining new perspective during the design stage of architecture and improve the quality of the environment.
What we are facing in this paper was the study of the architecture of the second Pahlavi era from contemporary Iranian architecture, and then focusing more on the architectural works of Hushang Sihoun. The answer to this question is how did Sihoun made Western architecture with Iranian architecture to be combined and without repeating traditional Iranian architecture, creating modern works that took into account the architectural location in addition modern age. For this purpose, the features of the architecture of the second Pahlavi period were discussed, and then the study of the Athar Architecture of Sihoun has been addressed. Houshang Sihoun\'s architecture also has more of these features. Villas, public buildings and memorials created three separate opportunities for the use of three different languages.
What we are facing in this article was the study of calligraphy art, especially the Nestalıq font, in terms of its aesthetics and its alignment with the art of architecture. Since calligraphy is a full-fledged art, it is important to understand the status of calligraphy art among other arts. The research methodology of this paper was descriptive and analytical, and data were gathered in a library and documentary manner. This paper responded to the question of what features the Nastaliq font has among the arts, especially the Islamic countries, that is considered the finest arts and, in addition, what are the common features between the art of calligraphy and the art of architecture. For this purpose, firstly, the definition of calligraphy and principles of the Nastaliq font have been discussed, and then the common aspects of the Nastaliq font and architecture have been investigated.
The focus of the study is kinetic uninterruptible power supply system, as a module of an emergency power system. Research studies are based on prototype tests and measurements. Detailed analysis of power losses and system effectiveness is performed, determining shares of electrical, mechanical and aerodynamic losses. It is validated through experiments over a prototype. An innovative system management and control is developed, based on performed analysis. Power loss optimisation has direct impact on the product’s cost of ownership. Elaborated control method is based on impulse management of generator instead of continuous supported power supply.
Projects some time fail to obtain their desired outcomes and not complete according to project\nconstraints and that lead to risk. It is important to minimize the impact of risk in order to attain\nproject success. Therefore, risk, and its management is vital for project success.\nRisk management as a method to prevent the risk and make sure not to be repeated through the\nproject and that by study of the causes of each risk to be avoided in the future, also risk\nmanagement extends to the fund-raising to make up for the project for the losses that occur in order\nnot to stop working and production .\nRisk response in the projects is to rank the elements of the risk by taking an action and relevant to\nits level. it\'s very necessary that risk response has the ability to treat all the type of risk event like\nthe planned risk response, the possible risk response and the estimation of cost for the responding\nwhich is consider to be an essential.\nOne of the important techniques of risk analysis is fuzzy logic ,the originator of fuzzy logic is Lotfi\nZadeh .significant advancement was made by him in the stabilization of fuzzy logic as a scientific\ndiscipline. fuzzy logic not a unique system of knowledge instead is a variety of methodologies\nsuggesting logical consideration of knowledge that imperfectly and vaguely.\nThe methodology of the paper includes two part, questionnaire and the use of data mining\ntechniques. The questionnaire was distributed to the owners, the contractor and other parties\ninvolved in the project, 9 projects were taken and the questionnaire was distributed to 15 people\nwho work in the project. The questionnaire includes the risk generated from risk response five\nmeasurements were used which are too low, low, medium, high and too high, the risk of the project\nare shown in the table below and its distributed on the periods 2014-2016 , the program that use\nfor risk analysis is KNIME combine with WEKA\n2\nfrom the results show the WEKA node and KNIME node the following was observed The\nsensitivity by using KNIME is higher than using the WEKA The specify of using KNIME is more\nthan using WEKA . The F- mean by using KNIME is higher than using the WEKA .The Cohen\nby using KNIME is more than using the WEKA The accuracy by using KNIME is more than\nusing the WEKA