Extracting Credit Rules from Imbalanced Data: The Case of an Iranian Export Development Bank
Journal Title: Journal of Information Systems and Telecommunication - Year 2015, Vol 3, Issue 1
Abstract
Credit scoring is an important topic, and banks collect different data from their loan applicant to make an appropriate and correct decision. Rule bases are of more attention in credit decision making because of their ability to explicitly distinguish between good and bad applicants. The credit scoring datasets are usually imbalanced. This is mainly because the number of good applicants in a portfolio of loan is usually much higher than the number of loans that default. This paper use previous applied rule bases in credit scoring, including RIPPER, OneR, Decision table, PART and C4.5 to study the reliability and results of sampling on its own dataset. A real database of one of an Iranian export development bank is used and, imbalanced data issues are investigated by randomly Oversampling the minority class of defaulters, and three times under sampling of majority of non-defaulters class. The performance criterion chosen to measure the reliability of rule extractors is the area under the receiver operating characteristic curve (AUC), accuracy and number of rules. Friedman’s statistic is used to test for significance differences between techniques and datasets. The results from study show that PART is better and good and bad samples of data affect its results less.
Authors and Affiliations
Seyed Mahdi Sadatrasoul, Mohammad Reza Gholamian, Kamran Shahanaghi
An Efficient Noise Removal Edge Detection Algorithm Based on Wavelet Transform
In this paper, we propose an efficient noise robust edge detection technique based on odd Gaussian derivations in the wavelet transform domain. At first, new basis wavelet functions are introduced and the proposed algori...
A New Recursive Algorithm for Universal Coding of Integers
In this paper, we aim to encode the set of all positive integers so that the codewords not only be uniquely decodable but also be an instantaneous set of binary sequences. Elias introduces three recursive algorithms for...
Node to Node Watermarking in Wireless Sensor Networks for Authentication of Self Nodes
In order to solve some security issues in Wireless Sensor Networks (WSNs), node to node authentication method based on digital watermarking technique for verification of relative nodes is proposed. In the proposed method...
Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier
Identifying the source camera of an image is one of the most important issues of digital court and is useful in many applications, such as images that are presented in court as evidence. In many methods, the image noise...
Joint Relay Selection and Power Allocation in MIMO Cooperative Cognitive Radio Networks
In this work, the issue of joint relay selection and power allocation in Underlay MIMO Cooperative Cognitive Radio Networks (U-MIMO-CCRN) is addressed. The system consists of a number of secondary users (SUs) in the seco...