(68 intermediate revisions by 3 users not shown)
Line 18: Line 18:
 
==<sup>5</sup>Universidade Tecnológica Federal do Paraná, (Londrina– Brazil)==
 
==<sup>5</sup>Universidade Tecnológica Federal do Paraná, (Londrina– Brazil)==
 
-->
 
-->
 
 
==Abstract==
 
==Abstract==
  
 
The purpose of this article is to compare the performance of a credit scoring model by applying different Machine Learning techniques for the classification of payers in bank financing of companies (5 432 historical records). Clients were considered “non-default” or “default” depending on their default index, thus, 4 238 were considered “non-default” and 1 194 “default”, including the information related to 10 variables (features) that composed the database. First, a random undersampling'' ''technique was applied to solve the unbalanced data problem. The variables were then coded in two ways: Code I (categorical variables) and Code II (binary or dummy variables). This was followed by the feature selection methods to detect the most important variables. Finally, we used three classifier algorithms of Machine Learning (ML), Bayesian Networks (BN), Decision Tree (DT) and Support Vector Machine (SVM) comparatively. All these techniques were implemented in WEKA (Waikato Environment for Knowledge Analysis) software. The best performance was 95.2% using balanced classes, with the attributes coded in a binary way and the SVM machine learning technique. So, in this way, it is possible to automatically classify (“non-default” or “default”) new instances making use of the proposed methodology with high performance.
 
The purpose of this article is to compare the performance of a credit scoring model by applying different Machine Learning techniques for the classification of payers in bank financing of companies (5 432 historical records). Clients were considered “non-default” or “default” depending on their default index, thus, 4 238 were considered “non-default” and 1 194 “default”, including the information related to 10 variables (features) that composed the database. First, a random undersampling'' ''technique was applied to solve the unbalanced data problem. The variables were then coded in two ways: Code I (categorical variables) and Code II (binary or dummy variables). This was followed by the feature selection methods to detect the most important variables. Finally, we used three classifier algorithms of Machine Learning (ML), Bayesian Networks (BN), Decision Tree (DT) and Support Vector Machine (SVM) comparatively. All these techniques were implemented in WEKA (Waikato Environment for Knowledge Analysis) software. The best performance was 95.2% using balanced classes, with the attributes coded in a binary way and the SVM machine learning technique. So, in this way, it is possible to automatically classify (“non-default” or “default”) new instances making use of the proposed methodology with high performance.
  
'''Keywords:''' classifier algorithms, feature selection, unbalanced classes, credit scoring model
+
'''Keywords''': Classifier algorithms, feature selection, unbalanced classes, credit scoring model
  
=1. Introduction=
+
==1. Introduction==
  
 
The term “credit”, in the context of banking, is a type of transaction or contract through which a financial institution makes a certain amount of money available to someone (individual or company) with the promise of returning the money later in one or more instalments. This is a complex decision, as this operation involves risk and can lead to serious consequences. Credit operations for companies, when taken together, can amount to significant financial resources. Therefore, risk assessment is very important, since in extreme cases, i.e., default, these operations can lead to the bankruptcy of the financial institution [1].
 
The term “credit”, in the context of banking, is a type of transaction or contract through which a financial institution makes a certain amount of money available to someone (individual or company) with the promise of returning the money later in one or more instalments. This is a complex decision, as this operation involves risk and can lead to serious consequences. Credit operations for companies, when taken together, can amount to significant financial resources. Therefore, risk assessment is very important, since in extreme cases, i.e., default, these operations can lead to the bankruptcy of the financial institution [1].
Line 49: Line 48:
 
The article is organized as follows. Following this introduction, the theoretical framework about credit risk analysis is presented in Section 2. In Section 3, the data collection and organization are explained. The methodology is presented in Section 4, and the results are shown in Section 5. Finally, the conclusions and suggestions for future studies are given in Section 6.
 
The article is organized as follows. Following this introduction, the theoretical framework about credit risk analysis is presented in Section 2. In Section 3, the data collection and organization are explained. The methodology is presented in Section 4, and the results are shown in Section 5. Finally, the conclusions and suggestions for future studies are given in Section 6.
  
=2. Theoretical Framework=
+
==2. Theoretical framework==
  
 
The theoretical framework is organized into the presentation of types and models of risk assessment and correlated works.
 
The theoretical framework is organized into the presentation of types and models of risk assessment and correlated works.
  
==2.1. Types and Models of Credit Risk==
+
===2.1. Types and models of credit risk===
  
As mentioned above, every granted credit operation, as it involves a future expectation of payment, is open to risks. Frascaroli, Paes and Ramos [10] highlight four kinds of risk: financial risk, operational risk, legal risk and systemic risk, as shown in Figure 1.
+
As mentioned above, every granted credit operation, as it involves a future expectation of payment, is open to risks. Frascaroli, Paes and Ramos [10] highlight four kinds of risk: financial risk, operational risk, legal risk and systemic risk, as shown in [[#img-1|Figure 1]].
 +
 
 +
<div id='img-1'></div>
 +
{| style="text-align: center; border: 1px solid #BBB; margin: 1em auto; width: auto;max-width: auto;"
 +
|-
 +
|style="padding:10px;"| [[Image:Draft_Samways dos Santos_683812980-image1.png|600px]]
 +
|- style="text-align: center; font-size: 75%;"
 +
| colspan="1" style="padding-bottom:10px;"| '''Figure 1'''. Types of risk and classification of credit risk models
 +
|}
  
<div class="center" style="width: auto; margin-left: auto; margin-right: auto;">
 
<span style="text-align: center; font-size: 75%;">'''Figure 1.''' Types of risk and classification of credit risk models</span>[[Image:Draft_Samways dos Santos_683812980-image1.png|600px]]
 
</div>
 
  
 
Financial risk is credit and liquidity risk. Operational risk is risk resulting from human failure, equipment failure and the failure of operational systems, increasing credit and liquidity risk. Legal risk results from a legal and regulatory base that is not suited to liquidation, an activity that it is intended to monitor and control. In turn, jointly or separately, these risks can lead to systemic risk, which may be defined as the possibility of credit and/or liquidity gaps that can lead to general default by the participants in a financial system [10].
 
Financial risk is credit and liquidity risk. Operational risk is risk resulting from human failure, equipment failure and the failure of operational systems, increasing credit and liquidity risk. Legal risk results from a legal and regulatory base that is not suited to liquidation, an activity that it is intended to monitor and control. In turn, jointly or separately, these risks can lead to systemic risk, which may be defined as the possibility of credit and/or liquidity gaps that can lead to general default by the participants in a financial system [10].
Line 65: Line 69:
 
Models that assess and/or measure credit risks can be classified into three groups, in accordance with Silva Brito and Assaf Neto [11]: risk classification models, stochastic credit risk models and portfolio risk models. Risk classification models seek to quantify the risk of a borrower or operation and grade the debtor or loan. Stochastic models are used to determine the stochastic behavior of the credit risk or the variables included in its calculation. Portfolio risk models estimate the distribution of likelihood of loss or the value of a credit portfolio and thus produce estimates of risk.
 
Models that assess and/or measure credit risks can be classified into three groups, in accordance with Silva Brito and Assaf Neto [11]: risk classification models, stochastic credit risk models and portfolio risk models. Risk classification models seek to quantify the risk of a borrower or operation and grade the debtor or loan. Stochastic models are used to determine the stochastic behavior of the credit risk or the variables included in its calculation. Portfolio risk models estimate the distribution of likelihood of loss or the value of a credit portfolio and thus produce estimates of risk.
  
Risk classification models, i.e., credit scoring, in turn, are divided into two categories: credit approval models and behavioral scoring models. The main difference between the two categories is that in the latter, the financial institution analyzes the behavior of the client in previous operations, whereas in credit approval models, the financial institution relies on companies’ registration data. It should be highlighted that the present study uses risk classification models based on ML models for the concession/approval or refusal of credit (in blue color in Figure 1).
+
Risk classification models, i.e., credit scoring, in turn, are divided into two categories: credit approval models and behavioral scoring models. The main difference between the two categories is that in the latter, the financial institution analyzes the behavior of the client in previous operations, whereas in credit approval models, the financial institution relies on companies’ registration data. It should be highlighted that the present study uses risk classification models based on ML models for the concession/approval or refusal of credit (in blue color in [[#img-1|Figure 1]]).
  
==2.2. Some Correlated Works ==
+
===2.2. Some correlated works===
  
Credit risk assessment, since it was introduced in the nineteen fifties, has been widely used, mainly for granting loans [12]. This problem consists of evaluating the risks involved when a financial institution lends money to a company or individual. For this purpose, researchers have used a wide range of techniques to minimize losses for financial institutions. Some works related to this subject will now be briefly described in chronological order since 2012 and comparatively summarized in Table 1. In this table, the techniques that have shown the best performance are in bold.
+
Credit risk assessment, since it was introduced in the nineteen fifties, has been widely used, mainly for granting loans [12]. This problem consists of evaluating the risks involved when a financial institution lends money to a company or individual. For this purpose, researchers have used a wide range of techniques to minimize losses for financial institutions. Some works related to this subject will now be briefly described in chronological order since 2012 and comparatively summarized in [[#tab-1|Table 1]]. In this table, the techniques that have shown the best performance are in bold.
 
+
Loterman ''et al.'' [13] compared 24 techniques used to classify banking credit, including heuristic procedures, Artificial Neural Networks (ANN), the SVM and statistical models, evaluated in six real databases. The ANN and B-OLS techniques had the best performances in more than one database. Brown and Mues [14] also made an extensive comparison of techniques, this time using five real databases. The techniques employed were Logistic Regression (LR), ANN, DT, SVM and Random Forests (RF). In general, RF had the best performance. In Wang ''et al.'' [15], the performances of ANN were compared with the Radial Basis Function (RBF), DT and LR in two credit databases of the UCI (UC Irvine Machine Learning Repository). The best results were obtained with LR, with accuracy greater than 88% in every case presented. Hens and Tiwari [16] developed a hybrid of SVM and Genetic Algorithms (GA) and compared this methodology with ANN. The accuracy of the proposed model, although greater, was very close to that of ANN. The rates obtained were 86.76% and 86.71%, respectively.
+
 
+
Marqués, Garcia and Sánchez [17] presented seven classification techniques, varying in the use (or not) of ensemble techniques. The best results were for tests using ensemble and the best performance was for DT, closely followed by ANN. The poorest results were the BN (Bayesian Networks) classifiers. Akkoç [18] proposed a hybrid for banking credit classification in a Turkish database. Initially, three techniques were analyzed separately: LDA, LR, ANN. These techniques were then hybridized. The resulting hybrid had a better performance than the other techniques, with an average accuracy of 60% in the tests that were conducted. In Kao, Chiu and Chiu [19], a client classification model was proposed based on Bayesian latent variables. The proposed method was compared with techniques such as LDA, ANN, SVM, CART (Classification and Regression Trees) and MARS (Multivariate Adaptive Regression Splines). The model was 92.9% accurate in its classification, followed by CART, with approximately 90%.
+
 
+
Tong, Mues and Thomas [20] compared statistical techniques such as LR, a mixed cure model and Cox regression, with highly similar performances. García, Marqués and Sánchez [21] analyzed 20 algorithms, using different types of SVM, statistical techniques and heuristics in applications for eight different databases. The best performances were for three heuristic models, Edited Nearest Neighbor'' ''(ENN), Nearest Centroid Neighbors Editing (NCN) and finally the CHC evolutionary algorithm. Li, Wei and Hao [22] proposed an ensemble methodology together with the SVM technique and PCA (Principal Component Analysis) in two databases. Not only did the proposed method have the best accuracy (89%) of the tested models, but it was also the most stable. Nikolic ''et al.'' [23], using a LR approach, proposed a credit risk assessment model for companies from different databases over five years (2007-2011). Accuracy varied between 50.99% and 53.91% according to the number of variables analyzed. Marqués, García and Sánchez [24] tested the ability of data resampling methods. LR and the SVM were compared and the authors found that resampling models can improve the performance of the classification techniques.
+
 
+
Zhu ''et al.'' [25] tested eight methods, including LDA, QDA (Quadratic Discriminant Analysis), DT, LR and SVM, applied in two UCI databases. For a database of a Peruvian bank, Blanco ''et al.'' [26] used ANN, LDA, QDA and LR techniques to predict the likelihood of default of 5 500 clients. The performance of ANN was better than the other techniques. Using different classification methods, Cubiles-de-la-Veja ''et al.'' [27] analyzed the credit risk of a Peruvian financial institution, showing that the MLP (Multiple Layer Perceptron) model reduces the costs of classification error by 13.7% in relation to the application of the other methods that were tested. Oreski and Oreski [28] presented a hybrid of GA and ANN in a Croatian database. The proposed algorithm showed a promising classification “ability” for selecting features and classifying risk compared with the other techniques. Chih-Fong and Chihli [29] compared ensembles of ANN and a hybrid of ANN in three databases (Australian, German and Japanese). The results showed that both the hybrid and the ensembles outdid the performance of pure ANN. Niklis, Duompos and Zopounidis [30] compared different types of SVM and LR to evaluate the credit risk of real data from 2005 to 2010. The best results were obtained by one of the SVM techniques (79.6%). Tong and Li [31], again using SVM and possible combinations of this technique, sought to assess the credit risk of Chinese companies. The best result obtained (9% error) was for the technique known as Relevance Vector Machines (RVM), a variant of SVM. Another analysis of different SVM techniques was conducted by Yi and Zhu [32], applied to an Australian database and a German one. The best result for the German database was obtained through RBF together with the SVM, achieving accuracy of 76%. For the Australian database, the greatest accuracy was 84.83% using polynomial functions in the tested SVM.
+
 
+
Bravo, Thomas and Weber [33] proposed a methodology that divides clients into “good payers”, “can’t pays” and “won’t pays”. The authors used a clustering algorithm, LR and Multinomial LR, together with ANN. Dividing clients in this way can mean a significant improvement over the classical division (good payers and bad payers). Koutanaei, Sajedi and Khanbabaei [34] developed a hybrid model that, in the first stage, pre-processes information using PCA and GA. The parameters obtained are then used as inputs for the SVM and ANN to compare these methods. The results showed that ANN, with the AdaBoost (adaptive boosting) ensemble technique achieved greater accuracy than the others that were tested. Harris [35] investigated LinR and LR, in addition to ANN, DT and the SVM to classify clients in a German database and another from a bank in Barbados. The best accuracy was obtained using the SVM.
+
 
+
Danenas and Garvas [36] presented ANN, PSO (Particle Swarm Optimization) and SVM techniques to classify clients in a database from 1999-2007 known as “EDGAR” (Electronic Data Gathering). The experimental research showed that the SVM had the best performance (over 90%). Zhao ''et al.'' [37] proposed an MLP type ANN analysis in an attempt to improve performance using three strategies. The first strategy involved optimizing the distribution of information from the databases using a method known as Average Random Choosing. The second involved comparing the effects of the number of instances of training, test and validation. The third involved finding the best number of neurons for the hidden layer. Using the client base of a German bank, the authors achieved a level of accuracy of 87% for 31 neurons in the hidden layer. Silva ''et al.'' [38] also used MLP to explore the idea of generating cases in pattern regions, in which it is more difficult to produce consistent responses. The ratio of defaulters and non-defaulters in the database used by the authors was 80% to 20%, with a greater tendency of information for non-defaulters, lowering the accuracy of the methods tested.
+
  
Abedini, Ahmadzadeh and Noorossana [39] proposed an approach using an ensemble classification technique with ANN, MLP, SVM, LinR and LR with bagging and MLP using RF. The proposed model performed better than when the techniques were applied on their own. The best accuracy level was 76.67% for the application of MLP with the RF ensemble technique. Zakirov, Bondarev and Momtselidye [40] presented a structure to compare different classification methods, in which the RF methodology was the most accurate. Applying the CART, MLP, SVM and BN, Ozturk, Namli and Erdal [41] examined the forecasting of different AI techniques to analyze bank credit. The results showed that the prediction techniques were over 90% accurate, while conventional statistical models were approximately 70% accurate. Abdou ''et al. ''[42] applied three correlation classification methods, LR, CART and ANN, to a database of banks in Cameroon. The best performance was obtained with ANN, with a 97.43% accurate identification of “good payers”. Punniyamoorthy and Sridevi [43] used ANN and compared them with an SVM model to classify bank clients in the United Kingdom. The SVM had better results than the ANN method, with accuracies of 80% and 77%, respectively.
+
<div class="center" style="font-size: 75%;">'''Table 1.''' Comparative synthesis of some correlated works (in chronological order)</div>
  
Ala’raj and Abbod [44] presented an approach with six classifiers: LR, ANN, SVM, RF, DT and BN. Five databases were used (German, Australian, Japanese, Iranian and Polish), with RF having the best performance in four of the five bases, followed by ANN, with the highest level of accuracy in the German base. Andric and Kalpic [45] compared three classification algorithms, LR, ANN and gradient boosting. Regarding the first database, the German one, ANN and gradient boosting were both 75% accurate. For the second database, the Japanese one, gradient boosting had the best result, with 91% accuracy.
+
<div id='tab-1'></div>
 
+
{| class="wikitable" style="margin: 1em auto 0.1em auto;border-collapse: collapse;font-size:85%;width:auto;"  
Li [46] conducted a credit risk analysis using the SVM based on fuzzy logic, for which the rate of accuracy was 77.7%. Guo and Dong [47] proposed a multi-objective PSO model for classifying customers and compared it with BN, LR, sequential minimal optimization, DT and ANN. The accuracy of the proposed model was greater than the other tested models (74.64%) for the first database that was tested. However, for the second, ANN had better performance than the others, with 61.15% accuracy. For the last database that was tested, LR had the best performance, with 76.70% accuracy.
+
|-style="text-align:center"
 
+
! style="text-align:left" |Authors, year !! style="width:280px" | Techniques !! style="width:200px" | Databases (DB) used
In Luo, Wu and Wu [48], the performance of credit scoring models was tested, applied to the CDS (Common Data Service) database. Deep learning ANN were used, as well as MLP, LR and the SVM, to compare the tests. The best accuracy was for the deep learning ANN (100%), followed by MLP (87.85%). Bequé and Lessmann [49] compared ANN and other classification methods with the ensemble technique known as extreme learning machines'' ''(ELM). Lanzarini ''et al.'' [50] presented an alternative model that could generate rules that worked not only with numerical features, but also with nominal ones. The technique was based on LVQ-PSO (Learning Vector Quantization'' ''combined with PSO). The highest level of accuracy obtained by the proposed algorithm was 81.05% in the tests that were performed. Maldonado, Pérez and Bravo [51] developed two proposals based on the SVM to select features and classify clients with regard to bank credit. Among the tested SVM, the Fisher-SVM was the most accurate (accuracy rate of 70.6%). This algorithm uses a Fisher scoring algorithm to select features according to costs and the SVM is then applied. In Assef et al. [52], compared ANN-MLP, ANN-RBF and LR in a problem with 5 432 data with 15 features, considering three classes: non-default; default and temporarily default; the authors present new insights towards research over Credit Risk Assessment.
+
 
+
<div class="center" style="width: auto; margin-left: auto; margin-right: auto;">
+
<span style="text-align: center; font-size: 75%;">'''Table 1.''' Comparative synthesis of some correlated works (in chronological order)</span></div>
+
 
+
{| style="width: 100%;border-collapse: collapse;"  
+
 
|-
 
|-
|  style="border-top: 2pt solid black;border-bottom: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">'''Authors, year'''</span>
+
|  style="text-align: left;"|Loterman ''et al.'', 2012 [13]
| colspan='2' style="border-top: 2pt solid black;border-bottom: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">'''Techniques'''</span>
+
|  style="text-align: center;"|24 techniques: '''B-OLS'''; '''ANN'''; SVM e statistical techniques
|  style="border-top: 2pt solid black;border-bottom: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">'''Databases (DB) used'''</span>
+
|  style="text-align: center;"|6 DB
 
|-
 
|-
|  style="border-top: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">Loterman ''et al.'', 2012 [13]</span>
+
|  style="text-align: left;"|Brown and Mues, 2012 [14]
| colspan='2'  style="border-top: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">24 techniques: '''B-OLS'''; '''ANN'''; SVM e statistical techniques</span>
+
|   style="text-align: center;"|DT; '''FF'''; LR; ANN; SVM
|  style="border-top: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">6 DB</span>
+
|  style="text-align: center;"|5 DB
 
|-
 
|-
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Brown and Mues, 2012 [14]</span>
+
|  style="text-align: left;"|Wang ''et al.'', 2012 [15]
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">DT; '''FF'''; LR; ANN; SVM</span>
+
|   style="text-align: center;"|DT; RBF; '''LR'''
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">5 DB</span>
+
|  style="text-align: center;"|2 UCI DB
 
|-
 
|-
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Wang ''et al.'', 2012 [15]</span>
+
|  style="text-align: left;"|Hens and Tiwari, 2012 [16]
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">DT; RBF; '''LR'''</span>
+
|   style="text-align: center;"|'''Híbrid (SVM e AG)''' and RNA
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">2 UCI DB</span>
+
|  style="text-align: center;"|2 DB: Australian and German
 
|-
 
|-
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Hens and Tiwari, 2012 [16]</span>
+
|  style="text-align: left;"|Marqués ''et al.'', 2012 [17]
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">'''Híbrid (SVM e AG)''' and RNA</span>
+
|   style="text-align: center;"|7 techniques ('''DT'''; ANN; others) '''with ensemble''' or without ensemble
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">2 DB: Australian and German</span>
+
|  style="text-align: center;"|UCI DB
 
|-
 
|-
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Marqués, Garcia and Sánchez, 2012 [17]</span>
+
|  style="text-align: left;"|Akkoç, 2012 [18]
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">7 techniques ('''DT'''; ANN; others) '''with ensemble''' or without ensemble</span>
+
|   style="text-align: center;"|LDA; LR; ANN; '''Hybrids'''
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">UCI DB</span>
+
|  style="text-align: center;"|DB from Turkey
 
|-
 
|-
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Akkoç, 2012 [18]</span>
+
|  style="text-align: left;"|Kao ''et al.'', 2012 [19]
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">LDA; LR; ANN; '''Hybrids'''</span>
+
|   style="text-align: center;"|'''Proposed method (Bayesian latente variables)'''; LDA; CART; MARS; ANN; SVM
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">DB from Turkey</span>
+
|  style="text-align: center;"|DB from Tawain
 
|-
 
|-
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Kao, Chiu and Chiu,</span>
+
|  style="text-align: left;"|Tong ''et al.'', 2012 [20]
 
+
|   style="text-align: center;"|LR, Cox Regression, '''Mixed Cure Model'''
<span style="text-align: center; font-size: 75%;">2012 [19]</span>
+
|  style="text-align: center;"|Portfolio of loans in the United Kingdom
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">'''Proposed method (Bayesian latente variables)'''; LDA; CART; MARS; ANN; SVM</span>
+
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">DB from Tawain</span>
+
 
|-
 
|-
| style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Tong, Mues and Thomas, 2012 [20]</span>
+
|   style="text-align: left;"|García ''et al.'', 2012 [21]
| colspan='2' style="text-align: center;"|<span style="text-align: center; font-size: 75%;">LR, Cox Regression, '''Mixed Cure Model'''</span>
+
|  style="text-align: center;"|SVM, '''ENN''', '''NCN''', '''CHC'''
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Portfolio of loans in the United Kingdom</span>
+
|  style="text-align: center;"|8 DB
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">García, Marqués and  Sánchez, 2012 [21]</span>
+
|   style="text-align: left;"|Li ''et al.'', 2013 [22]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">SVM, '''ENN''', '''NCN''', '''CHC'''</span>
+
|  style="text-align: center;"|'''SVM''' ('''with''' and without '''ensamble''')
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">8 DB</span>
+
|  style="text-align: center;"|2 DB
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Li, Wei and Hao, 2013 [22]</span>
+
|   style="text-align: left;"|Nikolic ''et al.'', 2013 [23]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">'''SVM''' ('''with''' and without '''ensamble''')</span>
+
|  style="text-align: center;"|'''LR'''
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">2 DB</span>
+
|  style="text-align: center;"|Company DB  
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Nikolic ''et al.'', 2013 [23]</span>
+
|   style="text-align: left;"|Marqués ''et al.'', 2013 [24]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">'''LR'''</span>
+
|  style="text-align: center;"|LR, SVM (with and without  '''resampling''')
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Company DB </span>
+
|  style="text-align: center;"|UCI DB
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Marqués, García and  Sánchez, 2013 [24]</span>
+
|   style="text-align: left;"|Zhu ''et al.'', 2013 [25]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">LR, SVM (with and without  '''resampling''')</span>
+
|  style="text-align: center;"|LDA, QDA, '''DT''', LR, SVM
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">UCI DB</span>
+
|  style="text-align: center;"|UCI DB
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Zhu ''et al.'', 2013 [25]</span>
+
|   style="text-align: left;"|Blanco ''et al.'', 2013 [26]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">LDA, QDA, '''DT''', LR, SVM</span>
+
|  style="text-align: center;"|LDA; QDA; '''ANN'''; LR
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">UCI DB</span>
+
|  style="text-align: center;"|DB from Peru
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Blanco ''et al.'', 2013 [26]</span>
+
|   style="text-align: left;"|Cubiles-de-la-Veja ''et al.'', 2013 [27]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">LDA; QDA; '''ANN'''; LR</span>
+
|  style="text-align: center;"|DT; LDA; QDA; LR; '''ANN'''; SVM; bagging; boosting
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">DB from Peru</span>
+
|  style="text-align: center;"|DB from Peru
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Cubiles-de-la-Veja ''et al.'', 2013 [27]</span>
+
|   style="text-align: left;"|Oreski and Oreski, 2014 [28]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">DT; LDA; QDA; LR; '''ANN'''; SVM; bagging; boosting</span>
+
|  style="text-align: center;"|'''Hybrid (GA and ANN)'''
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">DB from Peru</span>
+
|  style="text-align: center;"|DB from Croatia
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Oreski and Oreski, 2014 [28]</span>
+
|   style="text-align: left;"|Chih-Fong and Chihli, 2014 [29]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">'''Hybrid (GA and ANN)'''</span>
+
|  style="text-align: center;"|ANN; '''ANN Ensembles''';''' Hybrid RNA'''
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">DB from Croatia</span>
+
|  style="text-align: center;"|3 DB: Australian; German; Japanese
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Chih-Fong and Chihli, 2014 [29]</span>
+
|   style="text-align: left;"|Niklis ''et al.'', 2014 [30]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">ANN; '''ANN Ensembles''';''' Hybrid RNA'''</span>
+
|  style="text-align: center;"|'''SVM''', LR
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">3 DB: Australian; German; Japanese</span>
+
|  style="text-align: center;"|Greek DB  
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Niklis, Duompos and Zopounidis, 2014 [30]</span>
+
|   style="text-align: left;"|Tong e Li, 2015 [31]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">'''SVM''', LR</span>
+
|  style="text-align: center;"|SVM and combinations; '''RVM'''
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Greek DB </span>
+
|  style="text-align: center;"|Credit Risk of Chinese companies
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Tong e Li, 2015 [31]</span>
+
|   style="text-align: left;"|Yi e Zhu, 2015 [32]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">SVM and combinations; '''RVM'''</span>
+
|  style="text-align: center;"|Different '''SVM '''techniques
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Credit Risk of Chinese companies</span>
+
|  style="text-align: center;"|2 DB: Australian and German
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Yi e Zhu, 2015 [32]</span>
+
|   style="text-align: left;"|Bravo ''et al.'', 2015 [33]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Different '''SVM '''techniques</span>
+
|  style="text-align: center;"|LR; '''ANN'''; Clustering
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">2 DB: Australian and German</span>
+
|  style="text-align: center;"|Chilean Public Agency
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Bravo, Thomas and Weber, 2015 [33]</span>
+
|   style="text-align: left;"|Koutanaei ''et al.'' 2015 [34]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">LR; '''ANN'''; Clustering</span>
+
|  style="text-align: center;"|Hybrid (PCA and GA); SVM; '''ANN with''' and without '''ensemble'''
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Chilean Public Agency</span>
+
|  style="text-align: center;"|Iranian Development Bank
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Koutanaei, Sajedi and Khanbabaei, 2015 [34]</span>
+
|   style="text-align: left;"|Harris, 2015 [35]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Hybrid (PCA and GA); SVM; '''ANN with''' and without '''ensemble'''</span>
+
|  style="text-align: center;"|LinR; LR; ANN; DT; '''SVM'''
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Iranian Development Bank</span>
+
|  style="text-align: center;"|2 DB: German and from Barbados
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Harris, 2015 [35]</span>
+
|   style="text-align: left;"|Danenas and Garvas, 2015 [36]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">LinR; LR; ANN; DT; '''SVM'''</span>
+
|  style="text-align: center;"|ANN; PSO; '''SVM'''
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">2 DB: German and from Barbados</span>
+
|  style="text-align: center;"|EDGAR DB
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Danenas and Garvas, 2015 [36]</span>
+
|   style="text-align: left;"|Zhao ''et al.'', 2015 [37]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">ANN; PSO; '''SVM'''</span>
+
|  style="text-align: center;"|'''ANN''' (Three different strategies)
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">EDGAR DB</span>
+
|  style="text-align: center;"|German DB  
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Zhao ''et al.'', 2015 [37]</span>
+
|   style="text-align: left;"|Silva ''et al.'', 2015 [38]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">'''ANN''' (Three different strategies)</span>
+
|  style="text-align: center;"|'''ANN'''
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">German DB </span>
+
|  style="text-align: center;"|DB 13<sup>th</sup>. Pacific-Asia KDD and DM Conference
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Silva ''et al.'', 2015 [38]</span>
+
|   style="text-align: left;"|Abedini ''et al.'', 2016 [39]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">'''ANN'''</span>
+
|  style="text-align: center;"|'''ANN MLP '''with and without '''FR''', SVM, RL with and without bagging
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">DB 13<sup>th</sup></span><span style="text-align: center; font-size: 75%;">. Pacific-Asia KDD and DM Conference</span>
+
|  style="text-align: center;"|DB UCI
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Abedini, Ahmadzadeh and Noorossana, 2016 [39]</span>
+
|   style="text-align: left;"|Zakirov ''et al.'', 2016 [40]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">'''ANN MLP '''with and without '''FR''', SVM, RL with and without bagging</span>
+
|  style="text-align: center;"|'''SVM '''with''' '''and without application of '''RF'''
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">DB UCI</span>
+
|  style="text-align: center;"|Real DB  
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Zakirov, Bondarev and Momtselidye, 2016 [40]</span>
+
|   style="text-align: left;"|Ozturk ''et al.'', 2016 [41]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">'''SVM '''with''' '''and without application of '''RF'''</span>
+
|  style="text-align: center;"|BN, CART, MLP, '''SVM'''
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Real DB </span>
+
|  style="text-align: center;"|DB with 1 022 observations from 92 countries
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Ozturk, Namli and Erdal, 2016 [41]</span>
+
|   style="text-align: left;"|Abdou ''et al.'', 2016 [42]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">BN, CART, MLP, '''SVM'''</span>
+
|  style="text-align: center;"|LR, CART e '''ANN'''
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">DB with 1 022 observations from 92 countries</span>
+
|  style="text-align: center;"|DB of banks from Cameroon
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Abdou ''et al.'', 2016 [42]</span>
+
|   style="text-align: left;"|Punniyamoorthy and Sridevi, 2016 [43]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">LR, CART e '''ANN'''</span>
+
|  style="text-align: center;"|ANN; '''SVM'''
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">DB of banks from Cameroon</span>
+
|  style="text-align: center;"|DB from the United Kingdom
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Punniyamoorthy and Sridevi, 2016 [43]</span>
+
|   style="text-align: left;"|Ala’raj and Abbod, 2016 [44]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">ANN; '''SVM'''</span>
+
|  style="text-align: center;"|LR; '''ANN''' e SVM ('''with''' and without '''RF'''); DT
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">DB from the United Kingdom</span>
+
|  style="text-align: center;"|5 DB: German; Australian; Japanese; Iranian and Polish
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Ala’raj and Abbod, 2016 [44]</span>
+
|   style="text-align: left;"|Andric and Kalpic, 2016 [45]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">LR; '''ANN''' e SVM ('''with''' and without '''RF'''); DT</span>
+
|  style="text-align: center;"|LR; '''ANN''' ('''with '''and without '''gradient boosting''')
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">5 DB: German; Australian; Japanese; Iranian and Polish</span>
+
|  style="text-align: center;"|2 DB: German and Japanese
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Andric and Kalpic, 2016 [45]</span>
+
|   style="text-align: left;"|Li, 2016 [46]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">LR; '''ANN''' ('''with '''and without '''gradient boosting''')</span>
+
|  style="text-align: center;"|'''SVM with fuzzy logic'''
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">2 DB: German and Japanese</span>
+
|  style="text-align: center;"|Real DB  
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Li, 2016 [46]</span>
+
|   style="text-align: left;"|Guo and Dong, 2017 [47]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">'''SVM with fuzzy logic'''</span>
+
|  style="text-align: center;"|DT, BN, PSO, LR, ANN
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Real DB </span>
+
|  style="text-align: center;"|2 DB: United Kigdom and Germany
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Guo and Dong, 2017 [47]</span>
+
|   style="text-align: left;"|Luo ''et al.'', 2017 [48]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">DT, BN, PSO, LR, ANN</span>
+
|  style="text-align: center;"|'''ANN''' ('''deep learning''' and MLP), LR and SVM
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">2 DB:  United Kigdom and Germany</span>
+
|  style="text-align: center;"|CDS DB  
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Luo, Wu and Wu, 2017 [48]</span>
+
|   style="text-align: left;"|Bequé and Lessmann, 2017 [49]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">'''ANN''' ('''deep learning''' and MLP), LR and SVM</span>
+
|  style="text-align: center;"|ANN, '''ELM'''
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">CDS DB </span>
+
|  style="text-align: center;"|Real DB  
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Bequé and Lessmann, 2017 [49]</span>
+
|   style="text-align: left;"|Lanzarini, 2017 [50]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">ANN, '''ELM'''</span>
+
|  style="text-align: center;"|''' PSO Hybrid'''
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Real DB </span>
+
|  style="text-align: center;"|Tunisian bank DB
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Lanzarini, 2017 [50]</span>
+
|   style="text-align: left;"|Maldonado ''et al.'', 2017 [51]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">''' PSO Hybrid'''</span>
+
|  style="text-align: center;"|Different SVM techniques ('''Fisher-SVM''')
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Tunisian bank DB</span>
+
|  style="text-align: center;"|DB with 7 309 clients (small and micro businesses)
 
|-
 
|-
| colspan='2'  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Maldonado, Pérez and Bravo, 2017 [51]</span>
+
|   style="text-align: left;"|Assef ''et al.'', 2019 [52]
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">Different SVM techniques ('''Fisher-SVM''')</span>
+
|  style="text-align: center;"|ANN ('''MLP''' and RBF), LR
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">DB with 7 309 clients (small and micro businesses)</span>
+
|  style="text-align: center;"|DB with 5 432 clients  
|-
+
|  colspan='2'  style="border-bottom: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">Assef et al., 2019 [52]</span>
+
|  style="border-bottom: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">ANN ('''MLP''' and RBF), LR</span>
+
|  style="border-bottom: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">DB with 5 432 clients </span>
+
 
|}
 
|}
 
  
 
<span style="text-align: center; font-size: 75%;">'''Legend: '''ADL (Linear Discriminant Analysis); ANN (Artificial Neural Networks); BN (Bayesian Networks); B-OLS (Beta Ordinary Least Square); CART (Classification and Regression Trees); CDS (Common Data Service); DT (Decision Trees); ELM (Extreme Learning Machine); ENN (Edited Nearest Neighbor); GA (Genetic Algorithms); LinR (Linear Regression); LR (Logistic Regression); RF (Random Forest); MARS (Multivariate Adaptive Regression Splines); MLP (MultiLayer Perceptron); NCN (Nearest Centroid Neighbors Editing); PCA (Principal Components Analysis); PSO (Particle Swarm Optimization); QDA (Quadratic Discriminant Analysis); RBF (Radial Basis Function); RVM (Relevance Vector Machines); SVM (Support Vector Machines). </span>
 
<span style="text-align: center; font-size: 75%;">'''Legend: '''ADL (Linear Discriminant Analysis); ANN (Artificial Neural Networks); BN (Bayesian Networks); B-OLS (Beta Ordinary Least Square); CART (Classification and Regression Trees); CDS (Common Data Service); DT (Decision Trees); ELM (Extreme Learning Machine); ENN (Edited Nearest Neighbor); GA (Genetic Algorithms); LinR (Linear Regression); LR (Logistic Regression); RF (Random Forest); MARS (Multivariate Adaptive Regression Splines); MLP (MultiLayer Perceptron); NCN (Nearest Centroid Neighbors Editing); PCA (Principal Components Analysis); PSO (Particle Swarm Optimization); QDA (Quadratic Discriminant Analysis); RBF (Radial Basis Function); RVM (Relevance Vector Machines); SVM (Support Vector Machines). </span>
  
It should be highlighted that in this work, compared with those analyzed (Table 1), a default index was determined for every client and, also, in order to get better performance for the classifier algorithms of ML, techniques were applied for the data treatment: random undersampling for class balancing; features were coded as categorical and binary; and, finally, the features were selected using filter techniques (information gain) and wrapper techniques. With these data preprocessed, the Bayesian Networks (BN), Decision Tree (DT) and Support Vector Machine (SVM), were used comparatively. To provide a better illustration of the methodology, real data provided by a banking institution were used.
 
  
=3. Data Organization and Collection=
+
Loterman ''et al.'' [13] compared 24 techniques used to classify banking credit, including heuristic procedures, Artificial Neural Networks (ANN), the SVM and statistical models, evaluated in six real databases. The ANN and B-OLS techniques had the best performances in more than one database. Brown and Mues [14] also made an extensive comparison of techniques, this time using five real databases. The techniques employed were Logistic Regression (LR), ANN, DT, SVM and Random Forests (RF). In general, RF had the best performance. In Wang ''et al.'' [15], the performances of ANN were compared with the Radial Basis Function (RBF), DT and LR in two credit databases of the UCI (UC Irvine Machine Learning Repository). The best results were obtained with LR, with accuracy greater than 88% in every case presented. Hens and Tiwari [16] developed a hybrid of SVM and Genetic Algorithms (GA) and compared this methodology with ANN. The accuracy of the proposed model, although greater, was very close to that of ANN. The rates obtained were 86.76% and 86.71%, respectively.
 +
 
 +
Marqués ''et al.'' [17] presented seven classification techniques, varying in the use (or not) of ensemble techniques. The best results were for tests using ensemble and the best performance was for DT, closely followed by ANN. The poorest results were the BN (Bayesian Networks) classifiers. Akkoç [18] proposed a hybrid for banking credit classification in a Turkish database. Initially, three techniques were analyzed separately: LDA, LR, ANN. These techniques were then hybridized. The resulting hybrid had a better performance than the other techniques, with an average accuracy of 60% in the tests that were conducted. In Kao, Chiu and Chiu [19], a client classification model was proposed based on Bayesian latent variables. The proposed method was compared with techniques such as LDA, ANN, SVM, CART (Classification and Regression Trees) and MARS (Multivariate Adaptive Regression Splines). The model was 92.9% accurate in its classification, followed by CART, with approximately 90%.
 +
 
 +
Tong ''et al.'' [20] compared statistical techniques such as LR, a mixed cure model and Cox regression, with highly similar performances. García ''et al.'' [21] analyzed 20 algorithms, using different types of SVM, statistical techniques and heuristics in applications for eight different databases. The best performances were for three heuristic models, Edited Nearest Neighbor (ENN), Nearest Centroid Neighbors Editing (NCN) and finally the CHC evolutionary algorithm. Li, Wei and Hao [22] proposed an ensemble methodology together with the SVM technique and PCA (Principal Component Analysis) in two databases. Not only did the proposed method have the best accuracy (89%) of the tested models, but it was also the most stable. Nikolic ''et al.'' [23], using a LR approach, proposed a credit risk assessment model for companies from different databases over five years (2007-2011). Accuracy varied between 50.99% and 53.91% according to the number of variables analyzed. Marqués ''et al.'' [24] tested the ability of data resampling methods. LR and the SVM were compared and the authors found that resampling models can improve the performance of the classification techniques.
 +
 
 +
Zhu ''et al.'' [25] tested eight methods, including LDA, QDA (Quadratic Discriminant Analysis), DT, LR and SVM, applied in two UCI databases. For a database of a Peruvian bank, Blanco ''et al.'' [26] used ANN, LDA, QDA and LR techniques to predict the likelihood of default of 5 500 clients. The performance of ANN was better than the other techniques. Using different classification methods, Cubiles-de-la-Veja ''et al.'' [27] analyzed the credit risk of a Peruvian financial institution, showing that the MLP (Multiple Layer Perceptron) model reduces the costs of classification error by 13.7% in relation to the application of the other methods that were tested. Oreski and Oreski [28] presented a hybrid of GA and ANN in a Croatian database. The proposed algorithm showed a promising classification “ability” for selecting features and classifying risk compared with the other techniques. Chih-Fong and Chihli [29] compared ensembles of ANN and a hybrid of ANN in three databases (Australian, German and Japanese). The results showed that both the hybrid and the ensembles outdid the performance of pure ANN. Niklis ''et al.'' [30] compared different types of SVM and LR to evaluate the credit risk of real data from 2005 to 2010. The best results were obtained by one of the SVM techniques (79.6%). Tong and Li [31], again using SVM and possible combinations of this technique, sought to assess the credit risk of Chinese companies. The best result obtained (9% error) was for the technique known as Relevance Vector Machines (RVM), a variant of SVM. Another analysis of different SVM techniques was conducted by Yi and Zhu [32], applied to an Australian database and a German one. The best result for the German database was obtained through RBF together with the SVM, achieving accuracy of 76%. For the Australian database, the greatest accuracy was 84.83% using polynomial functions in the tested SVM.
 +
 
 +
Bravo ''et al.'' [33] proposed a methodology that divides clients into “good payers”, “can’t pays” and “won’t pays”. The authors used a clustering algorithm, LR and Multinomial LR, together with ANN. Dividing clients in this way can mean a significant improvement over the classical division (good payers and bad payers). Koutanaei ''et al.'' [34] developed a hybrid model that, in the first stage, pre-processes information using PCA and GA. The parameters obtained are then used as inputs for the SVM and ANN to compare these methods. The results showed that ANN, with the AdaBoost (adaptive boosting) ensemble technique achieved greater accuracy than the others that were tested. Harris [35] investigated LinR and LR, in addition to ANN, DT and the SVM to classify clients in a German database and another from a bank in Barbados. The best accuracy was obtained using the SVM.
 +
 
 +
Danenas and Garvas [36] presented ANN, PSO (Particle Swarm Optimization) and SVM techniques to classify clients in a database from 1999-2007 known as “EDGAR” (Electronic Data Gathering). The experimental research showed that the SVM had the best performance (over 90%). Zhao ''et al.'' [37] proposed an MLP type ANN analysis in an attempt to improve performance using three strategies. The first strategy involved optimizing the distribution of information from the databases using a method known as Average Random Choosing. The second involved comparing the effects of the number of instances of training, test and validation. The third involved finding the best number of neurons for the hidden layer. Using the client base of a German bank, the authors achieved a level of accuracy of 87% for 31 neurons in the hidden layer. Silva ''et al.'' [38] also used MLP to explore the idea of generating cases in pattern regions, in which it is more difficult to produce consistent responses. The ratio of defaulters and non-defaulters in the database used by the authors was 80% to 20%, with a greater tendency of information for non-defaulters, lowering the accuracy of the methods tested.
 +
 
 +
Abedini ''et al.'' [39] proposed an approach using an ensemble classification technique with ANN, MLP, SVM, LinR and LR with bagging and MLP using RF. The proposed model performed better than when the techniques were applied on their own. The best accuracy level was 76.67% for the application of MLP with the RF ensemble technique. Zakirov, Bondarev and Momtselidye [40] presented a structure to compare different classification methods, in which the RF methodology was the most accurate. Applying the CART, MLP, SVM and BN, Ozturk ''et al.'' [41] examined the forecasting of different AI techniques to analyze bank credit. The results showed that the prediction techniques were over 90% accurate, while conventional statistical models were approximately 70% accurate. Abdou ''et al. ''[42] applied three correlation classification methods, LR, CART and ANN, to a database of banks in Cameroon. The best performance was obtained with ANN, with a 97.43% accurate identification of “good payers”. Punniyamoorthy and Sridevi [43] used ANN and compared them with an SVM model to classify bank clients in the United Kingdom. The SVM had better results than the ANN method, with accuracies of 80% and 77%, respectively.
 +
 
 +
Ala’raj and Abbod [44] presented an approach with six classifiers: LR, ANN, SVM, RF, DT and BN. Five databases were used (German, Australian, Japanese, Iranian and Polish), with RF having the best performance in four of the five bases, followed by ANN, with the highest level of accuracy in the German base. Andric and Kalpic [45] compared three classification algorithms, LR, ANN and gradient boosting. Regarding the first database, the German one, ANN and gradient boosting were both 75% accurate. For the second database, the Japanese one, gradient boosting had the best result, with 91% accuracy.
 +
 
 +
Li [46] conducted a credit risk analysis using the SVM based on fuzzy logic, for which the rate of accuracy was 77.7%. Guo and Dong [47] proposed a multi-objective PSO model for classifying customers and compared it with BN, LR, sequential minimal optimization, DT and ANN. The accuracy of the proposed model was greater than the other tested models (74.64%) for the first database that was tested. However, for the second, ANN had better performance than the others, with 61.15% accuracy. For the last database that was tested, LR had the best performance, with 76.70% accuracy.
 +
 
 +
In Luo ''et al.'' [48], the performance of credit scoring models was tested, applied to the CDS (Common Data Service) database. Deep learning ANN were used, as well as MLP, LR and the SVM, to compare the tests. The best accuracy was for the deep learning ANN (100%), followed by MLP (87.85%). Bequé and Lessmann [49] compared ANN and other classification methods with the ensemble technique known as extreme learning machines'' ''(ELM). Lanzarini ''et al.'' [50] presented an alternative model that could generate rules that worked not only with numerical features, but also with nominal ones. The technique was based on LVQ-PSO (Learning Vector Quantization'' ''combined with PSO). The highest level of accuracy obtained by the proposed algorithm was 81.05% in the tests that were performed. Maldonado ''et al.'' [51] developed two proposals based on the SVM to select features and classify clients with regard to bank credit. Among the tested SVM, the Fisher-SVM was the most accurate (accuracy rate of 70.6%). This algorithm uses a Fisher scoring algorithm to select features according to costs and the SVM is then applied. In Assef ''et al.'' [52], compared ANN-MLP, ANN-RBF and LR in a problem with 5 432 data with 15 features, considering three classes: non-default; default and temporarily default; the authors present new insights towards research over Credit Risk Assessment.
 +
 
 +
It should be highlighted that in this work, compared with those analyzed ([[#tab-1|Table 1]]), a default index was determined for every client and, also, in order to get better performance for the classifier algorithms of ML, techniques were applied for the data treatment: random undersampling for class balancing; features were coded as categorical and binary; and, finally, the features were selected using filter techniques (information gain) and wrapper techniques. With these data preprocessed, the Bayesian Networks (BN), Decision Tree (DT) and Support Vector Machine (SVM), were used comparatively. To provide a better illustration of the methodology, real data provided by a banking institution were used.
 +
 
 +
==3. Data organization and collection==
  
The data used in this work were obtained from a large Brazilian financial institution with regard to the concession of credit to companies located in Paraná State (PR). Historical records from January 1996 to June 2017 were used, with over 39 000 credit operations involving 5 432 companies, chosen by the institution’s specialists (credit managers), in order to get good representations of the general bank client mix.
+
The data used in this work were obtained from a large Brazilian financial institution with regard to the concession of credit to companies located in Paraná State (PR). Historical records from January 1996 to June 2017 were used, with over 39000 credit operations involving 5432 companies, chosen by the institution’s specialists (credit managers), in order to get good representations of the general bank client mix.
  
 
The data of the operations conducted during the research period were classified concerning the situation of payment as follows, as the institution specialists’ suggestions.
 
The data of the operations conducted during the research period were classified concerning the situation of payment as follows, as the institution specialists’ suggestions.
Line 280: Line 280:
 
:* Class III (losses): operations overdue for more than 180 days.
 
:* Class III (losses): operations overdue for more than 180 days.
  
Thus, every one of the 5 432 companies were classified by the number of operations resulting in each of the aforementioned classes of observation. For this purpose, a function of the default rate was determined, as shown in (1), below.
+
Thus, every one of the 5432 companies were classified by the number of operations resulting in each of the aforementioned classes of observation. For this purpose, a function of the default rate was determined, as shown in (1),
  
 
{| class="formulaSCP" style="width: 100%; text-align: center;"  
 
{| class="formulaSCP" style="width: 100%; text-align: center;"  
Line 292: Line 292:
 
|}
 
|}
  
 
+
where <math display="inline">Q\left( x\right) \, \in [0.1]</math>  represents the default rate of each company <math display="inline">x</math>; <math display="inline">{n}^{I}</math> represents the number of operations of each company <math display="inline">x</math> belonging to Class I; and <math display="inline">{n}^{III}</math> the number of operations of each company <math display="inline">x</math> in Class III.
where <math display="inline">Q\left( x\right) \,</math> ∈ [0.1] represents the default rate of each company <math display="inline">x</math>; <math display="inline">{n}^{I}</math> represents the number of operations of each company <math display="inline">x</math> belonging to Class I; and <math display="inline">{n}^{III}</math> the number of operations of each company <math display="inline">x</math> in Class III.
+
  
 
Thus, the classification (value of the default rate) of each company actually represents a proportion of the Class III operations in relation to Classes I and III. In other words, they are operations with no expectation of payment in relation to the number of operations that the company had already paid or are within the deadline for payment (Class I). Therefore, when the default rate is closer to “1”, this means that the company has more Class III operations than Class I and is consequently more of a “defaulter”. Using Equation (1), the companies will be “penalized” in proportion to the number of overdue payments.
 
Thus, the classification (value of the default rate) of each company actually represents a proportion of the Class III operations in relation to Classes I and III. In other words, they are operations with no expectation of payment in relation to the number of operations that the company had already paid or are within the deadline for payment (Class I). Therefore, when the default rate is closer to “1”, this means that the company has more Class III operations than Class I and is consequently more of a “defaulter”. Using Equation (1), the companies will be “penalized” in proportion to the number of overdue payments.
Line 301: Line 300:
 
Class II operations were not considered in the calculation of the default index because they are on the threshold between default and non-default, as these payments can still be settled and become Class I.
 
Class II operations were not considered in the calculation of the default index because they are on the threshold between default and non-default, as these payments can still be settled and become Class I.
  
Having said this, the classification feature of the companies regarding repayment, corresponding to the output feature, was defined by a dichotomous variable <math display="inline">Y\left( x\right)</math> , assuming the values shown in (2).
+
Having said this, the classification feature of the companies regarding repayment, corresponding to the output feature, was defined by a dichotomous variable <math display="inline">Y\left( x\right)</math>, assuming the values shown in (2)
  
 
{| class="formulaSCP" style="width: 100%; text-align: center;"  
 
{| class="formulaSCP" style="width: 100%; text-align: center;"  
Line 308: Line 307:
 
{| style="text-align: center; margin:auto;"  
 
{| style="text-align: center; margin:auto;"  
 
|-
 
|-
| <math display="inline">Y\left( x\right) =\left\{ \begin{matrix}''Defaulter'',\, \, \&0.5<Q\left( x\right) \leq 1\\''Non-defaulter'',\, \, \&0<Q(x)\leq 0.5\end{matrix}\right.</math>
+
| <math display="inline">Y\left( x\right) =\left\{ \begin{array}{ll}''Defaulter'', & 0.5<Q\left( x\right) \leq 1\\''Non-defaulter'', & 0<Q(x)\leq 0.5\end{array}\right.</math>
 
|}
 
|}
 
| style="width: 5px;text-align: right;white-space: nowrap;" | (2)
 
| style="width: 5px;text-align: right;white-space: nowrap;" | (2)
 
|}
 
|}
  
 +
Therefore, of the total instances (5432 companies), 4238 were considered “non-defaulters” and 1194 “defaulters”. The 10 features selected with the help of a specialist from the banking institution to compose the prediction model were: Legal Status, Gross Annual Revenue, Number of Employees, Company Activity, Date of Incorporation, Time as Client, Market Sector, Risk Assessment, Borrower’s Credit Limit and, finally, Loan Restrictions (weak or impeditive). The feature selection using the expertise tries to avoid a high bias that could lead to a model underfitting.
  
Therefore, of the total instances (5 432 companies), 4 238 were considered “non-defaulters” and 1 194 “defaulters”. The 10 features selected with the help of a specialist from the banking institution to compose the prediction model were: Legal Status, Gross Annual Revenue, Number of Employees, Company Activity, Date of Incorporation, Time as Client, Market Sector, Risk Assessment, Borrower’s Credit Limit and, finally, Loan Restrictions (weak or impeditive).
+
==4. Methodology==
  
=4. Methodology=
+
The methodology was defined using in the five following stages: class balancing, coding features (categorical and binary), feature selection, application of machine learning algorithms and evaluation and comparison of their performance. These stages are illustrated in the flowchart in [[#img-2|Figure 2]]  and briefly described in the next subsections.
  
The methodology was defined using in the five following stages: class balancing, coding features (categorical and binary), feature selection, application of machine learning algorithms and evaluation and comparison of their performance. These stages are illustrated in the flowchart in Figure 2 and briefly described in the next subsections.
+
<div id='img-2'></div>
 +
{| style="text-align: center; border: 1px solid #BBB; margin: 1em auto; width: auto;max-width: auto;"
 +
|-
 +
|style="padding:10px;"|  [[Image:Draft_Samways dos Santos_683812980-image2.png|600px]]
 +
|- style="text-align: center; font-size: 75%;"
 +
| colspan="1" style="padding-bottom:10px;"| '''Figure 2'''. Proposed methodology
 +
|}
  
<div class="center" style="width: auto; margin-left: auto; margin-right: auto;">
 
<span style="text-align: center; font-size: 75%;">'''Figure 2.''' Proposed Methodology</span>
 
  
[[Image:Draft_Samways dos Santos_683812980-image2.png|600px]]
+
=== 4.1 Class balancing===
</div>
+
  
== 4.1. Class Balancing ==
+
The evident unbalancing or disproportionate number of instances in each class (4238 were considered “non-defaulters” and 1194 “defaulters”) can make the minority instances (“defaulters”) have “strong” chances of being classified incorrectly [53]. Therefore, the random undersampling technique [54] was applied to solve the problem of unbalancing, which consists of the random elimination of instances in the majority class (“non-defaulters"), so that the two classes have the same number (1194) of instances. This technique was used due to its simplicity and fast computation.
The evident unbalancing or disproportionate number of instances in each class (4 238 were considered “non-defaulters” and 1 194 “defaulters”) can make the minority instances (“defaulters”) have “strong” chances of being classified incorrectly [53]. Therefore, the random undersampling technique [54]''' '''was applied to solve the problem of unbalancing, which consists of the random elimination of instances in the majority class (“non-defaulters), so that the two classes have the same number (1 194) of instances.
+
  
==4.2. Coding of Features==
+
===4.2 Coding of features===
  
The raw data (continuous variables) underwent a coding procedure that consisted of categorizing the features and transforming them into dummy (binary) variables [55].
+
The raw data (continuous variables) underwent a coding procedure that consisted of categorizing the features and transforming them into dummy (binary) variables [55]. The continuous type features were categorized/binarized due to the significant differences between their values ranges.
  
 
The categorization of the features that were originally described by continuous variables consisted of creating four levels of discrete variables that corresponded to the quartiles of the value intervals of the original continuous variable. The “Gross Annual Revenue”, “Number of Employees”, “Date of Incorporation” and “Time as Client” features are included in this case.
 
The categorization of the features that were originally described by continuous variables consisted of creating four levels of discrete variables that corresponded to the quartiles of the value intervals of the original continuous variable. The “Gross Annual Revenue”, “Number of Employees”, “Date of Incorporation” and “Time as Client” features are included in this case.
  
The features described with variables that were originally categorical, with many levels, also had some of their levels regrouped to avoid the existence of categories with a small number of instances, which could affect the estimation of the model’s parameters. The features that fit this scenario are “Legal Status”, “Company Activity”, “Market Sector”, Risk Assessment”, “Borrower’s Credit Limit” and “Restrictions”. The variables were then “binarized” using the dummy coding, which is done by attributing the value of “1” when it has a characteristic represented by the level of the feature and a value of “0” otherwise. The use of dummies can help improve the assertiveness of the predictions of the classification models [9, 56, 3, 57]. The number of dummies is equal to the number of levels of each feature. Therefore, in the model in question, there was a total of 74 dummy variables.
+
The features described with variables that were originally categorical, with many levels, also had some of their levels regrouped to avoid the existence of categories with a small number of instances, which could affect the estimation of the model’s parameters. The features that fit this scenario are “Legal Status”, “Company Activity”, “Market Sector”, Risk Assessment”, “Borrower’s Credit Limit” and “Restrictions”. The variables were then “binarized” using the dummy coding, which is done by attributing the value of “1” when it has a characteristic represented by the level of the feature and a value of “0” otherwise. The use of dummies can help improve the assertiveness of the predictions of the classification models [3,9,56,57]. The number of dummies is equal to the number of levels of each feature. Therefore, in the model in question, there was a total of 74 dummy variables.
  
==4.3. Feature Selection==
+
===4.3. Feature selection===
  
 
Feature selection techniques were used that can improve the performance of the predictor models, facilitate visualization and understanding of the estimated parameters and prevent problems of overfitting [58].
 
Feature selection techniques were used that can improve the performance of the predictor models, facilitate visualization and understanding of the estimated parameters and prevent problems of overfitting [58].
  
There are different approaches to feature selection, two of which were used in the present work: a) Filter (Feature Ranking) to establish a ranking of the features based on information gain, independent of the classifier algorithm [59]; and b) Wrapper (Forward Selection) to select a subset of features that results in better “merit” (better assessment performance), depending on the classifier algorithm [60].
+
There are different approaches to feature selection, two of which were used in the present work: a) Filter (Feature Ranking) to establish a ranking of the features based on information gain, independent of the classifier algorithm [59]; and b) Wrapper (Forward Selection) to select a subset of features that results in better “merit” (better assessment performance), depending on the classifier algorithm, using the method WrapperSubsetEval, proposed by Kohavi and John [60].
  
 
With the feature selection using the Wrapper method, the models, which before were “complete” (with all the features), became “summarized” models. In other words, they came to include only the predictor variables considered most important for each classifier algorithm.
 
With the feature selection using the Wrapper method, the models, which before were “complete” (with all the features), became “summarized” models. In other words, they came to include only the predictor variables considered most important for each classifier algorithm.
  
==4.4. Classifier Algorithms==
+
===4.4. Classifier algorithms===
  
A number of ML techniques have been used in classification problems [61, 62]. The classifier algorithms selected for the case in question were Bayesian Networks (BN; [63]), Decision Tree'' ''(DT; [64]) and the'' ''Support Vector Machine'' ''(SVM; [65]), as they had the best performances in the correlated works that were analyzed (Table 1).
+
A number of ML techniques have been used in classification problems [61,62]. The classifier algorithms selected for the case in question were Bayesian Networks (BN; [63]), Decision Tree (DT; [64]) and the Support Vector Machine (SVM; [65]), as they had the best performances in the correlated works that were analyzed ([[#tab-1|Table 1]]).
  
A BN is a directed acyclic graph that codifies a joint probability distribution on a set of discrete random variables <math display="inline">U\, = \, \lbrace {X}_{1},\, ...,\, {X}_{n}\rbrace</math> where each variable ''X<sub>i</sub>'' can assume values of a finite set [66]. Formally, a BN for <math display="inline">U</math> is a pair <math display="inline">B=\left\langle G,\Theta \right\rangle ,\,</math> where the first component, <math display="inline">G</math>, is a directed acyclic graph whose vertices correspond to the random variables and whose edges represent direct dependences between these variables. The second component, <math display="inline">\Theta</math> , represents the set of parameters that quantifies the network [67].
+
A BN is a directed acyclic graph that codifies a joint probability distribution on a set of discrete random variables <math display="inline">U\, = \, \lbrace {X}_{1},\, ...,\, {X}_{n}\rbrace</math> where each variable ''X<sub>i</sub>'' can assume values of a finite set [66]. Formally, a BN for <math display="inline">U</math> is a pair <math display="inline">B=\left\langle G,\Theta \right\rangle ,\,</math> where the first component, <math display="inline">G</math>, is a directed acyclic graph whose vertices correspond to the random variables and whose edges represent direct dependences between these variables. The second component, <math display="inline">\Theta</math>, represents the set of parameters that quantifies the network [67].
  
 
A DT is a tree-based method, introduced by Breiman ''et al.'' [68]. The initial algorithm has been improved and expanded in several ways over the years, but the general principles remain: given a set of training data, the input variables and their corresponding levels are observed to determine possible division points. Each division point is then evaluated to determine which division is “better”. The process is then repeated with each subgroup until a stop condition is achieved [69].
 
A DT is a tree-based method, introduced by Breiman ''et al.'' [68]. The initial algorithm has been improved and expanded in several ways over the years, but the general principles remain: given a set of training data, the input variables and their corresponding levels are observed to determine possible division points. Each division point is then evaluated to determine which division is “better”. The process is then repeated with each subgroup until a stop condition is achieved [69].
Line 355: Line 357:
 
Finally, the original concept of the SVM [70] was intended to find ideal hyperplanes for linearly separable classes [71], but also has the ability of building nonlinear classifiers [72]. These hyperplanes depend on a subset of the training data, which are known as support vectors [69]. The SVM is widely used in real world problems due to a better generalization ability, including less overfitting problems.
 
Finally, the original concept of the SVM [70] was intended to find ideal hyperplanes for linearly separable classes [71], but also has the ability of building nonlinear classifiers [72]. These hyperplanes depend on a subset of the training data, which are known as support vectors [69]. The SVM is widely used in real world problems due to a better generalization ability, including less overfitting problems.
  
==4.5. Evaluation and Comparison of the Performance of the Models==
+
===4.5. Evaluation and comparison of the performance of the models===
  
 
The metrics used to assess the performance of the predictions of classification models, based on the confusion matrix were: a) Accuracy, measured by the Total Accuracy Rate (TAR); and b) Specificity, also called the true negative rate (TNR), measured by the rate of accuracy in “Defaulter” prediction.
 
The metrics used to assess the performance of the predictions of classification models, based on the confusion matrix were: a) Accuracy, measured by the Total Accuracy Rate (TAR); and b) Specificity, also called the true negative rate (TNR), measured by the rate of accuracy in “Defaulter” prediction.
  
'''  '''The rates TAR and TNR can be calculated using equations (3) and (4), respectively [73].
+
The rates TAR and TNR can be calculated using equations (3) and (4), respectively [73]
  
 
{| class="formulaSCP" style="width: 100%; text-align: center;"  
 
{| class="formulaSCP" style="width: 100%; text-align: center;"  
Line 380: Line 382:
 
| style="width: 5px;text-align: right;white-space: nowrap;" | (4)
 
| style="width: 5px;text-align: right;white-space: nowrap;" | (4)
 
|}
 
|}
 
  
 
where <math display="inline">{n}_{aa}\,</math> represents the number of non-default operations and correctly classified as “non-default” (true positive, TP); <math display="inline">{n}_{ii}</math>, the number of default operations correctly classified as “default” (true negative, TN); <math display="inline">{n}_{T}</math>, the total instances considered and <math display="inline">{n}_{i}</math>, the total number of “Defaulters”.
 
where <math display="inline">{n}_{aa}\,</math> represents the number of non-default operations and correctly classified as “non-default” (true positive, TP); <math display="inline">{n}_{ii}</math>, the number of default operations correctly classified as “default” (true negative, TN); <math display="inline">{n}_{T}</math>, the total instances considered and <math display="inline">{n}_{i}</math>, the total number of “Defaulters”.
  
The accuracy is the proportion of true results, both true positives (“non-default”) and true negatives (“default”), among the total number of 5 432 cases examined. The specificity measures the proportion of actual negatives (“default”) that are correctly identified as such defaulters.
+
The accuracy is the proportion of true results, both true positives (“non-default”) and true negatives (“default”), among the total number of 5432 cases examined. The specificity measures the proportion of actual negatives (“default”) that are correctly identified as such defaulters.
  
<span id='_Hlk523408541'></span>Another important evaluation metrics for checking the classification model’s performance is the AUC (Area Under the Curve) ROC (Receiver Operating Characteristics) curve, also written as AUROC (Area Under the Receiver Operating Characteristics). This measurement is obtained through the graphical representation of the pairs <math display="inline">x</math> and <math display="inline">y</math>, which correspond the false positive rate against the true positive rate (sensitivity) [74]. The AUROC can be obtained through numerical integration methods [73].
+
Another important evaluation metrics for checking the classification model’s performance is the AUC (Area Under the Curve) ROC (Receiver Operating Characteristics) curve, also written as AUROC (Area Under the Receiver Operating Characteristics). This measurement is obtained through the graphical representation of the pairs <math display="inline">x</math> and <math display="inline">y</math>, which correspond the false positive rate against the true positive rate (sensitivity) [74]. The AUROC can be obtained through numerical integration methods [73].
  
 
The AUROC measurement is preferable to only using accuracy, specificity or sensitivity, as it has a number of desirable properties [75] and can be interpreted as follows: the closer to “1” the obtained value is, the better the classifier algorithm will be in the task of separating the two classes. Values between 0.8 and 0.9 are considered acceptable, and values over 0.9, excellent.
 
The AUROC measurement is preferable to only using accuracy, specificity or sensitivity, as it has a number of desirable properties [75] and can be interpreted as follows: the closer to “1” the obtained value is, the better the classifier algorithm will be in the task of separating the two classes. Values between 0.8 and 0.9 are considered acceptable, and values over 0.9, excellent.
  
The models were compared to verify the existence of significant differences between the performance measurements (Accuracy, Specificity and AUROC) in the different classifier algorithms using the ''t'' test for coupled samples, with a level of significance of α = 0.05.
+
The models were compared to verify the existence of significant differences between the performance measurements (Accuracy, Specificity and AUROC) in the different classifier algorithms using the <math display="inline">t</math> test for coupled samples, with a level of significance of <math display="inline">\alpha = 0.05 </math>.
  
=5. Obtaining and Discussion of Results =
+
==5. Obtaining and discussion of results==
  
 
Following the data balancing, as in Section 4.1, the remaining stages of the methodology were followed.
 
Following the data balancing, as in Section 4.1, the remaining stages of the methodology were followed.
  
<span id='_Hlk523407439'></span>
+
===5.1. Feature coding===
==5.1. Feature Coding==
+
  
 
Following the procedures described in Section 4.2, the two configurations to be tested were obtained: a) Code I (Categorical Variables): with the 10 features categorized into 74 different alternatives; and b) Code II (Binarized Variables): with the 10 features transformed into 74 dummy variables. Detailed descriptions of the 10 self-explanatory features and Codes I and II are shown in Table A in the Appendix 1.
 
Following the procedures described in Section 4.2, the two configurations to be tested were obtained: a) Code I (Categorical Variables): with the 10 features categorized into 74 different alternatives; and b) Code II (Binarized Variables): with the 10 features transformed into 74 dummy variables. Detailed descriptions of the 10 self-explanatory features and Codes I and II are shown in Table A in the Appendix 1.
  
<span id='_Hlk523407385'></span>
+
===5.2. Results of the feature selection===
==5.2. Results of the Feature Selection==
+
  
Different “complete” and “summarized” models (filter method or information gain; wrapper) were constructed and tested and named as shown in Table 2, depending on whether the classes are balanced and also on the type of feature coding (categorical or binary).
+
Different “complete” and “summarized” models (filter method or information gain; wrapper) were constructed and tested and named as shown in [[#tab-2|Table 2]], depending on whether the classes are balanced and also on the type of feature coding (categorical or binary).
  
<div id="_Hlk523407655" class="center" style="width: auto; margin-left: auto; margin-right: auto;">
+
<div class="center" style="font-size: 75%;">'''Table 2.''' Denomination of complete and summarized models</div>
<span style="text-align: center; font-size: 75%;">'''Table 2.''' Denomination of Complete and Summarized Models</span></div>
+
  
{| style="width: 100%;border-collapse: collapse;"  
+
<div id='tab-2'></div>
 +
{| class="wikitable" style="margin: 1em auto 0.1em auto;border-collapse: collapse;font-size:85%;width:auto;"  
 +
|-style="text-align:center"
 +
!  !! colspan='4'  | Complete Models (CM) !! colspan='4'  | Summarized Models (SM)
 
|-
 
|-
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
| colspan='4' style="border-top: 2pt solid black;border-bottom: 1pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">'''Complete Models (CM)'''</span>
+
|  style="text-align: center;"|CM.A
|  style="border-top: 2pt solid black;text-align: center;"|
+
|  style="text-align: center;"|CM.B
| colspan='4' style="border-top: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">'''Summarized Models (SM)'''</span>
+
style="text-align: center;"|CM.C
 +
|  style="text-align: center;"|CM.D
 +
|  style="text-align: center;"|SM.A
 +
|  style="text-align: center;"|SM.B
 +
|  style="text-align: center;"|SM.C
 +
style="text-align: center;"|SM.D
 
|-
 
|-
|  style="border-bottom: 2pt solid black;text-align: center;"|
+
|  style="text-align: left;"|'''Class Balancing'''
|  style="border-top: 1pt solid black;border-bottom: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">CM.A</span>
+
|  style="border-top: 1pt solid black;border-bottom: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">CM.B</span>
+
|  style="border-top: 1pt solid black;border-bottom: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">CM.C</span>
+
|  style="border-top: 1pt solid black;border-bottom: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">CM.D</span>
+
|  style="border-bottom: 2pt solid black;text-align: center;"|
+
|  style="border-top: 1pt solid black;border-bottom: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">SM.A</span>
+
|  style="border-top: 1pt solid black;border-bottom: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">SM.B</span>
+
|  style="border-top: 1pt solid black;border-bottom: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">SM.C</span>
+
|  style="border-top: 1pt solid black;border-bottom: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">SM.D</span>
+
|-
+
|  style="border-top: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">'''Class Balancing'''</span>
+
|  style="border-top: 2pt solid black;text-align: center;"|
+
|  style="border-top: 2pt solid black;text-align: center;"|
+
|  style="border-top: 2pt solid black;text-align: center;"|
+
|  style="border-top: 2pt solid black;text-align: center;"|
+
|  style="border-top: 2pt solid black;text-align: center;"|
+
|  style="border-top: 2pt solid black;text-align: center;"|
+
|  style="border-top: 2pt solid black;text-align: center;"|
+
|  style="border-top: 2pt solid black;text-align: center;"|
+
|  style="border-top: 2pt solid black;text-align: center;"|
+
|-
+
|  style="text-align: right;"|<span style="text-align: center; font-size: 75%;">Unbalanced Classes</span>
+
 
+
<span style="text-align: center; font-size: 75%;">(5 432 instances)</span>
+
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">'''x'''</span>
+
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">'''x'''</span>
+
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">'''x'''</span>
 
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">'''x'''</span>
 
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
|-
 
|  style="text-align: right;"|<span style="text-align: center; font-size: 75%;">Balanced Classes</span>
 
 
<span style="text-align: center; font-size: 75%;">(2 388 instances)</span>
 
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">'''x'''</span>
 
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">'''x'''</span>
 
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
 +
|-
 +
|  style="text-align: left;"|Unbalanced Classes (5 432 instances)
 +
|  style="text-align: center;"|'''x'''
 +
|  style="text-align: center;"|'''x'''
 +
|  style="text-align: center;"|
 +
|  style="text-align: center;"|
 +
|  style="text-align: center;"|'''x'''
 +
|  style="text-align: center;"|'''x'''
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">'''x'''</span>
 
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">'''X'''</span>
 
 
|-
 
|-
| <span style="text-align: center; font-size: 75%;">'''Feature Coding'''</span>
+
| style="text-align: left;" |Balanced Classes (2 388 instances)
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
 +
|  style="text-align: center;"|'''x'''
 +
|  style="text-align: center;"|'''x'''
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
 +
|  style="text-align: center;"|'''x'''
 +
|  style="text-align: center;"|'''X'''
 +
|-
 +
| style="text-align: left;" |'''Feature Coding'''
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
Line 474: Line 458:
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
|-
 
|  style="text-align: right;"|<span style="text-align: center; font-size: 75%;">Code I Features</span>
 
 
<span style="text-align: center; font-size: 75%;">(Categorical)</span>
 
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">'''x'''</span>
 
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">'''x'''</span>
 
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">'''x'''</span>
+
|-
 +
|  style="text-align: left;"|Code I Features (Categorical)
 +
style="text-align: center;"|'''x'''
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">'''x'''</span>
+
|  style="text-align: center;"|'''x'''
 +
style="text-align: center;"|
 +
|  style="text-align: center;"|'''x'''
 +
|  style="text-align: center;"|
 +
|  style="text-align: center;"|'''x'''
 
|  style="text-align: center;"|
 
|  style="text-align: center;"|
 
|-
 
|-
|  style="border-bottom: 2pt solid black;text-align: right;"|<span style="text-align: center; font-size: 75%;">Code II Features</span>
+
|  style="text-align: left;"|Code II Features (Binary)
 
+
|  style="text-align: center;"|
<span style="text-align: center; font-size: 75%;">(Binary)</span>
+
|  style="text-align: center;"|'''x'''
|  style="border-bottom: 2pt solid black;text-align: center;"|
+
|  style="text-align: center;"|
|  style="border-bottom: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">'''x'''</span>
+
|  style="text-align: center;"|'''x'''
|  style="border-bottom: 2pt solid black;text-align: center;"|
+
|  style="text-align: center;"|
|  style="border-bottom: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">'''x'''</span>
+
|  style="text-align: center;"|'''x'''
|  style="border-bottom: 2pt solid black;text-align: center;"|
+
|  style="text-align: center;"|
|  style="border-bottom: 2pt solid black;text-align: center;"|
+
|  style="text-align: center;"|'''x'''
|  style="border-bottom: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">'''x'''</span>
+
|  style="border-bottom: 2pt solid black;text-align: center;"|
+
|  style="border-bottom: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">'''X'''</span>
+
 
|}
 
|}
  
  
<span id='_Hlk523407721'></span> Therefore, for example, CM.A is complete, the classes are unbalanced and its features are Code I (categorical features). The other models can be interpreted likewise.
+
Therefore, for example, CM.A is complete, the classes are unbalanced and its features are Code I (categorical features). The other models can be interpreted likewise.
  
It was now time for the feature selection. The results of this selection are shown in Figure 3, in the format of Code I (categorical), with balanced and unbalanced classes for defining the ranking (obtained using the filter or information gain approach), and for constituting the subset of features for each classifier algorithm (obtained using the wrapper approach).
+
It was now time for the feature selection. The results of this selection are shown in [[#img-3|Figure 3]], in the format of Code I (categorical), with balanced and unbalanced classes for defining the ranking (obtained using the filter or information gain approach), and for constituting the subset of features for each classifier algorithm (obtained using the wrapper approach).
  
<div id="_Hlk523407757" class="center" style="width: auto; margin-left: auto; margin-right: auto;">
+
<div id='img-1'></div>
<span style="text-align: center; font-size: 75%;">'''Figure 3.''' Ranking of features in Code I (categorical) format and selected subsets for each classifier algorithm</span></div>
+
{| style="text-align: center; border: 1px solid #BBB; margin: 1em auto; width: 80%;"
 
+
|-
<div class="center" style="width: auto; margin-left: auto; margin-right: auto;">
+
|style="padding:10px;"|  [[Image:Draft_Samways dos Santos_683812980-image3.png|600px]]
<span style="text-align: center; font-size: 75%;"> [[Image:Draft_Samways dos Santos_683812980-image3.png|600px]] </span></div>
+
|- style="text-align: center; font-size: 75%;"
 +
| colspan="1" style="padding-bottom:5px;"| '''Figure 3'''. Ranking of features in Code I (categorical) format and selected subsets for each classifier algorithm<br />
 +
<br />
 +
Feature’s Legend: (1) Legal Status, (2) Gross Annual Revenue, (3) Number of  Employees, (4) Company Activity, (5) Incorporation Data, (6) Time as Client, (7) Market Sector, (8) Risk Assessment, (9) Borrower’s Credit Limit, (10) Loan Restrictions. For more information, see [[#tab-A|Table A]] (Appendix 1).
 +
|}
  
<span id='_Hlk523407832'></span><span style="text-align: center; font-size: 75%;">*See Table A (Appendix 1, first column) for identification of features.</span>
 
  
<span id='_Hlk523407915'></span>According to the ranking shown in Figure 3, Features 8 and 10, “Risk Assessment” and “Loan Restrictions” are occupying positions 1 and 2 (table at the left in Figure 3), swapping their positions in the balanced classes (table at the right in Figure 3). Thus, these two features are highly relevant to the model, with the information gain higher than 0.26. Features 2 and 3, “Gross Annual Revenue” and “Number of Employees” (positions 9 and 10 in Figure 3) contributed least to the information gain in the model.
+
According to the ranking shown in [[#img-3|Figure 3]], Features 8 and 10, “Risk Assessment” and “Loan Restrictions” are occupying positions 1 and 2 (table at the left in [[#img-3|Figure 3]]), swapping their positions in the balanced classes (table at the right in [[#img-3|Figure 3]]). Thus, these two features are highly relevant to the model, with the information gain higher than 0.26. Features 2 and 3, “Gross Annual Revenue” and “Number of Employees” (positions 9 and 10 in [[#img-3|Figure 3]]) contributed least to the information gain in the model.
  
 
Moreover, Feature 8, “Risk Assessment”, was selected for the subset of features that result in greater “merit” (wrapper approach) for all thee classifier algorithms in both cases, Unbalanced and Balanced, as shown in the Venn diagram. This did not occur in the case of Feature 10, “Loan Restrictions”, which was selected in all the algorithms only when the classes were balanced.
 
Moreover, Feature 8, “Risk Assessment”, was selected for the subset of features that result in greater “merit” (wrapper approach) for all thee classifier algorithms in both cases, Unbalanced and Balanced, as shown in the Venn diagram. This did not occur in the case of Feature 10, “Loan Restrictions”, which was selected in all the algorithms only when the classes were balanced.
Line 521: Line 505:
 
Other features were also selected to compose each subset, but the interesting fact was the substantial reduction in their number, which went from 10 to a minimum of two features (8 and 10; DT with unbalanced classes) and a maximum of seven features (2, 3, 4, 5, 7, 8 and 10; BN with balanced classes).
 
Other features were also selected to compose each subset, but the interesting fact was the substantial reduction in their number, which went from 10 to a minimum of two features (8 and 10; DT with unbalanced classes) and a maximum of seven features (2, 3, 4, 5, 7, 8 and 10; BN with balanced classes).
  
Meanwhile for Code II (binary), with balanced and unbalanced classes, the results of the feature selection are shown in Figure 4. With this coding, not only the features with all their levels were selected, but rather the specific levels of each feature with greater representativeness for the model.
+
Meanwhile for Code II (binary), with balanced and unbalanced classes, the results of the feature selection are shown in [[#img-4|Figure 4]]. With this coding, not only the features with all their levels were selected, but rather the specific levels of each feature with greater representativeness for the model.
  
<div id="_Hlk523407967" class="center" style="width: auto; margin-left: auto; margin-right: auto;">
+
<div id='img-1'></div>
<span style="text-align: center; font-size: 75%;">'''Figure 4''' Ranking of features in the Code II (binary) format and selected subset for each classifier algorithm</span></div>
+
{| style="text-align: center; border: 1px solid #BBB; margin: 1em auto; width: 80%;"
 +
|-
 +
|style="padding:10px;"|  [[Image:Draft_Samways dos Santos_683812980-image4.png|600px]]
 +
|- style="text-align: center; font-size: 75%;"
 +
| colspan="1" style="padding-bottom:5px;"| '''Figure 4'''. Ranking of features in the Code II (binary) format and selected subset for each classifier algorithm <br />
 +
<br />
 +
Feature's Legend: (4) Simple partnership, (5) Individual limited company, (6) Individual entrepreneur, (7) Individual firm, (11) Civil association, (23) Industrial machinery, (26) Sales of cosmetics, toiletries and hygiene products, (31) Dental products, (33) Debt recovery and registered information,  (37) IT Technical support, maintenance and service, (40) 15/02/1939 a 01/06/1997, (42) 20/02/2004 a 19/02/2009, (43) 26/02/2009 a 02/12/2016, (47) 16/06/2011 a 05/12/2016, (51) Middle-level business, (55) A, (56) B, (59) E, (60) Level 1, (61) Level 2, (62) Level 3, (63) Level 4, (68) Level 9, (69) Level 10, (70) Level 11, (72) Impeditive restriction, (73) No restriction, (74) Weak restriction/information. For more information, see [[#tab-A|Table A]] (Appendix 1).
 +
|}
  
<div class="center" style="width: auto; margin-left: auto; margin-right: auto;">
 
<span style="text-align: center; font-size: 75%;"> [[Image:Draft_Samways dos Santos_683812980-image4.png|600px]] </span></div>
 
  
<span id='_Hlk523408041'></span><span style="text-align: center; font-size: 75%;">*See Table A (Appendix 1, second column) for identification of feature levels. </span>
+
The same features (59 and 72) occupied the first two places in the ranking using the filter approach, reversing positions in the case of unbalanced and balanced classes. These features are actually levels of the “Risk Assessment” and “Loan Restrictions” features, representing “Risk E” and “Impeditive Risk”. In other words, the binary format revealed the specific level of the most important features for the models.
 
+
<span id='_Hlk523408092'></span>The same features (59 and 72) occupied the first two places in the ranking using the filter approach, reversing positions in the case of unbalanced and balanced classes. These features are actually levels of the “Risk Assessment” and “Loan Restrictions” features, representing “Risk E” and “Impeditive Risk”. In other words, the binary format revealed the specific level of the most important features for the models.
+
  
 
Feature 59, “Risk E”, which appears in the intersection of the Venn diagram, was selected for the subset of features that results in better “merit” (wrapper approach) for all three classifier algorithms in both cases, Unbalanced and Balanced. In the case of the unbalanced classes, there was a radical reduction in the number of features, going from 74 to four in the total for the subset, with three in each classifier algorithm: BN with Features 59, 69 and 74; DT and SVM with Features 59, 74 and 63. With the balanced classes, this reducing effect was less marked, except for the SVM (Features 37, 51, 59 and 72). It remains to be seen whether this reduction in the number of features is advantageous in the sense of better performance of the models.
 
Feature 59, “Risk E”, which appears in the intersection of the Venn diagram, was selected for the subset of features that results in better “merit” (wrapper approach) for all three classifier algorithms in both cases, Unbalanced and Balanced. In the case of the unbalanced classes, there was a radical reduction in the number of features, going from 74 to four in the total for the subset, with three in each classifier algorithm: BN with Features 59, 69 and 74; DT and SVM with Features 59, 74 and 63. With the balanced classes, this reducing effect was less marked, except for the SVM (Features 37, 51, 59 and 72). It remains to be seen whether this reduction in the number of features is advantageous in the sense of better performance of the models.
  
<span id='_Hlk523408117'></span>
+
===5.4. Results of the classifier algorithms ===
==5.4. Results of the Classifier Algorithms ==
+
  
The algorithms used (BN, DT and SVM) were implemented in WEKA<sup>®</sup> software (Waikato Environment for Knowledge Analysis, available at: [http://www.cs.waikato.ac.nz/ml/weka http://www.cs.waikato.ac.nz/ml/weka]) and the tests were conducted with the option of cross-validation (k-fold), with ''k'' = 10 partitions and with a standard configuration in all parameters. More specifically, in the case of BN, the SimpleEstimator'' ''method was used with ''ɑ'' = 0.5 to determine the values of the conditional probability tables and the K2 method to determine the network structure. For the DT, the depth of the tree was considered unlimited, 100 was the number of iterations to be used and a single random seed was used. For the SVM, the complexity parameter, ''c ''= 1, the logistic method was used for calibration, and the Polynomial Kernel to determine the kernel.
+
The algorithms used (BN, DT and SVM) were implemented in WEKA<sup>®</sup> software (Waikato Environment for Knowledge Analysis, available at: [http://www.cs.waikato.ac.nz/ml/weka http://www.cs.waikato.ac.nz/ml/weka]) and the tests were conducted with the option of cross-validation (<math>k</math>-fold), with <math>k=10</math> partitions and with a standard configuration in all parameters. More specifically, in the case of BN, the SimpleEstimator method was used with <math>\alpha = 0.5</math> to determine the values of the conditional probability tables [76] and the K2 method to determine the network structure. For the DT, the depth of the tree was considered unlimited, 100 was the number of iterations to be used and a single random seed was used. For the SVM, the complexity parameter, <math>c = 1</math>, the logistic method was used for calibration, and the Polynomial Kernel to determine the kernel.
  
The results of the tests with the different classifier algorithms, considering the different constructed models (CM.A to CM.D and SM.A to SM.D), are shown in Table 3. In this table, the metrics for assessing the performance of the models are presented, as well as a comparison to determine whether there is a significant difference between the performances of the complete models.
+
The results of the tests with the different classifier algorithms, considering the different constructed models (CM.A to CM.D and SM.A to SM.D), are shown in [[#tab-3|Table 3]]. In this table, the metrics for assessing the performance of the models are presented, as well as a comparison to determine whether there is a significant difference between the performances of the complete models.
  
<div id="_Hlk523408159" class="center" style="width: auto; margin-left: auto; margin-right: auto;">
+
<div class="center" style="font-size: 75%;">'''Table 3.''' Performance of the models tested with BN, SVM and DT</div>
<span style="text-align: center; font-size: 75%;">'''Table 3.''' Performance of the models tested with BN, SVM and DT</span></div>
+
  
{| style="width: 100%;border-collapse: collapse;"  
+
<div id='tab-1'></div>
 +
{| class="wikitable" style="margin: 1em auto 0.1em auto;border-collapse: collapse;font-size:85%;width:auto;"  
 +
|-style="text-align:center"
 +
! rowspan="2" | Assessment Metric !! rowspan="2" | Classifier Algorithm !! colspan='4' | Complete Models !! colspan='4'  | Summarized Model
 
|-
 
|-
rowspan='2' style="border-top: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">'''Assessment Metric '''</span>
+
|  style=“text-align: center;|CM.A
rowspan='2' style="border-top: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">'''Classifier Algorithm'''</span>
+
style=“text-align: center;”|CM.B
| colspan='4' style="border-top: 2pt solid black;border-bottom: 1pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">'''Complete Models'''</span>
+
|  style=“text-align: center;”|CM.C
|  style="border-top: 2pt solid black;vertical-align: top;"|
+
| style=“text-align: center;”|CM.D
| colspan='4' style="border-top: 2pt solid black;border-right: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">'''Summarized Model'''</span>
+
|  style=“text-align: center;”|SM.A
 +
| style=“text-align: center;”|SM.B
 +
|  style=“text-align: center;|SM.C
 +
|  style=“text-align: center;|SM.D
 
|-
 
|-
|  style="border-top: 1pt solid black;border-bottom: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">CM.A</span>
+
rowspan='3' style="vertical-align: center;"|Accuracy
|  style="border-top: 1pt solid black;border-bottom: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">CM.B</span>
+
style="text-align: center;"|BN
|  style="border-top: 1pt solid black;border-bottom: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">CM.C</span>
+
|  style=“text-align: center;”|0.873
|  style="border-top: 1pt solid black;border-bottom: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">CM.D</span>
+
|  style=“text-align: center;”|0.858
|  style="border-bottom: 2pt solid black;"|
+
|  style=“text-align: center;”|0.856
|  style="border-top: 1pt solid black;border-bottom: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">SM.A</span>
+
|  style=“text-align: center;|0.858
|  style="border-top: 1pt solid black;border-bottom: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">SM.B</span>
+
|  style=“text-align: center;”|0.888
|  style="border-top: 1pt solid black;border-bottom: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">SM.C</span>
+
|  style=“text-align: center;”|0.890
|  style="border-top: 1pt solid black;border-bottom: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">SM.D</span>
+
|  style=“text-align: center;”|0.862
 +
|  style=“text-align: center;”|0.867
 
|-
 
|-
rowspan='3' style="border-top: 2pt solid black;vertical-align: top;"|<span style="text-align: center; font-size: 75%;">Accuracy</span>
+
|  style="text-align: center;"|SVM
| style="border-top: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">BN</span>
+
| style="text-align: center;"|0.889<sup>+</sup>
| style="border-top: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">0.873</span>
+
| style="text-align: center;"|0.890<sup>+</sup>
|  style="border-top: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">0.858</span>
+
| style="text-align: center;"|0.861
| style="border-top: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">0.856</span>
+
| style="text-align: center;"|0.861
| style="border-top: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">0.858</span>
+
| style="text-align: center;"|0.890
| style="border-top: 2pt solid black;"|
+
| style="text-align: center;"|0.890
|  style="border-top: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">0.888</span>
+
| style="text-align: center;"|0.862
| style="border-top: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">0.890</span>
+
| style="text-align: center;"|0.864
| style="border-top: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">0.862</span>
+
| style="border-top: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">0.867</span>
+
 
|-
 
|-
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">SVM</span>
+
|  style="text-align: center;"|DT
| <span style="text-align: center; font-size: 75%;">0.889<sup>+</sup></span>
+
| style="text-align: center;"|0.882<sup>+</sup>
| <span style="text-align: center; font-size: 75%;">0.890<sup>+</sup></span>
+
| style="text-align: center;"|0.879<sup>+</sup>
| <span style="text-align: center; font-size: 75%;">0.861</span>
+
| style="text-align: center;"| 0.848
| <span style="text-align: center; font-size: 75%;">0.861</span>
+
| style="text-align: center;"|0.856
|  
+
| style="text-align: center;"|0.890
| <span style="text-align: center; font-size: 75%;">0.890</span>
+
| style="text-align: center;"|0.890
| <span style="text-align: center; font-size: 75%;">0.890</span>
+
| style="text-align: center;"|0.863
| <span style="text-align: center; font-size: 75%;">0.862</span>
+
| style="text-align: center;"|0.873
| <span style="text-align: center; font-size: 75%;">0.864</span>
+
 
|-
 
|-
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">DT</span>
+
rowspan='3' style="vertical-align: center;"|Specificity
| <span style="text-align: center; font-size: 75%;">0.882<sup>+</sup></span>
+
style="text-align: center;"|BN
| <span style="text-align: center; font-size: 75%;">0.879<sup>+</sup></span>
+
| style="text-align: center;"|0.719
| <span style="text-align: center; font-size: 75%;">0.848</span>
+
| style="text-align: center;"| 0.768
| <span style="text-align: center; font-size: 75%;">0.856</span>
+
| style="text-align: center;"|0.886
|
+
| style="text-align: center;"|0.891
| <span style="text-align: center; font-size: 75%;">0.890</span>
+
| style="text-align: center;"|0.619
| <span style="text-align: center; font-size: 75%;">0.890</span>
+
| style="text-align: center;"|0.620
| <span style="text-align: center; font-size: 75%;">0.863</span>
+
| style="text-align: center;"|0.913
| <span style="text-align: center; font-size: 75%;">0.873</span>
+
| style="text-align: center;"|0.950
 
|-
 
|-
rowspan='3' style="vertical-align: top;"|<span style="text-align: center; font-size: 75%;">Specificity</span>
+
|  style="text-align: center;"|SVM
| style="text-align: center;"|<span style="text-align: center; font-size: 75%;">BN</span>
+
| style="text-align: center;"|0.616<sup>-</sup>
| <span style="text-align: center; font-size: 75%;">0.719</span>
+
| style="text-align: center;"|0.616<sup>-</sup>
| <span style="text-align: center; font-size: 75%;">0.768</span>
+
| style="text-align: center;"|0.946<sup>+</sup>
| <span style="text-align: center; font-size: 75%;">0.886</span>
+
| style="text-align: center;"|0.946<sup>+</sup>
| <span style="text-align: center; font-size: 75%;">0.891</span>
+
| style="text-align: center;"|0.617
|  
+
| style="text-align: center;"|0.619
| <span style="text-align: center; font-size: 75%;">0.619</span>
+
| style="text-align: center;"|0.947
| <span style="text-align: center; font-size: 75%;">0.620</span>
+
| style="text-align: center;"|0.952
| <span style="text-align: center; font-size: 75%;">0.913</span>
+
| <span style="text-align: center; font-size: 75%;">0.950</span>
+
 
|-
 
|-
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">SVM</span>
+
|  style="text-align: center;"|DT
| <span style="text-align: center; font-size: 75%;">0.616<sup>-</sup></span>
+
| style="text-align: center;"|0.681<sup>-</sup>
| <span style="text-align: center; font-size: 75%;">0.616<sup>-</sup></span>
+
| style="text-align: center;"|0.669<sup>-</sup>
| <span style="text-align: center; font-size: 75%;">0.946<sup>+</sup></span>
+
| style="text-align: center;"|0.874
| <span style="text-align: center; font-size: 75%;">0.946<sup>+</sup></span>
+
| style="text-align: center;"|0.886
|  
+
| style="text-align: center;"|0.619
| <span style="text-align: center; font-size: 75%;">0.617</span>
+
| style="text-align: center;"|0.619
| <span style="text-align: center; font-size: 75%;">0.619</span>
+
| style="text-align: center;"| 0.925
| <span style="text-align: center; font-size: 75%;">0.947</span>
+
| style="text-align: center;"|0.946
| <span style="text-align: center; font-size: 75%;">0.952</span>
+
 
|-
 
|-
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">DT</span>
+
rowspan='3' style="vertical-align: center;"|AUROC
| <span style="text-align: center; font-size: 75%;">0.681<sup>-</sup></span>
+
style="text-align: center;"|BN
| <span style="text-align: center; font-size: 75%;">0.669<sup>-</sup></span>
+
| style="text-align: center;"|0.931
| <span style="text-align: center; font-size: 75%;">0.874</span>
+
| style="text-align: center;"|0.928
| <span style="text-align: center; font-size: 75%;">0.886</span>
+
| style="text-align: center;"|0.925
|
+
| style="text-align: center;"| 0.923
| <span style="text-align: center; font-size: 75%;">0.619</span>
+
| style="text-align: center;"|0.863
| <span style="text-align: center; font-size: 75%;">0.619</span>
+
| style="text-align: center;"|0.830
| <span style="text-align: center; font-size: 75%;">0.925</span>
+
| style="text-align: center;"|0.925
| <span style="text-align: center; font-size: 75%;">0.946</span>
+
| style="text-align: center;"|0.913
 
|-
 
|-
rowspan='3' style="vertical-align: top;"|<span style="text-align: center; font-size: 75%;">AUROC </span>
+
|  style="text-align: center;"|SVM
| style="text-align: center;"|<span style="text-align: center; font-size: 75%;">BN</span>
+
| style="text-align: center;"| 0.791<sup>-</sup>
| <span style="text-align: center; font-size: 75%;">0.931</span>
+
| style="text-align: center;"|0.791<sup>-</sup>
| <span style="text-align: center; font-size: 75%;">0.928</span>
+
| style="text-align: center;"|0.861<sup>-</sup>
| <span style="text-align: center; font-size: 75%;">0.925</span>
+
| style="text-align: center;"|0.861<sup>-</sup>  
| <span style="text-align: center; font-size: 75%;">0.923</span>
+
| style="text-align: center;"|0.792
|
+
| style="text-align: center;"|0.793
| <span style="text-align: center; font-size: 75%;">0.863</span>
+
| style="text-align: center;"|0.852
| <span style="text-align: center; font-size: 75%;">0.830</span>
+
| style="text-align: center;"|0.864
| <span style="text-align: center; font-size: 75%;">0.925</span>
+
| <span style="text-align: center; font-size: 75%;">0.913</span>
+
|-
+
|  style="text-align: center;"|<span style="text-align: center; font-size: 75%;">SVM</span>
+
| <span style="text-align: center; font-size: 75%;">0.791<sup>-</sup></span>
+
| <span style="text-align: center; font-size: 75%;">0.791<sup>-</sup></span>
+
| <span style="text-align: center; font-size: 75%;">0.861<sup>-</sup></span>
+
| <span style="text-align: center; font-size: 75%;">0.861<sup>-</sup></span>
+
|  
+
| <span style="text-align: center; font-size: 75%;">0.792</span>
+
| <span style="text-align: center; font-size: 75%;">0.793</span>
+
| <span style="text-align: center; font-size: 75%;">0.852</span>
+
| <span style="text-align: center; font-size: 75%;">0.864</span>
+
 
|-
 
|-
|  style="border-bottom: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">DT</span>
+
|  style="text-align: center;"|DT
|  style="border-bottom: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">0.923<sup>-</sup></span>
+
|  style=“text-align: center;”|0.923<sup>-</sup>
|  style="border-bottom: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">0.925</span>
+
|  style=“text-align: center;”|0.925
|  style="border-bottom: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">0.916<sup>-</sup></span>
+
|  style=“text-align: center;”|0.916<sup>-</sup>
|  style="border-bottom: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">0.918</span>
+
|  style=“text-align: center;”|0.918
|  style="border-bottom: 2pt solid black;"|
+
|  style=“text-align: center;”|0.920
|  style="border-bottom: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">0.920</span>
+
|  style=“text-align: center;”|0.830
|  style="border-bottom: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">0.830</span>
+
|  style=“text-align: center;”|0.918
|  style="border-bottom: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">0.918</span>
+
|  style=“text-align: center;”|0.915
|  style="border-bottom: 2pt solid black;"|<span style="text-align: center; font-size: 75%;">0.915</span>
+
 
|}
 
|}
  
  
<span id='_Hlk523408325'></span><span id='_Hlk523408621'></span>The performances of the complete models for each performance metric are compared by attributing superscript signs, (+) and (-), when there is a greater or lesser significant difference, respectively, always compared with the performance with the BN classifier algorithm. For instance, in Model CM.A, the accuracies of the SVM (0.889) and DT (0.882) algorithms showed significant differences in relation to that of BN (0.873). As this difference is greater, a plus sign (+) was added. Regarding the accuracy of this CM.A, there was a significant difference for the SVM (0.616) and DT (0.681) in relation to BN (0.719). However, in this case, the value was lower (-).
+
The performances of the complete models for each performance metric are compared by attributing superscript signs, (+) and (-), when there is a greater or lesser significant difference, respectively, always compared with the performance with the BN classifier algorithm. For instance, in Model CM.A, the accuracies of the SVM (0.889) and DT (0.882) algorithms showed significant differences in relation to that of BN (0.873). As this difference is greater, a plus sign (+) was added. Regarding the specificity of this CM.A, there was a significant difference for the SVM (0.616) and DT (0.681) in relation to BN (0.719). However, in this case, the value was lower (-).
  
It should be highlighted that for each CM, the tests were conducted with an identical model (same features) to apply the three classifier algorithms. Thus, the ''t'' test could be used to compare their performances. For the SMs, this was not possible, since for each classifier algorithm different features were selected to compose each model. Therefore, these are incomparable from a statistical viewpoint.
+
It should be highlighted that for each CM, the tests were conducted with an identical model (same features) to apply the three classifier algorithms. Thus, the ''t'' test could be used to compare their performances. However, for the Summarized Models (SMs), the Wrapper method has a classifier dependency and it can select different features for each classifier technique, becoming impossible to compare means between these classifiers.
  
 
Although this statistical comparison could not be made, the accuracies of all the SMs are greater than or at least equal to those of the CMs. In other words, the feature selection stage, in addition to significantly reducing the number of features, also resulted in greater accuracy in all the models. However, regarding the specificity of the model, improvements were only seen in the models with balanced classes (SM.C and SM.D). With the AUROC, it is not possible to establish a generalization of improvement among the SMs in comparison with the CMs, as each model is unique.
 
Although this statistical comparison could not be made, the accuracies of all the SMs are greater than or at least equal to those of the CMs. In other words, the feature selection stage, in addition to significantly reducing the number of features, also resulted in greater accuracy in all the models. However, regarding the specificity of the model, improvements were only seen in the models with balanced classes (SM.C and SM.D). With the AUROC, it is not possible to establish a generalization of improvement among the SMs in comparison with the CMs, as each model is unique.
Line 679: Line 651:
 
In general, SM.D had the best accuracy for the SVM technique, with a value of 0.952. Regarding the performance of the AUROC metric, CM.A for the BN technique had the best result, with a value of 0.931.
 
In general, SM.D had the best accuracy for the SVM technique, with a value of 0.952. Regarding the performance of the AUROC metric, CM.A for the BN technique had the best result, with a value of 0.931.
  
<span id='_Hlk523409719'></span>
+
==6. Conclusions==
=6. Conclusions=
+
  
 
Addressing the application of improved and sophisticated tools to increasingly complex problems, this work achieved its goal, as it adopted an analysis methodology that incorporated various innovative ML techniques to obtain a predictive credit scoring model to minimize losses for banking institutions.
 
Addressing the application of improved and sophisticated tools to increasingly complex problems, this work achieved its goal, as it adopted an analysis methodology that incorporated various innovative ML techniques to obtain a predictive credit scoring model to minimize losses for banking institutions.
Line 686: Line 657:
 
In addition to the differential in the use of these techniques, in this work, an alternative way from those usually employed to classify clients as “defaulters” or “non-defaulters” was presented. In other words, a “default index” was used instead of only checking for overdue operations. Another differential lay in defining the features considered to compose the model, which are not related to the behavior of clients in previous operations so, in this way, new clients (without a historical data) of the institution can also be classified using the methodology.
 
In addition to the differential in the use of these techniques, in this work, an alternative way from those usually employed to classify clients as “defaulters” or “non-defaulters” was presented. In other words, a “default index” was used instead of only checking for overdue operations. Another differential lay in defining the features considered to compose the model, which are not related to the behavior of clients in previous operations so, in this way, new clients (without a historical data) of the institution can also be classified using the methodology.
  
With the results obtained through the proposed methodology, it was possible to answer the questions outlined at the beginning of the article: a) All the three methods (BN; SVM and DT) presented similar performances for the credit scoring prediction close to 95% (specificity) as can be observed in Table 3, in other words, these models can correctly classify about 95% of clients as “defaulters” or “non-defaulters”. This result reinforces the main intention of a financial institution when using these classifier algorithms (ML): identify as assertively as possible clients who are prone to being “defaulters”, it is preferable to use a technique with greater specificity; (b) Besides, we can say that for the problem approached here, the class unbalancing affect the performance of the model, as we can verify comparing the CM and SM models in Table 3, i.e., it is important that the classes are balanced in order to get better performance results; (c) The feature selection stage contributes to the credit scoring model, showing what are the main features or in which features the specialists must give special attention. In the approached problem, the features “risk assessment” and “loan restrictions” are occupying the main positions, as shown in Figure 3. On the other hand, the features “gross annual revenue” and “number of employees” are less important; (d) As for the practical implications of the present study, it becomes fundamental in a critical scenario of instability of Brazilian companies regarding “default”, since in March 2019 the number of debtors grew by 3.3% (''Serviço de Proteção ao Crédito'', SPC, or Credit Protection Services). In general, the market is slow to act against these high levels of defaulting companies [76, 77].
+
With the results obtained through the proposed methodology, it was possible to answer the questions outlined at the beginning of the article: a) All the three methods (BN; SVM and DT) presented similar performances for the credit scoring prediction close to 95% (specificity) as can be observed in [[#tab-3|Table 3]], in other words, these models can correctly classify about 95% of clients as “defaulters” or “non-defaulters”. This result reinforces the main intention of a financial institution when using these classifier algorithms (ML): identify as assertively as possible clients who are prone to being “defaulters”, it is preferable to use a technique with greater specificity; (b) Besides, we can say that for the problem approached here, the class unbalancing affect the performance of the model, as we can verify comparing the CM and SM models in [[#tab-3|Table 3]], i.e., it is important that the classes are balanced in order to get better performance results; (c) The feature selection stage contributes to the credit scoring model, showing what are the main features or in which features the specialists must give special attention. In the approached problem, the features “risk assessment” and “loan restrictions” are occupying the main positions, as shown in [[#img-3|Figure 3]] . On the other hand, the features “gross annual revenue” and “number of employees” are less important; (d) As for the practical implications of the present study, it becomes fundamental in a critical scenario of instability of Brazilian companies regarding “default”, since in March 2019 the number of debtors grew by 3.3% (''Serviço de Proteção ao Crédito'', SPC, or Credit Protection Services). In general, the market is slow to act against these high levels of defaulting companies [77,78].
  
 
Suggestions for future studies include conducting tests with other classifier algorithms, as Random Forest, XGBoost, and others, based on ensemble method, for example, always with a view to improving their performance as much as possible. Another suggestion is related to the random undersampling to solve the unbalanced data problem, which sometimes causes bias results; so, in this way, it would be interesting implement it more than 10 times using the average, standard deviation of accuracy and specificity as the results.
 
Suggestions for future studies include conducting tests with other classifier algorithms, as Random Forest, XGBoost, and others, based on ensemble method, for example, always with a view to improving their performance as much as possible. Another suggestion is related to the random undersampling to solve the unbalanced data problem, which sometimes causes bias results; so, in this way, it would be interesting implement it more than 10 times using the average, standard deviation of accuracy and specificity as the results.
Line 694: Line 665:
 
==Acknowledgements==
 
==Acknowledgements==
  
This study was financed in part by PUCPR and the Coordination for the Improvement of Higher Education Personnel – Brazil (CAPES), and by the National Council for Scientific and Technological Development – Brazil.
+
This study was partially financed by PUCPR and the Coordination for the Improvement of Higher Education Personnel – Brazil (CAPES), and by the National Council for Scientific and Technological Development – Brazil.
  
 
==References==
 
==References==
 +
<div class="auto" style="text-align: left;width: auto; margin-left: auto; margin-right: auto;font-size: 85%;">
  
[1] L. Capelletto and L. Corrar, “Índices de risco sistêmico para o setor bancário,” ''Rev. Contab. Finanças'', vol. 19, no. 47 SE-Artigos, Aug. 2008, doi: 10.1590/S1519-70772008000200002.
+
[1] Capelletto L.,  Corrar L. Índices de risco sistêmico para o setor bancário. Rev. Contab. Finanças, 19(47):6-18, SE-Artigos, 2008, doi: 10.1590/S1519-70772008000200002.
  
[2] J. B. Amaral Júnior and J. L. Távora Júnior, “Uma análise do uso de redes neurais para a avaliação do risco de crédito de empresas,” ''Rev. do BNDES'', vol. 34, pp. 133–180, 2010.
+
[2] Amaral Júnior J.B.,  Távora Júnior J.L. Uma análise do uso de redes neurais para a avaliação do risco de crédito de empresas. Rev. do BNDES, 4:133–180, 2010.
  
[3] P. Albuquerque, F. Medina, and A. Silva, “Regressão Logística Geograficamente Ponderada Aplicada a Modelos de Credit Scoring,” ''Rev. Contab. Finanças'', vol. 28, no. 73 SE-Artigos, Apr. 2017, doi: 10.1590/1808-057x201703760.
+
[3] Albuquerque P., Medina F., Silva A. Regressão logística geograficamente ponderada aplicada a modelos de credit scoring. Rev. Contab. Finanças, 28(73):93-112, SE-Artigos, 2017, doi: 10.1590/1808-057x201703760.
  
[4] M. T. A. Steiner, N. Y. Soma, T. Shimizu, J. C. Nievola, and P. J. Steiner Neto, “Abordagem de um problema médico por meio do processo de KDD com ênfase à análise exploratória dos dados ,” ''Gestão & Produção '', vol. 13. scielo , pp. 325–337, 2006.
+
[4] Steiner M.T.A., Soma N.Y., Shimizu T., Nievola J.C.,   Steiner Neto P.J. Abordagem de um problema médico por meio do processo de KDD com ênfase à análise exploratória dos dados. Gestão & Produção, 13:325–337, 2006.
  
[5] L. C. Thomas, “A survey of credit and behavioural scoring: forecasting financial risk of lending to consumers,” ''Int. J. Forecast.'', vol. 16, no. 2, pp. 149–172, 2000, doi: [https://doi.org/10.1016/S0169-2070 https://doi.org/10.1016/S0169-2070](00)00034-0.
+
[5] Thomas L.C. A survey of credit and behavioural scoring: forecasting financial risk of lending to consumers. Int. J. Forecast., 16(2):149–172, 2000, doi: [https://doi.org/10.1016/S0169-2070 https://doi.org/10.1016/S0169-2070](00)00034-0.
  
[6] R. P. Medina and M. L. M. Selva, “Análisis del credit scoring ,” ''Revista de Administração de Empresas '', vol. 53. scielo , pp. 303–315, 2013.
+
[6] Medina R.P., Selva M.L.M. Análisis del credit scoring. Revista de Administração de Empresas, 53:303–315, 2013.
  
[7] K. Samejima, K. Doya, and M. Kawato, “Inter-module credit assignment in modular reinforcement learning,” ''Neural Networks'', vol. 16, no. 7, pp. 985–994, 2003, doi: 10.1016/S0893-6080(02)00235-6.
+
[7] Samejima K., Doya K., Kawato M. Inter-module credit assignment in modular reinforcement learning. Neural Networks, 16(7):985–994, 2003, doi: 10.1016/S0893-6080(02)00235-6.
  
[8] M. Doumpos, K. Kosmidou, G. Baourakis, and C. Zopounidis, “Credit risk assessment using a multicriteria hierarchical discrimination approach: A comparative analysis,” ''Eur. J. Oper. Res.'', vol. 138, no. 2, pp. 392–412, 2002, doi: [https://doi.org/10.1016/S0377-2217 https://doi.org/10.1016/S0377-2217](01)00254-5.
+
[8] Doumpos M., Kosmidou K., Baourakis G.,   Zopounidis C. Credit risk assessment using a multicriteria hierarchical discrimination approach: A comparative analysis. Eur. J. Oper. Res., 138(2):392–412, 2002, doi: [https://doi.org/10.1016/S0377-2217 https://doi.org/10.1016/S0377-2217](01)00254-5.
  
[9] M. T. A. Steiner, J. C. Nievola, N. Y. Soma, T. Shimizu, and P. J. Steiner Neto, “Extração de regras de classificação a partir de redes neurais para auxílio à tomada de decisão na concessão de crédito bancário ,” ''Pesquisa Operacional '', vol. 27. scielo , pp. 407–426, 2007.
+
[9] Steiner M.T.A., Nievola J.C., Soma N.Y., Shimizu T., Steiner Neto P.J. Extração de regras de classificação a partir de redes neurais para auxílio à tomada de decisão na concessão de crédito bancário. Pesquisa Operacional, 27:407–426, 2007.
  
[10] B. F. Frascaroli, F. D. S. Ramos, and N. L. Paes, “A indústria brasileira e o racionamento de crédito: uma análise do comportamento dos bancos sob informações assimétricas,” ''Rev. Econ.'', vol. 11, no. 2, pp. 403–433, 2010.
+
[10] Frascaroli B.F., Ramos F.D.S.,   Paes N.L. A indústria brasileira e o racionamento de crédito: uma análise do comportamento dos bancos sob informações assimétricas. Rev. Econ., 11(2):403–433, 2010.
  
[11] G. A. S. Brito and A. Assaf Neto, “Modelo de classificação de risco de crédito de empresas ,” ''Revista Contabilidade & Finanças '', vol. 19. scielo , pp. 18–29, 2008.
+
[11] Brito G.A.S.,Assaf Neto  A. Modelo de classificação de risco de crédito de empresas. Revista Contabilidade & Finanças, 19:18–29, 2008.
  
[12] S. Luo, X. Kong, and T. Nie, “Spline based survival model for credit risk modeling,” ''Eur. J. Oper. Res.'', vol. 253, no. 3, pp. 869–879, 2016, doi: [https://doi.org/10.1016/j.ejor.2016.02.050. https://doi.org/10.1016/j.ejor.2016.02.050.]
+
[12] Luo S., Kong X., Nie T. Spline based survival model for credit risk modeling. Eur. J. Oper. Res., 253(3):869–879, 2016, doi: [https://doi.org/10.1016/j.ejor.2016.02.050. https://doi.org/10.1016/j.ejor.2016.02.050.]
  
[13] G. Loterman, I. Brown, D. Martens, C. Mues, and B. Baesens, “Benchmarking regression algorithms for loss given default modeling,” ''Int. J. Forecast.'', vol. 28, no. 1, pp. 161–170, 2012, doi: [https://doi.org/10.1016/j.ijforecast.2011.01.006. https://doi.org/10.1016/j.ijforecast.2011.01.006.]
+
[13] Loterman G., Brown I., Martens D., Mues C.,   Baesens B. Benchmarking regression algorithms for loss given default modeling. Int. J. Forecast., 28(1):161–170, 2012, doi: [https://doi.org/10.1016/j.ijforecast.2011.01.006. https://doi.org/10.1016/j.ijforecast.2011.01.006.]
  
[14] I. Brown and C. Mues, “An experimental comparison of classification algorithms for imbalanced credit scoring data sets,” ''Expert Syst. Appl.'', vol. 39, no. 3, pp. 3446–3453, 2012, doi: [https://doi.org/10.1016/j.eswa.2011.09.033. https://doi.org/10.1016/j.eswa.2011.09.033.]
+
[14] Brown I.,  Mues C. An experimental comparison of classification algorithms for imbalanced credit scoring data sets. Expert Syst. Appl., 39(3):3446–3453, 2012, doi: [https://doi.org/10.1016/j.eswa.2011.09.033. https://doi.org/10.1016/j.eswa.2011.09.033.]
  
[15] J. Wang, A.-R. Hedar, S. Wang, and J. Ma, “Rough set and scatter search metaheuristic based feature selection for credit scoring,” ''Expert Syst. Appl.'', vol. 39, no. 6, pp. 6123–6128, 2012, doi: [https://doi.org/10.1016/j.eswa.2011.11.011. https://doi.org/10.1016/j.eswa.2011.11.011.]
+
[15] Wang J., Hedar A.-R., Wang S.,   Ma J. Rough set and scatter search metaheuristic based feature selection for credit scoring. Expert Syst. Appl., 39(6):6123–6128, 2012, doi: [https://doi.org/10.1016/j.eswa.2011.11.011. https://doi.org/10.1016/j.eswa.2011.11.011.]
  
[16] A. B. Hens and M. K. Tiwari, “Computational time reduction for credit scoring: An integrated approach based on support vector machine and stratified sampling method,” ''Expert Syst. Appl.'', vol. 39, no. 8, pp. 6774–6781, 2012, doi: [https://doi.org/10.1016/j.eswa.2011.12.057. https://doi.org/10.1016/j.eswa.2011.12.057.]
+
[16] Hens A.B.,  Tiwari M.K. Computational time reduction for credit scoring: An integrated approach based on support vector machine and stratified sampling method. Expert Syst. Appl., 39(8):6774–6781, 2012, doi: [https://doi.org/10.1016/j.eswa.2011.12.057. https://doi.org/10.1016/j.eswa.2011.12.057.]
  
[17] A. I. Marqués, V. García, and J. S. Sánchez, “Exploring the behaviour of base classifiers in credit scoring ensembles,” ''Expert Syst. Appl.'', vol. 39, no. 11, pp. 10244–10250, 2012, doi: [https://doi.org/10.1016/j.eswa.2012.02.092. https://doi.org/10.1016/j.eswa.2012.02.092.]
+
[17] Marqués A.I., García V.,   Sánchez J.S. Exploring the behaviour of base classifiers in credit scoring ensembles. Expert Syst. Appl., 39(11):10244–10250, 2012, doi: [https://doi.org/10.1016/j.eswa.2012.02.092. https://doi.org/10.1016/j.eswa.2012.02.092.]
  
[18] S. Akkoç, “An empirical comparison of conventional techniques, neural networks and the three stage hybrid Adaptive Neuro Fuzzy Inference System (ANFIS) model for credit scoring analysis: The case of Turkish credit card data,” ''Eur. J. Oper. Res.'', vol. 222, no. 1, pp. 168–178, 2012, doi: [https://doi.org/10.1016/j.ejor.2012.04.009. https://doi.org/10.1016/j.ejor.2012.04.009.]
+
[18] Akkoç S. An empirical comparison of conventional techniques, neural networks and the three stage hybrid Adaptive Neuro Fuzzy Inference System (ANFIS) model for credit scoring analysis: The case of Turkish credit card data. Eur. J. Oper. Res., 222(1):168–178, 2012, doi: [https://doi.org/10.1016/j.ejor.2012.04.009. https://doi.org/10.1016/j.ejor.2012.04.009.]
  
[19] L.-J. Kao, C.-C. Chiu, and F.-Y. Chiu, “A Bayesian latent variable model with classification and regression tree approach for behavior and credit scoring,” ''Knowledge-Based Syst.'', vol. 36, pp. 245–252, 2012, doi: [https://doi.org/10.1016/j.knosys.2012.07.004. https://doi.org/10.1016/j.knosys.2012.07.004.]
+
[19] Kao L.-J., Chiu C.-C.Chiu F.-Y. A Bayesian latent variable model with classification and regression tree approach for behavior and credit scoring. Knowledge-Based Syst., 36:245–252, 2012, doi: [https://doi.org/10.1016/j.knosys.2012.07.004. https://doi.org/10.1016/j.knosys.2012.07.004.]
  
[20] E. N. C. Tong, C. Mues, and L. C. Thomas, “Mixture cure models in credit scoring: If and when borrowers default,” ''Eur. J. Oper. Res.'', vol. 218, no. 1, pp. 132–139, 2012, doi: [https://doi.org/10.1016/j.ejor.2011.10.007. https://doi.org/10.1016/j.ejor.2011.10.007.]
+
[20] Tong E.N.C., Mues C.,   Thomas L.C. Mixture cure models in credit scoring: If and when borrowers default. Eur. J. Oper. Res., 218(1):132–139, 2012, doi: [https://doi.org/10.1016/j.ejor.2011.10.007. https://doi.org/10.1016/j.ejor.2011.10.007.]
  
[21] V. García, A. I. Marqués, and J. S. Sánchez, “On the use of data filtering techniques for credit risk prediction with instance-based models,” ''Expert Syst. Appl.'', vol. 39, no. 18, pp. 13267–13276, 2012, doi: [https://doi.org/10.1016/j.eswa.2012.05.075. https://doi.org/10.1016/j.eswa.2012.05.075.]
+
[21] García V., Marqués A.I.,   Sánchez J.S. On the use of data filtering techniques for credit risk prediction with instance-based models, Expert Syst. Appl., 39(18):13267–13276, 2012, doi: [https://doi.org/10.1016/j.eswa.2012.05.075. https://doi.org/10.1016/j.eswa.2012.05.075.]
  
[22] J. Li, H. Wei, and W. Hao, “Weight-Selected Attribute Bagging for Credit Scoring,” ''Math. Probl. Eng.'', vol. 2013, p. 379690, 2013, doi: 10.1155/2013/379690.
+
[22] Li J., Wei H., Hao W. Weight-selected attribute bagging for credit scoring. Math. Probl. Eng., 2013:379690, 2013, doi: 10.1155/2013/379690.
  
[23] N. Nikolic, N. Zarkic-Joksimovic, D. Stojanovski, and I. Joksimovic, “The application of brute force logistic regression to corporate credit scoring models: Evidence from Serbian financial statements,” ''Expert Syst. Appl.'', vol. 40, no. 15, pp. 5932–5944, 2013, doi: [https://doi.org/10.1016/j.eswa.2013.05.022. https://doi.org/10.1016/j.eswa.2013.05.022.]
+
[23] Nikolic N., Zarkic-Joksimovic N., Stojanovski D.,   Joksimovic I. The application of brute force logistic regression to corporate credit scoring models: Evidence from Serbian financial statements. Expert Syst. Appl., 40(15):5932–5944, 2013, doi: [https://doi.org/10.1016/j.eswa.2013.05.022. https://doi.org/10.1016/j.eswa.2013.05.022.]
  
[24] A. I. Marqués, V. García, and J. S. Sánchez, “On the suitability of resampling techniques for the class imbalance problem in credit scoring,” ''J. Oper. Res. Soc.'', vol. 64, no. 7, pp. 1060–1070, 2013, doi: 10.1057/jors.2012.120.
+
[24] Marqués A.I., García V.,   Sánchez J.S. On the suitability of resampling techniques for the class imbalance problem in credit scoring. J. Oper. Res. Soc., 64(7):1060–1070, 2013, doi: 10.1057/jors.2012.120.
  
[25] X. Zhu, J. Li, D. Wu, H. Wang, and C. Liang, “Balancing accuracy, complexity and interpretability in consumer credit decision making: A C-TOPSIS classification approach,” ''Knowledge-Based Syst.'', vol. 52, pp. 258–267, 2013, doi: [https://doi.org/10.1016/j.knosys.2013.08.004. https://doi.org/10.1016/j.knosys.2013.08.004.]
+
[25] Zhu X., Li J., Wu D., Wang H.,   Liang C. Balancing accuracy, complexity and interpretability in consumer credit decision making: A C-TOPSIS classification approach. Knowledge-Based Syst., 52:258–267, 2013, doi: [https://doi.org/10.1016/j.knosys.2013.08.004. https://doi.org/10.1016/j.knosys.2013.08.004.]
  
[26] A. Blanco, R. Pino-Mejías, J. Lara, and S. Rayo, “Credit scoring models for the microfinance industry using neural networks: Evidence from Peru,” ''Expert Syst. Appl.'', vol. 40, no. 1, pp. 356–364, 2013, doi: [https://doi.org/10.1016/j.eswa.2012.07.051. https://doi.org/10.1016/j.eswa.2012.07.051.]
+
[26] Blanco A., Pino-Mejías R., Lara J.,   Rayo S. Credit scoring models for the microfinance industry using neural networks: Evidence from Peru. Expert Syst. Appl., 40(1):356–364, 2013, doi: [https://doi.org/10.1016/j.eswa.2012.07.051. https://doi.org/10.1016/j.eswa.2012.07.051.]
  
[27] M.-D. Cubiles-De-La-Vega, A. Blanco-Oliver, R. Pino-Mejías, and J. Lara-Rubio, “Improving the management of microfinance institutions by using credit scoring models based on Statistical Learning techniques,” ''Expert Syst. Appl.'', vol. 40, no. 17, pp. 6910–6917, 2013, doi: [https://doi.org/10.1016/j.eswa.2013.06.031. https://doi.org/10.1016/j.eswa.2013.06.031.]
+
[27] Cubiles-De-La-Vega M.-D.,  Blanco-Oliver A.Pino-Mejías R.Lara-Rubio J. Improving the management of microfinance institutions by using credit scoring models based on Statistical Learning techniques. Expert Syst. Appl., 40(17):6910–6917, 2013, doi: [https://doi.org/10.1016/j.eswa.2013.06.031. https://doi.org/10.1016/j.eswa.2013.06.031.]
  
[28] S. Oreski and G. Oreski, “Genetic algorithm-based heuristic for feature selection in credit risk assessment,” ''Expert Syst. Appl.'', vol. 41, no. 4, Part 2, pp. 2052–2064, 2014, doi: [https://doi.org/10.1016/j.eswa.2013.09.004. https://doi.org/10.1016/j.eswa.2013.09.004.]
+
[28] Oreski S.Oreski G. Genetic algorithm-based heuristic for feature selection in credit risk assessment. Expert Syst. Appl., 41(4 Part 2):2052–2064, 2014, doi: [https://doi.org/10.1016/j.eswa.2013.09.004. https://doi.org/10.1016/j.eswa.2013.09.004.]
  
[29] T. Chih-Fong and H. Chihli, “Modeling credit scoring using neural network ensembles,” ''Kybernetes'', vol. 43, no. 7, pp. 1114–1123, Jan. 2014, doi: 10.1108/K-01-2014-0016.
+
[29] Chih-Fong T.,  Chihli H. Modeling credit scoring using neural network ensembles. Kybernetes, 43(7):1114–1123, 2014, doi: 10.1108/K-01-2014-0016.
  
[30] D. Niklis, M. Doumpos, and C. Zopounidis, “Combining market and accounting-based models for credit scoring using a classification scheme based on support vector machines,” ''Appl. Math. Comput.'', vol. 234, pp. 69–81, 2014, doi: [https://doi.org/10.1016/j.amc.2014.02.028. https://doi.org/10.1016/j.amc.2014.02.028.]
+
[30] Niklis D., Doumpos M.,   Zopounidis C. Combining market and accounting-based models for credit scoring using a classification scheme based on support vector machines. Appl. Math. Comput., 234:69–81, 2014, doi: [https://doi.org/10.1016/j.amc.2014.02.028. https://doi.org/10.1016/j.amc.2014.02.028.]
  
[31] G. Tong and S. Li, “Construction and Application Research of Isomap-RVM Credit Assessment Model,” ''Math. Probl. Eng.'', vol. 2015, p. 197258, 2015, doi: 10.1155/2015/197258.
+
[31] Tong G.,  Li S. Construction and application research of isomap-RVM credit assessment model. Math. Probl. Eng., 2015:197258, 2015, doi: 10.1155/2015/197258.
  
[32] B. Yi and J. Zhu, “Credit scoring with an improved fuzzy support vector machine based on grey incidence analysis,” in ''2015 IEEE International Conference on Grey Systems and Intelligent Services (GSIS)'', 2015, pp. 173–178, doi: 10.1109/GSIS.2015.7301850.
+
[32] Yi B.,  Zhu J. Credit scoring with an improved fuzzy support vector machine based on grey incidence analysis. In 2015 IEEE International Conference on Grey Systems and Intelligent Services (GSIS), pp. 173–178,  2015, doi: 10.1109/GSIS.2015.7301850.
  
[33] C. Bravo, L. C. Thomas, and R. Weber, “Improving credit scoring by differentiating defaulter behaviour,” ''J. Oper. Res. Soc.'', vol. 66, no. 5, pp. 771–781, 2015, doi: 10.1057/jors.2014.50.
+
[33] Bravo C., Thomas L.C., Weber  R. Improving credit scoring by differentiating defaulter behaviour. J. Oper. Res. Soc., 66(5):771–781, 2015, doi: 10.1057/jors.2014.50.
  
[34] F. N. Koutanaei, H. Sajedi, and M. Khanbabaei, “A hybrid data mining model of feature selection algorithms and ensemble learning classifiers for credit scoring,” ''J. Retail. Consum. Serv.'', vol. 27, pp. 11–23, 2015, doi: [https://doi.org/10.1016/j.jretconser.2015.07.003. https://doi.org/10.1016/j.jretconser.2015.07.003.]
+
[34] Koutanaei F.N., Sajedi H.,   Khanbabaei M. A hybrid data mining model of feature selection algorithms and ensemble learning classifiers for credit scoring. J. Retail. Consum. Serv., 27:11–23, 2015, doi: [https://doi.org/10.1016/j.jretconser.2015.07.003. https://doi.org/10.1016/j.jretconser.2015.07.003.]
  
[35] T. Harris, “Credit scoring using the clustered support vector machine,” ''Expert Syst. Appl.'', vol. 42, no. 2, pp. 741–750, 2015, doi: [https://doi.org/10.1016/j.eswa.2014.08.029. https://doi.org/10.1016/j.eswa.2014.08.029.]
+
[35] Harris T. Credit scoring using the clustered support vector machine. Expert Syst. Appl., 42(2):741–750, 2015, doi: [https://doi.org/10.1016/j.eswa.2014.08.029. https://doi.org/10.1016/j.eswa.2014.08.029.]
  
[36] P. Danenas and G. Garsva, “Selection of Support Vector Machines based classifiers for credit risk domain,” ''Expert Syst. Appl.'', vol. 42, no. 6, pp. 3194–3204, 2015, doi: [https://doi.org/10.1016/j.eswa.2014.12.001. https://doi.org/10.1016/j.eswa.2014.12.001.]
+
[36] Danenas P.,  Garsva G. Selection of Support Vector Machines based classifiers for credit risk domain. Expert Syst. Appl., 42(6):3194–3204, 2015, doi: [https://doi.org/10.1016/j.eswa.2014.12.001. https://doi.org/10.1016/j.eswa.2014.12.001.]
  
[37] Z. Zhao, S. Xu, B. H. Kang, M. M. J. Kabir, Y. Liu, and R. Wasinger, “Investigation and improvement of multi-layer perceptron neural networks for credit scoring,” ''Expert Syst. Appl.'', vol. 42, no. 7, pp. 3508–3516, 2015, doi: [https://doi.org/10.1016/j.eswa.2014.12.006. https://doi.org/10.1016/j.eswa.2014.12.006.]
+
[37] Zhao Z., Xu S., Kang B.H., Kabir M.M.J., Liu Y.,   Wasinger R. Investigation and improvement of multi-layer perceptron neural networks for credit scoring, Expert Syst. Appl., 42, no. 7, pp. 3508–3516, 2015, doi: [https://doi.org/10.1016/j.eswa.2014.12.006. https://doi.org/10.1016/j.eswa.2014.12.006.]
  
[38] C. Silva, G. Vasconcelos, H. Barros, and G. França, “Case-based reasoning combined with neural networks for credit risk analysis,” in ''2015 International Joint Conference on Neural Networks (IJCNN)'', 2015, pp. 1–8, doi: 10.1109/IJCNN.2015.7280738.
+
[38] Silva C., Vasconcelos G., Barros H.,   França G. Case-based reasoning combined with neural networks for credit risk analysis. In 2015 International Joint Conference on Neural Networks (IJCNN), 1–8, 2015, doi: 10.1109/IJCNN.2015.7280738.
  
[39] A. Mohammadali, A. Farzaneh, and N. Rassoul, “Customer credit scoring using a hybrid data mining approach,” ''Kybernetes'', vol. 45, no. 10, pp. 1576–1588, Jan. 2016, doi: 10.1108/K-09-2015-0228.
+
[39] Mohammadali A., Farzaneh A.,   Rassoul N. Customer credit scoring using a hybrid data mining approach. Kybernetes, 45(10):1576–1588, 2016, doi: 10.1108/K-09-2015-0228.
  
[40] D. Zakirov, A. Bondarev, and N. Momtselidze, “A comparison of data mining techniques in evaluating retail credit scoring using R programming,” in ''2015 Twelve International Conference on Electronics Computer and Computation (ICECCO)'', 2015, pp. 1–4, doi: 10.1109/ICECCO.2015.7416867.
+
[40] Zakirov D., Bondarev A.,   Momtselidze N. A comparison of data mining techniques in evaluating retail credit scoring using R programming. In 2015 Twelve International Conference on Electronics Computer and Computation (ICECCO), pp. 1–4,  2015, doi: 10.1109/ICECCO.2015.7416867.
  
[41] H. Ozturk, E. Namli, and H. I. Erdal, “Modelling sovereign credit ratings: The accuracy of models in a heterogeneous sample,” ''Econ. Model.'', vol. 54, pp. 469–478, 2016, doi: [https://doi.org/10.1016/j.econmod.2016.01.012. https://doi.org/10.1016/j.econmod.2016.01.012.]
+
[41] Ozturk H., Namli E., Erdal H.I. Modelling sovereign credit ratings: The accuracy of models in a heterogeneous sample. Econ. Model., 54:469–478, 2016, doi: [https://doi.org/10.1016/j.econmod.2016.01.012. https://doi.org/10.1016/j.econmod.2016.01.012.]
  
[42] H. A. Abdou, M. D. D. Tsafack, C. G. Ntim, and R. D. Baker, “Predicting creditworthiness in retail banking with limited scoring data,” ''Knowledge-Based Syst.'', vol. 103, pp. 89–103, 2016, doi: [https://doi.org/10.1016/j.knosys.2016.03.023. https://doi.org/10.1016/j.knosys.2016.03.023.]
+
[42] Abdou H.A., Tsafack M.D.D., Ntim C.G., Baker R.D. Predicting creditworthiness in retail banking with limited scoring data. Knowledge-Based Syst., 103:89–103, 2016, doi: [https://doi.org/10.1016/j.knosys.2016.03.023. https://doi.org/10.1016/j.knosys.2016.03.023.]
  
[43] P. M. and S. P., “Identification of a standard AI based technique for credit risk analysis,” ''Benchmarking An Int. J.'', vol. 23, no. 5, pp. 1381–1390, Jan. 2016, doi: 10.1108/BIJ-09-2014-0094.
+
[43] Punniyamoorthy M.,  Sridevi P. Identification of a standard AI based technique for credit risk analysis. Benchmarking An Int. J., 23(5):1381–1390, 2016, doi: 10.1108/BIJ-09-2014-0094.
  
[44] M. Ala’raj and M. F. Abbod, “Classifiers consensus system approach for credit scoring,” ''Knowledge-Based Syst.'', vol. 104, pp. 89–105, 2016, doi: [https://doi.org/10.1016/j.knosys.2016.04.013. https://doi.org/10.1016/j.knosys.2016.04.013.]
+
[44] Ala’raj M.,  Abbod M.F. Classifiers consensus system approach for credit scoring. Knowledge-Based Syst., 104:89–105, 2016, doi: [https://doi.org/10.1016/j.knosys.2016.04.013. https://doi.org/10.1016/j.knosys.2016.04.013.]
  
[45] K. Andric and D. Kalpic, “The effect of class distribution on classification algorithms in credit risk assessment,” in ''2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics, MIPRO 2016 - Proceedings'', 2016, pp. 1241–1247, doi: 10.1109/MIPRO.2016.7522329.
+
[45] Andric K.,  Kalpic D. The effect of class distribution on classification algorithms in credit risk assessment. In 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics, MIPRO 2016 - Proceedings, pp. 1241–1247, 2016, doi: 10.1109/MIPRO.2016.7522329.
  
[46] Z. Li, “A New Method of Credit Risk Assessment of Commercial Banks,” in ''2016 International Conference on Robots & Intelligent System (ICRIS)'', 2016, pp. 34–37, doi: 10.1109/ICRIS.2016.7.
+
[46] Li Z. A new method of credit risk assessment of commercial banks. In 2016 International Conference on Robots & Intelligent System (ICRIS), pp. 34–37, 2016, doi: 10.1109/ICRIS.2016.7.
  
[47] Y. Guo and C. Dong, “A novel intelligent credit scoring method using MOPSO,” in ''2017 29th Chinese Control And Decision Conference (CCDC)'', 2017, pp. 6584–6588, doi: 10.1109/CCDC.2017.7978359.
+
[47] Guo Y.,  Dong C. A novel intelligent credit scoring method using MOPSO. In 2017 29th Chinese Control And Decision Conference (CCDC), pp. 6584–6588, 2017, doi: 10.1109/CCDC.2017.7978359.
  
[48] C. Luo, D. Wu, and D. Wu, “A deep learning approach for credit scoring using credit default swaps,” ''Eng. Appl. Artif. Intell.'', vol. 65, pp. 465–470, 2017, doi: [https://doi.org/10.1016/j.engappai.2016.12.002. https://doi.org/10.1016/j.engappai.2016.12.002.]
+
[48] Luo C., Wu D.Wu D. A deep learning approach for credit scoring using credit default swaps. Eng. Appl. Artif. Intell., 65:465–470, 2017, doi: [https://doi.org/10.1016/j.engappai.2016.12.002. https://doi.org/10.1016/j.engappai.2016.12.002.]
  
[49] A. Bequé and S. Lessmann, “Extreme learning machines for credit scoring: An empirical evaluation,” ''Expert Syst. Appl.'', vol. 86, pp. 42–53, 2017, doi: [https://doi.org/10.1016/j.eswa.2017.05.050. https://doi.org/10.1016/j.eswa.2017.05.050.]
+
[49] Bequé A.,  Lessmann S. Extreme learning machines for credit scoring: An empirical evaluation. Expert Syst. Appl., 86:42–53, 2017, doi: [https://doi.org/10.1016/j.eswa.2017.05.050. https://doi.org/10.1016/j.eswa.2017.05.050.]
  
[50] L. C. Lanzarini, A. V. Monte, A. F. Bariviera, and P. J. Santana, “Simplifying credit scoring rules using LVQ + PSO,” ''Kybernetes'', vol. 46, no. 1, pp. 8–16, Jan. 2017, doi: 10.1108/K-06-2016-0158.
+
[50] Lanzarini L.C., Monte A.V., Bariviera A.F.,   Santana P.J. Simplifying credit scoring rules using LVQ + PSO. Kybernetes, 46(1):8–16, 2017, doi: 10.1108/K-06-2016-0158.
  
[51] S. Maldonado, J. Pérez, and C. Bravo, “Cost-based feature selection for Support Vector Machines: An application in credit scoring,” ''Eur. J. Oper. Res.'', vol. 261, no. 2, pp. 656–665, 2017, doi: [https://doi.org/10.1016/j.ejor.2017.02.037. https://doi.org/10.1016/j.ejor.2017.02.037.]
+
[51] Maldonado S., Pérez J.,   Bravo C. Cost-based feature selection for Support Vector Machines: An application in credit scoring. Eur. J. Oper. Res., 261(2):656–665, 2017, doi: [https://doi.org/10.1016/j.ejor.2017.02.037. https://doi.org/10.1016/j.ejor.2017.02.037.]
  
[52] F. Assef, M. T. Steiner, P. J. S. Neto, and D. G. d. B. Franco, “Classification Algorithms in Financial Application: Credit Risk Analysis on Legal Entities,” ''IEEE Lat. Am. Trans.'', vol. 17, no. 10, pp. 1733–1740, 2019, doi: 10.1109/TLA.2019.8986452.
+
[52] Assef F., Steiner M.T., Neto P.J.S.,   Franco D.G.d.B. Classification algorithms in financial application: credit risk analysis on legal entities. IEEE Lat. Am. Trans., 17(10):1733–1740, 2019, doi: 10.1109/TLA.2019.8986452.
  
[53] N. Chawla, N. Japkowicz, and A. Kołcz, “Editorial: Special Issue on Learning from Imbalanced Data Sets,” ''SIGKDD Explor.'', vol. 6, pp. 1–6, Jun. 2004, doi: 10.1145/1007730.1007733.
+
[53] Chawla  N., Japkowicz  N.,   Kołcz A. Editorial: Special issue on learning from imbalanced data sets. SIGKDD Explor., 6:1–6, 2004, doi: 10.1145/1007730.1007733.
  
[54] N. V. Chawla, “Data Mining for Imbalanced Datasets: An Overview,” in ''Data Mining and Knowledge Discovery Handbook'', Springer-Verlag, 2006, pp. 853–867.
+
[54] Chawla N.V. Data mining for imbalanced datasets: An overview. In Data Mining and Knowledge Discovery Handbook, Springer-Verlag, pp. 853–867, 2005.
  
[55] J. J. Hox, M. Moerbeek, and R. Van de Schoot, ''Multilevel analysis: Techniques and applications'', 2nd ed. Newbury Park: SAGE PUBLICATIONS LTD, 2017.
+
[55] HoxJ.J., Moerbeek M.,   Van de Schoot R. Multilevel analysis: Techniques and applications. Newbury Park: Sage Publications LTD, 2nd ed., 2017.
  
[56] E. A. Araújo and C. U. D. M. Carmona, “Desenvolvimento de Modelos Credit Scoring com Abordagem de Regressão de Logística para a Gestão da Inadimplência de uma Instituição de Microcrédito,” ''Contab. Vista Rev.'', vol. 18, no. 3 SE-Artigos, pp. 107–131, May 2007.
+
[56] Araújo E.A.,  Carmona C.U.D.M. Desenvolvimento de modelos credit scoring com abordagem de regressão de logística para a gestão da inadimplência de uma instituição de microcrédito. Contab. Vista Rev., 18(3):107–131, 2007.
  
[57] A. T. Fenerich, M. T. A. Steiner, J. C. Nievola, K. B. Mendes, D. P. Tsutsumi, and B. S. dos Santos, “Diagnosis of Headaches Types Using Artificial Neural Networks and Bayesian Networks,” ''IEEE Lat. Am. Trans.'', vol. 18, no. 01, pp. 59–66, 2020, doi: 10.1109/TLA.2020.9049462.
+
[57] Fenerich A.T., Steiner M.T.A., Nievola J.C., Mendes K.B., Tsutsumi D.P.,   dos Santos B.S. Diagnosis of headaches types using artificial neural networks and bayesian networks. IEEE Lat. Am. Trans., 18(1):59–66, 2020, doi: 10.1109/TLA.2020.9049462.
  
[58] I. Guyon and A. Elisseeff, “An introduction to variable and feature selection,” ''J. Mach. Learn. Res.'', vol. 3, no. March, pp. 1157–1182, 2003.
+
[58] Guyon I.,  Elisseeff A. An introduction to variable and feature selection. J. Mach. Learn. Res., 3:1157–1182, 2003.
  
[59] G. Chandrashekar and F. Sahin, “A survey on feature selection methods,” ''Comput. Electr. Eng.'', vol. 40, no. 1, pp. 16–28, 2014, doi: [https://doi.org/10.1016/j.compeleceng.2013.11.024. https://doi.org/10.1016/j.compeleceng.2013.11.024.]
+
[59] Chandrashekar G.,  Sahin F. A survey on feature selection methods. Comput. Electr. Eng., 40(1):16–28, 2014, doi: [https://doi.org/10.1016/j.compeleceng.2013.11.024. https://doi.org/10.1016/j.compeleceng.2013.11.024.]
  
[60] R. Kohavi and G. H. John, “Wrappers for feature subset selection,” ''Artif. Intell.'', vol. 97, no. 1, pp. 273–324, 1997, doi: [https://doi.org/10.1016/S0004-3702 https://doi.org/10.1016/S0004-3702](97)00043-X.
+
[60] Kohavi R.,  John G.H. Wrappers for feature subset selection. Artif. Intell., 97(1):273–324, 1997, doi: [https://doi.org/10.1016/S0004-3702 https://doi.org/10.1016/S0004-3702](97)00043-X.
  
[61] S. J. Russel and P. Norvig, ''Artificial Intelligence: A Modern Approach''. Englewood: Prentice Hall, 2003.
+
[61] Russel S.J., Norvig P., Artificial intelligence: A modern approach. Englewood, Prentice Hall, 2003.
  
[62] E. Alpaydin, ''Introduction to Machine Learning'', 3rd ed. Cambridge: MIT Press, 2014.
+
[62] Alpaydin E. Introduction to machine learning. Cambridge: MIT Press, 3rd ed., 2014.
  
[63] G. F. Cooper and E. Herskovits, “A Bayesian method for the induction of probabilistic networks from data,” ''Mach. Learn.'', vol. 9, no. 4, pp. 309–347, 1992, doi: 10.1007/BF00994110.
+
[63] Cooper G.F.,  Herskovits E. A Bayesian method for the induction of probabilistic networks from data. Mach. Learn., 9(4):309–347, 1992, doi: 10.1007/BF00994110.
  
[64] L. Breiman, “Random forests,” ''Mach. Learn.'', vol. 45, pp. 5–32, 2001, doi: 10.1007/9781441993267_5.
+
[64] Breiman L. Random forests. Mach. Learn., 45:5–32, 2001, doi: 10.1007/9781441993267_5.
  
[65] S. S. Keerthi, S. K. Shevade, C. Bhattacharyya, and K. R. K. Murthy, “Improvements to Platt’s SMO Algorithm for SVM Classifier Design,” ''Neural Comput.'', vol. 13, no. 3, pp. 637–649, 2001, doi: 10.1162/089976601300014493.
+
[65] Keerthi S.S., Shevade S.K., Bhattacharyya C.,   Murthy K.R.K. Improvements to platt’s SMO algorithm for SVM classifier design. Neural Comput., 13(3):637–649, 2001, doi: 10.1162/089976601300014493.
  
[66] N. Friedman, D. Geiger, and M. Goldszmidt, “Bayesian Network Classifiers,” ''Mach. Learn.'', vol. 29, no. 2, pp. 131–163, 1997, doi: 10.1023/A:1007465528199.
+
[66] Friedman N., Geiger D., Goldszmidt M. Bayesian network classifiers. Mach. Learn., 29(2):131–163, 1997, doi: 10.1023/A:1007465528199.
  
[67] D. Koller and N. Friedman, ''Probabilistic graphical models: principles and techniques''. Cambridge: MIT Press, 2009.
+
[67] Koller D.,  Friedman  N. Probabilistic graphical models: principles and techniques. Cambridge: MIT Press, 2009.
  
[68] L. Breiman, J. Friedman, C. J. Stone, and R. A. Olshen, ''Classification and Regression Trees''. Taylor & Francis, 1984.
+
[68] Breiman L., Friedman J., Stone C.J.,   Olshen R.A. Classification and regression trees. Taylor & Francis, 1984.
  
[69] J. Dean, ''Big Data, Data Mining, and Machine Learning''. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2014.
+
[69] Dean J. Big data, data mining and machine learning. Hoboken, NJ, USA, John Wiley & Sons, Inc., 2014.
  
[70] V. Vapnik and S. Kotz, ''Estimation of Dependences Based on Empirical Data''. New York: Springer-Verlag, 1982.
+
[70] Vapnik V.,  Kotz S. Estimation of dependences based on empirical data. New York: Springer-Verlag, 1982.
  
[71] G. Cano ''et al.'', “Predicción de solubilidad de fármacos usando máquinas de soporte vectorial sobre unidades de procesamiento gráfico,” ''Rev. Int. Métodos Numéricos para Cálculo y Diseño en Ing.'', vol. 33, no. 1, pp. 97–102, 2017, doi: [https://doi.org/10.1016/j.rimni.2015.12.001. https://doi.org/10.1016/j.rimni.2015.12.001.]
+
[71] Cano G. et al. Predicción de solubilidad de fármacos usando máquinas de soporte vectorial sobre unidades de procesamiento gráfico. Rev. Int. Métodos Numéricos para Cálculo y Diseño en Ing., 33(1):97–102, 2017, doi: [https://doi.org/10.1016/j.rimni.2015.12.001. https://doi.org/10.1016/j.rimni.2015.12.001.]
  
[72] E. Carrizosa, B. Martín-Barragán, and D. Romero Morales, “A nested heuristic for parameter tuning in Support Vector Machines,” ''Comput. Oper. Res.'', vol. 43, pp. 328–334, 2014, doi: [https://doi.org/10.1016/j.cor.2013.10.002. https://doi.org/10.1016/j.cor.2013.10.002.]
+
[72] Carrizosa E., Martín-Barragán B., Romero Morales  D. A nested heuristic for parameter tuning in Support Vector Machines. Comput. Oper. Res., 43:328–334, 2014, doi: [https://doi.org/10.1016/j.cor.2013.10.002. https://doi.org/10.1016/j.cor.2013.10.002.]
  
[73] M. Bekkar, H. Djema, and T. A. Alitouche, “Evaluation measures for models assessment over imbalanced data sets,” ''J. Inf. Eng. Appl.'', vol. 3, pp. 27–38, Jan. 2013.
+
[73] Bekkar M., Djema H., Alitouche T.A. Evaluation measures for models assessment over imbalanced data sets. J. Inf. Eng. Appl., 3:27–38, 2013.
  
[74] T. Fawcett, “An introduction to ROC analysis,” ''Pattern Recognit. Lett.'', vol. 27, no. 8, pp. 861–874, 2006, doi: [https://doi.org/10.1016/j.patrec.2005.10.010. https://doi.org/10.1016/j.patrec.2005.10.010.]
+
[74] Fawcett T. An introduction to ROC analysis. Pattern Recognit. Lett., 27(8):861–874, 2006, doi: [https://doi.org/10.1016/j.patrec.2005.10.010. https://doi.org/10.1016/j.patrec.2005.10.010.]
  
[75] A. P. Bradley, “The use of the area under the ROC curve in the evaluation of machine learning algorithms,” ''Pattern Recognit.'', vol. 30, no. 7, pp. 1145–1159, 1997, doi: [https://doi.org/10.1016/S0031-3203 https://doi.org/10.1016/S0031-3203](96)00142-2.
+
[75] Bradley A.P. The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recognit., 30(7):1145–1159, 1997, doi: [https://doi.org/10.1016/S0031-3203 https://doi.org/10.1016/S0031-3203](96)00142-2.
  
[76] SPC Brasil, “Inadimplência de Pessoas Jurídicas - SPC Brasil,” 2019. .
+
[76] Bouckaert R. Bayesian network classifiers in weka for version 3-5-7. The University of Waikato, Hamilton, New Zealand, p. 46, 2008.
  
[77] C. N. de D. L. CNDL, “Inadimplência das empresas cresce 3,30% em março, a menor alta em 18 meses, apontam CNDL/SPC Brasil,2019. [Online]. Available: [https://site.cndl.org.br/inadimplencia-das-empresas-cresce-330-em-marco-a-menor-alta-em-18-meses-apontam-cndlspc-brasil/. https://site.cndl.org.br/inadimplencia-das-empresas-cresce-330-em-marco-a-menor-alta-em-18-meses-apontam-cndlspc-brasil/.] [Accessed: 18-Jan-2020].
+
[77] SPC Brasil. Inadimplência de pessoas jurídicas. SPC Brasil, 2019.  
  
<br/>
+
[78]  CNDL. Inadimplência das empresas cresce 3,30% em março, a menor alta em 18 meses, apontam CNDL/SPC Brasil, 2019. [Online]. Available: [https://site.cndl.org.br/inadimplencia-das-empresas-cresce-330-em-marco-a-menor-alta-em-18-meses-apontam-cndlspc-brasil/. https://site.cndl.org.br/inadimplencia-das-empresas-cresce-330-em-marco-a-menor-alta-em-18-meses-apontam-cndlspc-brasil/.] [Accessed: 18-Jan-2020].
 +
</div>
  
<div class="center" style="width: auto; margin-left: auto; margin-right: auto;">
+
==Appendix 1==
'''APPENDIX 1'''</div>
+
  
<div class="center" style="width: auto; margin-left: auto; margin-right: auto;">
 
<span style="text-align: center; font-size: 75%;">'''Table A.''' Feature Coding</span></div>
 
  
{| style="width: 100%;border-collapse: collapse;"  
+
 
 +
<div class="center" style="font-size: 75%;">'''Table A.''' Feature coding</div>
 +
 
 +
<div id='tab-A'></div>
 +
{| class="wikitable" style="margin: 1em auto 0.1em auto;border-collapse: collapse;font-size:85%;width:auto;"  
 +
|-style="text-align:center"
 +
! rowspan="2" style="text-align:left" | Features (1) !! rowspan='2' style="text-align:left" | Levels of features (2) !!  colspan='2' | Types of coding 
 
|-
 
|-
 +
!  I – Categorical (3) !! II – Binary (4)
 +
|-
 +
|  rowspan='12' style="text-align: left;width:180px;"|(1) Legal Status
 +
|  style="text-align: left;"|(1) Limited partnership
 +
|  style="text-align: center;"|1
 +
|  style="text-align: center;"|100000000000
 +
|-
 +
|  style="text-align:left;"|(2) Private company limited by shares
 +
|  style="text-align:center;"|2
 +
|  style="text-align:center;"|010000000000
 +
|-
 +
|  style="text-align:left;"|(3) Individual micro entrepreneur
 +
|  style="text-align:center;"|3
 +
|  style="text-align:center;"|001000000000
 +
|-
 +
|  style="text-align:left;"|(4) Simple partnership
 +
|  style="text-align:center;"|4
 +
|  style="text-align:center;"|000100000000
 +
|-
 +
|  style="text-align:left;"|(5) Individual limited company
 +
|  style="text-align:center;"|5
 +
|  style="text-align:center;"|000010000000
 +
|-
 +
|  style="text-align:left;"|(6) Individual entrepreneur
 +
|  style="text-align:center;"|6
 +
|  style="text-align:center;"|000001000000
 +
|-
 +
|  style="text-align:left;"|(7) Individual firm
 +
|  style="text-align:center;"|7
 +
|  style="text-align:center;"|000000100000
 +
|-
 +
|  style="text-align:left;"|(8) Closed Corporation
 +
|  style="text-align:center;"|8
 +
|  style="text-align:center;"|000000010000
 +
|-
 +
|  style="text-align:left;"|(9) For-profit organization
 +
|  style="text-align:center;"|9
 +
|  style="text-align:center;"|000000001000
 +
|-
 +
|  style="text-align:left;"|(10) Collective partnership
 +
|  style="text-align:center;"|10
 +
|  style="text-align:center;"|000000000100
 +
|-
 +
|  style="text-align:left;"|(11) Civil association
 +
|  style="text-align:center;"|11
 +
|  style="text-align:center;"|000000000010
 +
|-
 +
|  style="text-align:left;"|(12) State authority
 +
|  style="text-align:center;"|12
 +
|  style="text-align:center;"|000000000001
 +
|-style="border-top: 2pt solid black;"
 +
|  rowspan='4' style="text-align: left;"|(2) Gross Annual Revenue
 +
|  style="style="text-align: left;"|(13) 0 a 536200
 +
|  style="text-align: center;"|1
 +
|  style="text-align: center;"|1000
 +
|-
 +
|  style="text-align:left;"|(14) 536237,04 a 1372514,63
 +
|  style="text-align:center;"|2
 +
|  style="text-align:center;"|0100
 +
|-
 +
|  style="text-align:left;"|(15) 1372791,74 a 3156893,44
 +
|  style="text-align:center;"|3
 +
|  style="text-align:center;"|0010
 +
|-
 +
|  style="text-align:left;"|(16) 3158540,99 a 769665000,00
 +
|  style="text-align:center;"|4
 +
|  style="text-align:center;"|0001
 +
|-style="border-top: 2pt solid black;"
 +
|  rowspan='4' style="text-align: left;"|(3) Number of  Employees
 +
|  style="style="text-align: left;"|(17) 0 a 1
 +
|  style="text-align: center;"|1
 +
|  style="text-align: center;"|1000
 +
|-
 +
|  style="text-align:left;"|(18) 2 a 4
 +
|  style="text-align:center;"|2
 +
|  style="text-align:center;"|0100
 +
|-
 +
|  style="text-align:left;"|(19) 5 a 11
 +
|  style="text-align:center;"|3
 +
|  style="text-align:center;"|0010
 +
|-
 +
|  style="text-align:left;"|(20) 12 a 5113
 +
|  style="text-align:center;"|4
 +
|  style="text-align:center;"|0001
 +
|-style="border-top: 2pt solid black;"
 +
|  rowspan='19' style="text-align: left;"|(4) Company Activity
 +
|  style="style="text-align: left;"|(21) Real estate management
 +
|  style="text-align: center;"|1
 +
|  style="text-align: center;"|1000000000000000000
 +
|-
 +
|  style="text-align:left;"|(22) Hotels
 +
|  style="text-align:center;"|2
 +
|  style="text-align:center;"|0100000000000000000
 +
|-
 +
|  style="text-align:left;"|(23) Industrial machinery
 +
|  style="text-align:center;"|3
 +
|  style="text-align:center;"|0010000000000000000
 +
|-
 +
|  style="text-align:left;"|(24) Production of circuses and similar events
 +
|  style="text-align:center;"|4
 +
|  style="text-align:center;"|0001000000000000000
 +
|-
 +
|  style="text-align:left;"|(25) Public road transport
 +
|  style="text-align:center;"|5
 +
|  style="text-align:center;"|0000100000000000000
 +
|-
 +
|  style="text-align:left;"|(26) Sales of cosmetics, toiletries and hygiene products
 +
|  style="text-align:center;"|6
 +
|  style="text-align:center;"|0000010000000000000
 +
|-
 +
|  style="text-align:left;"|(27) Fair and party organization
 +
|  style="text-align:center;"|7
 +
|  style="text-align:center;"|0000001000000000000
 +
|-
 +
|  style="text-align:left;"|(28) Department stores or shops
 +
|  style="text-align:center;"|8
 +
|  style="text-align:center;"|0000000100000000000
 +
|-
 +
|  style="text-align:left;"|(29) Customs dispatching
 +
|  style="text-align:center;"|9
 +
|  style="text-align:center;"|0000000010000000000
 +
|-
 +
|  style="text-align:left;"|(30) Road fright transport
 +
|  style="text-align:center;"|10
 +
|  style="text-align:center;"|0000000001000000000
 +
|-
 +
|  style="text-align:left;"|(31) Dental products
 +
|  style="text-align:center;"|11
 +
|  style="text-align:center;"|0000000000100000000
 +
|-
 +
|  style="text-align:left;"|(32) Tatto and piercing services
 +
|  style="text-align:center;"|12
 +
|  style="text-align:center;"|0000000000010000000
 +
|-
 +
|  style="text-align:left;"|(33) Debt recovery and registered information
 +
|  style="text-align:center;"|13
 +
|  style="text-align:center;"|0000000000001000000
 +
|-
 +
|  style="text-align:left;"|(34) Retailer of vehicle parts and accessories
 +
|  style="text-align:center;"|14
 +
|  style="text-align:center;"|0000000000000100000
 +
|-
 +
|  style="text-align:left;"|(35) Repair os electric and eletronic equipamento
 +
|  style="text-align:center;"|15
 +
|  style="text-align:center;"|0000000000000010000
 +
|-
 +
|  style="text-align:left;"|(36) Retail Jeweler
 +
|  style="text-align:center;"|16
 +
|  style="text-align:center;"|0000000000000001000
 +
|-
 +
|  style="text-align:left;"|(37) IT Technical support, maintenance and servisse
 +
|  style="text-align:center;"|17
 +
|  style="text-align:center;"|0000000000000000100
 +
|-
 +
|  style="text-align:left;"|(38) Outpatient medical services
 +
|  style="text-align:center;"|18
 +
|  style="text-align:center;"|0000000000000000010
 +
|-
 +
|  style="text-align:left;"|(39) Footwear retailer
 +
|  style="text-align:center;"|19
 +
|  style="text-align:center;"|0000000000000000001
 +
|-style="border-top: 2pt solid black;"
 +
|  rowspan='4' style="text-align: left;"|(5) Incorporation Data
 +
|  style="text-align: left;"|(40) 15/02/1939 a 01/06/1997
 +
|  style="text-align: center;"|1
 +
|  style="text-align: center;"|1000
 +
|-
 +
|  style="text-align:left;"|(41) 03/06/1997 a 19/02/2004
 +
|  style="text-align:center;"|2
 +
|  style="text-align:center;"|0100
 +
|-
 +
|  style="text-align:left;"|(42) 20/02/2004 a 19/02/2009
 +
|  style="text-align:center;"|3
 +
|  style="text-align:center;"|0010
 +
|-
 +
|  style="text-align:left;"|(43) 26/02/2009 a 02/12/2016
 +
|  style="text-align:center;"|4
 +
|  style="text-align:center;"|0001
 +
|-style="border-top: 2pt solid black;"
 +
|  rowspan='4' style="text-align: left;"|(6) Time as Client
 +
|  style="text-align: left;"|(44) 23/06/1975 a 29/10/2003
 +
|  style="text-align: center;"|1
 +
|  style="text-align: center;"|1000
 +
|-
 +
|  style="text-align:left;"|(45) 30/10/2003 a 26/02/2008
 +
|  style="text-align:center;"|2
 +
|  style="text-align:center;"|0100
 +
|-
 +
|  style="text-align:left;"|(46) 27/02/2008 a 15/06/2011
 +
|  style="text-align:center;"|3
 +
|  style="text-align:center;"|0010
 +
|-
 +
|  style="text-align:left;"|(47) 16/06/2011 a 05/12/2016
 +
|  style="text-align:center;"|4
 +
|  style="text-align:center;"|0001
 +
|-style="border-top: 2pt solid black;"
 +
|  rowspan='7' style="text-align: left;"|(7) Market Sector
 +
|  style="text-align: left;"|(48) Small Company
 +
|  style="text-align: center;"|1
 +
|  style="text-align: center;"|1000000
 +
|-
 +
|  style="text-align:left;"|(49) Company
 +
|  style="text-align:center;"|2
 +
|  style="text-align:center;"|0100000
 +
|-
 +
|  style="text-align:left;"|(50) Micro Business
 +
|  style="text-align:center;"|3
 +
|  style="text-align:center;"|0010000
 +
|-
 +
|  style="text-align:left;"|(51) Middle-level business
 +
|  style="text-align:center;"|4
 +
|  style="text-align:center;"|0001000
 +
|-
 +
|  style="text-align:left;"|(52) Company (unclassifiable)
 +
|  style="text-align:center;"|5
 +
|  style="text-align:center;"|0000100
 +
|-
 +
|  style="text-align:left;"|(53) Corporate
 +
|  style="text-align:center;"|6
 +
|  style="text-align:center;"|0000010
 +
|-
 +
|  style="text-align:left;"|(54) State
 +
|  style="text-align:center;"|7
 +
|  style="text-align:center;"|0000001
 +
|-style="border-top: 2pt solid black;"
 +
|  rowspan='5' style="text-align: left;"|(8) Risk Assessment
 +
|  style="text-align: left;"|(55) A
 +
|  style="text-align: center;"|1
 +
|  style="text-align: center;"|10000
 +
|-
 +
|  style="text-align:left;"|(56) B
 +
|  style="text-align:center;"|2
 +
|  style="text-align:center;"|01000
 +
|-
 +
|  style="text-align:left;"|(57) C
 +
|  style="text-align:center;"|3
 +
|  style="text-align:center;"|00100
 +
|-
 +
|  style="text-align:left;"|(58) D
 +
|  style="text-align:center;"|4
 +
|  style="text-align:center;"|00010
 +
|-
 +
|  style="text-align:left;"|(59) E
 +
|  style="text-align:center;"|5
 +
|  style="text-align:center;"|00001
 +
|-style="border-top: 2pt solid black;"
 +
|  rowspan='12' style=" text-align: left;"|(9) Borrower’s Credit Limit (hierarchical decision level)
 +
|  style="text-align: left;"|(60) Level 1
 +
|  style="text-align: center;"|1
 +
|  style="text-align: center;"|100000000000
 +
|-
 +
|  style="text-align:left;"|(61) Level 2
 +
|  style="text-align:center;"|2
 +
|  style="text-align:center;"|010000000000
 +
|-
 +
|  style="text-align:left;"|(62) Level 3
 +
|  style="text-align:center;"|3
 +
|  style="text-align:center;"|001000000000
 +
|-
 +
|  style="text-align:left;"|(63) Level 4
 +
|  style="text-align:center;"|4
 +
|  style="text-align:center;"|000100000000
 +
|-
 +
|  style="text-align:left;"|(64) Level 5
 +
|  style="text-align:center;"|5
 +
|  style="text-align:center;"|000010000000
 +
|-
 +
|  style="text-align:left;"|(65) Level 6
 +
|  style="text-align:center;"|6
 +
|  style="text-align:center;"|000001000000
 +
|-
 +
|  style="text-align:left;"|(66) Level 7
 +
|  style="text-align:center;"|7
 +
|  style="text-align:center;"|000000100000
 +
|-
 +
|  style="text-align:left;"|(67) Level 8
 +
|  style="text-align:center;"|8
 +
|  style="text-align:center;"|000000010000
 +
|-
 +
|  style="text-align:left;"|(68) Level 9
 +
|  style="text-align:center;"|9
 +
|  style="text-align:center;"|000000001000
 +
|-
 +
|  style="text-align:left;"|(69) Level 10
 +
|  style="text-align:center;"|10
 +
|  style="text-align:center;"|000000000100
 +
|-
 +
|  style="text-align:left;"|(70) Level 11
 +
|  style="text-align:center;"|11
 +
|  style="text-align:center;"|000000000010
 +
|-
 +
|  style="text-align:left;"|(71) Level 12
 +
|  style=" text-align: center;"|12
 +
|  style="text-align:center;"|000000000001
 +
|-style="border-top: 2pt solid black;"
 +
|  rowspan='3' style=" text-align: left;"|(10) Loan Restrictions
 +
|  style="text-align: left;"|(72) Impeditive restriction
 +
|  style="text-align: center;"|1
 +
|  style="text-align: center;"|100
 +
|-
 +
|  style="text-align:left;"|(73) No restriction
 +
|  style=" text-align: center;"|2
 +
|  style=" text-align: center;"|010
 +
|-
 +
|  style="text-align:left;"|(74) Weak restriction/information
 +
|  style="text-align: center;"|3
 +
|  style=" text-align: center;"|001
 +
|}
 +
 +
<!--
 +
{| class="wikitable" style="margin: 1em auto 0.1em auto;border-collapse: collapse;font-size:85%;width:auto;"
 +
|-style="text-align:center"
 
|  rowspan='2' style="border-top: 2pt solid black;border-left: 1pt solid black;border-bottom: 1pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">'''Features'''</span>
 
|  rowspan='2' style="border-top: 2pt solid black;border-left: 1pt solid black;border-bottom: 1pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">'''Features'''</span>
  
 
<span style="text-align: center; font-size: 75%;">'''(1)'''</span>
 
<span style="text-align: center; font-size: 75%;">'''(1)'''</span>
 +
 
|  rowspan='2' style="border-top: 2pt solid black;border-left: 1pt solid black;border-bottom: 1pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">'''Levels of Features'''</span>
 
|  rowspan='2' style="border-top: 2pt solid black;border-left: 1pt solid black;border-bottom: 1pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">'''Levels of Features'''</span>
  
 
<span style="text-align: center; font-size: 75%;">'''(2)'''</span>
 
<span style="text-align: center; font-size: 75%;">'''(2)'''</span>
 +
 
|  colspan='2'  style="border-top: 2pt solid black;border-bottom: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">'''Types of Coding'''</span>
 
|  colspan='2'  style="border-top: 2pt solid black;border-bottom: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">'''Types of Coding'''</span>
 
|-
 
|-
Line 874: Line 1,164:
 
<span style="text-align: center; font-size: 75%;">'''(3)'''</span>
 
<span style="text-align: center; font-size: 75%;">'''(3)'''</span>
 
|  style="border-top: 2pt solid black;border-bottom: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">'''II – Binary'''</span>
 
|  style="border-top: 2pt solid black;border-bottom: 2pt solid black;text-align: center;"|<span style="text-align: center; font-size: 75%;">'''II – Binary'''</span>
 
 
<span style="text-align: center; font-size: 75%;">'''(4)'''</span>
 
<span style="text-align: center; font-size: 75%;">'''(4)'''</span>
 
|-
 
|-

Latest revision as of 09:55, 3 September 2020

Abstract

The purpose of this article is to compare the performance of a credit scoring model by applying different Machine Learning techniques for the classification of payers in bank financing of companies (5 432 historical records). Clients were considered “non-default” or “default” depending on their default index, thus, 4 238 were considered “non-default” and 1 194 “default”, including the information related to 10 variables (features) that composed the database. First, a random undersampling technique was applied to solve the unbalanced data problem. The variables were then coded in two ways: Code I (categorical variables) and Code II (binary or dummy variables). This was followed by the feature selection methods to detect the most important variables. Finally, we used three classifier algorithms of Machine Learning (ML), Bayesian Networks (BN), Decision Tree (DT) and Support Vector Machine (SVM) comparatively. All these techniques were implemented in WEKA (Waikato Environment for Knowledge Analysis) software. The best performance was 95.2% using balanced classes, with the attributes coded in a binary way and the SVM machine learning technique. So, in this way, it is possible to automatically classify (“non-default” or “default”) new instances making use of the proposed methodology with high performance.

Keywords: Classifier algorithms, feature selection, unbalanced classes, credit scoring model

1. Introduction

The term “credit”, in the context of banking, is a type of transaction or contract through which a financial institution makes a certain amount of money available to someone (individual or company) with the promise of returning the money later in one or more instalments. This is a complex decision, as this operation involves risk and can lead to serious consequences. Credit operations for companies, when taken together, can amount to significant financial resources. Therefore, risk assessment is very important, since in extreme cases, i.e., default, these operations can lead to the bankruptcy of the financial institution [1].

This issue is so important that the Brazilian Central Bank has set limits on credit operations in accordance with Resolutions 1559 and 1556 of the National Monetary Council (Conselho Monetário Nacional, CMN) of 22 December 1988. Furthermore, financial institutions have to list their credit operations according to the risk they incur, in accordance with CMN Resolution 2682 of 21 December 1999. Thus, credit concessions have to be ranked and dubious prospective borrowers listed by level of risk, the collateral they provide and the kind of operation [2].

Even with these security measurements with regard to risk, the decision on whether to authorize a loan is made by a credit committee, consisting of managers of the institutions, using diverse measurement methods and managerial mechanisms. In general terms, these methods seek to transform a set of data into information to define default and non-default clients.

The economic pressures resulting from the high demand for credit, the fierce competition in the sector and the emergence of new computer technologies have led to the development of sophisticated credit concession models that are objective, rapid and reliable [3,4].

Traditional models, also known as credit scoring, essentially focus on whether to grant credit by evaluating the likelihood of repayment, in other words, whether the individual or company will default, in accordance with overdue payments on loans [5].

Linear Discriminant Analysis (LDA), Linear Regression (LinR) and Decision Trees (DT), as used by Medina and Selva [6], and Linear Programming (LP), may be highlighted as techniques for constructing credit risk models [7]. Methods with a multiple-criteria decision approach have also been used for this purpose [8].

The techniques to aid this decision-making have been constantly improved, mainly by researchers in the field of Artificial Intelligence (AI). Tools such as database analysis, Data Mining (DM) and Machine Learning (ML) are among the new technologies used to increase the quality and efficiency of decisions in banking institutions [9].

The aim of the present article is to propose an efficient and effective methodology for determining whether to grant credit to companies. To this end, the performances of different classifier algorithms of ML (Bayesian Networks, BN; Decision Tree, DT and Support Vector Machine, SVM) will be compared. Prior to using these classifiers, data treatment will be performed: class balancing, coding of features (categorical and binary) and feature selection, with a view to improving the accuracy of those algorithms. To illustrate the methodology better, real data provided by a banking institution will be used.

The article contributes to several aspects of the field, such as defining a client default index (rather than simply defining clients as default or non-default); performing data treatment using techniques generally neglected by researchers and providing a geometric illustration to identify the most important features.

The present study seeks to address the following questions: a) Which classifier algorithms result in better performance of the credit scoring prediction model? b) How does the problem of class unbalancing affect the performance of the model? c) How does the feature selection stage contribute to the credit scoring model? d) What are the practical implications of getting a good defaulter and non-defaulter classification?

The article is organized as follows. Following this introduction, the theoretical framework about credit risk analysis is presented in Section 2. In Section 3, the data collection and organization are explained. The methodology is presented in Section 4, and the results are shown in Section 5. Finally, the conclusions and suggestions for future studies are given in Section 6.

2. Theoretical framework

The theoretical framework is organized into the presentation of types and models of risk assessment and correlated works.

2.1. Types and models of credit risk

As mentioned above, every granted credit operation, as it involves a future expectation of payment, is open to risks. Frascaroli, Paes and Ramos [10] highlight four kinds of risk: financial risk, operational risk, legal risk and systemic risk, as shown in Figure 1.

Draft Samways dos Santos 683812980-image1.png
Figure 1. Types of risk and classification of credit risk models


Financial risk is credit and liquidity risk. Operational risk is risk resulting from human failure, equipment failure and the failure of operational systems, increasing credit and liquidity risk. Legal risk results from a legal and regulatory base that is not suited to liquidation, an activity that it is intended to monitor and control. In turn, jointly or separately, these risks can lead to systemic risk, which may be defined as the possibility of credit and/or liquidity gaps that can lead to general default by the participants in a financial system [10].

Models that assess and/or measure credit risks can be classified into three groups, in accordance with Silva Brito and Assaf Neto [11]: risk classification models, stochastic credit risk models and portfolio risk models. Risk classification models seek to quantify the risk of a borrower or operation and grade the debtor or loan. Stochastic models are used to determine the stochastic behavior of the credit risk or the variables included in its calculation. Portfolio risk models estimate the distribution of likelihood of loss or the value of a credit portfolio and thus produce estimates of risk.

Risk classification models, i.e., credit scoring, in turn, are divided into two categories: credit approval models and behavioral scoring models. The main difference between the two categories is that in the latter, the financial institution analyzes the behavior of the client in previous operations, whereas in credit approval models, the financial institution relies on companies’ registration data. It should be highlighted that the present study uses risk classification models based on ML models for the concession/approval or refusal of credit (in blue color in Figure 1).

2.2. Some correlated works

Credit risk assessment, since it was introduced in the nineteen fifties, has been widely used, mainly for granting loans [12]. This problem consists of evaluating the risks involved when a financial institution lends money to a company or individual. For this purpose, researchers have used a wide range of techniques to minimize losses for financial institutions. Some works related to this subject will now be briefly described in chronological order since 2012 and comparatively summarized in Table 1. In this table, the techniques that have shown the best performance are in bold.

Table 1. Comparative synthesis of some correlated works (in chronological order)
Authors, year Techniques Databases (DB) used
Loterman et al., 2012 [13] 24 techniques: B-OLS; ANN; SVM e statistical techniques 6 DB
Brown and Mues, 2012 [14] DT; FF; LR; ANN; SVM 5 DB
Wang et al., 2012 [15] DT; RBF; LR 2 UCI DB
Hens and Tiwari, 2012 [16] Híbrid (SVM e AG) and RNA 2 DB: Australian and German
Marqués et al., 2012 [17] 7 techniques (DT; ANN; others) with ensemble or without ensemble UCI DB
Akkoç, 2012 [18] LDA; LR; ANN; Hybrids DB from Turkey
Kao et al., 2012 [19] Proposed method (Bayesian latente variables); LDA; CART; MARS; ANN; SVM DB from Tawain
Tong et al., 2012 [20] LR, Cox Regression, Mixed Cure Model Portfolio of loans in the United Kingdom
García et al., 2012 [21] SVM, ENN, NCN, CHC 8 DB
Li et al., 2013 [22] SVM (with and without ensamble) 2 DB
Nikolic et al., 2013 [23] LR Company DB
Marqués et al., 2013 [24] LR, SVM (with and without resampling) UCI DB
Zhu et al., 2013 [25] LDA, QDA, DT, LR, SVM UCI DB
Blanco et al., 2013 [26] LDA; QDA; ANN; LR DB from Peru
Cubiles-de-la-Veja et al., 2013 [27] DT; LDA; QDA; LR; ANN; SVM; bagging; boosting DB from Peru
Oreski and Oreski, 2014 [28] Hybrid (GA and ANN) DB from Croatia
Chih-Fong and Chihli, 2014 [29] ANN; ANN Ensembles; Hybrid RNA 3 DB: Australian; German; Japanese
Niklis et al., 2014 [30] SVM, LR Greek DB
Tong e Li, 2015 [31] SVM and combinations; RVM Credit Risk of Chinese companies
Yi e Zhu, 2015 [32] Different SVM techniques 2 DB: Australian and German
Bravo et al., 2015 [33] LR; ANN; Clustering Chilean Public Agency
Koutanaei et al. 2015 [34] Hybrid (PCA and GA); SVM; ANN with and without ensemble Iranian Development Bank
Harris, 2015 [35] LinR; LR; ANN; DT; SVM 2 DB: German and from Barbados
Danenas and Garvas, 2015 [36] ANN; PSO; SVM EDGAR DB
Zhao et al., 2015 [37] ANN (Three different strategies) German DB
Silva et al., 2015 [38] ANN DB 13th. Pacific-Asia KDD and DM Conference
Abedini et al., 2016 [39] ANN MLP with and without FR, SVM, RL with and without bagging DB UCI
Zakirov et al., 2016 [40] SVM with and without application of RF Real DB
Ozturk et al., 2016 [41] BN, CART, MLP, SVM DB with 1 022 observations from 92 countries
Abdou et al., 2016 [42] LR, CART e ANN DB of banks from Cameroon
Punniyamoorthy and Sridevi, 2016 [43] ANN; SVM DB from the United Kingdom
Ala’raj and Abbod, 2016 [44] LR; ANN e SVM (with and without RF); DT 5 DB: German; Australian; Japanese; Iranian and Polish
Andric and Kalpic, 2016 [45] LR; ANN (with and without gradient boosting) 2 DB: German and Japanese
Li, 2016 [46] SVM with fuzzy logic Real DB
Guo and Dong, 2017 [47] DT, BN, PSO, LR, ANN 2 DB: United Kigdom and Germany
Luo et al., 2017 [48] ANN (deep learning and MLP), LR and SVM CDS DB
Bequé and Lessmann, 2017 [49] ANN, ELM Real DB
Lanzarini, 2017 [50] PSO Hybrid Tunisian bank DB
Maldonado et al., 2017 [51] Different SVM techniques (Fisher-SVM) DB with 7 309 clients (small and micro businesses)
Assef et al., 2019 [52] ANN (MLP and RBF), LR DB with 5 432 clients

Legend: ADL (Linear Discriminant Analysis); ANN (Artificial Neural Networks); BN (Bayesian Networks); B-OLS (Beta Ordinary Least Square); CART (Classification and Regression Trees); CDS (Common Data Service); DT (Decision Trees); ELM (Extreme Learning Machine); ENN (Edited Nearest Neighbor); GA (Genetic Algorithms); LinR (Linear Regression); LR (Logistic Regression); RF (Random Forest); MARS (Multivariate Adaptive Regression Splines); MLP (MultiLayer Perceptron); NCN (Nearest Centroid Neighbors Editing); PCA (Principal Components Analysis); PSO (Particle Swarm Optimization); QDA (Quadratic Discriminant Analysis); RBF (Radial Basis Function); RVM (Relevance Vector Machines); SVM (Support Vector Machines).


Loterman et al. [13] compared 24 techniques used to classify banking credit, including heuristic procedures, Artificial Neural Networks (ANN), the SVM and statistical models, evaluated in six real databases. The ANN and B-OLS techniques had the best performances in more than one database. Brown and Mues [14] also made an extensive comparison of techniques, this time using five real databases. The techniques employed were Logistic Regression (LR), ANN, DT, SVM and Random Forests (RF). In general, RF had the best performance. In Wang et al. [15], the performances of ANN were compared with the Radial Basis Function (RBF), DT and LR in two credit databases of the UCI (UC Irvine Machine Learning Repository). The best results were obtained with LR, with accuracy greater than 88% in every case presented. Hens and Tiwari [16] developed a hybrid of SVM and Genetic Algorithms (GA) and compared this methodology with ANN. The accuracy of the proposed model, although greater, was very close to that of ANN. The rates obtained were 86.76% and 86.71%, respectively.

Marqués et al. [17] presented seven classification techniques, varying in the use (or not) of ensemble techniques. The best results were for tests using ensemble and the best performance was for DT, closely followed by ANN. The poorest results were the BN (Bayesian Networks) classifiers. Akkoç [18] proposed a hybrid for banking credit classification in a Turkish database. Initially, three techniques were analyzed separately: LDA, LR, ANN. These techniques were then hybridized. The resulting hybrid had a better performance than the other techniques, with an average accuracy of 60% in the tests that were conducted. In Kao, Chiu and Chiu [19], a client classification model was proposed based on Bayesian latent variables. The proposed method was compared with techniques such as LDA, ANN, SVM, CART (Classification and Regression Trees) and MARS (Multivariate Adaptive Regression Splines). The model was 92.9% accurate in its classification, followed by CART, with approximately 90%.

Tong et al. [20] compared statistical techniques such as LR, a mixed cure model and Cox regression, with highly similar performances. García et al. [21] analyzed 20 algorithms, using different types of SVM, statistical techniques and heuristics in applications for eight different databases. The best performances were for three heuristic models, Edited Nearest Neighbor (ENN), Nearest Centroid Neighbors Editing (NCN) and finally the CHC evolutionary algorithm. Li, Wei and Hao [22] proposed an ensemble methodology together with the SVM technique and PCA (Principal Component Analysis) in two databases. Not only did the proposed method have the best accuracy (89%) of the tested models, but it was also the most stable. Nikolic et al. [23], using a LR approach, proposed a credit risk assessment model for companies from different databases over five years (2007-2011). Accuracy varied between 50.99% and 53.91% according to the number of variables analyzed. Marqués et al. [24] tested the ability of data resampling methods. LR and the SVM were compared and the authors found that resampling models can improve the performance of the classification techniques.

Zhu et al. [25] tested eight methods, including LDA, QDA (Quadratic Discriminant Analysis), DT, LR and SVM, applied in two UCI databases. For a database of a Peruvian bank, Blanco et al. [26] used ANN, LDA, QDA and LR techniques to predict the likelihood of default of 5 500 clients. The performance of ANN was better than the other techniques. Using different classification methods, Cubiles-de-la-Veja et al. [27] analyzed the credit risk of a Peruvian financial institution, showing that the MLP (Multiple Layer Perceptron) model reduces the costs of classification error by 13.7% in relation to the application of the other methods that were tested. Oreski and Oreski [28] presented a hybrid of GA and ANN in a Croatian database. The proposed algorithm showed a promising classification “ability” for selecting features and classifying risk compared with the other techniques. Chih-Fong and Chihli [29] compared ensembles of ANN and a hybrid of ANN in three databases (Australian, German and Japanese). The results showed that both the hybrid and the ensembles outdid the performance of pure ANN. Niklis et al. [30] compared different types of SVM and LR to evaluate the credit risk of real data from 2005 to 2010. The best results were obtained by one of the SVM techniques (79.6%). Tong and Li [31], again using SVM and possible combinations of this technique, sought to assess the credit risk of Chinese companies. The best result obtained (9% error) was for the technique known as Relevance Vector Machines (RVM), a variant of SVM. Another analysis of different SVM techniques was conducted by Yi and Zhu [32], applied to an Australian database and a German one. The best result for the German database was obtained through RBF together with the SVM, achieving accuracy of 76%. For the Australian database, the greatest accuracy was 84.83% using polynomial functions in the tested SVM.

Bravo et al. [33] proposed a methodology that divides clients into “good payers”, “can’t pays” and “won’t pays”. The authors used a clustering algorithm, LR and Multinomial LR, together with ANN. Dividing clients in this way can mean a significant improvement over the classical division (good payers and bad payers). Koutanaei et al. [34] developed a hybrid model that, in the first stage, pre-processes information using PCA and GA. The parameters obtained are then used as inputs for the SVM and ANN to compare these methods. The results showed that ANN, with the AdaBoost (adaptive boosting) ensemble technique achieved greater accuracy than the others that were tested. Harris [35] investigated LinR and LR, in addition to ANN, DT and the SVM to classify clients in a German database and another from a bank in Barbados. The best accuracy was obtained using the SVM.

Danenas and Garvas [36] presented ANN, PSO (Particle Swarm Optimization) and SVM techniques to classify clients in a database from 1999-2007 known as “EDGAR” (Electronic Data Gathering). The experimental research showed that the SVM had the best performance (over 90%). Zhao et al. [37] proposed an MLP type ANN analysis in an attempt to improve performance using three strategies. The first strategy involved optimizing the distribution of information from the databases using a method known as Average Random Choosing. The second involved comparing the effects of the number of instances of training, test and validation. The third involved finding the best number of neurons for the hidden layer. Using the client base of a German bank, the authors achieved a level of accuracy of 87% for 31 neurons in the hidden layer. Silva et al. [38] also used MLP to explore the idea of generating cases in pattern regions, in which it is more difficult to produce consistent responses. The ratio of defaulters and non-defaulters in the database used by the authors was 80% to 20%, with a greater tendency of information for non-defaulters, lowering the accuracy of the methods tested.

Abedini et al. [39] proposed an approach using an ensemble classification technique with ANN, MLP, SVM, LinR and LR with bagging and MLP using RF. The proposed model performed better than when the techniques were applied on their own. The best accuracy level was 76.67% for the application of MLP with the RF ensemble technique. Zakirov, Bondarev and Momtselidye [40] presented a structure to compare different classification methods, in which the RF methodology was the most accurate. Applying the CART, MLP, SVM and BN, Ozturk et al. [41] examined the forecasting of different AI techniques to analyze bank credit. The results showed that the prediction techniques were over 90% accurate, while conventional statistical models were approximately 70% accurate. Abdou et al. [42] applied three correlation classification methods, LR, CART and ANN, to a database of banks in Cameroon. The best performance was obtained with ANN, with a 97.43% accurate identification of “good payers”. Punniyamoorthy and Sridevi [43] used ANN and compared them with an SVM model to classify bank clients in the United Kingdom. The SVM had better results than the ANN method, with accuracies of 80% and 77%, respectively.

Ala’raj and Abbod [44] presented an approach with six classifiers: LR, ANN, SVM, RF, DT and BN. Five databases were used (German, Australian, Japanese, Iranian and Polish), with RF having the best performance in four of the five bases, followed by ANN, with the highest level of accuracy in the German base. Andric and Kalpic [45] compared three classification algorithms, LR, ANN and gradient boosting. Regarding the first database, the German one, ANN and gradient boosting were both 75% accurate. For the second database, the Japanese one, gradient boosting had the best result, with 91% accuracy.

Li [46] conducted a credit risk analysis using the SVM based on fuzzy logic, for which the rate of accuracy was 77.7%. Guo and Dong [47] proposed a multi-objective PSO model for classifying customers and compared it with BN, LR, sequential minimal optimization, DT and ANN. The accuracy of the proposed model was greater than the other tested models (74.64%) for the first database that was tested. However, for the second, ANN had better performance than the others, with 61.15% accuracy. For the last database that was tested, LR had the best performance, with 76.70% accuracy.

In Luo et al. [48], the performance of credit scoring models was tested, applied to the CDS (Common Data Service) database. Deep learning ANN were used, as well as MLP, LR and the SVM, to compare the tests. The best accuracy was for the deep learning ANN (100%), followed by MLP (87.85%). Bequé and Lessmann [49] compared ANN and other classification methods with the ensemble technique known as extreme learning machines (ELM). Lanzarini et al. [50] presented an alternative model that could generate rules that worked not only with numerical features, but also with nominal ones. The technique was based on LVQ-PSO (Learning Vector Quantization combined with PSO). The highest level of accuracy obtained by the proposed algorithm was 81.05% in the tests that were performed. Maldonado et al. [51] developed two proposals based on the SVM to select features and classify clients with regard to bank credit. Among the tested SVM, the Fisher-SVM was the most accurate (accuracy rate of 70.6%). This algorithm uses a Fisher scoring algorithm to select features according to costs and the SVM is then applied. In Assef et al. [52], compared ANN-MLP, ANN-RBF and LR in a problem with 5 432 data with 15 features, considering three classes: non-default; default and temporarily default; the authors present new insights towards research over Credit Risk Assessment.

It should be highlighted that in this work, compared with those analyzed (Table 1), a default index was determined for every client and, also, in order to get better performance for the classifier algorithms of ML, techniques were applied for the data treatment: random undersampling for class balancing; features were coded as categorical and binary; and, finally, the features were selected using filter techniques (information gain) and wrapper techniques. With these data preprocessed, the Bayesian Networks (BN), Decision Tree (DT) and Support Vector Machine (SVM), were used comparatively. To provide a better illustration of the methodology, real data provided by a banking institution were used.

3. Data organization and collection

The data used in this work were obtained from a large Brazilian financial institution with regard to the concession of credit to companies located in Paraná State (PR). Historical records from January 1996 to June 2017 were used, with over 39000 credit operations involving 5432 companies, chosen by the institution’s specialists (credit managers), in order to get good representations of the general bank client mix.

The data of the operations conducted during the research period were classified concerning the situation of payment as follows, as the institution specialists’ suggestions.

  • Class I (paid in full or payable): operations with payments made on time or within the deadline for payment;
  • Class II (overdue): operations overdue for up to 180 days;
  • Class III (losses): operations overdue for more than 180 days.

Thus, every one of the 5432 companies were classified by the number of operations resulting in each of the aforementioned classes of observation. For this purpose, a function of the default rate was determined, as shown in (1),

(1)

where represents the default rate of each company ; represents the number of operations of each company belonging to Class I; and the number of operations of each company in Class III.

Thus, the classification (value of the default rate) of each company actually represents a proportion of the Class III operations in relation to Classes I and III. In other words, they are operations with no expectation of payment in relation to the number of operations that the company had already paid or are within the deadline for payment (Class I). Therefore, when the default rate is closer to “1”, this means that the company has more Class III operations than Class I and is consequently more of a “defaulter”. Using Equation (1), the companies will be “penalized” in proportion to the number of overdue payments.

This must be considered because there may be companies that have a profile of commitment and responsibility regarding the repayment of loans but, for some reason, have not been able to repay some of the instalments of the credit operation. For example, a company with 50 Class I operations and five in Class III will not be considered a “defaulter” because of the five overdue payments. Rather, all the other 45 operations will be considered, resulting in a default rate of 0.09.

Class II operations were not considered in the calculation of the default index because they are on the threshold between default and non-default, as these payments can still be settled and become Class I.

Having said this, the classification feature of the companies regarding repayment, corresponding to the output feature, was defined by a dichotomous variable , assuming the values shown in (2)

(2)

Therefore, of the total instances (5432 companies), 4238 were considered “non-defaulters” and 1194 “defaulters”. The 10 features selected with the help of a specialist from the banking institution to compose the prediction model were: Legal Status, Gross Annual Revenue, Number of Employees, Company Activity, Date of Incorporation, Time as Client, Market Sector, Risk Assessment, Borrower’s Credit Limit and, finally, Loan Restrictions (weak or impeditive). The feature selection using the expertise tries to avoid a high bias that could lead to a model underfitting.

4. Methodology

The methodology was defined using in the five following stages: class balancing, coding features (categorical and binary), feature selection, application of machine learning algorithms and evaluation and comparison of their performance. These stages are illustrated in the flowchart in Figure 2 and briefly described in the next subsections.

Draft Samways dos Santos 683812980-image2.png
Figure 2. Proposed methodology


4.1 Class balancing

The evident unbalancing or disproportionate number of instances in each class (4238 were considered “non-defaulters” and 1194 “defaulters”) can make the minority instances (“defaulters”) have “strong” chances of being classified incorrectly [53]. Therefore, the random undersampling technique [54] was applied to solve the problem of unbalancing, which consists of the random elimination of instances in the majority class (“non-defaulters"), so that the two classes have the same number (1194) of instances. This technique was used due to its simplicity and fast computation.

4.2 Coding of features

The raw data (continuous variables) underwent a coding procedure that consisted of categorizing the features and transforming them into dummy (binary) variables [55]. The continuous type features were categorized/binarized due to the significant differences between their values ranges.

The categorization of the features that were originally described by continuous variables consisted of creating four levels of discrete variables that corresponded to the quartiles of the value intervals of the original continuous variable. The “Gross Annual Revenue”, “Number of Employees”, “Date of Incorporation” and “Time as Client” features are included in this case.

The features described with variables that were originally categorical, with many levels, also had some of their levels regrouped to avoid the existence of categories with a small number of instances, which could affect the estimation of the model’s parameters. The features that fit this scenario are “Legal Status”, “Company Activity”, “Market Sector”, Risk Assessment”, “Borrower’s Credit Limit” and “Restrictions”. The variables were then “binarized” using the dummy coding, which is done by attributing the value of “1” when it has a characteristic represented by the level of the feature and a value of “0” otherwise. The use of dummies can help improve the assertiveness of the predictions of the classification models [3,9,56,57]. The number of dummies is equal to the number of levels of each feature. Therefore, in the model in question, there was a total of 74 dummy variables.

4.3. Feature selection

Feature selection techniques were used that can improve the performance of the predictor models, facilitate visualization and understanding of the estimated parameters and prevent problems of overfitting [58].

There are different approaches to feature selection, two of which were used in the present work: a) Filter (Feature Ranking) to establish a ranking of the features based on information gain, independent of the classifier algorithm [59]; and b) Wrapper (Forward Selection) to select a subset of features that results in better “merit” (better assessment performance), depending on the classifier algorithm, using the method WrapperSubsetEval, proposed by Kohavi and John [60].

With the feature selection using the Wrapper method, the models, which before were “complete” (with all the features), became “summarized” models. In other words, they came to include only the predictor variables considered most important for each classifier algorithm.

4.4. Classifier algorithms

A number of ML techniques have been used in classification problems [61,62]. The classifier algorithms selected for the case in question were Bayesian Networks (BN; [63]), Decision Tree (DT; [64]) and the Support Vector Machine (SVM; [65]), as they had the best performances in the correlated works that were analyzed (Table 1).

A BN is a directed acyclic graph that codifies a joint probability distribution on a set of discrete random variables where each variable Xi can assume values of a finite set [66]. Formally, a BN for is a pair where the first component, , is a directed acyclic graph whose vertices correspond to the random variables and whose edges represent direct dependences between these variables. The second component, , represents the set of parameters that quantifies the network [67].

A DT is a tree-based method, introduced by Breiman et al. [68]. The initial algorithm has been improved and expanded in several ways over the years, but the general principles remain: given a set of training data, the input variables and their corresponding levels are observed to determine possible division points. Each division point is then evaluated to determine which division is “better”. The process is then repeated with each subgroup until a stop condition is achieved [69].

Finally, the original concept of the SVM [70] was intended to find ideal hyperplanes for linearly separable classes [71], but also has the ability of building nonlinear classifiers [72]. These hyperplanes depend on a subset of the training data, which are known as support vectors [69]. The SVM is widely used in real world problems due to a better generalization ability, including less overfitting problems.

4.5. Evaluation and comparison of the performance of the models

The metrics used to assess the performance of the predictions of classification models, based on the confusion matrix were: a) Accuracy, measured by the Total Accuracy Rate (TAR); and b) Specificity, also called the true negative rate (TNR), measured by the rate of accuracy in “Defaulter” prediction.

The rates TAR and TNR can be calculated using equations (3) and (4), respectively [73]

(3)
(4)

where represents the number of non-default operations and correctly classified as “non-default” (true positive, TP); , the number of default operations correctly classified as “default” (true negative, TN); , the total instances considered and , the total number of “Defaulters”.

The accuracy is the proportion of true results, both true positives (“non-default”) and true negatives (“default”), among the total number of 5432 cases examined. The specificity measures the proportion of actual negatives (“default”) that are correctly identified as such defaulters.

Another important evaluation metrics for checking the classification model’s performance is the AUC (Area Under the Curve) ROC (Receiver Operating Characteristics) curve, also written as AUROC (Area Under the Receiver Operating Characteristics). This measurement is obtained through the graphical representation of the pairs and , which correspond the false positive rate against the true positive rate (sensitivity) [74]. The AUROC can be obtained through numerical integration methods [73].

The AUROC measurement is preferable to only using accuracy, specificity or sensitivity, as it has a number of desirable properties [75] and can be interpreted as follows: the closer to “1” the obtained value is, the better the classifier algorithm will be in the task of separating the two classes. Values between 0.8 and 0.9 are considered acceptable, and values over 0.9, excellent.

The models were compared to verify the existence of significant differences between the performance measurements (Accuracy, Specificity and AUROC) in the different classifier algorithms using the test for coupled samples, with a level of significance of .

5. Obtaining and discussion of results

Following the data balancing, as in Section 4.1, the remaining stages of the methodology were followed.

5.1. Feature coding

Following the procedures described in Section 4.2, the two configurations to be tested were obtained: a) Code I (Categorical Variables): with the 10 features categorized into 74 different alternatives; and b) Code II (Binarized Variables): with the 10 features transformed into 74 dummy variables. Detailed descriptions of the 10 self-explanatory features and Codes I and II are shown in Table A in the Appendix 1.

5.2. Results of the feature selection

Different “complete” and “summarized” models (filter method or information gain; wrapper) were constructed and tested and named as shown in Table 2, depending on whether the classes are balanced and also on the type of feature coding (categorical or binary).

Table 2. Denomination of complete and summarized models
Complete Models (CM) Summarized Models (SM)
CM.A CM.B CM.C CM.D SM.A SM.B SM.C SM.D
Class Balancing
Unbalanced Classes (5 432 instances) x x x x
Balanced Classes (2 388 instances) x x x X
Feature Coding
Code I Features (Categorical) x x x x
Code II Features (Binary) x x x x


Therefore, for example, CM.A is complete, the classes are unbalanced and its features are Code I (categorical features). The other models can be interpreted likewise.

It was now time for the feature selection. The results of this selection are shown in Figure 3, in the format of Code I (categorical), with balanced and unbalanced classes for defining the ranking (obtained using the filter or information gain approach), and for constituting the subset of features for each classifier algorithm (obtained using the wrapper approach).

Draft Samways dos Santos 683812980-image3.png
Figure 3. Ranking of features in Code I (categorical) format and selected subsets for each classifier algorithm


Feature’s Legend: (1) Legal Status, (2) Gross Annual Revenue, (3) Number of Employees, (4) Company Activity, (5) Incorporation Data, (6) Time as Client, (7) Market Sector, (8) Risk Assessment, (9) Borrower’s Credit Limit, (10) Loan Restrictions. For more information, see Table A (Appendix 1).


According to the ranking shown in Figure 3, Features 8 and 10, “Risk Assessment” and “Loan Restrictions” are occupying positions 1 and 2 (table at the left in Figure 3), swapping their positions in the balanced classes (table at the right in Figure 3). Thus, these two features are highly relevant to the model, with the information gain higher than 0.26. Features 2 and 3, “Gross Annual Revenue” and “Number of Employees” (positions 9 and 10 in Figure 3) contributed least to the information gain in the model.

Moreover, Feature 8, “Risk Assessment”, was selected for the subset of features that result in greater “merit” (wrapper approach) for all thee classifier algorithms in both cases, Unbalanced and Balanced, as shown in the Venn diagram. This did not occur in the case of Feature 10, “Loan Restrictions”, which was selected in all the algorithms only when the classes were balanced.

Other features were also selected to compose each subset, but the interesting fact was the substantial reduction in their number, which went from 10 to a minimum of two features (8 and 10; DT with unbalanced classes) and a maximum of seven features (2, 3, 4, 5, 7, 8 and 10; BN with balanced classes).

Meanwhile for Code II (binary), with balanced and unbalanced classes, the results of the feature selection are shown in Figure 4. With this coding, not only the features with all their levels were selected, but rather the specific levels of each feature with greater representativeness for the model.

Draft Samways dos Santos 683812980-image4.png
Figure 4. Ranking of features in the Code II (binary) format and selected subset for each classifier algorithm


Feature's Legend: (4) Simple partnership, (5) Individual limited company, (6) Individual entrepreneur, (7) Individual firm, (11) Civil association, (23) Industrial machinery, (26) Sales of cosmetics, toiletries and hygiene products, (31) Dental products, (33) Debt recovery and registered information, (37) IT Technical support, maintenance and service, (40) 15/02/1939 a 01/06/1997, (42) 20/02/2004 a 19/02/2009, (43) 26/02/2009 a 02/12/2016, (47) 16/06/2011 a 05/12/2016, (51) Middle-level business, (55) A, (56) B, (59) E, (60) Level 1, (61) Level 2, (62) Level 3, (63) Level 4, (68) Level 9, (69) Level 10, (70) Level 11, (72) Impeditive restriction, (73) No restriction, (74) Weak restriction/information. For more information, see Table A (Appendix 1).


The same features (59 and 72) occupied the first two places in the ranking using the filter approach, reversing positions in the case of unbalanced and balanced classes. These features are actually levels of the “Risk Assessment” and “Loan Restrictions” features, representing “Risk E” and “Impeditive Risk”. In other words, the binary format revealed the specific level of the most important features for the models.

Feature 59, “Risk E”, which appears in the intersection of the Venn diagram, was selected for the subset of features that results in better “merit” (wrapper approach) for all three classifier algorithms in both cases, Unbalanced and Balanced. In the case of the unbalanced classes, there was a radical reduction in the number of features, going from 74 to four in the total for the subset, with three in each classifier algorithm: BN with Features 59, 69 and 74; DT and SVM with Features 59, 74 and 63. With the balanced classes, this reducing effect was less marked, except for the SVM (Features 37, 51, 59 and 72). It remains to be seen whether this reduction in the number of features is advantageous in the sense of better performance of the models.

5.4. Results of the classifier algorithms

The algorithms used (BN, DT and SVM) were implemented in WEKA® software (Waikato Environment for Knowledge Analysis, available at: http://www.cs.waikato.ac.nz/ml/weka) and the tests were conducted with the option of cross-validation (-fold), with partitions and with a standard configuration in all parameters. More specifically, in the case of BN, the SimpleEstimator method was used with to determine the values of the conditional probability tables [76] and the K2 method to determine the network structure. For the DT, the depth of the tree was considered unlimited, 100 was the number of iterations to be used and a single random seed was used. For the SVM, the complexity parameter, , the logistic method was used for calibration, and the Polynomial Kernel to determine the kernel.

The results of the tests with the different classifier algorithms, considering the different constructed models (CM.A to CM.D and SM.A to SM.D), are shown in Table 3. In this table, the metrics for assessing the performance of the models are presented, as well as a comparison to determine whether there is a significant difference between the performances of the complete models.

Table 3. Performance of the models tested with BN, SVM and DT
Assessment Metric Classifier Algorithm Complete Models Summarized Model
CM.A CM.B CM.C CM.D SM.A SM.B SM.C SM.D
Accuracy BN 0.873 0.858 0.856 0.858 0.888 0.890 0.862 0.867
SVM 0.889+ 0.890+ 0.861 0.861 0.890 0.890 0.862 0.864
DT 0.882+ 0.879+ 0.848 0.856 0.890 0.890 0.863 0.873
Specificity BN 0.719 0.768 0.886 0.891 0.619 0.620 0.913 0.950
SVM 0.616- 0.616- 0.946+ 0.946+ 0.617 0.619 0.947 0.952
DT 0.681- 0.669- 0.874 0.886 0.619 0.619 0.925 0.946
AUROC BN 0.931 0.928 0.925 0.923 0.863 0.830 0.925 0.913
SVM 0.791- 0.791- 0.861- 0.861- 0.792 0.793 0.852 0.864
DT 0.923- 0.925 0.916- 0.918 0.920 0.830 0.918 0.915


The performances of the complete models for each performance metric are compared by attributing superscript signs, (+) and (-), when there is a greater or lesser significant difference, respectively, always compared with the performance with the BN classifier algorithm. For instance, in Model CM.A, the accuracies of the SVM (0.889) and DT (0.882) algorithms showed significant differences in relation to that of BN (0.873). As this difference is greater, a plus sign (+) was added. Regarding the specificity of this CM.A, there was a significant difference for the SVM (0.616) and DT (0.681) in relation to BN (0.719). However, in this case, the value was lower (-).

It should be highlighted that for each CM, the tests were conducted with an identical model (same features) to apply the three classifier algorithms. Thus, the t test could be used to compare their performances. However, for the Summarized Models (SMs), the Wrapper method has a classifier dependency and it can select different features for each classifier technique, becoming impossible to compare means between these classifiers.

Although this statistical comparison could not be made, the accuracies of all the SMs are greater than or at least equal to those of the CMs. In other words, the feature selection stage, in addition to significantly reducing the number of features, also resulted in greater accuracy in all the models. However, regarding the specificity of the model, improvements were only seen in the models with balanced classes (SM.C and SM.D). With the AUROC, it is not possible to establish a generalization of improvement among the SMs in comparison with the CMs, as each model is unique.

The greatest accuracy achieved by the complete models was 0.890 by the SVM only in CM.B. In the summarized models, the maximum value was also achieved by BN (SM.B), SVM (SM.A and SM.B) and DT (SM.A and SM.B) with this same value (0.890). In other words, with the summarized models, the maximum accuracy was obtained more times.

Although the SVM achieved the highest values for accuracy several times, this algorithm was disappointing in assessments with the AUROC metric, with much lower values in all the models, including the summarized models. Furthermore, as expected, the specificity of the models, complete and summarized, was greater in those with balanced classes.

In general, SM.D had the best accuracy for the SVM technique, with a value of 0.952. Regarding the performance of the AUROC metric, CM.A for the BN technique had the best result, with a value of 0.931.

6. Conclusions

Addressing the application of improved and sophisticated tools to increasingly complex problems, this work achieved its goal, as it adopted an analysis methodology that incorporated various innovative ML techniques to obtain a predictive credit scoring model to minimize losses for banking institutions.

In addition to the differential in the use of these techniques, in this work, an alternative way from those usually employed to classify clients as “defaulters” or “non-defaulters” was presented. In other words, a “default index” was used instead of only checking for overdue operations. Another differential lay in defining the features considered to compose the model, which are not related to the behavior of clients in previous operations so, in this way, new clients (without a historical data) of the institution can also be classified using the methodology.

With the results obtained through the proposed methodology, it was possible to answer the questions outlined at the beginning of the article: a) All the three methods (BN; SVM and DT) presented similar performances for the credit scoring prediction close to 95% (specificity) as can be observed in Table 3, in other words, these models can correctly classify about 95% of clients as “defaulters” or “non-defaulters”. This result reinforces the main intention of a financial institution when using these classifier algorithms (ML): identify as assertively as possible clients who are prone to being “defaulters”, it is preferable to use a technique with greater specificity; (b) Besides, we can say that for the problem approached here, the class unbalancing affect the performance of the model, as we can verify comparing the CM and SM models in Table 3, i.e., it is important that the classes are balanced in order to get better performance results; (c) The feature selection stage contributes to the credit scoring model, showing what are the main features or in which features the specialists must give special attention. In the approached problem, the features “risk assessment” and “loan restrictions” are occupying the main positions, as shown in Figure 3 . On the other hand, the features “gross annual revenue” and “number of employees” are less important; (d) As for the practical implications of the present study, it becomes fundamental in a critical scenario of instability of Brazilian companies regarding “default”, since in March 2019 the number of debtors grew by 3.3% (Serviço de Proteção ao Crédito, SPC, or Credit Protection Services). In general, the market is slow to act against these high levels of defaulting companies [77,78].

Suggestions for future studies include conducting tests with other classifier algorithms, as Random Forest, XGBoost, and others, based on ensemble method, for example, always with a view to improving their performance as much as possible. Another suggestion is related to the random undersampling to solve the unbalanced data problem, which sometimes causes bias results; so, in this way, it would be interesting implement it more than 10 times using the average, standard deviation of accuracy and specificity as the results.

Indeed, some other metrics for assessment other than those used in this article, such as the F-score, could be used. Another suggestion would be construct a specific model from the stratification of a relevant feature such as “Risk”, i.e., constructing, training and testing a model for each class (Risk = A; B; C; D; E). There is also the possibility of using data from the same banking institution for an analysis involving the opinion of a decision maker, such as the credit manager of the institution in question to employ multiple criteria decision techniques.

Acknowledgements

This study was partially financed by PUCPR and the Coordination for the Improvement of Higher Education Personnel – Brazil (CAPES), and by the National Council for Scientific and Technological Development – Brazil.

References

[1] Capelletto L., Corrar L. Índices de risco sistêmico para o setor bancário. Rev. Contab. Finanças, 19(47):6-18, SE-Artigos, 2008, doi: 10.1590/S1519-70772008000200002.

[2] Amaral Júnior J.B., Távora Júnior J.L. Uma análise do uso de redes neurais para a avaliação do risco de crédito de empresas. Rev. do BNDES, 4:133–180, 2010.

[3] Albuquerque P., Medina F., Silva A. Regressão logística geograficamente ponderada aplicada a modelos de credit scoring. Rev. Contab. Finanças, 28(73):93-112, SE-Artigos, 2017, doi: 10.1590/1808-057x201703760.

[4] Steiner M.T.A., Soma N.Y., Shimizu T., Nievola J.C., Steiner Neto P.J. Abordagem de um problema médico por meio do processo de KDD com ênfase à análise exploratória dos dados. Gestão & Produção, 13:325–337, 2006.

[5] Thomas L.C. A survey of credit and behavioural scoring: forecasting financial risk of lending to consumers. Int. J. Forecast., 16(2):149–172, 2000, doi: https://doi.org/10.1016/S0169-2070(00)00034-0.

[6] Medina R.P., Selva M.L.M. Análisis del credit scoring. Revista de Administração de Empresas, 53:303–315, 2013.

[7] Samejima K., Doya K., Kawato M. Inter-module credit assignment in modular reinforcement learning. Neural Networks, 16(7):985–994, 2003, doi: 10.1016/S0893-6080(02)00235-6.

[8] Doumpos M., Kosmidou K., Baourakis G., Zopounidis C. Credit risk assessment using a multicriteria hierarchical discrimination approach: A comparative analysis. Eur. J. Oper. Res., 138(2):392–412, 2002, doi: https://doi.org/10.1016/S0377-2217(01)00254-5.

[9] Steiner M.T.A., Nievola J.C., Soma N.Y., Shimizu T., Steiner Neto P.J. Extração de regras de classificação a partir de redes neurais para auxílio à tomada de decisão na concessão de crédito bancário. Pesquisa Operacional, 27:407–426, 2007.

[10] Frascaroli B.F., Ramos F.D.S., Paes N.L. A indústria brasileira e o racionamento de crédito: uma análise do comportamento dos bancos sob informações assimétricas. Rev. Econ., 11(2):403–433, 2010.

[11] Brito G.A.S.,Assaf Neto A. Modelo de classificação de risco de crédito de empresas. Revista Contabilidade & Finanças, 19:18–29, 2008.

[12] Luo S., Kong X., Nie T. Spline based survival model for credit risk modeling. Eur. J. Oper. Res., 253(3):869–879, 2016, doi: https://doi.org/10.1016/j.ejor.2016.02.050.

[13] Loterman G., Brown I., Martens D., Mues C., Baesens B. Benchmarking regression algorithms for loss given default modeling. Int. J. Forecast., 28(1):161–170, 2012, doi: https://doi.org/10.1016/j.ijforecast.2011.01.006.

[14] Brown I., Mues C. An experimental comparison of classification algorithms for imbalanced credit scoring data sets. Expert Syst. Appl., 39(3):3446–3453, 2012, doi: https://doi.org/10.1016/j.eswa.2011.09.033.

[15] Wang J., Hedar A.-R., Wang S., Ma J. Rough set and scatter search metaheuristic based feature selection for credit scoring. Expert Syst. Appl., 39(6):6123–6128, 2012, doi: https://doi.org/10.1016/j.eswa.2011.11.011.

[16] Hens A.B., Tiwari M.K. Computational time reduction for credit scoring: An integrated approach based on support vector machine and stratified sampling method. Expert Syst. Appl., 39(8):6774–6781, 2012, doi: https://doi.org/10.1016/j.eswa.2011.12.057.

[17] Marqués A.I., García V., Sánchez J.S. Exploring the behaviour of base classifiers in credit scoring ensembles. Expert Syst. Appl., 39(11):10244–10250, 2012, doi: https://doi.org/10.1016/j.eswa.2012.02.092.

[18] Akkoç S. An empirical comparison of conventional techniques, neural networks and the three stage hybrid Adaptive Neuro Fuzzy Inference System (ANFIS) model for credit scoring analysis: The case of Turkish credit card data. Eur. J. Oper. Res., 222(1):168–178, 2012, doi: https://doi.org/10.1016/j.ejor.2012.04.009.

[19] Kao L.-J., Chiu C.-C., Chiu F.-Y. A Bayesian latent variable model with classification and regression tree approach for behavior and credit scoring. Knowledge-Based Syst., 36:245–252, 2012, doi: https://doi.org/10.1016/j.knosys.2012.07.004.

[20] Tong E.N.C., Mues C., Thomas L.C. Mixture cure models in credit scoring: If and when borrowers default. Eur. J. Oper. Res., 218(1):132–139, 2012, doi: https://doi.org/10.1016/j.ejor.2011.10.007.

[21] García V., Marqués A.I., Sánchez J.S. On the use of data filtering techniques for credit risk prediction with instance-based models, Expert Syst. Appl., 39(18):13267–13276, 2012, doi: https://doi.org/10.1016/j.eswa.2012.05.075.

[22] Li J., Wei H., Hao W. Weight-selected attribute bagging for credit scoring. Math. Probl. Eng., 2013:379690, 2013, doi: 10.1155/2013/379690.

[23] Nikolic N., Zarkic-Joksimovic N., Stojanovski D., Joksimovic I. The application of brute force logistic regression to corporate credit scoring models: Evidence from Serbian financial statements. Expert Syst. Appl., 40(15):5932–5944, 2013, doi: https://doi.org/10.1016/j.eswa.2013.05.022.

[24] Marqués A.I., García V., Sánchez J.S. On the suitability of resampling techniques for the class imbalance problem in credit scoring. J. Oper. Res. Soc., 64(7):1060–1070, 2013, doi: 10.1057/jors.2012.120.

[25] Zhu X., Li J., Wu D., Wang H., Liang C. Balancing accuracy, complexity and interpretability in consumer credit decision making: A C-TOPSIS classification approach. Knowledge-Based Syst., 52:258–267, 2013, doi: https://doi.org/10.1016/j.knosys.2013.08.004.

[26] Blanco A., Pino-Mejías R., Lara J., Rayo S. Credit scoring models for the microfinance industry using neural networks: Evidence from Peru. Expert Syst. Appl., 40(1):356–364, 2013, doi: https://doi.org/10.1016/j.eswa.2012.07.051.

[27] Cubiles-De-La-Vega M.-D., Blanco-Oliver A., Pino-Mejías R., Lara-Rubio J. Improving the management of microfinance institutions by using credit scoring models based on Statistical Learning techniques. Expert Syst. Appl., 40(17):6910–6917, 2013, doi: https://doi.org/10.1016/j.eswa.2013.06.031.

[28] Oreski S., Oreski G. Genetic algorithm-based heuristic for feature selection in credit risk assessment. Expert Syst. Appl., 41(4 Part 2):2052–2064, 2014, doi: https://doi.org/10.1016/j.eswa.2013.09.004.

[29] Chih-Fong T., Chihli H. Modeling credit scoring using neural network ensembles. Kybernetes, 43(7):1114–1123, 2014, doi: 10.1108/K-01-2014-0016.

[30] Niklis D., Doumpos M., Zopounidis C. Combining market and accounting-based models for credit scoring using a classification scheme based on support vector machines. Appl. Math. Comput., 234:69–81, 2014, doi: https://doi.org/10.1016/j.amc.2014.02.028.

[31] Tong G., Li S. Construction and application research of isomap-RVM credit assessment model. Math. Probl. Eng., 2015:197258, 2015, doi: 10.1155/2015/197258.

[32] Yi B., Zhu J. Credit scoring with an improved fuzzy support vector machine based on grey incidence analysis. In 2015 IEEE International Conference on Grey Systems and Intelligent Services (GSIS), pp. 173–178, 2015, doi: 10.1109/GSIS.2015.7301850.

[33] Bravo C., Thomas L.C., Weber R. Improving credit scoring by differentiating defaulter behaviour. J. Oper. Res. Soc., 66(5):771–781, 2015, doi: 10.1057/jors.2014.50.

[34] Koutanaei F.N., Sajedi H., Khanbabaei M. A hybrid data mining model of feature selection algorithms and ensemble learning classifiers for credit scoring. J. Retail. Consum. Serv., 27:11–23, 2015, doi: https://doi.org/10.1016/j.jretconser.2015.07.003.

[35] Harris T. Credit scoring using the clustered support vector machine. Expert Syst. Appl., 42(2):741–750, 2015, doi: https://doi.org/10.1016/j.eswa.2014.08.029.

[36] Danenas P., Garsva G. Selection of Support Vector Machines based classifiers for credit risk domain. Expert Syst. Appl., 42(6):3194–3204, 2015, doi: https://doi.org/10.1016/j.eswa.2014.12.001.

[37] Zhao Z., Xu S., Kang B.H., Kabir M.M.J., Liu Y., Wasinger R. Investigation and improvement of multi-layer perceptron neural networks for credit scoring, Expert Syst. Appl., 42, no. 7, pp. 3508–3516, 2015, doi: https://doi.org/10.1016/j.eswa.2014.12.006.

[38] Silva C., Vasconcelos G., Barros H., França G. Case-based reasoning combined with neural networks for credit risk analysis. In 2015 International Joint Conference on Neural Networks (IJCNN), 1–8, 2015, doi: 10.1109/IJCNN.2015.7280738.

[39] Mohammadali A., Farzaneh A., Rassoul N. Customer credit scoring using a hybrid data mining approach. Kybernetes, 45(10):1576–1588, 2016, doi: 10.1108/K-09-2015-0228.

[40] Zakirov D., Bondarev A., Momtselidze N. A comparison of data mining techniques in evaluating retail credit scoring using R programming. In 2015 Twelve International Conference on Electronics Computer and Computation (ICECCO), pp. 1–4, 2015, doi: 10.1109/ICECCO.2015.7416867.

[41] Ozturk H., Namli E., Erdal H.I. Modelling sovereign credit ratings: The accuracy of models in a heterogeneous sample. Econ. Model., 54:469–478, 2016, doi: https://doi.org/10.1016/j.econmod.2016.01.012.

[42] Abdou H.A., Tsafack M.D.D., Ntim C.G., Baker R.D. Predicting creditworthiness in retail banking with limited scoring data. Knowledge-Based Syst., 103:89–103, 2016, doi: https://doi.org/10.1016/j.knosys.2016.03.023.

[43] Punniyamoorthy M., Sridevi P. Identification of a standard AI based technique for credit risk analysis. Benchmarking An Int. J., 23(5):1381–1390, 2016, doi: 10.1108/BIJ-09-2014-0094.

[44] Ala’raj M., Abbod M.F. Classifiers consensus system approach for credit scoring. Knowledge-Based Syst., 104:89–105, 2016, doi: https://doi.org/10.1016/j.knosys.2016.04.013.

[45] Andric K., Kalpic D. The effect of class distribution on classification algorithms in credit risk assessment. In 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics, MIPRO 2016 - Proceedings, pp. 1241–1247, 2016, doi: 10.1109/MIPRO.2016.7522329.

[46] Li Z. A new method of credit risk assessment of commercial banks. In 2016 International Conference on Robots & Intelligent System (ICRIS), pp. 34–37, 2016, doi: 10.1109/ICRIS.2016.7.

[47] Guo Y., Dong C. A novel intelligent credit scoring method using MOPSO. In 2017 29th Chinese Control And Decision Conference (CCDC), pp. 6584–6588, 2017, doi: 10.1109/CCDC.2017.7978359.

[48] Luo C., Wu D., Wu D. A deep learning approach for credit scoring using credit default swaps. Eng. Appl. Artif. Intell., 65:465–470, 2017, doi: https://doi.org/10.1016/j.engappai.2016.12.002.

[49] Bequé A., Lessmann S. Extreme learning machines for credit scoring: An empirical evaluation. Expert Syst. Appl., 86:42–53, 2017, doi: https://doi.org/10.1016/j.eswa.2017.05.050.

[50] Lanzarini L.C., Monte A.V., Bariviera A.F., Santana P.J. Simplifying credit scoring rules using LVQ + PSO. Kybernetes, 46(1):8–16, 2017, doi: 10.1108/K-06-2016-0158.

[51] Maldonado S., Pérez J., Bravo C. Cost-based feature selection for Support Vector Machines: An application in credit scoring. Eur. J. Oper. Res., 261(2):656–665, 2017, doi: https://doi.org/10.1016/j.ejor.2017.02.037.

[52] Assef F., Steiner M.T., Neto P.J.S., Franco D.G.d.B. Classification algorithms in financial application: credit risk analysis on legal entities. IEEE Lat. Am. Trans., 17(10):1733–1740, 2019, doi: 10.1109/TLA.2019.8986452.

[53] Chawla N., Japkowicz N., Kołcz A. Editorial: Special issue on learning from imbalanced data sets. SIGKDD Explor., 6:1–6, 2004, doi: 10.1145/1007730.1007733.

[54] Chawla N.V. Data mining for imbalanced datasets: An overview. In Data Mining and Knowledge Discovery Handbook, Springer-Verlag, pp. 853–867, 2005.

[55] HoxJ.J., Moerbeek M., Van de Schoot R. Multilevel analysis: Techniques and applications. Newbury Park: Sage Publications LTD, 2nd ed., 2017.

[56] Araújo E.A., Carmona C.U.D.M. Desenvolvimento de modelos credit scoring com abordagem de regressão de logística para a gestão da inadimplência de uma instituição de microcrédito. Contab. Vista Rev., 18(3):107–131, 2007.

[57] Fenerich A.T., Steiner M.T.A., Nievola J.C., Mendes K.B., Tsutsumi D.P., dos Santos B.S. Diagnosis of headaches types using artificial neural networks and bayesian networks. IEEE Lat. Am. Trans., 18(1):59–66, 2020, doi: 10.1109/TLA.2020.9049462.

[58] Guyon I., Elisseeff A. An introduction to variable and feature selection. J. Mach. Learn. Res., 3:1157–1182, 2003.

[59] Chandrashekar G., Sahin F. A survey on feature selection methods. Comput. Electr. Eng., 40(1):16–28, 2014, doi: https://doi.org/10.1016/j.compeleceng.2013.11.024.

[60] Kohavi R., John G.H. Wrappers for feature subset selection. Artif. Intell., 97(1):273–324, 1997, doi: https://doi.org/10.1016/S0004-3702(97)00043-X.

[61] Russel S.J., Norvig P., Artificial intelligence: A modern approach. Englewood, Prentice Hall, 2003.

[62] Alpaydin E. Introduction to machine learning. Cambridge: MIT Press, 3rd ed., 2014.

[63] Cooper G.F., Herskovits E. A Bayesian method for the induction of probabilistic networks from data. Mach. Learn., 9(4):309–347, 1992, doi: 10.1007/BF00994110.

[64] Breiman L. Random forests. Mach. Learn., 45:5–32, 2001, doi: 10.1007/9781441993267_5.

[65] Keerthi S.S., Shevade S.K., Bhattacharyya C., Murthy K.R.K. Improvements to platt’s SMO algorithm for SVM classifier design. Neural Comput., 13(3):637–649, 2001, doi: 10.1162/089976601300014493.

[66] Friedman N., Geiger D., Goldszmidt M. Bayesian network classifiers. Mach. Learn., 29(2):131–163, 1997, doi: 10.1023/A:1007465528199.

[67] Koller D., Friedman N. Probabilistic graphical models: principles and techniques. Cambridge: MIT Press, 2009.

[68] Breiman L., Friedman J., Stone C.J., Olshen R.A. Classification and regression trees. Taylor & Francis, 1984.

[69] Dean J. Big data, data mining and machine learning. Hoboken, NJ, USA, John Wiley & Sons, Inc., 2014.

[70] Vapnik V., Kotz S. Estimation of dependences based on empirical data. New York: Springer-Verlag, 1982.

[71] Cano G. et al. Predicción de solubilidad de fármacos usando máquinas de soporte vectorial sobre unidades de procesamiento gráfico. Rev. Int. Métodos Numéricos para Cálculo y Diseño en Ing., 33(1):97–102, 2017, doi: https://doi.org/10.1016/j.rimni.2015.12.001.

[72] Carrizosa E., Martín-Barragán B., Romero Morales D. A nested heuristic for parameter tuning in Support Vector Machines. Comput. Oper. Res., 43:328–334, 2014, doi: https://doi.org/10.1016/j.cor.2013.10.002.

[73] Bekkar M., Djema H., Alitouche T.A. Evaluation measures for models assessment over imbalanced data sets. J. Inf. Eng. Appl., 3:27–38, 2013.

[74] Fawcett T. An introduction to ROC analysis. Pattern Recognit. Lett., 27(8):861–874, 2006, doi: https://doi.org/10.1016/j.patrec.2005.10.010.

[75] Bradley A.P. The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recognit., 30(7):1145–1159, 1997, doi: https://doi.org/10.1016/S0031-3203(96)00142-2.

[76] Bouckaert R. Bayesian network classifiers in weka for version 3-5-7. The University of Waikato, Hamilton, New Zealand, p. 46, 2008.

[77] SPC Brasil. Inadimplência de pessoas jurídicas. SPC Brasil, 2019.

[78] CNDL. Inadimplência das empresas cresce 3,30% em março, a menor alta em 18 meses, apontam CNDL/SPC Brasil, 2019. [Online]. Available: https://site.cndl.org.br/inadimplencia-das-empresas-cresce-330-em-marco-a-menor-alta-em-18-meses-apontam-cndlspc-brasil/. [Accessed: 18-Jan-2020].

Appendix 1

Table A. Feature coding
Features (1) Levels of features (2) Types of coding
I – Categorical (3) II – Binary (4)
(1) Legal Status (1) Limited partnership 1 100000000000
(2) Private company limited by shares 2 010000000000
(3) Individual micro entrepreneur 3 001000000000
(4) Simple partnership 4 000100000000
(5) Individual limited company 5 000010000000
(6) Individual entrepreneur 6 000001000000
(7) Individual firm 7 000000100000
(8) Closed Corporation 8 000000010000
(9) For-profit organization 9 000000001000
(10) Collective partnership 10 000000000100
(11) Civil association 11 000000000010
(12) State authority 12 000000000001
(2) Gross Annual Revenue (13) 0 a 536200 1 1000
(14) 536237,04 a 1372514,63 2 0100
(15) 1372791,74 a 3156893,44 3 0010
(16) 3158540,99 a 769665000,00 4 0001
(3) Number of Employees (17) 0 a 1 1 1000
(18) 2 a 4 2 0100
(19) 5 a 11 3 0010
(20) 12 a 5113 4 0001
(4) Company Activity (21) Real estate management 1 1000000000000000000
(22) Hotels 2 0100000000000000000
(23) Industrial machinery 3 0010000000000000000
(24) Production of circuses and similar events 4 0001000000000000000
(25) Public road transport 5 0000100000000000000
(26) Sales of cosmetics, toiletries and hygiene products 6 0000010000000000000
(27) Fair and party organization 7 0000001000000000000
(28) Department stores or shops 8 0000000100000000000
(29) Customs dispatching 9 0000000010000000000
(30) Road fright transport 10 0000000001000000000
(31) Dental products 11 0000000000100000000
(32) Tatto and piercing services 12 0000000000010000000
(33) Debt recovery and registered information 13 0000000000001000000
(34) Retailer of vehicle parts and accessories 14 0000000000000100000
(35) Repair os electric and eletronic equipamento 15 0000000000000010000
(36) Retail Jeweler 16 0000000000000001000
(37) IT Technical support, maintenance and servisse 17 0000000000000000100
(38) Outpatient medical services 18 0000000000000000010
(39) Footwear retailer 19 0000000000000000001
(5) Incorporation Data (40) 15/02/1939 a 01/06/1997 1 1000
(41) 03/06/1997 a 19/02/2004 2 0100
(42) 20/02/2004 a 19/02/2009 3 0010
(43) 26/02/2009 a 02/12/2016 4 0001
(6) Time as Client (44) 23/06/1975 a 29/10/2003 1 1000
(45) 30/10/2003 a 26/02/2008 2 0100
(46) 27/02/2008 a 15/06/2011 3 0010
(47) 16/06/2011 a 05/12/2016 4 0001
(7) Market Sector (48) Small Company 1 1000000
(49) Company 2 0100000
(50) Micro Business 3 0010000
(51) Middle-level business 4 0001000
(52) Company (unclassifiable) 5 0000100
(53) Corporate 6 0000010
(54) State 7 0000001
(8) Risk Assessment (55) A 1 10000
(56) B 2 01000
(57) C 3 00100
(58) D 4 00010
(59) E 5 00001
(9) Borrower’s Credit Limit (hierarchical decision level) (60) Level 1 1 100000000000
(61) Level 2 2 010000000000
(62) Level 3 3 001000000000
(63) Level 4 4 000100000000
(64) Level 5 5 000010000000
(65) Level 6 6 000001000000
(66) Level 7 7 000000100000
(67) Level 8 8 000000010000
(68) Level 9 9 000000001000
(69) Level 10 10 000000000100
(70) Level 11 11 000000000010
(71) Level 12 12 000000000001
(10) Loan Restrictions (72) Impeditive restriction 1 100
(73) No restriction 2 010
(74) Weak restriction/information 3 001


Back to Top

Document information

Published on 03/09/20
Accepted on 21/08/20
Submitted on 11/05/20

Volume 36, Issue 3, 2020
DOI: 10.23967/j.rimni.2020.08.003
Licence: CC BY-NC-SA license

Document Score

0

Views 1238
Recommendations 0

Share this document