SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
39
PROFICIENCY COMPARISON OFLADTREE
AND REPTREE CLASSIFIERS FOR CREDIT
RISK FORECAST
Lakshmi Devasena C
Dept. of Operations & Systems, ISB Hyderabad, IFHE University
Abstract
Predicting the Credit Defaulter is a perilous task of Financial Industries like Banks. Ascertainingnon-
payer before giving loan is a significant and conflict-ridden task of the Banker. Classification techniques
are the better choice for predictive analysis like finding the claimant, whether he/she is an unpretentious
customer or a cheat. Defining the outstanding classifier is a risky assignment for any industrialist like a
banker. This allow computer science researchers to drill down efficient research works through eval-
uating different classifiers and finding out the best classifier for such predictive problems. This research
work investigates the productivity of LADTree Classifier and REPTree Classifier for the credit risk predic-
tion and compares their fitness through various measures. German credit dataset has been taken and used
to predict the credit risk with a help of open source machine learning tool.
Key words
Credit Risk Forecast, LAD Tree Classifier, Proficiency Comparison, REP Tree Classifier.
1.INTRODUCTION
The enormous volume of transactions made information processing automation an invigorating
factor for high quality standards, cost reduction, with high speed results. Data analysis automation
and result of the relevant successes produced by state-of-the art computer algorithms have
changed the opinions of many misanthropists. In the past, people thought that financial market
analysis necessitates intuition, knowledge and experience and speculated how this job could be
automated. Conversely, growth of scientific and technological advances, achieved the automation
of financial market analysis. In recent days, credit defaulter prediction and credit risk evaluation
have fascinated great deal of interests from regulators, practitioners, and theorists, in the financial
industry. Since, the credit score of an applicant could be calculated from the past giant database
and the demographic data, it needs automation. Automation of credit risk forecastcan be achieved
using classification techniques. Selecting the classifier, which envisages credit risk in an efficient
manner, is an imperative and critical task. This research work appraises the credit risk
performance of two diverse classifiers, namely, REP Tree Classifier and LAD Tree Classifier and
compares their accuracyofcredit risk prediction.
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
40
2.LITERATURE REVIEW
There are many research works made to predict credit risk using wide-ranging computing
techniques. In [1], a neural network based algorithm for automatic provisioning to credit risk
scrutiny in a real world problem is presented. An assimilated back propagation neural network
(BPNN) with the customary discriminant analysis approach used to discover the performance of
credit scoring is given in [2]. A comparative study of corporate credit rating analysis using back
propagation neural network (BPNN) and support vector machines (SVM) is described in [3]. An
uncorrelated maximization algorithm within a triple-phase neural network ensemble technique for
credit risk evaluation to differentiate good creditors from bad ones are elucidated in [4]. An
application of artificial neural network to credit risk assessment using two altered architectures
are deliberated in [5]. Credit risk investigation using diverse Data Mining models like C4.5, NN,
BP, RIPPER, LR and SMO islikened in [6]. The credit risk of a Tunisian bank through modeling
the non-payment risk of its commercial loans is analyzed in [7]. Credit risk valuation using six
stage neural network ensemble learning approach is argued in [8]. A modeling framework for
credit calculation models is erected using different modeling procedures is explained and its
performance is analyzed in [9]. Hybrid method for assessing credit risk using Kolmogorove-
Smirnov test, Fuzzy Expert system and DEMATEL method is enlightened in [10]. An Artificial
Neural Network centeredmethodology for Credit Risk supervision is proposed in [11]. Artificial
neural networks using Feed-forward back propagation neural network and business rules to
correctly determine credit defaulter is proposed in [12]. The performance comparison of Memory
based classifiers for credit risk investigation is experimented and précised in [13]. The
performance comparison between Instance Based and K Star Classifiers for Credit Risk
Inspection is accomplished and pronounced in [14]. The performance comparison among
Sequential Minimal Optimization and Logistic Classifiers for Credit Risk Calculation is specified
in [15]. The performance comparisonbetween Multilayer Perceptron and SMO Classifier for
Credit Risk appraisal is described in [16]. The performance comparison between JRip and PART
Classifier for Credit Risk Estimation is explored in [17]. Tree based classifiers are easier to
interpret and explain. That’s the reason; this research work randomly taken LAD Tree classifier
and REP Tree Classifier which are used in various optimization literatures [23] for efficiency
comparison. LAD Tree and REP Tree Classifiers have already used in various domain of problem
like Forensic Mining [24], Intrusion Detection system [25] and [36], Non-spatial Data
Classification [26], Classification for Bank Direct Marketing [27], Global land cover
classification [28], Medical Data Classification [29], [30] and [34] , Automatic classification of
active objects from large categories [31], Micro array dataset classification and analysis [32],
Classification of Strom type from weather radar reflectivity [33], Identification of Link Spam in
Web search Engines [35], etc.
3.DATASET USED
The German credit data [18] is used to evaluate the performance of Logistic classifier and Partial
Decision Tree Classifier for credit risk prediction. This data setcontains 20 attributes, namely,
Duration, Credit History, Checking Status, Purpose, Credit Amount, Employment, Installment
Commitment, Saving Status, Personal Status, Other parties, Property magnitude, Age, resident
since, Other payment plans, existing credits, job, Housing, No. of dependents, Foreign worker
and Own Phone. The data set comprises 1000 instances of client credit data with class detail. It
discriminates the records into two classes, namely, good and bad.
4.METHODOLOGY USED
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
41
In this research work, two diversetree based classifiers namely, LAD Tree Classifierand REP
Tree Classifier are compared for proficiencyassessment of credit risk estimation.
4.1.LAD Tree Classifier
LAD Tree builds a classifier for binary target variable based on learning a logical expression that
can discriminate between positive and negative samples in a data set. The construction of LAD
model for a given data set typically involves the generation of large set patterns and the selection
of a subset of them that satisfies the above assumption that a binary point covered by some
positive patterns, but not covered by any negative pattern is positive, and similarly, a binary point
covered by some negative patterns, but not covered by positive pattern is negative, such that each
pattern in the model satisfies certain requirements in terms of prevalence and homogeneity[23].
LAD Tree Classifier generates a multi-class alternating decision tree using the Logit Boost
strategy. The LAD Tree algorithm applies logistic boosting algorithm in order to induce an
alternating decision tree. In this algorithm, a single attribute test is chosen as a splitter node for
the tree at each iteration. For each training instance, working response and weights are calculated
and stored on a per-class basis. Then, it fits the working response to the mean value of the
instances, in a particular subset, by minimizing the least-squares value between them. IN this
algorithm, trees for the different classes are grown in parallel. Once all the trees have been
constructed, then it merges the trees into a final model. Advantage of this classifier is the size of
the tree cannot outgrow the combined size of the individual trees [19].
4.2.REP Tree Classifier
Reduces Error Pruning (REP) Tree Classifier is a fast decision tree learning algorithm and is
based on the principle of computing the information gain with entropy and minimizing the error
arising from variance [20]. This algorithm is first recommended in [21]. REP Tree applies
regression tree logic and generates multiple trees in altered iterations. Afterwards it picks best one
from all spawned trees. This algorithm constructs the regression/decision tree using variance and
information gain. Also, this algorithm prunes the tree using reduced-error pruning with back
fitting method. At the beginning of the model preparation, it sorts the values of numeric attributes
once. As in C4.5 Algorithm, this algorithm also deals the missing values by splitting the
corresponding instances into pieces.[22].
5.PERFORMANCE MEASURES USED
Variousscales are used to gauge the performance of the classifiers.
Classification Accuracy
Any classifier could have an error rate and it may fail to categorize correctly. Classification
accuracy is calculated as Correctly classified instances divided by Total number of instances
multiplied by 100.
Mean Absolute Error
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
42
Mean absolute error is the average of the variance between predicted and actual value in all test
cases. It is a good measure to gauge the performance.
Root Mean Square Error
Root mean squared error is used to scaledissimilarities between values actually perceived and the
values predicted by the model. It is determined by taking the square root of the mean square error.
Confusion Matrix
A confusion matrix encompasses information about actual and predicted groupings done by a
classification system.
6.RESULTS AND DISCUSSION
Open source machine learning tool is used to experiment the performance of LAD Tree and REP
Tree Classifiers. The performance is tested out using the Training set as well as using different
Cross Validation methods. The class is arrived by considering all 20 attributes of the dataset.
6.1.Performance of LAD Tree Classifier
The overall assessment summary of LAD Tree Classifier using training set and different cross
validation methods is given in Table I. The performance of LAD Tree Classifier in terms of
Correctly Classified Instances and Classification Accuracy is shown in Fig. 1and Fig. 2. The
confusion matrix for different test mode is given in Table II to Table VI. LAD Tree Classifier
gives 76.1% accuracy for the training data set. Various cross validation methods are used to
check its actual performance. On an average, it gives around 70.7% of accuracy for credit risk
estimation.
TABLE I
LAD TREE CLASSIFIER OVERALL EVALUATION SUMMARY
Test Mode Correctly
Classified
Instances
Incorrectly
Classified
Instances
Accuracy Mean
Absolute
Error
Root Mean
Squared
Error
Time Taken
to Build
Model (Sec)
Training Set 761 239 76.1% 0.3236 0.3953 2.64
5 Fold CV 702 298 70.2% 0.3547 0.437 2.07
10 Fold CV 708 292 70.8% 0.3494 0.4326 1.92
15 Fold CV 715 285 71.5% 0.3545 0.4351 2.67
20 Fold CV 704 296 70.4% 0.3559 0.437 1.43
TABLE II
CONFUSION MATRIX –LAD TREE CLASSIFIER (ON TRAINING DATASET)
Good Bad Actual (Total)
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
43
Good 655 45 700
Bad 194 106 300
Predicted (Total) 849 151 1000
TABLE III
CONFUSION MATRIX – LAD TREE CLASSIFIER (5 FOLD CROSS VALIDATION)
Good Bad Actual (Total)
Good 585 115 700
Bad 183 117 300
Predicted (Total) 768 232 1000
TABLE IV
CONFUSION MATRIX – LAD TREE CLASSIFIER (10 FOLD CROSS VALIDATION)
Good Bad Actual (Total)
Good 597 103 700
Bad 189 111 300
Predicted (Total) 786 214 1000
TABLE V
CONFUSION MATRIX – LAD TREE CLASSIFIER (15 FOLD CROSS VALIDATION)
Good Bad Actual (Total)
Good 614 86 700
Bad 199 101 300
Predicted (Total) 813 187 1000
TABLE VI
CONFUSION MATRIX –LAD TREE CLASSIFIER (20 FOLD CROSS VALIDATION)
Good Bad Actual (Total)
Good 594 106 700
Bad 190 110 300
Predicted (Total) 784 216 1000
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
44
Fig. 1 Correctly Classified instances of LAD Tree Classifier
Fig. 2 Classification Accuracy of LAD Tree Classifier
6.2.Performance of REP Tree Classifier
The overall assessment summary of REP Tree Classifier using training set and different cross
validation methods is given in Table VII. The performance of REP Tree Classifier in terms of
Correctly Classified Instances and Classification Accuracy is shown in Fig. 3and Fig. 4. The
confusion matrix for different test mode is given in Table VIII to Table XII. REP Tree Classifier
gives 80% accuracy for the training data set. Various cross validation methods are used to check
its actual performance. On an average, it gives around 71.9% of accuracy for credit risk
estimation.
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
45
TABLE VIII
REP TREE CLASSIFIER COMPLETE EVALUATION SUMMARY
Test Mode Correctly
Classified
Instances
Incorrectly
Classified
Instances
Accuracy Mean
absolute
error
Root Mean
Squared
Error
Time Taken
to Build
Model (Sec)
Training
Set
800 200 80% 0.2905 0.3811 0.32
5 Fold CV 717 283 71.7% 0.3458 0.4437 0.78
10 Fold CV 718 282 71.8% 0.3417 0.4424 1.33
15 Fold CV 726 274 72.6% 0.3422 0.4382 0.16
20 Fold CV 719 281 71.9% 0.3368 0.4364 0.11
TABLE VIII
CONFUSION MATRIX – REP TREE CLASSIFIER (ON TRAINING DATASET)
Good Bad Actual (Total)
Good 649 51 700
Bad 149 151 300
Predicted (Total) 798 202 1000
TABLE IX
CONFUSION MATRIX – REP TREE CLASSIFIER (5 FOLD CROSS VALIDATION)
Good Bad Actual (Total)
Good 616 84 700
Bad 199 101 300
Predicted (Total) 815 185 1000
TABLE X
CONFUSION MATRIX – REP TREE CLASSIFIER (10 FOLD CROSS VALIDATION)
Good Bad Actual (Total)
Good 601 99 700
Bad 183 117 300
Predicted (Total) 784 216 1000
TABLE XI
CONFUSION MATRIX – REP TREE CLASSIFIER (15 FOLD CROSS VALIDATION)
Good Bad Actual (Total)
Good 612 88 700
Bad 186 114 300
Predicted (Total) 798 202 1000
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
46
TABLE XII
CONFUSION MATRIX – REP TREE CLASSIFIER (20 FOLD CROSS VALIDATION)
Good Bad Actual (Total)
Good 605 95 700
Bad 151 149 300
Predicted (Total) 756 244 1000
Fig. 3 Correctly Classified instances of REP Tree Classifier
Fig. 4 Classification Accuracy of REP Tree Classifier
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
47
6.3Comparison of LAD Tree Classifier and REP Tree Classifier
The comparison of performance between LAD Tree Classifier and REP Tree Classifier is
depicted in Fig 5, and Fig. 6 in terms of Correctly Classified Instances and Classification
Accuracy. The complete ranking is prepared based on correctly classified instances, classification
accuracy, MAE and RMSE values and other statistics found using Training Set result and Cross
Validation Techniques. Consequently, it is perceived that REP Tree classifier performs better
than LAD Tree Classifier.
Fig. 5 Correctly Classified Instances Comparison between LAD Tree Classifier and REP Tree Classifier
Fig. 6Classification Accuracy Comparison between LAD Tree Classifier and REP Tree Classifier
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
48
7.CONCLUSION
This work investigated the efficiency of two different classifiers namely, LAD Tree Classifier
andREP Tree Classifier for credit risk prediction. Testing is accomplished using the open source
machine learning tool. Also, effectiveness comparison of both the classifiers has been done in
view of different scales of performance evaluation. At last, it is observed that REP Tree Classifier
performs better than LAD Tree Classifier for credit risk prediction by taking various measures
including Classification accuracy and Time taken to build the model.
ACKNOWLEDGMENT
The author expresses her deep gratitude to the Management of IBS Hyderabad, IFHE University
and Operations & IT Department of IBS Hyderabad for constant support and motivation.
REFERENCES
[1] Germano C. Vasconcelos, Paulo J. L. Adeodato and Domingos S. M. P. Monteiro, “A Neural
Network Based Solution for the Credit Risk Assessment Problem,” Proceedings of the IV Brazilian
Conference on Neural Networks - IV CongressoBrasileiro de RedesNeurais pp. 269-274, July 20-22,
1999.
[2] Tian-Shyug Lee, Chih-Chou Chiu, Chi-Jie Lu and I-Fei Chen, “Credit scoring using the hybrid neural
discriminant technique,” Expert Systems with Applications (Elsevier) 23, pp. 245–254, 2002.
[3] Zan Huang, Hsinchun Chena, Chia-Jung Hsu, Wun-Hwa Chen and Soushan Wu, “Credit rating
analysis with support vector machines and neural networks: a market comparative study,” Decision
Support Systems (Elsevier) 37, pp. 543– 558, 2004.
[4] Kin Keung Lai, Lean Yu, Shouyang Wang, and Ligang Zhou, “Credit Risk Analysis Using a
Reliability-Based Neural Network Ensemble Model,” S. Kollias et al. (Eds.): ICANN 2006, Part II,
Springer LNCS 4132, pp. 682 – 690, 2006.
[5] Eliana Angelini, Giacomo di Tollo, and Andrea Roli “A Neural Network Approach for Credit Risk
Evaluation,” Kluwer Academic Publishers, pp. 1 – 22, 2006.
[6] S. Kotsiantis, “Credit risk analysis using a hybrid data mining model,” Int. J. Intelligent Systems
Technologies and Applications, Vol. 2, No. 4, pp. 345 – 356, 2007.
[7] HamadiMatoussi and Aida Krichene, “Credit risk assessment using Multilayer Neural Network
Models - Case of a Tunisian bank,” 2007.
[8] Lean Yu, Shouyang Wang, Kin Keung Lai, “Credit risk assessment with a multistage neural network
ensemble learning approach”, Expert Systems with Applications (Elsevier) 34, pp.1434–1444, 2008.
[9] ArnarIngiEinarsson, “Credit Risk Modeling”, Ph.D Thesis, Technical University of Denmark, 2008.
[10] SanazPourdarab, Ahmad Nadali and Hamid EslamiNosratabadi, “A Hybrid Method for Credit Risk
Assessment of Bank Customers,” International Journal of Trade, Economics and Finance, Vol. 2, No.
2, April 2011.
[11] Vincenzo Pacelli and Michele Azzollini, “An Artificial Neural Network Approach for Credit Risk
Management”, Journal of Intelligent Learning Systems and Applications, 3, pp. 103-112, 2011.
[12] A.R.Ghatge and P.P.Halkarnikar, “Ensemble Neural Network Strategy for Predicting Credit Default
Evaluation” International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue
7, January 2013 pp. 223 – 225.
[13] Lakshmi Devasena, C., “Adeptness Evaluation of Memory Based Classifiers for Credit Risk
Analysis,” Proc. of International Conference on Intelligent Computing Applications - ICICA 2014,
978-1-4799-3966-4/14 (IEEE Explore), 6-7 March 2014, pp. 143-147, 2014.
[14] Lakshmi Devasena, C., “Adeptness Comparison between Instance Based and K Star Classifiers for
Credit Risk Scrutiny,” International Journal of Innovative Research in Computer and Communication
Engineering, Vol.2, Special Issue 1, March 2014.
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
49
[15] Lakshmi Devasena, C., “Effectiveness Assessment between Sequential Minimal Optimization and
Logistic Classifiers for Credit Risk Prediction,” International Journal of Application or Innovation in
Engineering & Management, Volume3, Issue 4, April 2014.
[16] Lakshmi Devasena, C., “Efficiency Comparison of Multilayer Perceptron and SMO Classifier for
Credit Risk Prediction,” International Journal of Advanced Research in Computer and
Communication Engineering, Vol. 3, Issue 4, 2014.
[17] Lakshmi Devasena, C. “Competency Assessment between JRip and Partial Decision Tree Classifiers
for Credit Risk Estimation”, International Journal of Advanced Research in Computer Science and
Software Engineering, Vol. 4 (5), May – 2014, pp. 164-173.
[18] UCI Machine Learning Data Repository – http://archive.ics.uci.edu/ml/datasets.
[19] Geoffrey Holmes, Bernhard Pfahringer, Richard Kirkby, Eibe Frank and Mark Hall. “Multiclass
Alternating Decision Trees”, ECML, pp. 161-172, 2001.
[20] Witten IH, Frank E (2005) Data mining: practical machine learning tools and techniques – 2nd ed. the
United States of America, Morgan Kaufmann series in data management systems.
[21] Quinlan J (1987) Simplifying decision trees, International Journal of Man Machine Studies, 27(3), pp.
221–234.
[22] S.K. Jayanthi and S.Sasikala, “REPTree Classifier for indentifying Link Spam in Web Search
Engines”, IJSC, Volume 3, Issue 2, pp. 498 – 505, Jan 2013.
[23] Trilok Chand Sharma and Manoj Jain, “WEKA Approach for Comparative Study of Classification
Algorithm”, International Journal of Advanced Research in Computer and Communication
Engineering,Vol. 2, Issue 4, April 2013, pp 1925 – 1931.
[24] Adesesan B. Adeyemo and OluwafemiOriola, “Personnel Audit Using a Forensic Mining Technique”,
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 6, November 2010, pp 222 –
231.
[25] G. V. Nadiammai and M. Hemalatha, “Performance Analysis of Tree Based Classification
Algorithms for Intrusion Detection System”, Mining Intelligence and Knowledge Exploration,
Lecture Notes in Computer Science Volume 8284, pp 82-89, 2013.
[26] Ashish Kokare, Pradeep Venkatesan, SwapnilTandel, and HemantPalivela, “Survey On Classification
Based Techniques on Non-Spatial Data”, International Journal of Innovative Research in Science,
Engineering and Technology, Volume 3, Special Issue 1, February 2014, pp. 409 – 413.
[27] K. Wisaeng, “A Comparison of Different Classification Techniques for Bank Direct Marketing”,
International Journal of Soft Computing and Engineering (IJSCE), Volume-3, Issue-4, September
2013, pp. 116 – 119.
[28] M. C. Hansen, R. S. Defries, J. R. G. Townshend and R. Sohlberg, “Global land cover classification
at 1 km spatial resolution using a classification tree approach”, Int. j. remote sensing, vol. 21, no. 6 &
7, pp. 1331–1364, 2000.
[29] P. K. Srimani and Manjula Sanjay Koti, “Medical Diagnosis Using Ensemble Classifiers - A Novel
Machine-Learning Approach”, Journal of Advanced Computing, volume 1, pp. 9-27,
doi:10.7726/jac.2013.1002, 2013.
[30] OlaiyaFolorunsho, “Comparative Study of Different Data Mining Techniques Performance in
knowledge Discovery from Medical Database”, International Journal of Advanced Research in
Computer Science and Software Engineering, Volume 3, Issue 3, March 2013, pp. 11 – 15.
[31] Yongheng Zhao and Yanxia Zhang, “Comparison of decision tree methods for finding active
objects”, Advances of Space Research, Aug 2007.
[32] GregorStiglic , Simon Kocbek and Peter Kokol, “Comprehensibility of Classifiers for Future
Microarray Analysis Datasets”, 2000.
[33] David JohnGagne, Amy McGovern and Jerry Brotzge, “Classification of Convective Areas using
Decision Trees”, American Metrological Society, July 2009, pp. 1341 – 1351.
[34] AbuBakrAwad, MahasenMabrouk, and TahanyAwad, “Performance Evaluation of Decision Tree
Classifiers for the Prediction of Response to treatment of Hepatitis C Patients”, Pervasive Health,
May 2014, pp. 186 – 190.
[35] S.K. Jayanthi and S. Sasikala, “REPTree Classifier for Identifying Link Spam in Web Search
Engines”, ICTACT JOURNAL ON SOFT COMPUTING, January 2013, Volume 3, Issue 2, pp. 498
– 505.
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015
50
[36] Jayshri R. Patel, “Performance Evaluation of Decision Tree Classifiers for Ranked Features of
Intrusion Detection”, Journal of Information, Knowledge and Research in Information Technology ,
Nov 12 to Oct 13, Volume 2, Issue 2, pp. 152 – 155, 2013.

Weitere ähnliche Inhalte

Was ist angesagt?

Improving the credit scoring model of microfinance
Improving the credit scoring model of microfinanceImproving the credit scoring model of microfinance
Improving the credit scoring model of microfinanceeSAT Publishing House
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Credit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning AlgorithmsCredit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning Algorithmsankit panigrahy
 
Mining Credit Card Defults
Mining Credit Card DefultsMining Credit Card Defults
Mining Credit Card DefultsKrunal Khatri
 
Default Probability Prediction using Artificial Neural Networks in R Programming
Default Probability Prediction using Artificial Neural Networks in R ProgrammingDefault Probability Prediction using Artificial Neural Networks in R Programming
Default Probability Prediction using Artificial Neural Networks in R ProgrammingVineet Ojha
 
PREDICTING BANKRUPTCY USING MACHINE LEARNING ALGORITHMS
PREDICTING BANKRUPTCY USING MACHINE LEARNING ALGORITHMSPREDICTING BANKRUPTCY USING MACHINE LEARNING ALGORITHMS
PREDICTING BANKRUPTCY USING MACHINE LEARNING ALGORITHMSIJCI JOURNAL
 
Credit card fraud detection using python machine learning
Credit card fraud detection using python machine learningCredit card fraud detection using python machine learning
Credit card fraud detection using python machine learningSandeep Garg
 
INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...
INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...
INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...IJDKP
 
A high level overview of all that is Analytics
A high level overview of all that is AnalyticsA high level overview of all that is Analytics
A high level overview of all that is AnalyticsRamkumar Ravichandran
 
Final Report
Final ReportFinal Report
Final Reportimu409
 
Phase 2 of Predicting Payment default on Vehicle Loan EMI
Phase 2 of Predicting Payment default on Vehicle Loan EMIPhase 2 of Predicting Payment default on Vehicle Loan EMI
Phase 2 of Predicting Payment default on Vehicle Loan EMIVikas Virani
 
The use of genetic algorithm, clustering and feature selection techniques in ...
The use of genetic algorithm, clustering and feature selection techniques in ...The use of genetic algorithm, clustering and feature selection techniques in ...
The use of genetic algorithm, clustering and feature selection techniques in ...IJMIT JOURNAL
 
DATA MINING on WEKA
DATA MINING on WEKADATA MINING on WEKA
DATA MINING on WEKAsatyamkhatri
 
Knowledge discovery claudiad amato
Knowledge discovery claudiad amatoKnowledge discovery claudiad amato
Knowledge discovery claudiad amatoSSSW
 
Applying Classification Technique using DID3 Algorithm to improve Decision Su...
Applying Classification Technique using DID3 Algorithm to improve Decision Su...Applying Classification Technique using DID3 Algorithm to improve Decision Su...
Applying Classification Technique using DID3 Algorithm to improve Decision Su...IJMER
 
Fuzzy Analytic Hierarchy Based DBMS Selection In Turkish National Identity Ca...
Fuzzy Analytic Hierarchy Based DBMS Selection In Turkish National Identity Ca...Fuzzy Analytic Hierarchy Based DBMS Selection In Turkish National Identity Ca...
Fuzzy Analytic Hierarchy Based DBMS Selection In Turkish National Identity Ca...Ferhat Ozgur Catak
 
Benchmarks for Evaluating Anomaly Based Intrusion Detection Solutions
Benchmarks for Evaluating Anomaly Based Intrusion Detection SolutionsBenchmarks for Evaluating Anomaly Based Intrusion Detection Solutions
Benchmarks for Evaluating Anomaly Based Intrusion Detection SolutionsIJNSA Journal
 

Was ist angesagt? (19)

Improving the credit scoring model of microfinance
Improving the credit scoring model of microfinanceImproving the credit scoring model of microfinance
Improving the credit scoring model of microfinance
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Credit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning AlgorithmsCredit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning Algorithms
 
Mining Credit Card Defults
Mining Credit Card DefultsMining Credit Card Defults
Mining Credit Card Defults
 
Default Probability Prediction using Artificial Neural Networks in R Programming
Default Probability Prediction using Artificial Neural Networks in R ProgrammingDefault Probability Prediction using Artificial Neural Networks in R Programming
Default Probability Prediction using Artificial Neural Networks in R Programming
 
PREDICTING BANKRUPTCY USING MACHINE LEARNING ALGORITHMS
PREDICTING BANKRUPTCY USING MACHINE LEARNING ALGORITHMSPREDICTING BANKRUPTCY USING MACHINE LEARNING ALGORITHMS
PREDICTING BANKRUPTCY USING MACHINE LEARNING ALGORITHMS
 
Credit card fraud detection using python machine learning
Credit card fraud detection using python machine learningCredit card fraud detection using python machine learning
Credit card fraud detection using python machine learning
 
INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...
INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...
INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...
 
A high level overview of all that is Analytics
A high level overview of all that is AnalyticsA high level overview of all that is Analytics
A high level overview of all that is Analytics
 
Credit iconip
Credit iconipCredit iconip
Credit iconip
 
Final Report
Final ReportFinal Report
Final Report
 
Phase 2 of Predicting Payment default on Vehicle Loan EMI
Phase 2 of Predicting Payment default on Vehicle Loan EMIPhase 2 of Predicting Payment default on Vehicle Loan EMI
Phase 2 of Predicting Payment default on Vehicle Loan EMI
 
The use of genetic algorithm, clustering and feature selection techniques in ...
The use of genetic algorithm, clustering and feature selection techniques in ...The use of genetic algorithm, clustering and feature selection techniques in ...
The use of genetic algorithm, clustering and feature selection techniques in ...
 
DATA MINING on WEKA
DATA MINING on WEKADATA MINING on WEKA
DATA MINING on WEKA
 
Knowledge discovery claudiad amato
Knowledge discovery claudiad amatoKnowledge discovery claudiad amato
Knowledge discovery claudiad amato
 
Applying Classification Technique using DID3 Algorithm to improve Decision Su...
Applying Classification Technique using DID3 Algorithm to improve Decision Su...Applying Classification Technique using DID3 Algorithm to improve Decision Su...
Applying Classification Technique using DID3 Algorithm to improve Decision Su...
 
I0704047054
I0704047054I0704047054
I0704047054
 
Fuzzy Analytic Hierarchy Based DBMS Selection In Turkish National Identity Ca...
Fuzzy Analytic Hierarchy Based DBMS Selection In Turkish National Identity Ca...Fuzzy Analytic Hierarchy Based DBMS Selection In Turkish National Identity Ca...
Fuzzy Analytic Hierarchy Based DBMS Selection In Turkish National Identity Ca...
 
Benchmarks for Evaluating Anomaly Based Intrusion Detection Solutions
Benchmarks for Evaluating Anomaly Based Intrusion Detection SolutionsBenchmarks for Evaluating Anomaly Based Intrusion Detection Solutions
Benchmarks for Evaluating Anomaly Based Intrusion Detection Solutions
 

Andere mochten auch

Expert system of single magnetic lens using JESS in Focused Ion Beam
Expert system of single magnetic lens using JESS in Focused Ion BeamExpert system of single magnetic lens using JESS in Focused Ion Beam
Expert system of single magnetic lens using JESS in Focused Ion Beamijcsa
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetijcsa
 
A SURVEY OF S ENTIMENT CLASSIFICATION TECHNIQUES USED FOR I NDIAN REGIONA...
A  SURVEY OF  S ENTIMENT CLASSIFICATION  TECHNIQUES USED FOR  I NDIAN REGIONA...A  SURVEY OF  S ENTIMENT CLASSIFICATION  TECHNIQUES USED FOR  I NDIAN REGIONA...
A SURVEY OF S ENTIMENT CLASSIFICATION TECHNIQUES USED FOR I NDIAN REGIONA...ijcsa
 
A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...
A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...
A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...ijcsa
 
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...ijcsa
 
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...ijcsa
 
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...ijcsa
 
Integrating fuzzy and ant colony system for
Integrating fuzzy and ant colony system forIntegrating fuzzy and ant colony system for
Integrating fuzzy and ant colony system forijcsa
 
Parsing of xml file to make secure transaction in mobile commerce
Parsing of xml file to make secure transaction in mobile commerceParsing of xml file to make secure transaction in mobile commerce
Parsing of xml file to make secure transaction in mobile commerceijcsa
 
Feature selection in multimodal
Feature selection in multimodalFeature selection in multimodal
Feature selection in multimodalijcsa
 
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKSAN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKSijcsa
 
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...ijcsa
 
A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...
A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...
A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...ijcsa
 
Transaction processing, techniques
Transaction processing, techniquesTransaction processing, techniques
Transaction processing, techniquesijcsa
 
USING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDY
USING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDYUSING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDY
USING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDYijcsa
 
Modeling Call Holding Times Of Public Safety Network
Modeling Call Holding Times Of Public Safety NetworkModeling Call Holding Times Of Public Safety Network
Modeling Call Holding Times Of Public Safety Networkijcsa
 
Distributed mixed reality for diving and
Distributed mixed reality for diving andDistributed mixed reality for diving and
Distributed mixed reality for diving andijcsa
 
Inside Story Opens the Vaults on Corporate Reputation - May 2013
Inside Story Opens the Vaults on Corporate Reputation - May 2013Inside Story Opens the Vaults on Corporate Reputation - May 2013
Inside Story Opens the Vaults on Corporate Reputation - May 2013Catherine Anderson
 
Idiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient Experience
Idiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient ExperienceIdiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient Experience
Idiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient ExperienceCatherine Anderson
 
Il Cielo
Il  CieloIl  Cielo
Il CieloTom Aikins
 

Andere mochten auch (20)

Expert system of single magnetic lens using JESS in Focused Ion Beam
Expert system of single magnetic lens using JESS in Focused Ion BeamExpert system of single magnetic lens using JESS in Focused Ion Beam
Expert system of single magnetic lens using JESS in Focused Ion Beam
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manet
 
A SURVEY OF S ENTIMENT CLASSIFICATION TECHNIQUES USED FOR I NDIAN REGIONA...
A  SURVEY OF  S ENTIMENT CLASSIFICATION  TECHNIQUES USED FOR  I NDIAN REGIONA...A  SURVEY OF  S ENTIMENT CLASSIFICATION  TECHNIQUES USED FOR  I NDIAN REGIONA...
A SURVEY OF S ENTIMENT CLASSIFICATION TECHNIQUES USED FOR I NDIAN REGIONA...
 
A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...
A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...
A Novel Framework and Policies for On-line Block of Cores Allotment for Multi...
 
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...
 
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...
Statistical Analysis based Hypothesis Testing Method in Biological Knowledge ...
 
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
 
Integrating fuzzy and ant colony system for
Integrating fuzzy and ant colony system forIntegrating fuzzy and ant colony system for
Integrating fuzzy and ant colony system for
 
Parsing of xml file to make secure transaction in mobile commerce
Parsing of xml file to make secure transaction in mobile commerceParsing of xml file to make secure transaction in mobile commerce
Parsing of xml file to make secure transaction in mobile commerce
 
Feature selection in multimodal
Feature selection in multimodalFeature selection in multimodal
Feature selection in multimodal
 
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKSAN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
 
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
 
A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...
A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...
A ROBUST MISSING VALUE IMPUTATION METHOD MIFOIMPUTE FOR INCOMPLETE MOLECULAR ...
 
Transaction processing, techniques
Transaction processing, techniquesTransaction processing, techniques
Transaction processing, techniques
 
USING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDY
USING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDYUSING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDY
USING ARTIFICIAL NEURAL NETWORK IN DIAGNOSIS OF THYROID DISEASE: A CASE STUDY
 
Modeling Call Holding Times Of Public Safety Network
Modeling Call Holding Times Of Public Safety NetworkModeling Call Holding Times Of Public Safety Network
Modeling Call Holding Times Of Public Safety Network
 
Distributed mixed reality for diving and
Distributed mixed reality for diving andDistributed mixed reality for diving and
Distributed mixed reality for diving and
 
Inside Story Opens the Vaults on Corporate Reputation - May 2013
Inside Story Opens the Vaults on Corporate Reputation - May 2013Inside Story Opens the Vaults on Corporate Reputation - May 2013
Inside Story Opens the Vaults on Corporate Reputation - May 2013
 
Idiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient Experience
Idiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient ExperienceIdiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient Experience
Idiopathic Subglottic and Tracheal Stenosis - A Survey of the Patient Experience
 
Il Cielo
Il  CieloIl  Cielo
Il Cielo
 

Ă„hnlich wie Comparing LADTree and REPTree Classifiers for Credit Risk Forecasting

Unfolding the Credit Card Fraud Detection Technique by Implementing SVM Algor...
Unfolding the Credit Card Fraud Detection Technique by Implementing SVM Algor...Unfolding the Credit Card Fraud Detection Technique by Implementing SVM Algor...
Unfolding the Credit Card Fraud Detection Technique by Implementing SVM Algor...IRJET Journal
 
DataMining_CA2-4
DataMining_CA2-4DataMining_CA2-4
DataMining_CA2-4Aravind Kumar
 
A predictive system for detection of bankruptcy using machine learning techni...
A predictive system for detection of bankruptcy using machine learning techni...A predictive system for detection of bankruptcy using machine learning techni...
A predictive system for detection of bankruptcy using machine learning techni...IJDKP
 
MACHINE LEARNING CLASSIFIERS TO ANALYZE CREDIT RISK
MACHINE LEARNING CLASSIFIERS TO ANALYZE CREDIT RISKMACHINE LEARNING CLASSIFIERS TO ANALYZE CREDIT RISK
MACHINE LEARNING CLASSIFIERS TO ANALYZE CREDIT RISKIRJET Journal
 
The Use of Genetic Algorithm, Clustering and Feature Selection Techniques in ...
The Use of Genetic Algorithm, Clustering and Feature Selection Techniques in ...The Use of Genetic Algorithm, Clustering and Feature Selection Techniques in ...
The Use of Genetic Algorithm, Clustering and Feature Selection Techniques in ...IJMIT JOURNAL
 
B05840510
B05840510B05840510
B05840510IOSR-JEN
 
B05840510
B05840510B05840510
B05840510IOSR-JEN
 
factorization methods
factorization methodsfactorization methods
factorization methodsShaina Raza
 
IRJET- Credit Card Fraud Detection Analysis
IRJET- Credit Card Fraud Detection AnalysisIRJET- Credit Card Fraud Detection Analysis
IRJET- Credit Card Fraud Detection AnalysisIRJET Journal
 
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)ieijjournal1
 
Review of Algorithms for Crime Analysis & Prediction
Review of Algorithms for Crime Analysis & PredictionReview of Algorithms for Crime Analysis & Prediction
Review of Algorithms for Crime Analysis & PredictionIRJET Journal
 
IRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET- A Detailed Study on Classification Techniques for Data MiningIRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET- A Detailed Study on Classification Techniques for Data MiningIRJET Journal
 
Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...
Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...
Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...Melissa Moody
 
LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.
LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.
LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.Souma Maiti
 
The pertinent single-attribute-based classifier for small datasets classific...
The pertinent single-attribute-based classifier  for small datasets classific...The pertinent single-attribute-based classifier  for small datasets classific...
The pertinent single-attribute-based classifier for small datasets classific...IJECEIAES
 
IRJET - Ensembling Reinforcement Learning for Portfolio Management
IRJET -  	  Ensembling Reinforcement Learning for Portfolio ManagementIRJET -  	  Ensembling Reinforcement Learning for Portfolio Management
IRJET - Ensembling Reinforcement Learning for Portfolio ManagementIRJET Journal
 
Data mining on Financial Data
Data mining on Financial DataData mining on Financial Data
Data mining on Financial DataAmarnathVenkataraman
 
A Comparative Study on Identical Face Classification using Machine Learning
A Comparative Study on Identical Face Classification using Machine LearningA Comparative Study on Identical Face Classification using Machine Learning
A Comparative Study on Identical Face Classification using Machine LearningIRJET Journal
 

Ă„hnlich wie Comparing LADTree and REPTree Classifiers for Credit Risk Forecasting (20)

Unfolding the Credit Card Fraud Detection Technique by Implementing SVM Algor...
Unfolding the Credit Card Fraud Detection Technique by Implementing SVM Algor...Unfolding the Credit Card Fraud Detection Technique by Implementing SVM Algor...
Unfolding the Credit Card Fraud Detection Technique by Implementing SVM Algor...
 
DataMining_CA2-4
DataMining_CA2-4DataMining_CA2-4
DataMining_CA2-4
 
A predictive system for detection of bankruptcy using machine learning techni...
A predictive system for detection of bankruptcy using machine learning techni...A predictive system for detection of bankruptcy using machine learning techni...
A predictive system for detection of bankruptcy using machine learning techni...
 
MACHINE LEARNING CLASSIFIERS TO ANALYZE CREDIT RISK
MACHINE LEARNING CLASSIFIERS TO ANALYZE CREDIT RISKMACHINE LEARNING CLASSIFIERS TO ANALYZE CREDIT RISK
MACHINE LEARNING CLASSIFIERS TO ANALYZE CREDIT RISK
 
Credit iconip
Credit iconipCredit iconip
Credit iconip
 
Credit iconip
Credit iconipCredit iconip
Credit iconip
 
The Use of Genetic Algorithm, Clustering and Feature Selection Techniques in ...
The Use of Genetic Algorithm, Clustering and Feature Selection Techniques in ...The Use of Genetic Algorithm, Clustering and Feature Selection Techniques in ...
The Use of Genetic Algorithm, Clustering and Feature Selection Techniques in ...
 
B05840510
B05840510B05840510
B05840510
 
B05840510
B05840510B05840510
B05840510
 
factorization methods
factorization methodsfactorization methods
factorization methods
 
IRJET- Credit Card Fraud Detection Analysis
IRJET- Credit Card Fraud Detection AnalysisIRJET- Credit Card Fraud Detection Analysis
IRJET- Credit Card Fraud Detection Analysis
 
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
 
Review of Algorithms for Crime Analysis & Prediction
Review of Algorithms for Crime Analysis & PredictionReview of Algorithms for Crime Analysis & Prediction
Review of Algorithms for Crime Analysis & Prediction
 
IRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET- A Detailed Study on Classification Techniques for Data MiningIRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET- A Detailed Study on Classification Techniques for Data Mining
 
Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...
Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...
Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...
 
LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.
LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.
LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.
 
The pertinent single-attribute-based classifier for small datasets classific...
The pertinent single-attribute-based classifier  for small datasets classific...The pertinent single-attribute-based classifier  for small datasets classific...
The pertinent single-attribute-based classifier for small datasets classific...
 
IRJET - Ensembling Reinforcement Learning for Portfolio Management
IRJET -  	  Ensembling Reinforcement Learning for Portfolio ManagementIRJET -  	  Ensembling Reinforcement Learning for Portfolio Management
IRJET - Ensembling Reinforcement Learning for Portfolio Management
 
Data mining on Financial Data
Data mining on Financial DataData mining on Financial Data
Data mining on Financial Data
 
A Comparative Study on Identical Face Classification using Machine Learning
A Comparative Study on Identical Face Classification using Machine LearningA Comparative Study on Identical Face Classification using Machine Learning
A Comparative Study on Identical Face Classification using Machine Learning
 

KĂĽrzlich hochgeladen

complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxsomshekarkn64
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 

KĂĽrzlich hochgeladen (20)

complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptx
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 

Comparing LADTree and REPTree Classifiers for Credit Risk Forecasting

  • 1. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 39 PROFICIENCY COMPARISON OFLADTREE AND REPTREE CLASSIFIERS FOR CREDIT RISK FORECAST Lakshmi Devasena C Dept. of Operations & Systems, ISB Hyderabad, IFHE University Abstract Predicting the Credit Defaulter is a perilous task of Financial Industries like Banks. Ascertainingnon- payer before giving loan is a significant and conflict-ridden task of the Banker. Classification techniques are the better choice for predictive analysis like finding the claimant, whether he/she is an unpretentious customer or a cheat. Defining the outstanding classifier is a risky assignment for any industrialist like a banker. This allow computer science researchers to drill down efficient research works through eval- uating different classifiers and finding out the best classifier for such predictive problems. This research work investigates the productivity of LADTree Classifier and REPTree Classifier for the credit risk predic- tion and compares their fitness through various measures. German credit dataset has been taken and used to predict the credit risk with a help of open source machine learning tool. Key words Credit Risk Forecast, LAD Tree Classifier, Proficiency Comparison, REP Tree Classifier. 1.INTRODUCTION The enormous volume of transactions made information processing automation an invigorating factor for high quality standards, cost reduction, with high speed results. Data analysis automation and result of the relevant successes produced by state-of-the art computer algorithms have changed the opinions of many misanthropists. In the past, people thought that financial market analysis necessitates intuition, knowledge and experience and speculated how this job could be automated. Conversely, growth of scientific and technological advances, achieved the automation of financial market analysis. In recent days, credit defaulter prediction and credit risk evaluation have fascinated great deal of interests from regulators, practitioners, and theorists, in the financial industry. Since, the credit score of an applicant could be calculated from the past giant database and the demographic data, it needs automation. Automation of credit risk forecastcan be achieved using classification techniques. Selecting the classifier, which envisages credit risk in an efficient manner, is an imperative and critical task. This research work appraises the credit risk performance of two diverse classifiers, namely, REP Tree Classifier and LAD Tree Classifier and compares their accuracyofcredit risk prediction.
  • 2. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 40 2.LITERATURE REVIEW There are many research works made to predict credit risk using wide-ranging computing techniques. In [1], a neural network based algorithm for automatic provisioning to credit risk scrutiny in a real world problem is presented. An assimilated back propagation neural network (BPNN) with the customary discriminant analysis approach used to discover the performance of credit scoring is given in [2]. A comparative study of corporate credit rating analysis using back propagation neural network (BPNN) and support vector machines (SVM) is described in [3]. An uncorrelated maximization algorithm within a triple-phase neural network ensemble technique for credit risk evaluation to differentiate good creditors from bad ones are elucidated in [4]. An application of artificial neural network to credit risk assessment using two altered architectures are deliberated in [5]. Credit risk investigation using diverse Data Mining models like C4.5, NN, BP, RIPPER, LR and SMO islikened in [6]. The credit risk of a Tunisian bank through modeling the non-payment risk of its commercial loans is analyzed in [7]. Credit risk valuation using six stage neural network ensemble learning approach is argued in [8]. A modeling framework for credit calculation models is erected using different modeling procedures is explained and its performance is analyzed in [9]. Hybrid method for assessing credit risk using Kolmogorove- Smirnov test, Fuzzy Expert system and DEMATEL method is enlightened in [10]. An Artificial Neural Network centeredmethodology for Credit Risk supervision is proposed in [11]. Artificial neural networks using Feed-forward back propagation neural network and business rules to correctly determine credit defaulter is proposed in [12]. The performance comparison of Memory based classifiers for credit risk investigation is experimented and prĂ©cised in [13]. The performance comparison between Instance Based and K Star Classifiers for Credit Risk Inspection is accomplished and pronounced in [14]. The performance comparison among Sequential Minimal Optimization and Logistic Classifiers for Credit Risk Calculation is specified in [15]. The performance comparisonbetween Multilayer Perceptron and SMO Classifier for Credit Risk appraisal is described in [16]. The performance comparison between JRip and PART Classifier for Credit Risk Estimation is explored in [17]. Tree based classifiers are easier to interpret and explain. That’s the reason; this research work randomly taken LAD Tree classifier and REP Tree Classifier which are used in various optimization literatures [23] for efficiency comparison. LAD Tree and REP Tree Classifiers have already used in various domain of problem like Forensic Mining [24], Intrusion Detection system [25] and [36], Non-spatial Data Classification [26], Classification for Bank Direct Marketing [27], Global land cover classification [28], Medical Data Classification [29], [30] and [34] , Automatic classification of active objects from large categories [31], Micro array dataset classification and analysis [32], Classification of Strom type from weather radar reflectivity [33], Identification of Link Spam in Web search Engines [35], etc. 3.DATASET USED The German credit data [18] is used to evaluate the performance of Logistic classifier and Partial Decision Tree Classifier for credit risk prediction. This data setcontains 20 attributes, namely, Duration, Credit History, Checking Status, Purpose, Credit Amount, Employment, Installment Commitment, Saving Status, Personal Status, Other parties, Property magnitude, Age, resident since, Other payment plans, existing credits, job, Housing, No. of dependents, Foreign worker and Own Phone. The data set comprises 1000 instances of client credit data with class detail. It discriminates the records into two classes, namely, good and bad. 4.METHODOLOGY USED
  • 3. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 41 In this research work, two diversetree based classifiers namely, LAD Tree Classifierand REP Tree Classifier are compared for proficiencyassessment of credit risk estimation. 4.1.LAD Tree Classifier LAD Tree builds a classifier for binary target variable based on learning a logical expression that can discriminate between positive and negative samples in a data set. The construction of LAD model for a given data set typically involves the generation of large set patterns and the selection of a subset of them that satisfies the above assumption that a binary point covered by some positive patterns, but not covered by any negative pattern is positive, and similarly, a binary point covered by some negative patterns, but not covered by positive pattern is negative, such that each pattern in the model satisfies certain requirements in terms of prevalence and homogeneity[23]. LAD Tree Classifier generates a multi-class alternating decision tree using the Logit Boost strategy. The LAD Tree algorithm applies logistic boosting algorithm in order to induce an alternating decision tree. In this algorithm, a single attribute test is chosen as a splitter node for the tree at each iteration. For each training instance, working response and weights are calculated and stored on a per-class basis. Then, it fits the working response to the mean value of the instances, in a particular subset, by minimizing the least-squares value between them. IN this algorithm, trees for the different classes are grown in parallel. Once all the trees have been constructed, then it merges the trees into a final model. Advantage of this classifier is the size of the tree cannot outgrow the combined size of the individual trees [19]. 4.2.REP Tree Classifier Reduces Error Pruning (REP) Tree Classifier is a fast decision tree learning algorithm and is based on the principle of computing the information gain with entropy and minimizing the error arising from variance [20]. This algorithm is first recommended in [21]. REP Tree applies regression tree logic and generates multiple trees in altered iterations. Afterwards it picks best one from all spawned trees. This algorithm constructs the regression/decision tree using variance and information gain. Also, this algorithm prunes the tree using reduced-error pruning with back fitting method. At the beginning of the model preparation, it sorts the values of numeric attributes once. As in C4.5 Algorithm, this algorithm also deals the missing values by splitting the corresponding instances into pieces.[22]. 5.PERFORMANCE MEASURES USED Variousscales are used to gauge the performance of the classifiers. Classification Accuracy Any classifier could have an error rate and it may fail to categorize correctly. Classification accuracy is calculated as Correctly classified instances divided by Total number of instances multiplied by 100. Mean Absolute Error
  • 4. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 42 Mean absolute error is the average of the variance between predicted and actual value in all test cases. It is a good measure to gauge the performance. Root Mean Square Error Root mean squared error is used to scaledissimilarities between values actually perceived and the values predicted by the model. It is determined by taking the square root of the mean square error. Confusion Matrix A confusion matrix encompasses information about actual and predicted groupings done by a classification system. 6.RESULTS AND DISCUSSION Open source machine learning tool is used to experiment the performance of LAD Tree and REP Tree Classifiers. The performance is tested out using the Training set as well as using different Cross Validation methods. The class is arrived by considering all 20 attributes of the dataset. 6.1.Performance of LAD Tree Classifier The overall assessment summary of LAD Tree Classifier using training set and different cross validation methods is given in Table I. The performance of LAD Tree Classifier in terms of Correctly Classified Instances and Classification Accuracy is shown in Fig. 1and Fig. 2. The confusion matrix for different test mode is given in Table II to Table VI. LAD Tree Classifier gives 76.1% accuracy for the training data set. Various cross validation methods are used to check its actual performance. On an average, it gives around 70.7% of accuracy for credit risk estimation. TABLE I LAD TREE CLASSIFIER OVERALL EVALUATION SUMMARY Test Mode Correctly Classified Instances Incorrectly Classified Instances Accuracy Mean Absolute Error Root Mean Squared Error Time Taken to Build Model (Sec) Training Set 761 239 76.1% 0.3236 0.3953 2.64 5 Fold CV 702 298 70.2% 0.3547 0.437 2.07 10 Fold CV 708 292 70.8% 0.3494 0.4326 1.92 15 Fold CV 715 285 71.5% 0.3545 0.4351 2.67 20 Fold CV 704 296 70.4% 0.3559 0.437 1.43 TABLE II CONFUSION MATRIX –LAD TREE CLASSIFIER (ON TRAINING DATASET) Good Bad Actual (Total)
  • 5. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 43 Good 655 45 700 Bad 194 106 300 Predicted (Total) 849 151 1000 TABLE III CONFUSION MATRIX – LAD TREE CLASSIFIER (5 FOLD CROSS VALIDATION) Good Bad Actual (Total) Good 585 115 700 Bad 183 117 300 Predicted (Total) 768 232 1000 TABLE IV CONFUSION MATRIX – LAD TREE CLASSIFIER (10 FOLD CROSS VALIDATION) Good Bad Actual (Total) Good 597 103 700 Bad 189 111 300 Predicted (Total) 786 214 1000 TABLE V CONFUSION MATRIX – LAD TREE CLASSIFIER (15 FOLD CROSS VALIDATION) Good Bad Actual (Total) Good 614 86 700 Bad 199 101 300 Predicted (Total) 813 187 1000 TABLE VI CONFUSION MATRIX –LAD TREE CLASSIFIER (20 FOLD CROSS VALIDATION) Good Bad Actual (Total) Good 594 106 700 Bad 190 110 300 Predicted (Total) 784 216 1000
  • 6. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 44 Fig. 1 Correctly Classified instances of LAD Tree Classifier Fig. 2 Classification Accuracy of LAD Tree Classifier 6.2.Performance of REP Tree Classifier The overall assessment summary of REP Tree Classifier using training set and different cross validation methods is given in Table VII. The performance of REP Tree Classifier in terms of Correctly Classified Instances and Classification Accuracy is shown in Fig. 3and Fig. 4. The confusion matrix for different test mode is given in Table VIII to Table XII. REP Tree Classifier gives 80% accuracy for the training data set. Various cross validation methods are used to check its actual performance. On an average, it gives around 71.9% of accuracy for credit risk estimation.
  • 7. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 45 TABLE VIII REP TREE CLASSIFIER COMPLETE EVALUATION SUMMARY Test Mode Correctly Classified Instances Incorrectly Classified Instances Accuracy Mean absolute error Root Mean Squared Error Time Taken to Build Model (Sec) Training Set 800 200 80% 0.2905 0.3811 0.32 5 Fold CV 717 283 71.7% 0.3458 0.4437 0.78 10 Fold CV 718 282 71.8% 0.3417 0.4424 1.33 15 Fold CV 726 274 72.6% 0.3422 0.4382 0.16 20 Fold CV 719 281 71.9% 0.3368 0.4364 0.11 TABLE VIII CONFUSION MATRIX – REP TREE CLASSIFIER (ON TRAINING DATASET) Good Bad Actual (Total) Good 649 51 700 Bad 149 151 300 Predicted (Total) 798 202 1000 TABLE IX CONFUSION MATRIX – REP TREE CLASSIFIER (5 FOLD CROSS VALIDATION) Good Bad Actual (Total) Good 616 84 700 Bad 199 101 300 Predicted (Total) 815 185 1000 TABLE X CONFUSION MATRIX – REP TREE CLASSIFIER (10 FOLD CROSS VALIDATION) Good Bad Actual (Total) Good 601 99 700 Bad 183 117 300 Predicted (Total) 784 216 1000 TABLE XI CONFUSION MATRIX – REP TREE CLASSIFIER (15 FOLD CROSS VALIDATION) Good Bad Actual (Total) Good 612 88 700 Bad 186 114 300 Predicted (Total) 798 202 1000
  • 8. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 46 TABLE XII CONFUSION MATRIX – REP TREE CLASSIFIER (20 FOLD CROSS VALIDATION) Good Bad Actual (Total) Good 605 95 700 Bad 151 149 300 Predicted (Total) 756 244 1000 Fig. 3 Correctly Classified instances of REP Tree Classifier Fig. 4 Classification Accuracy of REP Tree Classifier
  • 9. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 47 6.3Comparison of LAD Tree Classifier and REP Tree Classifier The comparison of performance between LAD Tree Classifier and REP Tree Classifier is depicted in Fig 5, and Fig. 6 in terms of Correctly Classified Instances and Classification Accuracy. The complete ranking is prepared based on correctly classified instances, classification accuracy, MAE and RMSE values and other statistics found using Training Set result and Cross Validation Techniques. Consequently, it is perceived that REP Tree classifier performs better than LAD Tree Classifier. Fig. 5 Correctly Classified Instances Comparison between LAD Tree Classifier and REP Tree Classifier Fig. 6Classification Accuracy Comparison between LAD Tree Classifier and REP Tree Classifier
  • 10. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 48 7.CONCLUSION This work investigated the efficiency of two different classifiers namely, LAD Tree Classifier andREP Tree Classifier for credit risk prediction. Testing is accomplished using the open source machine learning tool. Also, effectiveness comparison of both the classifiers has been done in view of different scales of performance evaluation. At last, it is observed that REP Tree Classifier performs better than LAD Tree Classifier for credit risk prediction by taking various measures including Classification accuracy and Time taken to build the model. ACKNOWLEDGMENT The author expresses her deep gratitude to the Management of IBS Hyderabad, IFHE University and Operations & IT Department of IBS Hyderabad for constant support and motivation. REFERENCES [1] Germano C. Vasconcelos, Paulo J. L. Adeodato and Domingos S. M. P. Monteiro, “A Neural Network Based Solution for the Credit Risk Assessment Problem,” Proceedings of the IV Brazilian Conference on Neural Networks - IV CongressoBrasileiro de RedesNeurais pp. 269-274, July 20-22, 1999. [2] Tian-Shyug Lee, Chih-Chou Chiu, Chi-Jie Lu and I-Fei Chen, “Credit scoring using the hybrid neural discriminant technique,” Expert Systems with Applications (Elsevier) 23, pp. 245–254, 2002. [3] Zan Huang, Hsinchun Chena, Chia-Jung Hsu, Wun-Hwa Chen and Soushan Wu, “Credit rating analysis with support vector machines and neural networks: a market comparative study,” Decision Support Systems (Elsevier) 37, pp. 543– 558, 2004. [4] Kin Keung Lai, Lean Yu, Shouyang Wang, and Ligang Zhou, “Credit Risk Analysis Using a Reliability-Based Neural Network Ensemble Model,” S. Kollias et al. (Eds.): ICANN 2006, Part II, Springer LNCS 4132, pp. 682 – 690, 2006. [5] Eliana Angelini, Giacomo di Tollo, and Andrea Roli “A Neural Network Approach for Credit Risk Evaluation,” Kluwer Academic Publishers, pp. 1 – 22, 2006. [6] S. Kotsiantis, “Credit risk analysis using a hybrid data mining model,” Int. J. Intelligent Systems Technologies and Applications, Vol. 2, No. 4, pp. 345 – 356, 2007. [7] HamadiMatoussi and Aida Krichene, “Credit risk assessment using Multilayer Neural Network Models - Case of a Tunisian bank,” 2007. [8] Lean Yu, Shouyang Wang, Kin Keung Lai, “Credit risk assessment with a multistage neural network ensemble learning approach”, Expert Systems with Applications (Elsevier) 34, pp.1434–1444, 2008. [9] ArnarIngiEinarsson, “Credit Risk Modeling”, Ph.D Thesis, Technical University of Denmark, 2008. [10] SanazPourdarab, Ahmad Nadali and Hamid EslamiNosratabadi, “A Hybrid Method for Credit Risk Assessment of Bank Customers,” International Journal of Trade, Economics and Finance, Vol. 2, No. 2, April 2011. [11] Vincenzo Pacelli and Michele Azzollini, “An Artificial Neural Network Approach for Credit Risk Management”, Journal of Intelligent Learning Systems and Applications, 3, pp. 103-112, 2011. [12] A.R.Ghatge and P.P.Halkarnikar, “Ensemble Neural Network Strategy for Predicting Credit Default Evaluation” International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 7, January 2013 pp. 223 – 225. [13] Lakshmi Devasena, C., “Adeptness Evaluation of Memory Based Classifiers for Credit Risk Analysis,” Proc. of International Conference on Intelligent Computing Applications - ICICA 2014, 978-1-4799-3966-4/14 (IEEE Explore), 6-7 March 2014, pp. 143-147, 2014. [14] Lakshmi Devasena, C., “Adeptness Comparison between Instance Based and K Star Classifiers for Credit Risk Scrutiny,” International Journal of Innovative Research in Computer and Communication Engineering, Vol.2, Special Issue 1, March 2014.
  • 11. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 49 [15] Lakshmi Devasena, C., “Effectiveness Assessment between Sequential Minimal Optimization and Logistic Classifiers for Credit Risk Prediction,” International Journal of Application or Innovation in Engineering & Management, Volume3, Issue 4, April 2014. [16] Lakshmi Devasena, C., “Efficiency Comparison of Multilayer Perceptron and SMO Classifier for Credit Risk Prediction,” International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 4, 2014. [17] Lakshmi Devasena, C. “Competency Assessment between JRip and Partial Decision Tree Classifiers for Credit Risk Estimation”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4 (5), May – 2014, pp. 164-173. [18] UCI Machine Learning Data Repository – http://archive.ics.uci.edu/ml/datasets. [19] Geoffrey Holmes, Bernhard Pfahringer, Richard Kirkby, Eibe Frank and Mark Hall. “Multiclass Alternating Decision Trees”, ECML, pp. 161-172, 2001. [20] Witten IH, Frank E (2005) Data mining: practical machine learning tools and techniques – 2nd ed. the United States of America, Morgan Kaufmann series in data management systems. [21] Quinlan J (1987) Simplifying decision trees, International Journal of Man Machine Studies, 27(3), pp. 221–234. [22] S.K. Jayanthi and S.Sasikala, “REPTree Classifier for indentifying Link Spam in Web Search Engines”, IJSC, Volume 3, Issue 2, pp. 498 – 505, Jan 2013. [23] Trilok Chand Sharma and Manoj Jain, “WEKA Approach for Comparative Study of Classification Algorithm”, International Journal of Advanced Research in Computer and Communication Engineering,Vol. 2, Issue 4, April 2013, pp 1925 – 1931. [24] Adesesan B. Adeyemo and OluwafemiOriola, “Personnel Audit Using a Forensic Mining Technique”, IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 6, November 2010, pp 222 – 231. [25] G. V. Nadiammai and M. Hemalatha, “Performance Analysis of Tree Based Classification Algorithms for Intrusion Detection System”, Mining Intelligence and Knowledge Exploration, Lecture Notes in Computer Science Volume 8284, pp 82-89, 2013. [26] Ashish Kokare, Pradeep Venkatesan, SwapnilTandel, and HemantPalivela, “Survey On Classification Based Techniques on Non-Spatial Data”, International Journal of Innovative Research in Science, Engineering and Technology, Volume 3, Special Issue 1, February 2014, pp. 409 – 413. [27] K. Wisaeng, “A Comparison of Different Classification Techniques for Bank Direct Marketing”, International Journal of Soft Computing and Engineering (IJSCE), Volume-3, Issue-4, September 2013, pp. 116 – 119. [28] M. C. Hansen, R. S. Defries, J. R. G. Townshend and R. Sohlberg, “Global land cover classification at 1 km spatial resolution using a classification tree approach”, Int. j. remote sensing, vol. 21, no. 6 & 7, pp. 1331–1364, 2000. [29] P. K. Srimani and Manjula Sanjay Koti, “Medical Diagnosis Using Ensemble Classifiers - A Novel Machine-Learning Approach”, Journal of Advanced Computing, volume 1, pp. 9-27, doi:10.7726/jac.2013.1002, 2013. [30] OlaiyaFolorunsho, “Comparative Study of Different Data Mining Techniques Performance in knowledge Discovery from Medical Database”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 3, March 2013, pp. 11 – 15. [31] Yongheng Zhao and Yanxia Zhang, “Comparison of decision tree methods for finding active objects”, Advances of Space Research, Aug 2007. [32] GregorStiglic , Simon Kocbek and Peter Kokol, “Comprehensibility of Classifiers for Future Microarray Analysis Datasets”, 2000. [33] David JohnGagne, Amy McGovern and Jerry Brotzge, “Classification of Convective Areas using Decision Trees”, American Metrological Society, July 2009, pp. 1341 – 1351. [34] AbuBakrAwad, MahasenMabrouk, and TahanyAwad, “Performance Evaluation of Decision Tree Classifiers for the Prediction of Response to treatment of Hepatitis C Patients”, Pervasive Health, May 2014, pp. 186 – 190. [35] S.K. Jayanthi and S. Sasikala, “REPTree Classifier for Identifying Link Spam in Web Search Engines”, ICTACT JOURNAL ON SOFT COMPUTING, January 2013, Volume 3, Issue 2, pp. 498 – 505.
  • 12. International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015 50 [36] Jayshri R. Patel, “Performance Evaluation of Decision Tree Classifiers for Ranked Features of Intrusion Detection”, Journal of Information, Knowledge and Research in Information Technology , Nov 12 to Oct 13, Volume 2, Issue 2, pp. 152 – 155, 2013.