The use of credit has grown considerably in recent years. Banks and financial institutions confront credit risks to conduct their business. Good management of these risks is a key factor to increase profitability. Therefore, every bank needs to predict the credit risks of its customers. Credit risk prediction has been widely studied in the field of data mining as a classification problem. This paper proposes a new classifier using immune principles and fuzzy rules to predict quality factors of individuals in banks. The proposed model is combined with fuzzy pattern classification to extract accurate fuzzy if-then rules. In our proposed model, we have used immune memory to remember good B cells during the cloning process. We have designed two forms of memory: simple memory and k-layer memory. Two real world credit data sets in UCI machine learning repository are selected as experimental data to show the accuracy of the proposed classifier. We compare the performance of our immune-based learning system with results obtained by several well-known classifiers. Results indicate that the proposed immune-based classification system is accurate in detecting credit risks. 1. Introduction Banks and financial agencies employ credit scoring models extensively to determine good and bad credits. Loans are usually the most significant cause of risk in banks. Using credit scoring will reduce the time of loan approval procedure [1] and save cost per loan and enhance credit decisions. This enhancement helps lenders to guarantee that they are applying the same criteria to same groups of borrowers [2]. In these situations banks can supervise the existing loans much easier than before [3]. Because of the fast growth of autofinancing in the last two decades, the use of data mining for credit risk prediction increases rapidly [4–7]. The first investigation into credit scoring was started by Olson and Wu in 2010 to classify credit applications as good or bad payers [8]. Fair and Isaac presented a credit scoring model in the early 60s [9]. Since then, various models have been developed using traditional statistical methods such as discriminant analysis method in [10, 11]. Ordinary linear regression has also been used as another traditional statistic method for credit scoring [12, 13]. Recent techniques of credit risk assessment [14–20] treat lending decision problem as a binary classification problem [8]. The performance of bioinspired algorithms, like artificial neural networks and evolutionary computation, for various data mining problems has been demonstrated by many
References
[1]
H. A. Abdou, “Genetic programming for credit scoring: the case of Egyptian public sector banks,” Expert Systems with Applications, vol. 36, no. 9, pp. 11402–11417, 2009.
[2]
L. J. Mester, “What's the point of credit scoring?” Business Review, vol. 3, pp. 3–16, 1997.
[3]
L. Zhang, X. Hui, and L. Wang, “Application of adaptive support vector machines method in credit scoring,” in Proceedings of the 16th International Conference on Management Science and Engineering (ICMSE '09), pp. 1410–1415, September 2009.
[4]
S. Vukovic, B. Delibasic, A. Uzelac, and M. Suknovic, “A case-based reasoning model that uses preference theory functions for credit scoring,” Expert Systems with Applications, vol. 39, no. 9, pp. 8389–8395, 2012.
[5]
B. W. Yap, S. H. Ong, and N. H. M. Husain, “Using data mining to improve assessment of credit worthiness via credit scoring models,” Expert Systems with Applications, vol. 38, no. 10, pp. 13274–13283, 2011.
[6]
W. Gang and M. Jian, “A hybrid ensemble approach for enterprise credit risk assessment based on Support Vector Machine,” Expert Systems with Applications, vol. 39, no. 5, pp. 5325–5331, 2012.
[7]
X. Zhou, W. Jiang, Y. Shi, and Y. Tian, “Credit risk evaluation with kernel-based affine subspace nearest points learning method,” Expert Systems with Applications, vol. 38, no. 4, pp. 4272–4279, 2011.
[8]
D. L. Olson and D. D. Wu, “Review of innovative CSR: from risk management to value creation,” Journal of Cleaner Production, vol. 18, no. 16, pp. 1767–1768, 2010.
[9]
K. Leung, F. Cheong, and C. Cheong, “Consumer credit scoring using an artificial immune system algorithm,” in Proceedings of the IEEE Congress on Evolutionary Computation (CEC '07), pp. 3377–3384, Singapore, September 2007.
[10]
E. Altman, “Financial ratios, discriminant analysis and the prediction of corporate bankruptcy,” Journal of Finance, vol. 23, no. 4, pp. 589–609, 1968.
[11]
P. A. Lachenbruch, Discriminant Analysis, Hafner, New York, NY, USA, 1975.
[12]
W. E. Henley and D. J. Hand, “A k-nearest-neighbour classifier for assessing consumer credit risk,” Journal of the Royal Statistical Society Series D: The Statistician, vol. 45, no. 1, pp. 77–95, 1996.
[13]
Y. E. Orgler, “A credit scoring model for commercial loans,” Journal of Money Credit Bank, pp. 435–445, 1970.
[14]
S. Finlay, “Credit scoring for profitability objectives,” European Journal of Operational Research, vol. 202, no. 2, pp. 528–537, 2010.
[15]
D. Wu and D. L. Olson, “Enterprise risk management: coping with model risk in a large bank,” Journal of the Operational Research Society, vol. 61, no. 2, pp. 179–190, 2010.
[16]
D. Wu and D. L. Olson, “Enterprise risk management: small business scorecard analysis,” Production Planning & Control, vol. 20, no. 4, pp. 362–369, 2009.
[17]
D. D. Wu and D. L. Olson, “Introduction to the special section on ‘optimizing risk management: Methods and tools’,” Human and Ecological Risk Assessment, vol. 15, no. 2, pp. 220–226, 2009.
[18]
D. D. Wu, X. Kefan, L. Hua, Z. Shi, and D. L. Olson, “Modeling technological innovation risks of an entrepreneurial team using system dynamics: an agent-based perspective,” Technological Forecasting and Social Change, vol. 77, no. 6, pp. 857–869, 2010.
[19]
D. D. Wu and D. Olson, “Enterprise risk management: a DEA VaR approach in vendor selection,” International Journal of Production Research, vol. 48, no. 16, pp. 4919–4932, 2010.
[20]
D. D. Wu and D. L. Olson, “Introduction to special section on ”Risk and Technology“,” Technological Forecasting and Social Change, vol. 77, no. 6, pp. 837–839, 2010.
[21]
L. Wang and C. Fang, “An effective shuffled frog-leaping algorithm for multi-mode resource-constrained project scheduling problem,” Information Sciences, vol. 181, no. 20, pp. 4804–4822, 2011.
[22]
Y. Wen, H. Xu, and J. Yang, “A heuristic-based hybrid genetic-variable neighborhood search algorithm for task scheduling in heterogeneous multiprocessor system,” Information Sciences, vol. 181, no. 3, pp. 567–581, 2011.
[23]
J. Yang, H. Xu, and P. Jia, “Effective search for Pittsburgh learning classifier systems via estimation of distribution algorithms,” Information Sciences, vol. 198, pp. 100–117, 2012.
[24]
L. Yu, “An evolutionary programming based asymmetric weighted least squares support vector machine ensemble learning methodology for software repository mining,” Information Sciences, vol. 191, pp. 31–46, 2012.
[25]
R. Zhang and C. Wu, “Bottleneck machine identification method based on constraint transformation for job shop scheduling with genetic algorithm,” Information Sciences, vol. 188, pp. 236–252, 2012.
[26]
V. S. Desai, J. N. Crook, and G. A. Overstreet Jr., “A comparison of neural networks and linear scoring models in the credit union environment,” European Journal of Operational Research, vol. 95, no. 1, pp. 24–37, 1996.
[27]
J. E. Hunt and D. E. Cooke, “Learning using an artificial immune system,” Journal of Network and Computer Applications, vol. 19, no. 2, pp. 189–212, 1996.
[28]
J. Timmis and T. Knight, “Artificial immune systems: using the immune system as inspiration for data mining,” in Data Mining: A Heuristic Approach, pp. 209–230, Group Idea Publishing, 2001.
[29]
J. Timmis, A. Hone, T. Stibor, and E. Clark, “Theoretical advances in artificial immune systems,” Theoretical Computer Science, vol. 403, no. 1, pp. 11–32, 2008.
[30]
E. Kamalloo and M. S. Abadeh, “An artificial immune system for extracting fuzzy rules in credit scoring,” in Proceedings of the IEEE Congress on Evolutionary Computation (CEC '10), pp. 1–8, Barcelona, Spain, July 2010.
[31]
E. Kamalloo and M. S. Abadeh, “Comprehensible credit scoring with fuzzy artificial immune system,” in Proceedings of the 18th Iranian Conference on Electrical Engineering (ICEE '10), pp. 542–547, Isfahan, Iran, May 2010.
[32]
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten, “The WEKA data mining software: an update,” ACM SIGKDD Explorations Newsletter, vol. 11, no. 1, pp. 10–18, 2009.
[33]
C. Huang, M. Chen, and C. Wang, “Credit scoring with a data mining approach based on support vector machines,” Expert Systems with Applications, vol. 33, no. 4, pp. 847–856, 2007.
[34]
P. Yao, “Hybrid classifier using neighborhood rough set and SVM for credit scoring,” in Proceedings of the International Conference on Business Intelligence and Financial Engineering (BIFE '09), pp. 138–142, Beijing, China, July 2009.
[35]
D. Zhang, M. Hifi, Q. Chen, and W. Ye, “A hybrid credit scoring model based on genetic programming and support vector machines,” in Proceedings of the 4th International Conference on Natural Computation (ICNC '08), pp. 8–12, October 2008.
[36]
J. Yi, “Credit scoring model based on the decision tree and the simulated annealing algorithm,” in Proceedings of the WRI World Congress on Computer Science and Information Engineering (CSIE '09), pp. 18–22, Los Angeles, Calif, USA, April 2009.
[37]
M. F. A. Gadi, X. Wang, and A. P. Do Lago, “Credit card fraud detection with artificial immune system,” Lecture Notes in Computer Science, vol. 5132, pp. 119–131, 2008.
[38]
W.-C. Yeh, “Novel swarm optimization for mining classification rules on thyroid gland data,” Information Sciences, vol. 197, pp. 65–76, 2012.
[39]
Z. Pei, G. Resconi, A. J. van der Wal, K. Qin, and Y. Xu, “Interpreting and extracting fuzzy decision rules from fuzzy information systems and their inference,” Information Sciences, vol. 176, no. 13, pp. 1869–1897, 2006.
[40]
M. J. Zolghadri and E. G. Mansoori, “Weighting fuzzy classification rules using receiver operating characteristics (ROC) analysis,” Information Sciences, vol. 177, no. 11, pp. 2296–2307, 2007.
[41]
X. Chang and J. H. Lilly, “Evolutionary design of a fuzzy classifier from data,” IEEE Transactions on Systems, Man, and Cybernetics B, vol. 34, no. 4, pp. 1894–1906, 2004.
[42]
Z. Lei and L. Ren-Hou, “Designing of classifiers based on immune principles and fuzzy rules,” Information Sciences, vol. 178, no. 7, pp. 1836–1847, 2008.
[43]
A. Frank and A. Asuncion, UCI Machine Learning Repository, 2010, http://archive.ics.uci.edu/ml.
[44]
D. Yang, L. Jiao, M. Gong, and F. Liu, “Artificial immune multi-objective SAR image segmentation with fused complementary features,” Information Sciences, vol. 181, no. 13, pp. 2797–2812, 2011.
[45]
J. Zhao, Q. Liu, W. Wang, Z. Wei, and P. Shi, “A parallel immune algorithm for traveling salesman problem and its application on cold rolling scheduling,” Information Sciences, vol. 181, no. 7, pp. 1212–1223, 2011.
[46]
Y. Zhong, L. Zhang, B. Huang, and P. Li, “An unsupervised artificial immune classifier for multi/hyperspectral remote sensing imagery,” IEEE Transactions on Geoscience and Remote Sensing, vol. 44, no. 2, pp. 420–431, 2006.
[47]
L. N. de Castro and F. J. von Zuben, “Learning and optimization using the clonal selection principle,” IEEE Transactions on Evolutionary Computation, vol. 6, no. 3, pp. 239–251, 2002.
[48]
D. Dasgupta, “Advances in artificial immune systems,” IEEE Computational Intelligence Magazine, vol. 1, no. 4, pp. 40–43, 2006.
[49]
J. Greensmith, U. Aickelin, and G. Tedesco, “Information fusion for anomaly detection with the dendritic cell algorithm,” Information Fusion, vol. 11, no. 1, pp. 21–34, 2010.
[50]
Z. Jinquan, L. Xiaojie, L. Tao, L. Caiming, P. Lingxi, and S. Feixian, “A self-adaptive negative selection algorithm used for anomaly detection,” Progress in Natural Science, vol. 19, no. 2, pp. 261–266, 2009.
[51]
R. R. Sumar, A. A. Rodrigues Coelho, and L. D. Santos Coelho, “Use of an artificial immune network optimization approach to tune the parameters of a discrete variable structure controller,” Expert Systems with Applications, vol. 36, no. 3, pp. 5009–5015, 2009.
[52]
K. Tan, C. Goh, A. Mamun, and E. Ei, “An evolutionary artificial immune system for multi-objective optimization,” European Journal of Operational Research, vol. 187, no. 2, pp. 371–392, 2008.
[53]
H. Y. K. Lau, V. W. K. Wong, and I. S. K. Lee, “Immunity-based autonomous guided vehicles control,” Applied Soft Computing Journal, vol. 7, no. 1, pp. 41–57, 2007.
[54]
G. Luh and W. Liu, “An immunological approach to mobile robot reactive navigation,” Applied Soft Computing Journal, vol. 8, no. 1, pp. 30–45, 2008.
[55]
E. Hart and J. Timmis, “Application areas of AIS: the past, the present and the future,” Applied Soft Computing Journal, vol. 8, no. 1, pp. 191–201, 2008.
[56]
W. Wang, S. Gao, and Z. Tang, “A complex artificial immune system,” in Proceedings of the 4th International Conference on Natural Computation (ICNC '08), pp. 597–601, Jinan, China, October 2008.
[57]
K. Polat and S. Güne?, “A hybrid medical decision making system based on principles component analysis, k-NN based weighted pre-processing and adaptive neuro-fuzzy inference system,” Digital Signal Processing, vol. 16, no. 6, pp. 913–921, 2006.
[58]
X. Shen, X. Z. Gao, R. Bie, and X. Jin, “Artificial immune networks: models and applications,” in Proceedings of the International Conference on Computational Intelligence and Security (ICCIAS '06), pp. 394–397, October 2006.
[59]
L. de Castro and F. von Zuben, “aiNet: an artificial immune network for data analysis,” in Data Mining: A Heuristic Approach, pp. 231–259, Group Idea Publishing, 2001.
[60]
J. Kelsey and J. Timmis, “Immune inspired somatic contiguous hypermutation for function optimisation,” in Genetic and Evolutionary Computation (GECCO '03), 2003.
[61]
H. Ishibuchi, K. Nozaki, N. Yamamoto, and H. Tanaka, “Selecting fuzzy if-then rules for classification problems using genetic algorithms,” IEEE Transactions on Fuzzy Systems, vol. 3, no. 3, pp. 260–270, 1995.
[62]
O. Cordón and F. Herrera, “A three-stage evolutionary process for learning descriptive and approximate fuzzy-logic-controller knowledge bases from examples,” International Journal of Approximate Reasoning, vol. 17, no. 4, pp. 369–407, 1997.
[63]
F. Hoffmann, “Combining boosting and evolutionary algorithms for learning of fuzzy classification rules,” Fuzzy Sets and Systems, vol. 141, no. 1, pp. 47–58, 2004.
[64]
K. Nozaki, H. Ishibuchi, and H. Tanaka, “Adaptive fuzzy rule-based classification systems,” IEEE Transactions on Fuzzy Systems, vol. 4, no. 3, pp. 238–250, 1996.
[65]
M. S. Abadeh, J. Habibi, M. Daneshi, M. Jalali, and M. Khezrzadeh, “Intrusion detection using a hybridization of evolutionary fuzzy systems and artificial immune systems,” in Proceedings of the IEEE Congress on Evolutionary Computation (CEC '07), pp. 3547–3553, September 2007.
[66]
A. Watkins, J. Timmis, and L. Boggess, “Artificial immune recognition system (AIRS): An immune-inspired supervised learning algorithm,” Genetic Programming and Evolvable Machines, vol. 5, no. 3, pp. 291–317, 2004.