{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T17:55:38Z","timestamp":1775152538931,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T00:00:00Z","timestamp":1629676800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T00:00:00Z","timestamp":1629676800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s11277-021-08844-y","type":"journal-article","created":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T16:51:52Z","timestamp":1629737512000},"page":"2699-2718","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Improving the Efficiency of Customer's Credit Rating with Machine Learning in Big Data Cloud Computing"],"prefix":"10.1007","volume":"121","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4932-1660","authenticated-orcid":false,"given":"Amir","family":"Javadpour","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9971-7348","authenticated-orcid":false,"given":"Khatereh","family":"Saedifar","sequence":"additional","affiliation":[]},{"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kuan-Ching","family":"Li","sequence":"additional","affiliation":[]},{"given":"Fatemeh","family":"Saghafi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,23]]},"reference":[{"key":"8844_CR1","doi-asserted-by":"crossref","unstructured":"Javadpour, A., Rezaei, S., Li, K.-C., & Wang, G. (2020) A scalable feature selection and opinion miner using whale optimization algorithm. In Advances in Signal Processing and Intelligent Recognition Systems, pp. 237\u2013247.","DOI":"10.1007\/978-981-15-4828-4_20"},{"issue":"8","key":"8844_CR2","doi-asserted-by":"publisher","first-page":"3825","DOI":"10.1016\/j.eswa.2013.12.003","volume":"41","author":"J Abell\u00e1n","year":"2014","unstructured":"Abell\u00e1n, J., & Mantas, C. J. (2014). Improving experimental studies about ensembles of classifiers for bankruptcy prediction and credit scoring. Expert Systems with Applications, 41(8), 3825\u20133830.","journal-title":"Expert Systems with Applications"},{"key":"8844_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-90294-4","volume-title":"Contemporary Issues in Banking: Regulation","author":"M Garc\u00eda-Olalla","year":"2018","unstructured":"Garc\u00eda-Olalla, M., & Clifton, J. (2018). Contemporary Issues in Banking: Regulation. Springer International Publishing."},{"key":"8844_CR4","first-page":"1","volume":"2020","author":"A Javadpour","year":"2020","unstructured":"Javadpour, A., Wang, G., Rezaei, S., & Li, K.-C. (2020). Detecting straggler MapReduce tasks in big data processing infrastructure by neural network. Journal of Supercomputing, 2020, 1\u201325.","journal-title":"Journal of Supercomputing"},{"key":"8844_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-06427-6","volume-title":"CreditRisk+ in the Banking Industry","author":"M Gundlach","year":"2004","unstructured":"Gundlach, M., & Lehrbass, F. (2004). CreditRisk+ in the Banking Industry. Springer."},{"key":"8844_CR6","doi-asserted-by":"crossref","unstructured":"Javadpour, A., Kazemi Abharian, S., & Wang, G. (2017). Feature selection and intrusion detection in cloud environment based on machine learning algorithms. In 2017 IEEE International Symposium on Parallel Distributed Processing with Application. 2017 IEEE Internationl Conference Ubiquitous Communications and Network Computing, pp. 1417\u20131421, 2017.","DOI":"10.1109\/ISPA\/IUCC.2017.00215"},{"key":"8844_CR7","doi-asserted-by":"crossref","unstructured":"Rezaei, S., Radmanesh, H., Alavizadeh, P., Nikoofar, H., & Lahouti, F. (2016). Automatic fault detection and diagnosis in cellular networks using operations support systems data. In NOMS 2016 - 2016 IEEE\/IFIP Network Operations and Management Symposium, pp. 468\u2013473.","DOI":"10.1109\/NOMS.2016.7502845"},{"key":"8844_CR8","doi-asserted-by":"crossref","unstructured":"Javadpour, A., Wang, G., & Li, K.-C. (2019). A high throughput MAC protocol for wireless body area networks in intensive care. In Smart City and Informatization, pp. 23\u201334.","DOI":"10.1007\/978-981-15-1301-5_3"},{"key":"8844_CR9","volume-title":"Economic Analysis of Information System Investment in Banking Industry","author":"Y Ukai","year":"2006","unstructured":"Ukai, Y. (2006). Economic Analysis of Information System Investment in Banking Industry. Springer."},{"key":"8844_CR10","doi-asserted-by":"crossref","unstructured":"Kao, M.Y., & Li, X.Y. (2007). Algorithmic Aspects in Information and Management: Third International Conference, AAIM 2007, Portland, OR, USA, June 6\u20138, 2007, Proceedings. Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-540-72870-2"},{"key":"8844_CR11","volume-title":"Distributed Algorithms","author":"NA Lynch","year":"1996","unstructured":"Lynch, N. A. (1996). Distributed Algorithms. Elsevier Science."},{"key":"8844_CR12","first-page":"1","volume":"2021","author":"A Javadpour","year":"2021","unstructured":"Javadpour, A., Abadi, A. M. H., Rezaei, S., Zomorodian, M., & Rostami, A. S. (2021). Improving load balancing for data-duplication in big data cloud computing networks. Cluster Comput., 2021, 1\u201319.","journal-title":"Cluster Comput."},{"key":"8844_CR13","doi-asserted-by":"crossref","unstructured":"Filev, D., & Yager, R.R. (1994). Learning OWA operator weights from data. In Fuzzy Systems, 1994. IEEE World Congress on Computational Intelligence., Proceedings of the Third IEEE Conference on, pp. 468\u2013473.","DOI":"10.1109\/FUZZY.1994.343740"},{"issue":"2","key":"8844_CR14","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1016\/j.eswa.2014.08.029","volume":"42","author":"T Harris","year":"2015","unstructured":"Harris, T. (2015). Credit scoring using the clustered support vector machine. Expert Systems with Applications, 42(2), 741\u2013750.","journal-title":"Expert Systems with Applications"},{"issue":"2","key":"8844_CR15","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1016\/j.ejor.2014.04.001","volume":"238","author":"T Verbraken","year":"2014","unstructured":"Verbraken, T., Bravo, C., Weber, R., & Baesens, B. (2014). Development and application of consumer credit scoring models using profit-based classification measures. European Journal of Operational Research, 238(2), 505\u2013513.","journal-title":"European Journal of Operational Research"},{"key":"8844_CR16","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.asoc.2016.02.022","volume":"43","author":"H Xiao","year":"2016","unstructured":"Xiao, H., Xiao, Z., & Wang, Y. (2016). Ensemble classification based on supervised clustering for credit scoring. Applied Soft Computing, 43, 73\u201386.","journal-title":"Applied Soft Computing"},{"issue":"1","key":"8844_CR17","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.ejor.2013.02.030","volume":"234","author":"YH Ju","year":"2014","unstructured":"Ju, Y. H., & Sohn, S. Y. (2014). Updating a credit-scoring model based on new attributes without realization of actual data. European Journal of Operational Research, 234(1), 119\u2013126.","journal-title":"European Journal of Operational Research"},{"issue":"4","key":"8844_CR18","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1007\/s11009-014-9415-6","volume":"17","author":"E Boj","year":"2015","unstructured":"Boj, E., Costa, T., Fortiana, J., & Esteve, A. (2015). Assessing the importance of risk factors in distance-based generalized linear models. Methodology and Computing in Applied Probability, 17(4), 951\u2013962.","journal-title":"Methodology and Computing in Applied Probability"},{"key":"8844_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSTARS.2013.2240437","volume":"6","author":"N Alajlan","year":"2013","unstructured":"Alajlan, N., et al. (2013). Using OWA Fusion Operators for the Classification of Hyperspectral Images. IEEE Journal of Selected Topics in Applied Earth Observations Remote Sensing, 6, 1\u201313.","journal-title":"IEEE Journal of Selected Topics in Applied Earth Observations Remote Sensing"},{"issue":"1","key":"8844_CR20","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.rdf.2014.03.002","volume":"4","author":"HA Bekhet","year":"2014","unstructured":"Bekhet, H. A., & Eletter, S. F. K. (2014). Credit risk assessment model for Jordanian commercial banks: Neural scoring approach. Review of Development Finance, 4(1), 20\u201328.","journal-title":"Review of Development Finance"},{"key":"8844_CR21","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1016\/j.jempfin.2015.03.007","volume":"33","author":"A-S Berger\u00e8s","year":"2015","unstructured":"Berger\u00e8s, A.-S., d\u2019Astous, P., & Dionne, G. (2015). Is there any dependence between consumer credit line utilization and default probability on a term loan? Evidence from bank-customer data. Journal of Empirical Finance, 33, 276\u2013286.","journal-title":"Journal of Empirical Finance"},{"key":"8844_CR22","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.jretconser.2015.07.003","volume":"27","author":"FN Koutanaei","year":"2015","unstructured":"Koutanaei, F. N., Sajedi, H., & Khanbabaei, M. (2015). A hybrid data mining model of feature selection algorithms and ensemble learning classifiers for credit scoring. Journal of Retailing and Consumer Services, 27, 11\u201323.","journal-title":"Journal of Retailing and Consumer Services"},{"key":"8844_CR23","first-page":"96","volume":"1","author":"CP Goh","year":"2015","unstructured":"Goh, C. P., Koh, H. C., & Tan, W. C. (2015). A two-step method to construct credit scoring models with data mining techniques. International Journal of Business and Information, 1, 96\u2013118.","journal-title":"International Journal of Business and Information"},{"issue":"7","key":"8844_CR24","doi-asserted-by":"publisher","first-page":"3508","DOI":"10.1016\/j.eswa.2014.12.006","volume":"42","author":"Z Zhao","year":"2015","unstructured":"Zhao, Z., Xu, S., Kang, B. H., Kabir, M. M. J., Liu, Y., & Wasinger, R. (2015). Investigation and improvement of multi-layer perceptron neural networks for credit scoring. Expert Systems with Applications, 42(7), 3508\u20133516.","journal-title":"Expert Systems with Applications"},{"key":"8844_CR25","doi-asserted-by":"crossref","unstructured":"Siami, M., & Gholamian, M.R. (2011). An application of locally linear model tree algorithm. pp. 133\u2013142","DOI":"10.1007\/978-3-642-24443-8_15"},{"issue":"1","key":"8844_CR26","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.ejor.2015.05.030","volume":"247","author":"S Lessmann","year":"2015","unstructured":"Lessmann, S., Baesens, B., Seow, H.-V., & Thomas, L. C. (2015). Benchmarking state-of-the-art classification algorithms for credit scoring: An update of research. European Journal of Operational Research, 247(1), 124\u2013136.","journal-title":"European Journal of Operational Research"},{"key":"8844_CR27","doi-asserted-by":"crossref","unstructured":"Zhuang, Y., Xu, Z., & Tang, Y. (2015) A credit scoring model based on bayesian network and mutual information. In 2015 12th Web Information System and Application Conference (WISA), pp. 281\u2013286.","DOI":"10.1109\/WISA.2015.31"},{"issue":"1","key":"8844_CR28","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1109\/TPAMI.2007.250607","volume":"29","author":"HL Wei","year":"2007","unstructured":"Wei, H. L., & Billings, S. A. (2007). Feature subset selection and ranking for data dimensionality reduction. IEEE Transactionn on Pattern Analysis and Machine Intelligence, 29(1), 162\u2013166.","journal-title":"IEEE Transactionn on Pattern Analysis and Machine Intelligence"},{"key":"8844_CR29","volume-title":"Classification and Regression Trees","author":"R Olshen","year":"1984","unstructured":"Olshen, R., Breiman, L., Friedman, J., & Stone, C. J. (1984). Classification and Regression Trees. Chapman Hall\/CRC."},{"issue":"1","key":"8844_CR30","first-page":"81","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan, J. R. (1986). Induction of decision trees. Machine Learning, 1(1), 81\u2013106.","journal-title":"Machine Learning"},{"issue":"9","key":"8844_CR31","doi-asserted-by":"publisher","first-page":"2742","DOI":"10.1016\/j.patcog.2008.03.007","volume":"41","author":"Y Hong","year":"2008","unstructured":"Hong, Y., Kwong, S., Chang, Y., & Ren, Q. (2008). Unsupervised feature selection using clustering ensembles and population based incremental learning algorithm. Pattern Recognition, 41(9), 2742\u20132756.","journal-title":"Pattern Recognition"},{"key":"8844_CR32","doi-asserted-by":"crossref","unstructured":"Ahmadi, M., Ulyanov, D., Semenov, S., Trofimov, M., & Giacinto, G. (2016). Novel feature extraction, selection and fusion for effective malware family classification. In Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, pp. 183\u2013194.","DOI":"10.1145\/2857705.2857713"},{"key":"8844_CR33","unstructured":"Han, J., & Kamber, M. (2006). Data transformation. In Data Mining: Concepts and Techniques, pp. 70\u201372."},{"key":"8844_CR34","doi-asserted-by":"crossref","unstructured":"Eid, H.F., Hassanien, A.E., Kim, T., & Banerjee, S. (2013). Linear correlation-based feature selection for network intrusion detection model. In Advances in Security of Information and Communication Networks, Springer, pp. 240\u2013248.","DOI":"10.1007\/978-3-642-40597-6_21"},{"issue":"11","key":"8844_CR35","doi-asserted-by":"publisher","first-page":"26","DOI":"10.5120\/3344-4605","volume":"27","author":"A Sharma","year":"2011","unstructured":"Sharma, A., & Panigrahi, P. (2011). A neural network based approach for predicting customer churn in cellular network services. International Journal of Computer Application, 27(11), 26\u201331.","journal-title":"International Journal of Computer Application"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08844-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08844-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08844-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T20:12:12Z","timestamp":1638303132000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08844-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,23]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["8844"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08844-y","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,23]]},"assertion":[{"value":"6 August 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}