{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T23:41:36Z","timestamp":1764978096611,"version":"3.46.0"},"reference-count":26,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T00:00:00Z","timestamp":1529280000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12,18]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Credit risk analysis is important for financial institutions that provide loans to businesses and individuals. Banks and other financial institutions generally face risks that are mostly of financial nature; hence, such institutions must balance risks and returns. Analyzing or determining risk levels involved in credits, finances, and loans can be performed through predictive analytic techniques, such as an extreme learning machine (ELM). In this work, we empirically evaluated the performance of an ELM for credit risk problems and compared it to naive Bayes, decision tree, and multi-layer perceptron (MLP). The comparison was conducted on the basis of a German credit risk dataset. The simulation results of statistical measures of performance corroborated that the ELM outperforms naive Bayes, decision tree, and MLP classifiers by 1.8248%, 16.6346%, and 5.8934%, respectively.<\/jats:p>","DOI":"10.1515\/jisys-2018-0058","type":"journal-article","created":{"date-parts":[[2018,6,17]],"date-time":"2018-06-17T18:16:31Z","timestamp":1529259391000},"page":"640-652","source":"Crossref","is-referenced-by-count":2,"title":["Extreme Learning Machine for Credit Risk Analysis"],"prefix":"10.1515","volume":"29","author":[{"given":"Mais Haj","family":"Qasem","sequence":"first","affiliation":[{"name":"King Abdullah II School for Information Technology , The University of Jordan , Amman , Jordan"}]},{"given":"Loai","family":"Nemer","sequence":"additional","affiliation":[{"name":"King Abdullah II School for Information Technology , The University of Jordan , Amman , Jordan"}]}],"member":"374","published-online":{"date-parts":[[2018,6,18]]},"reference":[{"key":"2025120523362797265_j_jisys-2018-0058_ref_001","doi-asserted-by":"crossref","unstructured":"E. I. Altman and A. Saunders, Credit risk measurement: developments over the last 20 years, J. Banking Finance 21 (1997), 1721\u20131742.","DOI":"10.1016\/S0378-4266(97)00036-8"},{"key":"2025120523362797265_j_jisys-2018-0058_ref_002","doi-asserted-by":"crossref","unstructured":"L. Andersen and J. Sidenius, J. Extensions to the Gaussian copula: random recovery and random factor loadings, J. Credit Risk Vol. 1 (2004), 5.","DOI":"10.21314\/JCR.2005.003"},{"key":"2025120523362797265_j_jisys-2018-0058_ref_003","doi-asserted-by":"crossref","unstructured":"E. Avci, A new method for expert target recognition system: genetic wavelet extreme learning machine (GAWELM), Expert Syst. Appl. 40 (2013), 3984\u20133993.","DOI":"10.1016\/j.eswa.2013.01.011"},{"key":"2025120523362797265_j_jisys-2018-0058_ref_004","doi-asserted-by":"crossref","unstructured":"E. Avci and R. Coteli, A new automatic target recognition system based on wavelet extreme learning machine, Expert Syst. Appl. 39 (2012), 12340\u201312348.","DOI":"10.1016\/j.eswa.2012.04.012"},{"key":"2025120523362797265_j_jisys-2018-0058_ref_005","doi-asserted-by":"crossref","unstructured":"N. V. Chawla, K. W. Bowyer, L. O. Hall and W. P. Kegelmeyer, SMOTE: synthetic minority over-sampling technique, J. Artif. Intell. Res. 16 (2002), 321\u2013357.","DOI":"10.1613\/jair.953"},{"key":"2025120523362797265_j_jisys-2018-0058_ref_006","unstructured":"D. Cossin and H. Pirotte, Advanced Credit Risk Analysis: Financial Approaches and Mathematical Models to Assess, Price, and Manage Credit Risk, Wiley, New York, 2000."},{"key":"2025120523362797265_j_jisys-2018-0058_ref_007","doi-asserted-by":"crossref","unstructured":"M. Crouhy, D. Galai and R. Mark, A comparative analysis of current credit risk models, J. Banking Finance 24 (2000), 59\u2013117.","DOI":"10.1016\/S0378-4266(99)00053-9"},{"key":"2025120523362797265_j_jisys-2018-0058_ref_008","unstructured":"B. Ganguin and J. Bilardello, Standard & Poor\u2019s Fundamentals of Corporate Credit Analysis, McGraw Hill Professional, New York, 2004."},{"key":"2025120523362797265_j_jisys-2018-0058_ref_009","doi-asserted-by":"crossref","unstructured":"P. Golestaneh, M. Zekri and F. Sheikholeslam, Fuzzy wavelet extreme learning machine, Fuzzy Sets Syst. 342 (2018), 90\u2013108.","DOI":"10.1016\/j.fss.2017.12.006"},{"key":"2025120523362797265_j_jisys-2018-0058_ref_010","doi-asserted-by":"crossref","unstructured":"G. B. Huang, Q. Y. Zhu, and C. K. Siew, Extreme learning machine: a new learning scheme of feedforward neural networks, in: Proceedings 2004 IEEE International Joint Conference on Neural Networks, vol. 2, pp. 985\u2013990, IEEE, 2004.","DOI":"10.1109\/IJCNN.2004.1380068"},{"key":"2025120523362797265_j_jisys-2018-0058_ref_011","doi-asserted-by":"crossref","unstructured":"G.-B. Huang, Q.-Y. Zhu and C.-K. Siew, Extreme learning machine: theory and applications, Neurocomputing 70 (2006), 489\u2013501.","DOI":"10.1016\/j.neucom.2005.12.126"},{"key":"2025120523362797265_j_jisys-2018-0058_ref_012","doi-asserted-by":"crossref","unstructured":"G. B. Huang, D. H. Wang and Y. Lan, Extreme learning machines: a survey, Int. J. Mach. Learn. Cybernet. 2 (2011), 107\u2013122.","DOI":"10.1007\/s13042-011-0019-y"},{"key":"2025120523362797265_j_jisys-2018-0058_ref_013","doi-asserted-by":"crossref","unstructured":"G. B. Huang, H. Zhou, X. Ding and R. Zhang, Extreme learning machine for regression and multiclass classification, IEEE Trans. Syst. Man Cybernet. Pt. B (Cybernet.) 42 (2012), 513\u2013529.","DOI":"10.1109\/TSMCB.2011.2168604"},{"key":"2025120523362797265_j_jisys-2018-0058_ref_014","doi-asserted-by":"crossref","unstructured":"G. Huang, G. B. Huang, S. Song and K. You, Trends in extreme learning machines: a review, Neural Netw. 61 (2015), 32\u201348.","DOI":"10.1016\/j.neunet.2014.10.001"},{"key":"2025120523362797265_j_jisys-2018-0058_ref_015","unstructured":"F. Mahmud and M. Al Mamun, Facial expression recognition system using extreme learning machine, Int. J. Sci. Eng. Res. 8 (2017), 26\u201330."},{"key":"2025120523362797265_j_jisys-2018-0058_ref_016","doi-asserted-by":"crossref","unstructured":"Y. Miche, A. Sorjamaa, P. Bas, O. Simula, C. Jutten and A. Lendasse, OP-ELM: optimally pruned extreme learning machine, IEEE Trans. Neural Netw. 21 (2010), 158\u2013162.","DOI":"10.1109\/TNN.2009.2036259"},{"key":"2025120523362797265_j_jisys-2018-0058_ref_017","unstructured":"P. Murphy and D. Aha, UCI Repository of Machine Learning Databases, Department of Information and Computer Science, University of California, Irvine, CA, 1994."},{"key":"2025120523362797265_j_jisys-2018-0058_ref_018","unstructured":"T. R. Patil and S. S. Sherekar, Performance analysis of naive Bayes and J48 classification algorithm for data classification, Int. J. Comput. Sci. Appl. 6 (2013), 256\u2013261."},{"key":"2025120523362797265_j_jisys-2018-0058_ref_019","unstructured":"H. Pirotte and D. Cossin, Advanced credit risk analysis: financial approaches and mathematical models to assess, price, and manage credit risk (No. 2013\/191833), ULB \u2013 Universite Libre de Bruxelles, 2000."},{"key":"2025120523362797265_j_jisys-2018-0058_ref_020","doi-asserted-by":"crossref","unstructured":"M. H. Qasem, H. Faris, A. Rodan and A. Sheta, Empirical evaluation of the cycle reservoir with regular jumps for time series forecasting: a comparison study, in: Computer Science On-line Conference, pp. 115\u2013124, Springer, Cham, 2017.","DOI":"10.1007\/978-3-319-57261-1_12"},{"key":"2025120523362797265_j_jisys-2018-0058_ref_021","doi-asserted-by":"crossref","unstructured":"S. R. Safavian and D. Landgrebe, A survey of decision tree classifier methodology, IEEE Trans. Syst. Man Cybernet. 21 (1991), 660\u2013674.","DOI":"10.1109\/21.97458"},{"key":"2025120523362797265_j_jisys-2018-0058_ref_022","unstructured":"A. Sonak and R. Patankar, A survey on methods to handle imbalance dataset, Int. J. Comput. Sci. Mobile Comput. 4 (2015), 338\u2013343."},{"key":"2025120523362797265_j_jisys-2018-0058_ref_023","doi-asserted-by":"crossref","unstructured":"H. Taud and J. F. Mas, Multilayer perceptron (MLP), in: Geomatic Approaches for Modeling Land Change Scenarios, pp. 451\u2013455, Springer, Cham, 2018.","DOI":"10.1007\/978-3-319-60801-3_27"},{"key":"2025120523362797265_j_jisys-2018-0058_ref_024","doi-asserted-by":"crossref","unstructured":"S. Wang and X. Yao, Diversity analysis on imbalanced data sets by using ensemble models, in: IEEE Symposium on Computational Intelligence and Data Mining, CIDM\u201909, pp. 324\u2013331, IEEE, Nashville, TN, USA, 2009.","DOI":"10.1109\/CIDM.2009.4938667"},{"key":"2025120523362797265_j_jisys-2018-0058_ref_025","doi-asserted-by":"crossref","unstructured":"Y. Zhang, Y. Wang, G. Zhou, J. Jin, B. Wang, X. Wang and A. Cichocki, Multi-kernel extreme learning machine for EEG classification in brain-computer interfaces, Expert Syst. Appl. 96 (2018), 302\u2013310.","DOI":"10.1016\/j.eswa.2017.12.015"},{"key":"2025120523362797265_j_jisys-2018-0058_ref_026","doi-asserted-by":"crossref","unstructured":"Q. Y. Zhu, A. K. Qin, P. N. Suganthan and G. B. Huang, Evolutionary extreme learning machine, Pattern Recogn. 38 (2005), 1759\u20131763.","DOI":"10.1016\/j.patcog.2005.03.028"}],"container-title":["Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/view\/journals\/jisys\/29\/1\/article-p640.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2018-0058\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2018-0058\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T23:39:34Z","timestamp":1764977974000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2018-0058\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,18]]},"references-count":26,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2018,4,25]]},"published-print":{"date-parts":[[2019,12,18]]}},"alternative-id":["10.1515\/jisys-2018-0058"],"URL":"https:\/\/doi.org\/10.1515\/jisys-2018-0058","relation":{},"ISSN":["2191-026X","0334-1860"],"issn-type":[{"type":"electronic","value":"2191-026X"},{"type":"print","value":"0334-1860"}],"subject":[],"published":{"date-parts":[[2018,6,18]]}}}