EP1261928A2 - System and method for valuing loan portfolios using fuzzy clustering - Google Patents
System and method for valuing loan portfolios using fuzzy clusteringInfo
- Publication number
- EP1261928A2 EP1261928A2 EP00982309A EP00982309A EP1261928A2 EP 1261928 A2 EP1261928 A2 EP 1261928A2 EP 00982309 A EP00982309 A EP 00982309A EP 00982309 A EP00982309 A EP 00982309A EP 1261928 A2 EP1261928 A2 EP 1261928A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- assets
- cluster
- fuzzy clustering
- logic
- intra
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation or account maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/06—Asset management; Financial planning or analysis
Definitions
- This disclosure relates to the valuation of loan portfolios, and more specifically, describes a system and method for valuating loan portfolios using clustering logic.
- the valuation process involves determining the worth of income/cash flow generating assets. It is a relatively simple process that can be applied to expected streams of benefits from bonds, stocks, rental properties, oil v ells and loans.
- the valuation process is performed in order to determine the assets' worth at a give • point in time.
- the time value of money concept and the risk return concept are key elements in the valuation process.
- the valuation of any asset is equal to the net present value of all the expected future benefits, which are commonly measured in terms of cash flow.
- This disclosure describes a system and method for the valuation of loan portfolios using clustering logic.
- An assets acquisition logic acquires a plurality of assets and attaches a plurality of variables to the plurality of assets in an assets database.
- Segmentation logic examines the plurality of assets and variables with a model.
- a fuzzy clustering logic calculates a value of the plurality of assets and variables, and a profitability analysis logic calculates a profitability of the plurality of assets.
- This disclosure can also be viewed as providing a method for valuating loan portfolios using clustering logic.
- the method can be broadly summarized by the following steps: (1) acquiring a plurality of assets and attaching a plurality of variables to the assets; (2) examining the plurality of assets and variables with a model; (3) using fuzzy clustering to calculate the value of the plurality of assets and variables; and (4) calculating a profitability of the plurality of assets.
- assets can be, but are not limited to, loan portfolios, bonds, stocks, rental property, etc.
- FIG. 1 is a block diagram illustrating an example of the valuating of assets using a fuzzy clustering system with the example of loan portfolios.
- FIG. 2 is a block diagram illustrating the valuation of assets using fuzzy clustering, situated w ' thin a computer readable medium in a computer system.
- FIG. 3 is a block diagram illustrating an example of the process flow of the system and method for valuation of assets using fuzzy clustering.
- FIG. 4 is a flow c art illustrating an example of the process flow of the system and method for evaluation of assets using fuzzy clustering, for an example of different types of loan portfolios.
- FIG. 5 is a block diagram of an example illustrating the different types of data acquired during the data acquisition process, as shown in FIGs. 2, 3 and 4.
- FIG. 6 is a table of examples of critical variables and the encoding schemes utilized in the hierarchical segmentation process, as shown in FIGs. 3 and 4.
- FIG. 7 is a block diagram of an example illustrating the use of segmentation modeling for the example of loan portfolios, as shown in FIGs. 2, 3 and 4 above.
- FIG. 8 is a flow chart example of the fuzzy clustering process used in the system and method for valuation of assets of the present invention, for the example of loan portfolios, as shown in FIGs. 2, 3 and 4.
- FIG. 9 is a flow chart of an example of the process that calculates the fuzzy clustering means in the system and method for asset valuation of the present invention, for the examples of loans and a portfolio, as shown in FIGs. 2, 3, 4 and 8.
- FIG. 10 is a flow chart of an example of the underwriting review process in the system and method for valuing of assets of the present invention, for the example of loans in a portfolio, as shown in FIGs. 2, 3, and 4.
- FIG. 1 1 A is a diagram illustrating an example of the intra-cluster variance of the six clusters generated in the dendrogram, as shown in FIG. 1 ID.
- FIG. 1 IB is a diagram illustrating the inter-cluster variance of the six clusters, as shown in FIGs. 11A and 1 lC.
- FIG. 11C is a diagram ref rred to as a dendrogram for illustrating each pair of cluster centroids using the distance matrix, as found in FIG. 8.
- FIG. 1 ID is a diagram of a dendrogram generated during a rerun of the generate dendrogram, as shown in FIGs. 8 and 1 IB.
- FIG. 12 is an example of a HELTR table of the valuation of the six clusters, as shown in FIG. 11D.
- FIG. 1 Illustrated in FIG. 1 is a high-level view block diagram of the valuation of assets using the fuzzy clustering process.
- the process includes acquiring a number of portfolios of loans 2A-2Z. These portfolios of loans are then restructured using a portfolio restructuring process 3.
- the restructured portfolios are next fed into a merge loan information process 4, which takes loan information from a loan information database 5 and merges that loan information with the restructured portfolios.
- the restructured portfolios with the appended loan information 5 are then output as restructured portfolio 6A-6H.
- These restructured portfolios 6A-6H are then fed into a (expand) HELTR process 7 of the present invention.
- the HELTR process 7 provides a method for forming a valuation of assets using fuzzy clustering of the present invention.
- the valuing of assets using the fuzzy clustering method of the present invention takes the aforementioned loan data, then gives the expected cash flow and risk assessment for each of the restructured portfolios of assets 8.
- a computer system 21 generally comprises a processor 22 and memory 31 (e.g., RAM, ROM, hard disk, CD-ROM, etc.) with an operating system 32.
- the processor 22 accepts code and data from the memory 31 over the local interface 23, for example, a bus(es).
- Direction from the user can be signaled by using input devices, for example but not limited to, a mouse 24 and a keyboard 25.
- An asset valuation using the fuzzy clustering system 50 can access other computers and resources on a network, utilizing modem or network card 27.
- a asset valuation using fuzzy clustering system 50 that includes: a data acquisition process 60, a variable selection process 80, a hierarchical segmentation process 100, a fuzzy clustering process 120, and an underwriting review process 180, which are in memory area 31.
- Databases 33 are also shown to reside in memory area 31. These components are herein described in further detail with regard to FIGS. 2-12.
- the memory area 31 can be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium.
- the memory area 31 includes any one or more of the following: an electrical connection (electronic) having one or more wires, a portable computer diskette (magnetic), a random access memory (RAM) (magnetic), a read-only memory (ROM) (magnetic), an erasable programmable read-only memory (EPROM or Flash memory) (magnetic), an optical fiber (optical), and a portable compact disc read-only memory (CDROM) (optical).
- an electrical connection electronic having one or more wires
- a portable computer diskette magnetic
- RAM random access memory
- ROM read-only memory
- EPROM or Flash memory erasable programmable read-only memory
- CDROM portable compact disc read-only memory
- Illustrated in FIG. 3 is an example of the system and method flow for asset valuation using fuzzy clustering system 50 of this disclosure.
- the following description of the system and method for asset valuation using fuzzy clustering system 50 uses the example of loan portfolios.
- the assets can be, but are not limited to, loans, insurance policies, bonds, stocks, rental properties and other properties.
- the system and method for asset valuation using fuzzy clustering system 50 includes the data acquisition process 60 that comprises the step of acquiring data.
- data acquisition process 60 comprises the step of acquiring data.
- loan portfolios For the example used in the disclosure: loan portfolios, loan background information including loanee payment history data sets, credit analysis data sets, auto loan and mortgage loan data sets, and industry specific data sets.
- the data acquisition process 60 employs a divide and conquer approach to handling massive amounts of asset data.
- the asset data is input into the variable selection process 80 that identifies the critical loan variables for credit review or those variables with the most discriminating power and separating the various loan groups.
- the loan portfolio data collected in the data acquisition process 60 and the critical variables identified in the variable selection process 80 are both input into the hierarchical segmentation process 100.
- the hierarchical segmentation process 100 segments the entire portfolio of assets (i.e., for this example, loans) into a number of bins based upon a predetermined critical variable selected by those reviewing the creditworthiness of the portfolios.
- the segmented assets i.e., loans
- the fuzzy clustering process 120 classifies each of the segmented bins into a predetermined number of clusters based upon natural structure of the asset data.
- the classification of assets are further processed by the underwriting review process 180 that assigns the projected cash flow and risk scores for the assets for each of the clusters.
- the projected cash flow and risk scores for the assets for each of the clusters is output for usage in the analysis of the creditworthiness of the portfolios.
- the data acquisition process 60, variable selection process 80, hierarchical segmentation process 100, the fuzzy clustering process 120 and underwriting review process 180 are hereindefined in further detail with regard to FIGs. 4-12.
- FIG. 4 Illustrated in FIG. 4 is a flow chart of the example of the asset valuation using fuzzy clustering system 50.
- the asset valuation using fuzzy clustering system 50 executes the data acquisition process 60 at step 51.
- the data acquisition process 60 is hereindefined in further detail with regard to FIG. 5.
- the assets valuation using fuzzy clustering system 50 next executes the variable selection process 80 at step 52.
- the variable selection process 80 utilizes the asset data captured in the data acquisition process 60.
- the variable selection process 80 is hereindefined in further detail with regard to FIG. 6.
- the asset valuation using fuzzy clustering system 50 then executes the hierarchical segmentation process 100.
- the hierarchical segmentation process 100 segments the portfolio of assets, i.e., loans, into a user predefined number of bins based upon the user identified critical variables.
- the hierarchical segmentation process 120 is hereindefined in further detail with regard to FIG. 7.
- the asset valuation using fuzzy clustering system 50 next executes the fuzzy clustering process at step 54.
- the fuzzy clustering process 120 further classifies each of the bins identified in the hierarchical segmentation process 100 into a user predetermined number of clusters based upon the natural structure of the a c set data.
- the fuzzy clustering process 120 is hereindefined in further detail with regard to FIG. 8.
- the asset valuation of using fuzzy clustering system 50 executes the underwriting review process 180 at step 55.
- the underwriting review process 180 assigns the projected cash flow and risk scores to each of the clusters identified by the fuzzy clustering process 120.
- the underwriting review process 180 is hereindefined in further detail with regard to FIG. 10.
- the asset valuation using fuzzy clustering system 50 then exits. Illustrated in FIG. 5 is a block diagram illustrating example types of asset databases utilized in building the attaching of asset relevant variables to the asset portfolio.
- the data acquisition process 60 includes the step of acquiring asset related data. This step generally comprises attaching data relevant to the assets in the asset portfolio. This disclosure will illustrate these concepts using a loan example discussed throughout this disclosure. Using this example, the loans will have relevant data cross-referenced and merged into the asset information.
- the loan asset data in the loan asset database 60 are cross-referenced and merged with multiple databases.
- the example loan asset database can include records from a variety of different universal files or databases including, for example, but not limited to, loanee payment history data sets 35, public credit analysis data sets 36, private credit analysis data sets 37, auto loan and mortgage loan data set data 38 and industry specific data sets 39.
- the loan asset records in the loan assets database 60 are merged with the above-referenced data which will then be useful in identifying critical variables that are used during hierarchical segmentation process 100 and fuzzy clustering process 120 execution.
- data scrubbing on the collected data is performed. For instance, data scru bing includes but is not limited to, detecting outliers, filing in or deleting missing values, derived imputed variables from raw data, etc.
- variable selection process 80 Illustrated in FIG. 6 is a table of an example of one implementation of the variable selection process 80.
- the user identifies those variables that are deemed critical.
- the variable selection process 80 has identified 11 variables that will be utilized by the fuzzy clustering process 120.
- associated with each of the variables deemed critical there is an associated category and/or value range for the variable as well as an encoding scheme for representing the variable.
- Illustrated in FIG. 7 is an example of a hierarchical segmentation model created during the hierarchical segmentation process 100 with regard to the loan portfolios example.
- One example of a hierarchical segmentation model applied by the hierarchical segmentation process 100 is CART.
- CART is a well-known statistical algorithm of regressive trees and is used for hierarchical segmentation. The idea behind the regression trees is to segment the loan portfolios into a predetermined number of categories such that each category is homogenous with regard to the user predefined critical variables.
- the resulting regression tree has the example loan portfolios segmented using three critical variables. These three critical variables for this example include loan security, the loan type and the last payment on the loan.
- the resulting regression tree partitions the loan portfolio using these three critical variables into six bins. These partitions can be represented as a tree structure using the CART model.
- the fuzzy clustering process 120 then can perform a fine granular partitioning of each of these predetermined bins.
- FIG. 8 Illustrated in FIG. 8 is a flow chart of an example one implementation of the fuzzy clustering process 120 of the present invention.
- the example implementation shown in FIG. 8 uses the example of the segmented loan portfolios generated by the hierarchical segmentation process 100.
- the fuzzy clustering process 120 is first initialized at step 121.
- the fuzzy clustering process calculates the fuzzy clustering means by executing a calculate FCM process 140.
- the calculate FCM process 140 is hereindefined in further detail with regard to FIG. 9.
- the fuzzy clustering process 120 calculates the intra-cluster and inter-cluster variance by box plot. This calculation of the intra-cluster and inter-cluster variance by box plot is a diagnostic check on the final result. This diagnostic check is performed by examining the corresponding box plots for the intra-cluster and inter-cluster, respectively.
- the intra-cluster and inter- cluster variance box-plots are hereindefined in further detail with regard to FIGs. 11 (A&B).
- the fuzzy clustering process 120 determines if the intra-cluster and inter-cluster variance are compact enough or there is only one cluster left. Determining if the clustering is compact enough is resolved by determining if the intra-cluster variance is minimized while the inter-cluster variance is maximized by the calculate FMC process performed at step 122. If it is determined at step 124 that the clustering is compact enough or that only one is left, the fuzzy clustering process 120 exits at step 139.
- the fuzzy clustering process 120 If it is determined that the clustering is not compacted enough at step 124, the fuzzy clustering process 120 then gets the first pair on next set of cluster centroids at step 125. The fuzzy clustering process 120 calculates the distance between each of the pair of cluster centroids and stores this distance in a distance matrix at step 126. At step 131, the fuzzy clustering process 120 determines if there are more clustering centroid pairs to be examined. If there are more cluster centroid pairs to be examined, fuzzy clustering process 120 returns to repeat steps 125-131.
- the fuzzy clustering process 120 then generates a dendrogram for each pair of cluster centroids using the distance matrix at step 132.
- the fuzzy clustering process 120 at step 133 inspects the dendrogram for possible merg es of cluster centroids.
- the process inspects the dendrogram for possibu: merge of centroid clusters.
- the example of a dendrogram is hereindefined in further detail with regard to FIGs. 1 1 A through 11D.
- the fuzzy clustering process 120 determines if any cluster centroids can be merged. If there is possible merger of a pair of cluster centroids, the fuzzy clustering process 120 returns to repeat steps 122 through 124. If the fuzzy clustering process 120 determines that there is no possible merger of cluster centroids, the fuzzy clustering process 120 then exits at step 139. This process is herein defined in further detail with regard to FIGs. 1 1 A and 1 IB.
- step 141 the number clusters and weighted exponents are input into the calculate FCM process 140.
- step 142 the first cluster at step 142.
- step 143 the first (next) data point is obtained.
- the calculate FCM process 140 then randomizes the degree of membership of each point of each cluster at step 144.
- the degree of membership ⁇ lk is defined by
- the calculate FCM determines whether all the data points in the current cluster have been randomized at step 145. If it is determined at step 145 that all of the data points have not been randomized, the calculate FCM process 140 then returns to repeat steps 143 through 145.
- the calculate FCM process 140 determines if all the data points have been randomized for all of the available clusters at step 146. If the calculate FCM process 140 determines that not all the clusters have had their data points randomized, then the calculate FCM process 140 then returns to repeat steps 142 through 146.
- the calculate FCM process 140 calculates the centroid for all the data points at step 147.
- the rth cluster centroid V is defined by
- V render is the ith cluster centroid, is the weighted sum of the coordinates of X k , where k is the number of data points.
- the calculate FCM process 140 will converge to a solution for V, that represents either a local minimum or a saddle point of the cost function.
- the quality of the calculate FCM process 140 solution like that of most nonlinear optimization problems, depends strongly on the choice of initial values - the number c and the initial cluster centroids V,.
- the calculate FCM process 140 calculates the objective function.
- the objective function is defined by
- ⁇ lk is a real number and bounded in [0, 1].
- the cost function would be minimized if each data point belongs exactly to a specific cluster and there is no partial degree of membership to any other clusters. That is, there is no ambiguity in assigning each data point to the cluster where it belongs.
- the calculate FCM process 140 determines whether the value of the calculate objective function is convergent. If the calculate objective function is not convergent, the calculate FCM process 140 proceeds to steps 151 through 155. If the calculate FCM process 140 determines that the value of the objective function is convergent at step 149, the calculate FCM process then exits at step 159.
- the calculate FCM process 140 gets the first cluster.
- the first data point is obtained.
- the FCM process 140 then updates the degree of membership of each point in each cluster at step 153.
- the calculate FCM process 140 determines whether every data point in the current cluster has been updated. If all the data points in the current cluster have not been updated, the calculate FCM process 140 then returns to repeat steps 152 through 154. If all the data points for the current cluster have been updated, the calculate FCM process 140 next determines whether each data point of all the clusters has been updated at step 155.
- the calculate FCM process 140 determines that not all data points have been updated for all clusters at step 155, the calculate FCM process 140 then returns to repeat steps 151 through 155. If the calculate FCM process 140 determines that all the data points for all the clusters have been updated at step 155, the calculate FCM process 140 then returns to repeat steps 147-149, as defined above.
- underwriting review process 180 Illustrated in FIG. 10 is underwriting review process 180.
- the underwriting review process 180 is performed after the entire portfolio is segmented by the fuzzy clustering processing 120.
- each cluster is reviewed and is assigned a composite score called HELTR.
- HELTR s ⁇ nds for: H- high cash flow; E-expected cash flow; L-low cash flow; T-timing of cash flow in months; and R-risk assessment of borrower.
- the HELTR score captures both the expected and range of cash, the timing of cash flow and the risk associate 1 with each cluster.
- the underwriting review process 180 is initialized at step 181. At step 181.
- the first loan segment is obtained and made the current loan segment.
- the underwriting review process 180 calculates the cash flow score and timing of the cash flow for the current cluster in the current loan segment.
- the underwriting review process 180 calculates the risk assessment of purchasing all the clusters in the current loan segment.
- the underwriting review process determines if the assessment of all the current clusters in the current loan segment have been performed. If there are more clusters in the current loan segment, the underwriting review process 180 returns to repeat step 183 through 186.
- the underwriting review process 180 determines whether all the clusters have been reviewed in all of the loan segments If the underwriting review process 180 determines that not all the clusters in all the loan segments have been reviewed, the underwriting review process 180 returns to repeat steps 182 through 187 If the underwriting review process 180 determines that all of the clusters in all of the loan segments have been reviewed, the underwriting review process 180 then exits at step 189
- FIG 1 1A and 1 IB Illustrated in FIG 1 1A and 1 IB are the intra-cluster and inter-cluster variance of an example of six clusters as generated at step 123 (FIG 8) As shown in FIG 1 IB, the average distance of all the data points to centroid one is 1 0, while the average distance of the data points in cluster 1 is 0 6 as shown in FIG 1 1A This indicates that the cluste ⁇ ng is quite compact Therefore, the intra-cluster variance is minimized, while the inter-cluster variance is maximized by the calculate FCM process 140
- FIGs 1 1C and 1 ID Illustrated in FIGs 1 1C and 1 ID are dendrograms of 20 clusters and 6 c'usters, respectively. It is noted that each dendrogram starts with a data point forming a separate cluster, and in which data points or clusters close to one another are successive s fully merged It usually requires a couple iterations of the fuzzy clustering process 12 to get the optimum of amount of clusters As shown in FIG 11C, of the 20 centroids, 12 of them should be merged Therefore, in the above example, the fu ⁇ zy cluste ⁇ ng process 120 is then re-executed with six clusters with the result being shown in FIG 11D.
- FIG. 12 Illustrated in FIG. 12 is an example of a HELTR table for the six clusters shown in FIGs. 1 ID
- the HELTR table includes data for each centroid identified in the example in FIG 7 and for each cluster within each identified centroid
- the data utilized in the HELTR table include whether or not the loans are secured, revolving credit, required notice, include a last payment, loan maturity, or whether or not the loans are guaranteed Shown are the collective score, en position, unpaid p ⁇ nciple balance in millions, total unpaid principal %, and cash flow analysis
- the method and system for the valuation of assets using fuzzy clustering system 50 comprise an ordered listing of executable instructions for implementing logical functions.
- the ordered listing can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device, and execute the instructions.
- a "computer-readable medium” can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
- the computer readable medium can be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. More specific examples (a nonexhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic) having one or more wires, a portable computer diskette
- Magnetic magnetic
- RAM random access memory
- ROM read-only memory
- EPROM or Flash memory erasable programmable read-only memory
- CDROM portable compact disc read-only memory
- the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured via, for instance, optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
- each block represents a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
- each block represents a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
- the functions noted in the blocks may occur out of the order noted in the figures, or for example, may in fact be executed substantially concurrently or in the reverse order, depending upon the functionality involved.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Technology Law (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Marketing (AREA)
- Entrepreneurship & Innovation (AREA)
- Game Theory and Decision Science (AREA)
- Human Resources & Organizations (AREA)
- Operations Research (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16849999P | 1999-12-02 | 1999-12-02 | |
US168499P | 1999-12-02 | ||
US56188600A | 2000-05-01 | 2000-05-01 | |
US561886 | 2000-05-01 | ||
PCT/US2000/032592 WO2001041016A2 (en) | 1999-12-02 | 2000-11-30 | System and method for valuing loan portfolios using fuzzy clustering |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1261928A2 true EP1261928A2 (en) | 2002-12-04 |
Family
ID=26864184
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP00982309A Withdrawn EP1261928A2 (en) | 1999-12-02 | 2000-11-30 | System and method for valuing loan portfolios using fuzzy clustering |
Country Status (9)
Country | Link |
---|---|
EP (1) | EP1261928A2 (en) |
JP (1) | JP2003526848A (en) |
KR (1) | KR100686466B1 (en) |
CN (1) | CN1630867A (en) |
AU (1) | AU1935901A (en) |
BR (1) | BR0016142A (en) |
MX (1) | MXPA02005432A (en) |
PL (1) | PL358525A1 (en) |
WO (1) | WO2001041016A2 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130238395A1 (en) * | 2010-11-27 | 2013-09-12 | Jerry Z. Shan | Composite Driver Derivation |
CN105528730B (en) * | 2015-12-15 | 2021-11-09 | 杜衡 | Asset pool targeting method based on asset securitization |
AU2017308691B2 (en) * | 2016-08-12 | 2021-12-16 | Centaurus Biopharma Co., Ltd. | Crystal of DPP-IV long-acting inhibitor and salt thereof |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3555211B2 (en) * | 1994-07-06 | 2004-08-18 | オムロン株式会社 | Database search apparatus and method, direct mail issuance support system equipped with database search apparatus |
JP3334029B2 (en) * | 1996-03-28 | 2002-10-15 | 日本電信電話株式会社 | Cluster classification method and cluster classification device |
JPH10275177A (en) * | 1997-03-28 | 1998-10-13 | Nri & Ncc Co Ltd | Device and method for evaluating performance of investment trust |
-
2000
- 2000-11-30 CN CNA008187681A patent/CN1630867A/en active Pending
- 2000-11-30 MX MXPA02005432A patent/MXPA02005432A/en not_active Application Discontinuation
- 2000-11-30 WO PCT/US2000/032592 patent/WO2001041016A2/en not_active Application Discontinuation
- 2000-11-30 BR BR0016142-0A patent/BR0016142A/en not_active Application Discontinuation
- 2000-11-30 JP JP2001542001A patent/JP2003526848A/en active Pending
- 2000-11-30 PL PL00358525A patent/PL358525A1/en not_active Application Discontinuation
- 2000-11-30 EP EP00982309A patent/EP1261928A2/en not_active Withdrawn
- 2000-11-30 AU AU19359/01A patent/AU1935901A/en not_active Abandoned
- 2000-11-30 KR KR1020027007056A patent/KR100686466B1/en not_active IP Right Cessation
Non-Patent Citations (1)
Title |
---|
See references of WO0141016A2 * |
Also Published As
Publication number | Publication date |
---|---|
CN1630867A (en) | 2005-06-22 |
PL358525A1 (en) | 2004-08-09 |
WO2001041016A8 (en) | 2002-02-07 |
BR0016142A (en) | 2002-12-24 |
KR100686466B1 (en) | 2007-02-23 |
KR20020054362A (en) | 2002-07-06 |
MXPA02005432A (en) | 2002-11-29 |
WO2001041016A2 (en) | 2001-06-07 |
AU1935901A (en) | 2001-06-12 |
JP2003526848A (en) | 2003-09-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cielen et al. | Bankruptcy prediction using a data envelopment analysis | |
US6253186B1 (en) | Method and apparatus for detecting fraud | |
US20110238566A1 (en) | System and methods for determining and reporting risk associated with financial instruments | |
US7181422B1 (en) | Segregation and management of financial assets by rules | |
US20150019405A1 (en) | System and method for building and validating a credit scoring function | |
US7272578B1 (en) | Method and system for creating a portfolio of stock equities based on market capitalization and sales | |
Datta et al. | Reorganization and financial distress: An empirical investigation | |
US20050004862A1 (en) | Identifying the probability of violative behavior in a market | |
CN111985937A (en) | Method, system, storage medium and computer equipment for evaluating value information of transaction traders | |
US7801808B1 (en) | Database structure for financial products with unique, consistent identifier for parties that assume roles with respect to the products and methods of using the database structure | |
CN110866822B (en) | Wind control management method and device for securitization of assets, electronic equipment and storage medium | |
Cormier et al. | The auditor's consideration of the going concern assumption: A diagnostic model | |
US11416926B1 (en) | Intelligent data matching and validation system | |
KR20220074176A (en) | Enterprise analysis using finance big data analysis and investment portfolio optimization system and method | |
Zurada et al. | Comparison of the performance of several data mining methods for bad debt recovery in the healthcare industry | |
WO2020058993A1 (en) | A block-chain based smart securitization platform | |
KR100633823B1 (en) | Loan assets management system, loan assets management method and program recording medium for the same | |
Shilbayeh et al. | Creditworthiness pattern prediction and detection for GCC Islamic banks using machine learning techniques | |
WO2001041016A2 (en) | System and method for valuing loan portfolios using fuzzy clustering | |
WO1996030850A1 (en) | Method of and system for determining and assessing credit risks | |
Cheng et al. | Using fuzzy analytical hierarchy process for multi-criteria evaluation model of high-yield bonds investment | |
Davalos et al. | Bankruptcy classification of firms investigated by the US Securities and Exchange Commission: an evolutionary adaptive ensemble model approach | |
JP4213692B2 (en) | Loan asset management system | |
Braswell et al. | Banking and financial activities in the real economy | |
Bollapragada et al. | GE's energy rentals business automates its credit assessment process |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20020807 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Free format text: AL;LT;LV;MK;RO;SI |
|
RBV | Designated contracting states (corrected) |
Designated state(s): FR IT |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: 8566 |
|
17Q | First examination report despatched |
Effective date: 20061018 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20070301 |