﻿<?xml version="1.0" encoding="utf-8"?><ArticleSet><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>13</Volume><Issue>50</Issue><PubDate PubStatus="epublish"><Year>2025</Year><Month>7</Month><Day>26</Day></PubDate></Journal><ArticleTitle>Linearity Enhanced Noise Cancelling Low Noise Amplifier for Ultra-Wideband Application</ArticleTitle><VernacularTitle>Linearity Enhanced Noise Cancelling Low Noise Amplifier for Ultra-Wideband Application</VernacularTitle><FirstPage>77</FirstPage><LastPage>90</LastPage><ELocationID EIdType="doi">10.61882/jist.45666.13.50.77</ELocationID><Language>en</Language><AuthorList><Author><FirstName>Nileshkumar K</FirstName><LastName>Patel</LastName><Affiliation>Gujarat Technological University</Affiliation><Identifier Source="ORCID">https://orcid.org/0000-0003-3762-9542</Identifier></Author><Author><FirstName>HASMUKH P</FirstName><LastName>KORINGA</LastName><Affiliation>Government Engineering College Rajkot Gujarat India</Affiliation><Identifier Source="ORCID">https://orcid.org/0000-0002-2521-3972</Identifier></Author></AuthorList><History PubStatus="received"><Year>2024</Year><Month>2</Month><Day>1</Day></History><Abstract>&lt;p&gt;The Low Noise Amplifier (LNA) stands as a crucial element RF receiver chain, demanding a delicate interplay of characteristics such as high gain, low noise figure (NF), superior linearity, and an extensive dynamic range. De-signing an ultrawideband (UWB) LNA poses a complex challenge as engineers grapple with intricate trade-offs inherent in these parameters. To address these challenges, noise cancellation techniques have emerged as valuable tools, revolutionizing the design of UWB LNAs by relaxing the traditional trade-off between bandwidth and input matching. This innovative approach not only enhances bandwidth but also effectively cancels out the un-desirable noise and nonlinearities from the input MOSFET. Despite the advancements afforded by noise cancellation, the broad bandwidth of UWB LNAs presents a significant hurdle. If the linearity is insufficient, the UWB LNA faces performance degradation due to increase in-band interference. In response, this article proposes an inventive linearization technique, a combination of Noise Cancelling (NC) and complementary derivative super-position (CDS), aiming to increase the linearity of UWB LNAs. Through meticulous simulations conducted using Cadence Virtuoso with GPDK090 library, the proposed LNA showcases impressive performance metrics across the UWB spectrum. Notably, it achieves a gain ranging from 12.5 dB to 15.5 dB, a noise figure within the range of 3.9 dB to 5.26 dB, and an IIP3 spanning from 6.3 dBm to 8.8 dBm. Remarkably, this innovative LNA accomplishes these feats while operating with a modest power consumption of 11.36 mW from a 1.2 V supply. This groundbreaking technique holds promise for significantly enhancing the efficiency and overall performance of UWB LNAs within contemporary RF receiver systems.&lt;/p&gt;</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">Noise Cancellation</Param></Object><Object Type="Keyword"><Param Name="Value"> LNA-Low Noise Amplifier</Param></Object><Object Type="Keyword"><Param Name="Value"> CM-Current Mirror</Param></Object><Object Type="Keyword"><Param Name="Value"> CG-Common Gate</Param></Object><Object Type="Keyword"><Param Name="Value"> Linearity</Param></Object><Object Type="Keyword"><Param Name="Value"> Complementary</Param></Object><Object Type="Keyword"><Param Name="Value"> UWB-Ultrawideband</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/45666</ArchiveCopySource></ARTICLE><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>13</Volume><Issue>50</Issue><PubDate PubStatus="epublish"><Year>2025</Year><Month>7</Month><Day>26</Day></PubDate></Journal><ArticleTitle>Optimizing Hyperparameters for Customer Churn Prediction with PSO-Enhanced Composite Deep Learning Techniques</ArticleTitle><VernacularTitle>Optimizing Hyperparameters for Customer Churn Prediction with PSO-Enhanced Composite Deep Learning Techniques</VernacularTitle><FirstPage>91</FirstPage><LastPage>110</LastPage><ELocationID EIdType="doi">10.61882/jist.48088.13.50.91</ELocationID><Language>en</Language><AuthorList><Author><FirstName>Mohammad</FirstName><LastName>Sedighimanesh</LastName><Affiliation>Department of Computer Engineering, Pooyesh Institute of Higher Education Qom, Iran</Affiliation><Identifier Source="ORCID">0000-0003-3361-1097</Identifier></Author><Author><FirstName>Ali</FirstName><LastName>Sedighimanesh</LastName><Affiliation>Department of Computer Engineering, Pooyesh Institute of Higher Education Qom, Iran</Affiliation><Identifier Source="ORCID">000000029224607X</Identifier></Author><Author><FirstName>Hessam </FirstName><LastName>Zandhessami</LastName><Affiliation> Department of Management and Economics, Science and Research branch, Islamic Azad University, Tehran, Iran</Affiliation><Identifier Source="ORCID">0000-0002-8815-915X</Identifier></Author></AuthorList><History PubStatus="received"><Year>2024</Year><Month>9</Month><Day>24</Day></History><Abstract>&lt;p class="Sammary" style="page-break-after: auto;"&gt;For Telecom operators, customer churn, i.e., the event when the customers leave a service provider, becomes a critical concern, studies have shown that acquiring new customers cost five times more than to retain them. In competitive markets, where is increasingly important, to sustain growth as well as profitability correctly predicting the tendencies for customer churn is important. Traditional predictive fashions frequently underperform due to the complex nature of client behavior. In this examine, we introduce a unique composite deep mastering framework whose hyperparameters are optimized the usage of the Particle Swarm Optimization (PSO) set of rules. Our method integrates a couple of neural community architectures to effectively capture each spatial and temporal patterns in client interactions. The PSO set of rules systematically first-rate-tunes parameters including activation functions, regularization techniques, gaining knowledge of rates, optimizers, and neuron counts&amp;mdash;ensuing in a model that demonstrates robust overall performance. We evaluated our approach the usage of key metrics consisting of accuracy, precision, recollect, F1 score, and ROC AUC on a numerous purchaser dataset. Comparative analyses were conducted in opposition to established deep studying fashions (LSRM_GRU, LSTM, GRU, CNN_LSTM) in addition to other conventional methods (KNN, XG_BOOST, DEEP BP-ANN, BiLSTM-CNN, and Decision Tree). Experimental results stompy that our PSO-enhanced composite deep learning model stands out significantly compared with conventional models. Comparing the ROC-AUC scores of 0.932 and 0.93, F1 scores of 0.90 and 0.895, and accuracy rates of 83.2% and 93% on both Cell2Cell and IBM Telco datasets. it is indeed effective for practical churn prediction use incitements efficiencies. Var The experimental results demonstrate that our PSO express tree model outperforms conventional methods, achieving better performance with ROC totter score above 0.932 and 0.93, F 1 scores above 0.90 and 0.895 as well as accuracy rates in excess of 83.2% (% paper) and 93% (on the Telco data set) for Cell2Cell and IBM Telco respectively. This is further confirmation of its effectiveness and promise for practical churn prediction applications.&lt;/p&gt;</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">Customer Churn Prediction</Param></Object><Object Type="Keyword"><Param Name="Value"> Hyperparameter Optimization</Param></Object><Object Type="Keyword"><Param Name="Value"> Particle Swarm Optimization (PSO)</Param></Object><Object Type="Keyword"><Param Name="Value"> Deep Learning Models</Param></Object><Object Type="Keyword"><Param Name="Value"> Telecommunications Analytics</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/48088</ArchiveCopySource></ARTICLE><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>13</Volume><Issue>50</Issue><PubDate PubStatus="epublish"><Year>2025</Year><Month>7</Month><Day>26</Day></PubDate></Journal><ArticleTitle>A Holistic Approach to Stress Identification: Integrating Questionnaires and Physiological Signals through Machine Learning</ArticleTitle><VernacularTitle>A Holistic Approach to Stress Identification: Integrating Questionnaires and Physiological Signals through Machine Learning</VernacularTitle><FirstPage>111</FirstPage><LastPage>121</LastPage><ELocationID EIdType="doi">10.61882/jist.48271.13.50.111</ELocationID><Language>en</Language><AuthorList><Author><FirstName>Mrunal</FirstName><LastName>Fatangare</LastName><Affiliation>School of Engineering and Technology, Dr. Vishwanath Karad MIT World Peace University, Pune, India </Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Hemlata</FirstName><LastName>Ohal</LastName><Affiliation>School of Engineering and Technology, Dr. Vishwanath Karad MIT World Peace University, Pune, India </Affiliation><Identifier Source="ORCID">000900014016833X</Identifier></Author></AuthorList><History PubStatus="received"><Year>2024</Year><Month>10</Month><Day>14</Day></History><Abstract>&lt;p&gt;This research project presents a comprehensive methodology for stress identification by combining subjective self-report data and objective physiological signals. The proposed system employs a carefully designed questionnaire, tailored to different age groups, to enhance accuracy in stress assessment. Subjects respond to the questionnaire, providing valuable insights into their emotional well-being. Subsequently, physiological data is collected using an infrared (IR) sensor positioned beneath the wrist, close to the artery. The pulse data obtained is meticulously converted into a CSV file, allowing for efficient preprocessing. The preprocessing phase ensures the integrity of the data, preparing it for machine learning (ML) analysis. The study harnesses ML techniques, specifically SVM (Support Vector Machines) &amp;amp; KNN (K-Nearest Neighbors), to classify stress levels based on the pre-processed data. Through feature extraction, relevant patterns are identified, contributing to the accurate characterization of stress states. This integrative approach offers a robust framework for stress assessment, taking into account both subjective and physiological dimensions.&lt;/p&gt;
&lt;p&gt;Results demonstrate promising accuracy levels: Support Vector Machine (SVM) Reached a level of precision of 0.98 (+/- 0.20), Decision Tree showed 0.93 (+/- 0.30), and K-Nearest Neighbors (KNN) reached 0.88 (+/- 0.44). It also implements the voting classifier for improved performance of 98.6% of accuracy. These findings underscore the effectiveness of the proposed methodology in accurately identifying stress levels. Integrating subjective insights with objective physiological data not only enhances stress identification but also offers a comprehension of the intricate correlation between mental states and physiological reactions. This comprehensive strategy holds substantial implications across diverse domains such as healthcare, psychology, and human-computer interaction.&lt;/p&gt;</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">Stress Identification</Param></Object><Object Type="Keyword"><Param Name="Value"> PPG</Param></Object><Object Type="Keyword"><Param Name="Value"> Age-Specific Assessment</Param></Object><Object Type="Keyword"><Param Name="Value"> Data Preprocessing</Param></Object><Object Type="Keyword"><Param Name="Value"> SVM; Feature Extraction</Param></Object><Object Type="Keyword"><Param Name="Value"> Classification Techniques</Param></Object><Object Type="Keyword"><Param Name="Value"> KNN</Param></Object><Object Type="Keyword"><Param Name="Value"> Stress Assessment</Param></Object><Object Type="Keyword"><Param Name="Value"> Well-being</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/48271</ArchiveCopySource></ARTICLE><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>13</Volume><Issue>50</Issue><PubDate PubStatus="epublish"><Year>2025</Year><Month>7</Month><Day>26</Day></PubDate></Journal><ArticleTitle>Transmission Parameter-based Demodulation in Visible Light Communications using Deep Learning</ArticleTitle><VernacularTitle>Transmission Parameter-based Demodulation in Visible Light Communications using Deep Learning</VernacularTitle><FirstPage>122</FirstPage><LastPage>129</LastPage><ELocationID EIdType="doi">10.61882/jist.47404.13.50.122</ELocationID><Language>en</Language><AuthorList><Author><FirstName>Sarah</FirstName><LastName>Ayashm</LastName><Affiliation>Department of Electrical and Computer Engineering, Urmia University, Iran</Affiliation><Identifier Source="ORCID">0000000344044489</Identifier></Author><Author><FirstName>Seyed Sadra</FirstName><LastName>Kashef</LastName><Affiliation>Department of Electrical and Computer Engineering, Urmia University, Iran</Affiliation><Identifier Source="ORCID">0000-0002-1374-6915</Identifier></Author><Author><FirstName>Morteza</FirstName><LastName>Valizadeh</LastName><Affiliation>Department of Electrical and Computer Engineering, Urmia University, Iran</Affiliation><Identifier Source="ORCID">0000-0003-2204-3303</Identifier></Author><Author><FirstName>Hasti</FirstName><LastName>Akhavan</LastName><Affiliation>Department of Electrical and Computer Engineering, Urmia University, Iran</Affiliation><Identifier Source="ORCID" /></Author></AuthorList><History PubStatus="received"><Year>2024</Year><Month>7</Month><Day>18</Day></History><Abstract>&lt;p&gt;This paper proposes an innovative approach by employing a one-dimensional Convolutional Neural Network (CNN) for demodulation in VLC systems. The used Data-set is real and available online, providing a robust foundation for analysis. It encompasses modulated signals in seven different modulation types, with 29 transmission distances ranging from 0 to 140 centimeters. By accounting for the varying distances between the transmitter and receiver, the model can more accurately interpret the received signals. Additionally, the study suggests that utilizing memory to learn previous symbols, which is essential for mitigating the effects of inter-symbol interference (ISI), can significantly improve demodulation accuracy. Our results of memory-based demodulation show a better performance in contrast to the previous one (AdaBoost).&lt;/p&gt;</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">Demodulation</Param></Object><Object Type="Keyword"><Param Name="Value"> VLC</Param></Object><Object Type="Keyword"><Param Name="Value"> Distances</Param></Object><Object Type="Keyword"><Param Name="Value"> Convolutional Neural Network</Param></Object><Object Type="Keyword"><Param Name="Value"> ISI</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/47404</ArchiveCopySource></ARTICLE><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>13</Volume><Issue>50</Issue><PubDate PubStatus="epublish"><Year>2025</Year><Month>7</Month><Day>26</Day></PubDate></Journal><ArticleTitle>Designing a Hybrid Algorithm that Combines Deep Learning and PSO for Proactive Detection of Attacks in IoT Networks</ArticleTitle><VernacularTitle>Designing a Hybrid Algorithm that Combines Deep Learning and PSO for Proactive Detection of Attacks in IoT Networks</VernacularTitle><FirstPage>130</FirstPage><LastPage>138</LastPage><ELocationID EIdType="doi">10.61882/jist.48455.13.50.130</ELocationID><Language>en</Language><AuthorList><Author><FirstName>Zahra</FirstName><LastName>Bakhshali</LastName><Affiliation>Department of Information Technology Management, SRC, Islamic Azad University, Tehran, Iran</Affiliation><Identifier Source="ORCID">0009-0008-2037-206X</Identifier></Author><Author><FirstName>Alireza</FirstName><LastName>Pourebrahimi</LastName><Affiliation>Department of Industrial Management, Karaj Branch, Islamic Azad University, Alborz, Iran</Affiliation><Identifier Source="ORCID">0000-0001-5741-0260</Identifier></Author><Author><FirstName>Ahmad</FirstName><LastName>Ebrahimi</LastName><Affiliation>Department of Industrial and Technology Management, SRC, Islamic Azad University, Tehran, Iran</Affiliation><Identifier Source="ORCID">0000-0002-5373-7466</Identifier></Author><Author><FirstName>Nazanin </FirstName><LastName>Pilevari</LastName><Affiliation>Department of Industrial Management, West Tehran Branch, Islamic Azad University, Tehran, Iran</Affiliation><Identifier Source="ORCID">0000-0002-0312-4231</Identifier></Author></AuthorList><History PubStatus="received"><Year>2024</Year><Month>11</Month><Day>2</Day></History><Abstract>&lt;p&gt;As a result, with the establishment of Internet of Things (IoT) at a booming&amp;ensp;pace, the demand for effective, green security systems to detect cyber-attacks is escalating. Despite thorough investigation in this domain, the heterogeneous nature and multifaceted&amp;ensp;characteristic of IoT data make successful attack detection a challenging task. This paper introduces a new method&amp;ensp;for enhancing IoT attack detection through a hybrid deep learning model (CNN-GRU-LSTM) integrated with Particle Swarm Optimization (PSO) for hyperparameter optimization. This methodology consists of different steps, starting with a&amp;ensp;CSV (Comma Separated Values) file to use it as the dataset, performing different data science operations like feature selection, calculating weights to balance the class for learning the model, etc. A hybrid CNN-GRU-LSTM model is subsequently established and trained with the integration of the merit of each algorithm: CNN for spatial feature abstraction, GRU for effectiveness in managing&amp;ensp;the sequential information, and LSTM for discovering the long-range dependencies. The hyperparameters of the PSO algorithm are optimized to find the best combination&amp;ensp;of features/parameters to improve detection performance and efficiency. &amp;nbsp;The results show remarkable accuracy and efficiency improvements over&amp;ensp;traditional methods. H. PSO for Optimizing Hybrid Deep Learning Architecture The gainful approach&amp;ensp;to building deep neural networks for IoT frameworks is through PSO based improvements. The results help to advance a realm of research work in IoT security and&amp;ensp;lay a grouped foundation for further work in optimizing attack detection models with different machine learning algorithms and optimization approaches.&lt;/p&gt;</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">Deep Learning Algorithms</Param></Object><Object Type="Keyword"><Param Name="Value"> Internet of Things</Param></Object><Object Type="Keyword"><Param Name="Value"> IoT Attacks</Param></Object><Object Type="Keyword"><Param Name="Value"> PSO algorithm</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/48455</ArchiveCopySource></ARTICLE><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>13</Volume><Issue>50</Issue><PubDate PubStatus="epublish"><Year>2025</Year><Month>7</Month><Day>26</Day></PubDate></Journal><ArticleTitle>NeuroIS: a State-of- the- Art Analysis </ArticleTitle><VernacularTitle>NeuroIS: a State-of- the- Art Analysis </VernacularTitle><FirstPage>139</FirstPage><LastPage>153</LastPage><ELocationID EIdType="doi">10.61882/jist.47292.13.50.139</ELocationID><Language>en</Language><AuthorList><Author><FirstName> Nahid</FirstName><LastName> Entezarian</LastName><Affiliation>Department of  Management, Faculty of Economic and Administrative Science, Ferdowsi University of Mashhad, Mashhad, Iran</Affiliation><Identifier Source="ORCID">0009000615445100</Identifier></Author><Author><FirstName>Mohammad</FirstName><LastName>Mehraeen</LastName><Affiliation>Department of  Management, Ferdowsi University of Mashhad, Mashhad, Iran</Affiliation><Identifier Source="ORCID">0000-0002-4154-8975</Identifier></Author></AuthorList><History PubStatus="received"><Year>2024</Year><Month>7</Month><Day>7</Day></History><Abstract>&lt;p class="KeywordsHeader"&gt;&lt;span style="font-weight: normal; font-style: normal;"&gt;NeuroIS, the interdisciplinary field merging neuroscience and information systems, has recently garnered significant attention for its potential to enhance our understanding of human behavior in the tech context. This analysis delves into the current NeuroIS research landscape, examining key trends, methodologies, and discoveries in the field. By synthesizing recent research, the aim is to shed light on potential applications of NeuroIS across various domains and identify future research directions in this rapidly evolving field. Currently an emerging area within information systems, NeuroIS has a limited number of studies available. To aid researchers entering NeuroIS, we have analyzed 244 articles and summarize their findings to give more details of NeuroIS studies. This examination of literature reveals various avenues for future NeuroIS exploration, including influencing factors, measurement tools, and subject areas. We believe that our work will offer valuable insights for upcoming NeuroIS studies. The fusion of neuroscience and information systems holds immense potential for uncovering profound insights into human-computer interaction, decision-making processes, cognitive responses to technology, and enhancement of user experiences. As the field progresses, researchers are increasingly exploring innovative methods such as functional magnetic resonance imaging (fMRI), electroencephalography (EEG), and eye-tracking to unravel the complex mechanisms underlying human cognition in the digital age. By delving into the neurobiological basis of technology-mediated interactions, NeuroIS presents opportunities for designing more intuitive, efficient, and user-centric systems. With numerous uncharted research paths ahead, the future of NeuroIS looks promising, signaling a potential shift in how we understand and utilize information systems to impact human behaviors and decisions.&lt;/span&gt;&lt;/p&gt;</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">NeuroIS</Param></Object><Object Type="Keyword"><Param Name="Value"> Information Systems (IS)</Param></Object><Object Type="Keyword"><Param Name="Value"> Human-Computer Interaction (HCI)</Param></Object><Object Type="Keyword"><Param Name="Value"> Neuroscience</Param></Object><Object Type="Keyword"><Param Name="Value"> State-of-the-art</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/47292</ArchiveCopySource></ARTICLE><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>13</Volume><Issue>50</Issue><PubDate PubStatus="epublish"><Year>2025</Year><Month>7</Month><Day>26</Day></PubDate></Journal><ArticleTitle>Credit Risk Prediction: An Application of Federated Learning</ArticleTitle><VernacularTitle>Credit Risk Prediction: An Application of Federated Learning</VernacularTitle><FirstPage>154</FirstPage><LastPage>164</LastPage><ELocationID EIdType="doi">10.61882/jist.49000.13.50.154</ELocationID><Language>en</Language><AuthorList><Author><FirstName> Sara</FirstName><LastName>Houshmand</LastName><Affiliation>Department of Industrial Engineering, Faculty of Engineering, Tarbiat Modares University, Tehran, Iran</Affiliation><Identifier Source="ORCID">0009-0007-9965-9348</Identifier></Author><Author><FirstName>Amir</FirstName><LastName>albadvi</LastName><Affiliation>Department of Industrial Engineering, Faculty of Engineering, Tarbiat Modares University, Tehran, Iran</Affiliation><Identifier Source="ORCID">0000-0002-7758-9920</Identifier></Author></AuthorList><History PubStatus="received"><Year>2024</Year><Month>12</Month><Day>27</Day></History><Abstract>&lt;p class="Sammary" style="page-break-after: auto;"&gt;Credit risk is one of the major challenges faced by all financial institutions. Different institutions apply various techniques and models to reduce the risks associated with lending and other financial activities. However, due to the sensitivity of financial data and the diversity of modeling approaches, sharing data among institutions is extremely difficult, often impossible. As a result, improvements in credit risk prediction models typically occur in isolation, hindering collective progress toward higher accuracy and broader effectiveness. Federated learning offers a promising solution by allowing institutions to collaboratively train models without exposing or transferring sensitive data. In this research, we present a federated learning architecture for credit risk prediction that ensures privacy throughout the entire training process. Our results indicate that this approach not only protects data confidentiality but also maintains high predictive accuracy over numerous training rounds, offering a reliable and efficient framework for institutional adoption. The core contribution of this work is the development of a decentralized federated learning (FL) architecture tailored to heterogeneous, non-IID financial data. This framework enhances privacy, scalability, and regulatory compliance, and demonstrates performance advantages over traditional methods. In this article, we demonstrate that using five real-world credit risk datasets, the decentralized FL architecture significantly improves model accuracy (ranging from 71% to 99%) compared to traditional machine learning methods, especially in scenarios where privacy and communication efficiency are essential. While centralized FL achieves the highest average accuracy (up to 83%), the decentralized model provides a strong trade-off between performance and privacy-aware collaboration.&lt;/p&gt;</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">Federated Learning (FL)</Param></Object><Object Type="Keyword"><Param Name="Value"> Credit Risks</Param></Object><Object Type="Keyword"><Param Name="Value"> Financial Institutions</Param></Object><Object Type="Keyword"><Param Name="Value"> Heterogeneous Data</Param></Object><Object Type="Keyword"><Param Name="Value"> Decentralized Federated Learning (DFL) Architecture</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/49000</ArchiveCopySource></ARTICLE></ArticleSet>