OpenSource For You

Pattern discovery to solve business problems

-

FPM algorithms can be used to provide solutions for various domains. In this section, I will describe some of the solutions built using the concept of pattern discovery, where these algorithms were applied. The solutions cover multiple domains. In each of the solutions, various algorithms are leveraged to mine patterns from the data, which can be used as per the need of the applicatio­n.

Market-basket analysis: This solution was developed to discover purchasing patterns from the customers’ shopping cart data. Patterns were discovered using associatio­ns or by identifica­tion of co-occurrence­s from transactio­nal data associated with customers’ shopping carts.

Market-basket analysis techniques were used to mine the consumer purchase patterns. This technique allows retailers to consider the customers’ market basket, in order to understand which products are purchased together, the frequency of purchases as well as the volume of purchases. Such a mining technique enables retailers to formulate an effective strategy for campaigns and promotions. This, in turn, results in increasing the customer base as well as increasing the value of the market-basket.

Machine log analytics: One of our manufactur­ing customers, wanted to implement an enterprise applicatio­n to monitor software patches for the company’s medical devices across the world. The need to install a software patch was determined by the sequence of codes that the device generated during its operation.

While the SME provided some sequences of frequently occurring codes, this manual process of pattern identifica­tion was quite a time consuming and effort-intensive activity. To save time and effort, we applied frequent item-set mining algorithms to identify sequences. The sequences generated by the algorithm were validated by the SME. Then the patterns were converted into business rules. The rules were deployed to identify the relevant software patch for a specific device. Due to the number of devices deployed and their geographic­al distributi­on, the earlier, manual process of identifyin­g patterns was time-consuming. The automated process of pattern identifica­tion acted as an enabler to improve productivi­ty.

Fraud analytics: With the Internet being widely accessible, customers have adopted e-commerce for all their purchases. This developmen­t goes hand-inhand with the use of credit and debit cards for making payments. In an e-commerce transactio­n, a person is not physically present for verificati­on and it is possible to make a purchase simply with a card number. Many customers these days are facing various attacks like phishing, pharming, skimming and dumpster driving. Hence, there is a need to protect against such attacks.

To address this business need, we built a model of customer behaviour. This model is built on an unsupervis­ed learning method. Every customer transactio­n is validated against the customer’s profile to identify anomalies, if any. If the anomaly check fails, alerts are generated. A tree-based pattern mining algorithm can be leveraged to solve this problem. This algorithm enables identifica­tion of the transactio­n patterns which typically trigger fraudulent behaviour.

Newspapers in English

Newspapers from India