A proposed machine learning solution for a Problem statement of a Mall which needs to predict the success of a scheme with all the insights for the business
A Drone project planned for implementation in an Urban environment for delivering parcels in an area using Autonomous drones which can carry upto 2Kg weight and 30 KM's flight time. This project could not move forward due to restrictions posed by the Authority in urban areas.
A presentation given by Mark Billinghurst at the OzCHI 2016 conference on November 30th 2016. This was based on a research paper written by Richie Jose, Gun Lee and Mark Billinghurst. The paper compared different types of AR displays for in-car navigation using a driving simulator.
Hawk-Eye is a computer system used in cricket, tennis, snookers and other sports to visually track the path of the ball and display a record of its most statistically likely path as a moving image
Hawk-Eye as the most innovative technology provider in sports broadcasting and is a development that will reinforce the groups presence and influence.
Hawk-Eye is a computer system that uses six cameras to track the path of a ball in sports like cricket and tennis. It was developed in 2001 and provides a 3D trajectory of the ball to determine metrics like speed, angle, and deviation. Testing has found it to be over 99% accurate. It is used in cricket for lbw decisions, in tennis for line calls, and in snooker to visualize shots. Developers continue working to expand its applications to other sports.
The document discusses the present and future of the drone industry. It covers the commercial, military, and hobbyist markets for drones and how drones are being used for applications like delivery, agriculture, filmmaking, and more. The document predicts that commercial drone spending will reach $4.8 billion globally by 2021 and that drones will continue revolutionizing various industries through innovations in engagement, solutions to unique challenges, and new forms of advertising and events.
Drones and their Increasing Number of ApplicationsJeffrey Funk
These slides use concepts from my (Jeff Funk) course entitled analyzing hi-tech opportunities to analyze how drones are becoming economic feasible for an increasing number of applications as their costs fall. The costs of drones are falling as the costs of various ICs (controllers, GPS) and MEMS sensors rapidly fall, their performance rises (e.g., accuracy of GPS) and as the cost of carbon fibers fall at a somewhat slower pace than do ICs and MEMS. These falling costs are making drones economically feasible for a number of applications such as producing movies, TV reporting, surveillance, and delivery.
The document provides an introduction to drones, including their invention and timeline. It discusses the different types of drones, including quadcopters, GPS drones, and delivery drones. It also describes the anatomy of drones, including components like propellers, motors, flight controllers. The document outlines the working principle of drones and various flight modes. Applications of drones discussed include agriculture, sports, military, and humanitarian uses. Advantages and disadvantages of drones are presented. The document concludes with a section on the legality of drone use.
A Drone project planned for implementation in an Urban environment for delivering parcels in an area using Autonomous drones which can carry upto 2Kg weight and 30 KM's flight time. This project could not move forward due to restrictions posed by the Authority in urban areas.
A presentation given by Mark Billinghurst at the OzCHI 2016 conference on November 30th 2016. This was based on a research paper written by Richie Jose, Gun Lee and Mark Billinghurst. The paper compared different types of AR displays for in-car navigation using a driving simulator.
Hawk-Eye is a computer system used in cricket, tennis, snookers and other sports to visually track the path of the ball and display a record of its most statistically likely path as a moving image
Hawk-Eye as the most innovative technology provider in sports broadcasting and is a development that will reinforce the groups presence and influence.
Hawk-Eye is a computer system that uses six cameras to track the path of a ball in sports like cricket and tennis. It was developed in 2001 and provides a 3D trajectory of the ball to determine metrics like speed, angle, and deviation. Testing has found it to be over 99% accurate. It is used in cricket for lbw decisions, in tennis for line calls, and in snooker to visualize shots. Developers continue working to expand its applications to other sports.
The document discusses the present and future of the drone industry. It covers the commercial, military, and hobbyist markets for drones and how drones are being used for applications like delivery, agriculture, filmmaking, and more. The document predicts that commercial drone spending will reach $4.8 billion globally by 2021 and that drones will continue revolutionizing various industries through innovations in engagement, solutions to unique challenges, and new forms of advertising and events.
Drones and their Increasing Number of ApplicationsJeffrey Funk
These slides use concepts from my (Jeff Funk) course entitled analyzing hi-tech opportunities to analyze how drones are becoming economic feasible for an increasing number of applications as their costs fall. The costs of drones are falling as the costs of various ICs (controllers, GPS) and MEMS sensors rapidly fall, their performance rises (e.g., accuracy of GPS) and as the cost of carbon fibers fall at a somewhat slower pace than do ICs and MEMS. These falling costs are making drones economically feasible for a number of applications such as producing movies, TV reporting, surveillance, and delivery.
The document provides an introduction to drones, including their invention and timeline. It discusses the different types of drones, including quadcopters, GPS drones, and delivery drones. It also describes the anatomy of drones, including components like propellers, motors, flight controllers. The document outlines the working principle of drones and various flight modes. Applications of drones discussed include agriculture, sports, military, and humanitarian uses. Advantages and disadvantages of drones are presented. The document concludes with a section on the legality of drone use.
In-Service Corrosion Mapping—Challenges for the Chemical IndustryOlympus IMS
This presentation from ECNDT 2018 reviews the following topics:
Corrosion inspection—particularities of the chemical industry
Pitting detection in thin-wall components
Challenges of in-service inspection: high temperature
Results of accuracy tests with temperature variation
The slides give the brief description of the top most famous drones presently available in the market. These Drones are highly efficient and User-Friendly, that's why it is being loved so much.
The document discusses drones/unmanned aerial vehicles (UAVs), including definitions, examples of drones in use today, and their applications. Some key points are:
- Drones are powered, aerial vehicles that can fly autonomously or be piloted remotely, and can carry payloads like weapons or cameras.
- Common drones include the Solar Eagle, Puma AE, Predator, Nano, Hummingbird, and quadcopters.
- Drones are used commercially, by governments/research, and as hobbies for purposes like surveillance, mapping, search and rescue, and delivery.
- Regulations in India require drones to fly below 400 feet and only during daylight hours to avoid disturbing
UAV(unmanned aerial vehicle) and its application Joy Karmakar
This document discusses unmanned aerial vehicles (UAVs), including their definition, history, components, applications, and disadvantages. UAVs are aircraft without human pilots that can be controlled autonomously or remotely. They have various applications both militarily and civilly, such as aerial surveillance, search and rescue operations, agriculture, filmmaking, and more. The key components of UAVs are the payload, air vehicle, navigation systems, and communications systems. India has developed several UAVs domestically such as Rustom, Nishant, and Lakshya for military purposes. The future of UAV technology remains dynamic with new discoveries expected over the next 16 years.
Unmanned aerial vehicles (UAVs), or drones, are aircraft without human pilots that can be controlled autonomously or remotely. UAV development began in the early 20th century for military purposes but has since expanded for both civilian and military uses. UAVs have several subsystems including communications, navigation, monitoring, and collision avoidance. While UAVs cannot fully replace manned aircraft, they are increasingly used for missions involving risks to human life like surveillance, transportation, and search and rescue. Advantages of UAVs include reduced risks to human operators, while disadvantages include potential risks to civilian safety and privacy concerns.
Introduction
Beacons are small wireless devices that broadcast signals using Bluetooth Low Energy (BLE), or Bluetooth SMART technology. Mobile apps on compatible devices are able to listen for signals from beacons placed in the physical world and then trigger an experience via the app.
Beacon enabled apps are notified when the device enters or exits the range of a beacon, and are also able to monitor the distance from the beacon as it changes, often referred to as 'ranging'.
Bluetooth Low Energy
BLE or Bluetooth Smart is an intelligent and power friendly version of Bluetooth wireless technology and exchanges data over short distances using radio transmissions. The power of BLE is in its ability to work with an app on a smartphone, tablet or any other compatible mobile device.
The Beacon System
The Beacon system from Apple can be broken down into two parts:
• A piece of hardware – the “Beacon”, which constantly broadcasts a Bluetooth Low Energy signal. This transmits a unique identifier (UUID) and two further identifiers; major and minor (unsigned 16 bit integer values), which can be used to identify the beacon.
• Application Programmable Interface (API) - An API to search for beacons with a certain UUID and optionally a specific major and minor value. iBeacon adds the possibility for the developer to subscribe to beacons like you would subscribe to geolocations. This enables the app to get notifications (whether the app is currently running or not) when the user gets within range of a specific beacon.
Importance
• High degree of accuracy
• Low impact on battery life
• Low cost of entry
• No Internet connection required
Security
Some of the most common beacon security myths:
• Beacons are transmitting personal data:
Beacons don’t transmit any personal data. In fact, beacons don’t receive any data at all.
• Beacons are tracking my location:
Beacons can’t track your location. The only thing they can do is let your mobile device know that you’re nearby.
Compatibility
Beacons work with both Android and iOS. They were initially introduced in iOS7 and are compatible with every Android version > 4.3
This puts beacon functionality in 300 million + devices.
Conclusion
Beacons transmit a low energy signal from a device with a radius of 0-50 meters to broadcast static pieces of data within short distances.
In a nutshell, our basic requirements for an operational beacon are:
1. Beacon enabled mobile app
2. Network of deployed beacons
3. Bluetooth switched on and relevant permissions
Without a doubt, the Beacon is a useful convergence device that can be given a shot at, which is for sure a revolution in technology
Abstract
The advancement in new technologies has significantly resulted more perfection in authentication issues. In ATM machine, access
permission is usually taking personal identification numbers (PIN) for authentication. Through this paper, this old method is
being exhausted by introducing a combination of embedded 3 layered bio-metric molding to setup an ATM simulator. Finger print
scanner, retina scanner followed by the onetime password (OTP) will help the user for smart and secured tractions. It will
reduced the duplication and makes the ATM machine more secured compare to current version.
Keywords: ATM, Biometric Security, OTP, Duplication Free, Retina Scanner.
Hawk-eye technology uses multiple high-speed cameras and triangulation to track the path of a ball in sports like cricket and tennis. It consists of a tracking system that calculates details of the ball's movement and speed, and a video replay system that records and displays the ball's most statistically likely trajectory. Hawk-eye is used in cricket for contentious decisions like leg before wicket and has improved accuracy of calls to over 99%. Developers continue enhancing the system for additional sports and applications.
This document describes the development of a drone for firefighting operations. The drone uses an Arduino, sensors like flame and ultrasonic, and electronic speed controllers to control brushless DC motors and propellers. It allows remote monitoring and firefighting capabilities to help protect firefighters in dangerous situations. The drone was developed using an Arduino microcontroller and integrated sensors to allow autonomous or remote controlled detection and response to fires. This provides a safer alternative to traditional firefighting methods that put lives at risk.
Augmented reality (AR) combines real and virtual images, is interactive in real-time, and has virtual content registered in 3D space. The document traces the history of AR from early experimentation in the 1960s-1980s to mainstream commercial applications today. Key developments include the first head-mounted display in 1968, mobile phone AR in the 2000s, and consumer products like Google Glass. The document also provides examples of AR applications in various domains such as marketing, gaming, manufacturing, and healthcare.
Radar stands for Radio Detection and Ranging. It is a system that transmits electromagnetic waves and analyzes the echoes from objects to detect and determine their range, altitude, direction or speed. The basic parts of a radar system include a transmitter, receiver, antenna and indicator. The radar equation describes the power returning to the receiving antenna based on factors like the transmitted power, antenna gains, radar cross section of the target, and distance. There are different types of radars like pulse radar, moving target indication radar, pulse Doppler radar and tracking radar used for various applications like air traffic control, missile guidance and ground surveillance.
This document is a project report for a BSc in Aerospace Technology that details the design of a power unit for a basic ornithopter. It includes a literature review of ornithopter mechanics, components, and case studies to inform the design. Prototypes were fabricated and theoretical calculations were performed before finalizing the design in CAD software. The power unit consists of small electrical and mechanical components like a motor, gearing system, servo, and electronics to enable the flapping wing motion of the ornithopter.
The document provides an analysis of the drone market and key companies DJI Enterprise and Parrot SA. It includes a market overview showing military, consumer, and commercial segments. It also analyzes each company's products, capabilities, value chain, Porter's 5 forces, and conducts SWOT and resource analyses. DJI has the largest market share due to strong brand value, innovation, and global distribution centers, while Parrot focuses more on partnerships and acquisitions for growth. Both companies aim to develop new products and technologies to remain competitive in the rapidly changing drone market.
Mika Saastamoinen: Spatial computing - extending reality. Presentation at Kela Conference on Social Security 2019 – Equality and wellbeing through sustainable social security system, 10.12.2019.
Drones are shaping the construction industry as we know it. There are obvious - and less obvious - applications of these flying wonders for the construction and engineering industries. In this post, we look at the ‘state of the art’ as it is today, and touch on a few key themes for the future.
Drones are unmanned aerial vehicles that can fly autonomously or be piloted remotely, carrying payloads but no human. The US drone industry is an $82 billion market and will grow to 10% of aviation by 2025. Regulations require drones under 55 lbs to fly below 400 ft and within 5 miles of an airport with FAA authorization. Violations can result in fines up to $250k or imprisonment.
This document discusses the use of drones, or unmanned aerial vehicles, for conservation purposes. Drones can be used to map land changes, monitor wildlife, and survey habitat areas. They provide real-time data using cameras and sensors without requiring people in remote locations. While drones have advantages over satellites like lower costs and ability to fly at low altitudes, they also have disadvantages such as noise disturbing wildlife and needing to follow FAA regulations. The document specifically discusses how drones are being used to monitor invasive algal blooms by collecting multi-spectral data on algal growth and distribution over time.
Drone Insights 2021, and its Impact on other sectors in IndiaKaushik Biswas
The Booming Drone Industry and its prospect by 2025. What are the sectors in which Drones can be used in India, the regulatory frameworks comparing World Vs India, What are the Top 3 companies we can do business with, who are the other players in the industry?
I have also done a small survey on what Indians think about the drone industry overall, and finally a conclusion on where we are vs the world
This power point presentation summarizes the key components and functioning of a quadcopter drone. It describes the main parts which include four brushless motors, electronic speed controllers, a CC3D flight controller, Li-Po battery, power distribution board, and transmitter and receiver. The presentation discusses the advantages of quadcopters like stability, flexibility for indoor use, and ability to enter any environment without a pilot. Applications mentioned include use in agriculture, delivery services, military, videography, and civil purposes. Disadvantages include hardware complexity, short flight duration, and need for frequent battery replacement.
This document provides an overview of radar systems. It discusses what radar is, the evolution of radar from its initial uses detecting objects with radio waves in the late 1800s. It then explains the basic principles of how radar works to detect objects using radio signal transmission and reflection. Key components of radar systems like transmitters, receivers, antennas and signal processing are described. Applications of radar systems include military, remote sensing, air traffic control, and navigation. The document also discusses radar modulators and antenna design considerations for radar.
An AI project : The AIM of the project is to come out with Business Insights on the data provided and Train a Machine Learning model which can predict the success of campaign with highest accuracy percentage.
In-Service Corrosion Mapping—Challenges for the Chemical IndustryOlympus IMS
This presentation from ECNDT 2018 reviews the following topics:
Corrosion inspection—particularities of the chemical industry
Pitting detection in thin-wall components
Challenges of in-service inspection: high temperature
Results of accuracy tests with temperature variation
The slides give the brief description of the top most famous drones presently available in the market. These Drones are highly efficient and User-Friendly, that's why it is being loved so much.
The document discusses drones/unmanned aerial vehicles (UAVs), including definitions, examples of drones in use today, and their applications. Some key points are:
- Drones are powered, aerial vehicles that can fly autonomously or be piloted remotely, and can carry payloads like weapons or cameras.
- Common drones include the Solar Eagle, Puma AE, Predator, Nano, Hummingbird, and quadcopters.
- Drones are used commercially, by governments/research, and as hobbies for purposes like surveillance, mapping, search and rescue, and delivery.
- Regulations in India require drones to fly below 400 feet and only during daylight hours to avoid disturbing
UAV(unmanned aerial vehicle) and its application Joy Karmakar
This document discusses unmanned aerial vehicles (UAVs), including their definition, history, components, applications, and disadvantages. UAVs are aircraft without human pilots that can be controlled autonomously or remotely. They have various applications both militarily and civilly, such as aerial surveillance, search and rescue operations, agriculture, filmmaking, and more. The key components of UAVs are the payload, air vehicle, navigation systems, and communications systems. India has developed several UAVs domestically such as Rustom, Nishant, and Lakshya for military purposes. The future of UAV technology remains dynamic with new discoveries expected over the next 16 years.
Unmanned aerial vehicles (UAVs), or drones, are aircraft without human pilots that can be controlled autonomously or remotely. UAV development began in the early 20th century for military purposes but has since expanded for both civilian and military uses. UAVs have several subsystems including communications, navigation, monitoring, and collision avoidance. While UAVs cannot fully replace manned aircraft, they are increasingly used for missions involving risks to human life like surveillance, transportation, and search and rescue. Advantages of UAVs include reduced risks to human operators, while disadvantages include potential risks to civilian safety and privacy concerns.
Introduction
Beacons are small wireless devices that broadcast signals using Bluetooth Low Energy (BLE), or Bluetooth SMART technology. Mobile apps on compatible devices are able to listen for signals from beacons placed in the physical world and then trigger an experience via the app.
Beacon enabled apps are notified when the device enters or exits the range of a beacon, and are also able to monitor the distance from the beacon as it changes, often referred to as 'ranging'.
Bluetooth Low Energy
BLE or Bluetooth Smart is an intelligent and power friendly version of Bluetooth wireless technology and exchanges data over short distances using radio transmissions. The power of BLE is in its ability to work with an app on a smartphone, tablet or any other compatible mobile device.
The Beacon System
The Beacon system from Apple can be broken down into two parts:
• A piece of hardware – the “Beacon”, which constantly broadcasts a Bluetooth Low Energy signal. This transmits a unique identifier (UUID) and two further identifiers; major and minor (unsigned 16 bit integer values), which can be used to identify the beacon.
• Application Programmable Interface (API) - An API to search for beacons with a certain UUID and optionally a specific major and minor value. iBeacon adds the possibility for the developer to subscribe to beacons like you would subscribe to geolocations. This enables the app to get notifications (whether the app is currently running or not) when the user gets within range of a specific beacon.
Importance
• High degree of accuracy
• Low impact on battery life
• Low cost of entry
• No Internet connection required
Security
Some of the most common beacon security myths:
• Beacons are transmitting personal data:
Beacons don’t transmit any personal data. In fact, beacons don’t receive any data at all.
• Beacons are tracking my location:
Beacons can’t track your location. The only thing they can do is let your mobile device know that you’re nearby.
Compatibility
Beacons work with both Android and iOS. They were initially introduced in iOS7 and are compatible with every Android version > 4.3
This puts beacon functionality in 300 million + devices.
Conclusion
Beacons transmit a low energy signal from a device with a radius of 0-50 meters to broadcast static pieces of data within short distances.
In a nutshell, our basic requirements for an operational beacon are:
1. Beacon enabled mobile app
2. Network of deployed beacons
3. Bluetooth switched on and relevant permissions
Without a doubt, the Beacon is a useful convergence device that can be given a shot at, which is for sure a revolution in technology
Abstract
The advancement in new technologies has significantly resulted more perfection in authentication issues. In ATM machine, access
permission is usually taking personal identification numbers (PIN) for authentication. Through this paper, this old method is
being exhausted by introducing a combination of embedded 3 layered bio-metric molding to setup an ATM simulator. Finger print
scanner, retina scanner followed by the onetime password (OTP) will help the user for smart and secured tractions. It will
reduced the duplication and makes the ATM machine more secured compare to current version.
Keywords: ATM, Biometric Security, OTP, Duplication Free, Retina Scanner.
Hawk-eye technology uses multiple high-speed cameras and triangulation to track the path of a ball in sports like cricket and tennis. It consists of a tracking system that calculates details of the ball's movement and speed, and a video replay system that records and displays the ball's most statistically likely trajectory. Hawk-eye is used in cricket for contentious decisions like leg before wicket and has improved accuracy of calls to over 99%. Developers continue enhancing the system for additional sports and applications.
This document describes the development of a drone for firefighting operations. The drone uses an Arduino, sensors like flame and ultrasonic, and electronic speed controllers to control brushless DC motors and propellers. It allows remote monitoring and firefighting capabilities to help protect firefighters in dangerous situations. The drone was developed using an Arduino microcontroller and integrated sensors to allow autonomous or remote controlled detection and response to fires. This provides a safer alternative to traditional firefighting methods that put lives at risk.
Augmented reality (AR) combines real and virtual images, is interactive in real-time, and has virtual content registered in 3D space. The document traces the history of AR from early experimentation in the 1960s-1980s to mainstream commercial applications today. Key developments include the first head-mounted display in 1968, mobile phone AR in the 2000s, and consumer products like Google Glass. The document also provides examples of AR applications in various domains such as marketing, gaming, manufacturing, and healthcare.
Radar stands for Radio Detection and Ranging. It is a system that transmits electromagnetic waves and analyzes the echoes from objects to detect and determine their range, altitude, direction or speed. The basic parts of a radar system include a transmitter, receiver, antenna and indicator. The radar equation describes the power returning to the receiving antenna based on factors like the transmitted power, antenna gains, radar cross section of the target, and distance. There are different types of radars like pulse radar, moving target indication radar, pulse Doppler radar and tracking radar used for various applications like air traffic control, missile guidance and ground surveillance.
This document is a project report for a BSc in Aerospace Technology that details the design of a power unit for a basic ornithopter. It includes a literature review of ornithopter mechanics, components, and case studies to inform the design. Prototypes were fabricated and theoretical calculations were performed before finalizing the design in CAD software. The power unit consists of small electrical and mechanical components like a motor, gearing system, servo, and electronics to enable the flapping wing motion of the ornithopter.
The document provides an analysis of the drone market and key companies DJI Enterprise and Parrot SA. It includes a market overview showing military, consumer, and commercial segments. It also analyzes each company's products, capabilities, value chain, Porter's 5 forces, and conducts SWOT and resource analyses. DJI has the largest market share due to strong brand value, innovation, and global distribution centers, while Parrot focuses more on partnerships and acquisitions for growth. Both companies aim to develop new products and technologies to remain competitive in the rapidly changing drone market.
Mika Saastamoinen: Spatial computing - extending reality. Presentation at Kela Conference on Social Security 2019 – Equality and wellbeing through sustainable social security system, 10.12.2019.
Drones are shaping the construction industry as we know it. There are obvious - and less obvious - applications of these flying wonders for the construction and engineering industries. In this post, we look at the ‘state of the art’ as it is today, and touch on a few key themes for the future.
Drones are unmanned aerial vehicles that can fly autonomously or be piloted remotely, carrying payloads but no human. The US drone industry is an $82 billion market and will grow to 10% of aviation by 2025. Regulations require drones under 55 lbs to fly below 400 ft and within 5 miles of an airport with FAA authorization. Violations can result in fines up to $250k or imprisonment.
This document discusses the use of drones, or unmanned aerial vehicles, for conservation purposes. Drones can be used to map land changes, monitor wildlife, and survey habitat areas. They provide real-time data using cameras and sensors without requiring people in remote locations. While drones have advantages over satellites like lower costs and ability to fly at low altitudes, they also have disadvantages such as noise disturbing wildlife and needing to follow FAA regulations. The document specifically discusses how drones are being used to monitor invasive algal blooms by collecting multi-spectral data on algal growth and distribution over time.
Drone Insights 2021, and its Impact on other sectors in IndiaKaushik Biswas
The Booming Drone Industry and its prospect by 2025. What are the sectors in which Drones can be used in India, the regulatory frameworks comparing World Vs India, What are the Top 3 companies we can do business with, who are the other players in the industry?
I have also done a small survey on what Indians think about the drone industry overall, and finally a conclusion on where we are vs the world
This power point presentation summarizes the key components and functioning of a quadcopter drone. It describes the main parts which include four brushless motors, electronic speed controllers, a CC3D flight controller, Li-Po battery, power distribution board, and transmitter and receiver. The presentation discusses the advantages of quadcopters like stability, flexibility for indoor use, and ability to enter any environment without a pilot. Applications mentioned include use in agriculture, delivery services, military, videography, and civil purposes. Disadvantages include hardware complexity, short flight duration, and need for frequent battery replacement.
This document provides an overview of radar systems. It discusses what radar is, the evolution of radar from its initial uses detecting objects with radio waves in the late 1800s. It then explains the basic principles of how radar works to detect objects using radio signal transmission and reflection. Key components of radar systems like transmitters, receivers, antennas and signal processing are described. Applications of radar systems include military, remote sensing, air traffic control, and navigation. The document also discusses radar modulators and antenna design considerations for radar.
An AI project : The AIM of the project is to come out with Business Insights on the data provided and Train a Machine Learning model which can predict the success of campaign with highest accuracy percentage.
Improving profitability of campaigns through data scienceswebi
Analyze the campaign results and provide insights and recommendations on :
Which type of customers responded positively to the campaign ?
What can the customer be doing for better future campaign performance ?
How much can be the financial gains of the improved campaign strategies ?
Database Marketing, part two: data enhancement, analytics, and attribution Relevate
This document outlines the key steps in a database marketing roadmap, including data enhancement, smart profiling, predictive analytics, and campaign attribution and reporting. It discusses enhancing a database with external data and best practices for data hygiene. Smart profiling provides a descriptive view of a customer base by comparing to national averages. Predictive analytics uses past performance to predict future behavior through models. Attribution and reporting involves measuring campaign performance, analyzing results, and using insights to improve future efforts. The overall roadmap is designed to optimize customer interactions and marketing success.
“Half the money I spend on advertising is wasted; the trouble is, I don’t know which half”, said John Wanamaker, an American merchant, over 50 years ago. Nothing’s changed much since then, as we still need to know which of our marketing channels work and which ones don’t. This is exactly why you need an attribution model!
This document discusses attribution models and how to choose the right model for a business. It describes several common attribution models including first click, last click, linear, and time decay models. It also discusses more advanced models like Markov chains, Shapley value, and custom funnel-based models. The key aspects to consider when selecting a model include the customer journey, data availability, and which business questions need to be answered. Testing multiple models is recommended to identify the most effective approach for a given marketing strategy and goals.
Supply chain strategy and financial metrics 20180118Bram Desmet
This document discusses balancing supply chain metrics like inventory turns and service levels with financial metrics like EBIT. It recommends benchmarking companies in two dimensions to identify balanced targets. Companies should set targets on their maximum "bang-for-the-buck" line based on their supply chain strategy - whether it prioritizes operational excellence, product leadership, or customer intimacy. Different strategies imply different optimal positions on the bang-for-the-buck curve to maximize shareholder value as measured by ROCE.
This document provides an overview of data analytics including:
- Key topics in data analytics like popular job roles, tools, skills needed, and industries that use data analytics.
- Examples of how data analytics has been used like predicting customer churn in telecommunications, detecting fraud in energy utilities, and analyzing school performance data.
- Different analytical solutions like predictive modeling, statistical analysis, and data-driven decision making are discussed along with case studies.
- Popular skills, roles, and tools in data analytics like data scientists, data analysts, Tableau, R, Python are highlighted.
1) The document proposes using advanced data analytics to build knowledge of customer behavior, preferences, and aspirations in order to maximize revenue.
2) A case study uses data from an online beauty/personal care subsidiary to demonstrate how clustering, classification, and regression analyses can provide insights.
3) The analyses identify customer subgroups, predict which customers will churn, and forecast spending amounts. This knowledge can then be used to target marketing and improve customer retention and spending.
This document discusses how analytics can be used across different functions in retail organizations like marketing, merchandising, finance, and operations. It provides examples of typical retail data structures and metrics used. It emphasizes building knowledge through deep data analysis and insights to make better business decisions. Key points covered include measuring the impact of marketing programs, examples of analytics dos and don'ts, and questions to ask when evaluating programs like CRM.
The document analyzes a study of 315 enterprises to identify challenges and best practices around closed-loop marketing. It finds that top performing organizations are improving metrics like conversion and return on marketing investments through closed-loop practices. Best-in-Class companies see 36% annual revenue growth, 26% return on marketing investment growth, and 21% conversion rate growth. They share characteristics like leveraging closed-loop processes/technologies (88%), analyzing customer behavior for segmentation (56%), and having documented processes to collect customer responses across functions (42%). To achieve Best-in-Class performance, companies must develop a robust customer database for closed-loop efforts and take a phased approach to closed-loop adoption.
Improving Customer Experience via Experimentation Dynamic Talks: San Francisc...Grid Dynamics
She'll be sharing use cases, lessons learned and business impacts made using customer experience data and experimentation. She'll also share how combining quantitative data with unstructured quantitative data could provide powerful insights into user behavior that can be leveraged for improving business KPIs. Her team is using AI to support thousands of employees at PayPal and fueling innovation and data driven culture.
This document provides details about a proposed cocoa chocolate manufacturing project. It includes an overview of the product varieties and ingredients. The manufacturing process involves collecting cocoa beans, separating, drying, roasting, winnowing, grinding, mixing with sugar, conching, molding, and finishing. Potential plant locations are evaluated in Karnataka and Tamil Nadu based on climate, raw material availability, and other factors. The document outlines sections on forecasting and inventory management, management strategies using IT systems, risk management approaches, and feasibility analysis including a SWOT analysis and break-even point calculation. Marketing strategies propose introducing new flavors and packaging to attract different demographic groups.
Mather Disciplined Pricing Approach For Banking Summarydfischer
This document discusses developing a disciplined pricing approach for banks. It outlines an 8-phase process: 1) Review bank strategy and pricing implications, 2) Review regulatory constraints, 3) Develop pricing strategies, 4) Build a database and pricing model, 5) Develop preliminary pricing tactics, 6) Test and refine pricing tactics, 7) Implement pricing guidelines, and 8) Measure and track results. The goal is to help banks maximize revenue and profitability through strategic pricing when new regulations eliminate some bank fees. Advanced analytics are used to understand customer behavior and optimize prices.
A large appliance manufacturer was interested in using propensity models to better target consumers with direct mail campaigns. A data set containing transactional data from past purchases and enriched with all kinds of data about the consumer, the household or the zip code, from third party providers was used to develop a model to predict non-responders and avoid targeting them. Simulations varying the estimated revenue per customer and the cutoff point used to filter out potential consumers allowed me to identify different optimal point in the Reach-vs-Response-Rate tradeoff.
Case Study Interactive: How To Work With Structured And Unstructured Data To Increase Customer Acquisition And Reduce Churn With Relevant Communication
How can analytics improve your attribution model accuracy to highlight and transform your most successful marketing channels?
How can you introduce predictive analytics to increase your customer segmentation competency?
How can insights from consumer data help you to predict customer lifetime value and focus on your top customers?
How can split testing consumer data help to improve your customer offering and boost retention rates?
Rapid Optimization Application Development Using Excel and SolverMichael Mina
Marketing optimization is the process of determining how to allocate marketing dollars in order to achieve specific goals (e.g., maximize profit), subject to certain constraints (e.g., a fixed marketing budget). This often takes the form of using mathematical techniques to determine who to target, through which channel, and with what message or offer.
A number of optimization applications are commercially available. However, many of them require changes to data and computational infrastructure that are labor-intensive and cost-prohibitive. This presentation will demonstrate how optimization applications can be developed easily and quickly using Excel combined with Excel Solver, even for large marketing campaigns.
This presentation will discuss how segmentation can be used to reduce the complexity of large optimization problems, and how to quickly develop a simple but effective optimization application using Excel combined with Excel Solver.
This presentation will be of interest to those seeking to optimize marketing campaigns of any size while managing operational and computational complexity.
An electronic copy of the Excel worksheet used for optimization is this presentation is available at tinyurl.com/mina2018artforum.
Solving business problems using mekko graphics: This presentation shows you how to improve customer loyalty by identifying reasons for churn and ways to reduce them
Sidewalk Event - Why CX matters by mikael vandeskelde Mikael Vandeskelde
This document discusses the importance of customer experience management. It notes that acquiring new customers costs 6-7 times more than retaining existing ones. Dissatisfied customers will tell 9-15 people about negative experiences, while positive word of mouth from satisfied customers reaches 4-6 people. Customers are more likely to purchase again from companies that receive positive customer experience ratings. The document also outlines a framework for measuring customer experience, identifies challenges in profiling today's customers, and presents a case study example of improving customer experience through personalized omnichannel experiences.
Similar to A Mall Case Study Machine Learning (20)
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. 🚀 This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. 💻
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. 🖥️
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. 🌟
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
2. INDEX
1. Problem Statement
2. Challenges
4. Binning
5. Data Analysis
6. ML & Business Insights
3. Missing Value Treatment
3. PROBLEM STATEMENT
Problem Context Relevance AIMs & Objectives
A mall is doing a
coupon campaign
and wants to
ensure the
success of
campaign using a
Robust prediction
model built with
Machine Learning
techniques.
Mall has provided
historical data
which comprises
of recommended
coupons,
customer details
and coupon
consumption
details of
previous years
Mall is going to
run the campaign
again and based
on the historical
data of coupons
effectiveness they
want to increase
the footfalls in
the Mall which
will help the mall
to increase
business for the
shops in the mall.
The AIM of the
project is to come
out with Business
Insights on the
data provided
and Train a
Machine Learning
model which can
predict the
success of
campaign with
highest accuracy
percentage.
4. CHALLENGES IN HISTORICAL DATA
• 26 features – 9 Numerical and 17
Categorical
• Missing values in 5 Columns
• Categorical Columns have Multiple labels,
going to maximum 25 labels in 1 column.
• Categorical Data has outliers and
skewness
• Most of the features are correlated
5. MISSING VALUE TREATMENT
• Car – There are 84 values only out of 10147 in
this column which is less then 1% hence we
removed this column as it has no impact.
• Bar, CoffeeHouse, CarryAway,
RestaurantLessThan20, Restaurant20To50 – These
have missing values around 2% hence we have used
the Feature engineering technique to fill the most
commonly occurring value out of the total values
available in these columns.
6. BINNING
Occupation column has 25 labels and the data frequency variation is very
high creating outliers and skewness, so we used the Binning technique to
reduce the number of labels hence removed the outliers and skewness
7. BINNING CONTD.
Fig. : 1 Fig. : 2
Fig. : 3 Fig. : 4
Outliers: In Figure – 1, we can see
two dots, these are outliers which we
tackled with binning and hence Figure
- 2 shows the result of binning on the
categorical column
Skewness: In Figure – 3, we can see
the curve is skewed on the right, which
we have tackled with binning and post
processing; Figure – 4, shows the
result of binning on the categorical
column
8. DATA ANALYSIS
Success of Coupons (Historical Data)
28%
27%
25%
11%
9%
Coffee House
Restaurant(<20)
Carry out & Take away
Bar
Restaurant(20-50)
Coffee House, Carry out and Restaurant(<20) were
the most successful coupons
Age Vs Coupons (Historical Data)
164
862
817
751
495
363
235
692
268
1271
1216
885
570
516
303
739
<21 21 26 31 36 41 46 50+
N Y
Age group from 21 to 31 and 50+, the coupon
usage is very high. Below 21 years the coupon
distribution is low and hence the usage.
9. DATA ANALYSIS CONTD.
Occupation Vs Coupon Success (Historical Data)
N, 860
Y, 1262
0
200
400
600
800
1000
1200
1400
Student, Unemployed, computer professionals and
Retired categories the success rate is high.
Marital Status (Historical Data)
40%
38%
17%
4% 1%
Single
Married partner
Unmarried partner
Divorced
Widowed
Age group from 21 to 31 and 50+, the coupon
usage is very high. Below 21 years the coupon
distribution is low and hence the usage.
10. DATA ANALYSIS CONTD.
Multicollinearity Chart
Colour Legend
• Yellow shade – Correlation is 0
• Red and Dark Green is -1 and +1
Business Understanding
• Customer ID, Temperature, Time,
Weather, Direction, Passenger and
Driving Distance impact is very low
• Age, Has Children, Marital status,
Gender, Occupation the impact is
intermediate.
• Restaurant type visit rating has the
highest impact
11. MACHINE LEARNING MODEL
ML Model 1: Logistic Regression
Logistic
Regression
Cross
Validation
Accuracy
68.97%
ML Model 2: Decision Tree
Hyper Tuning
Cross
Validation
Accuracy
70.95%
Decision Tree
Accuracy
76.63%
ML Model 3: Random Forest
ML Models with their accuracy scores
Random
Forest
Hyper Tuning
Cross
Validation
12. MACHINE LEARNING
(HYPERTUNING)
Random Forest – Hyper Tuning to get accuracy
No of Estimators: We used Randomize Search and Grid Search
to find the optimum number of Estimators (Trees) which can
give the highest accuracy score and then used the same in our
Machine Learning Model.
No of Folds: We used 5 folds to create random test and train
split within the model to generate 5 accuracy scores and
based on which the average score got select as the most
optimum score.
Random State: We have tuned the Random state to 80 which
is giving the maximum accuracy score in our model.
13. Business Insights
Advantages to Business
1. Coffee, Restaurant (<20) and Take away coupons are
more successful.
2. Coupons are mostly used by age group 21 to 31 and 50+
3. Computer Workers, Retired, students and Unemployed
are mostly using the coupons.
4. Customers tend to use the coupons if Driving Distance is
between 5 to 15 minutes.
5. Customers tend to use the coupons mostly when the
weather is sunny.
6. Carry away coupons utilization is most for customers
using it 1~3 times in a month.
7. Most footfalls are at 7:00 AM and 6:00 PM, probably to
pick a snack.