Here is the Bitcoin Report. The report involves every aspect of Bitcoin that one need to understand Bitcoin from scratch. Following are the contents that are being covered by the report:-
· Abstract
· Introduction
· History and its Creation
· Working of Bitcoin
· Advantages
· Disadvantages
· Challenges to Bitcoin
· Scope of Bitcoin
· Conclusion
Hope this will help
Digital Currencies- Block chain, Cryptocurrencies and Bitcoin Sai P Mishra
Digital currency is a money balance recorded electronically on a stored-value card or other devices. It exhibits properties similar to physical currencies, but can allow for instantaneous transactions. Digital Currencies like blockchain, bit coin, etherium are emerging and has great future.
Here is the Bitcoin Report. The report involves every aspect of Bitcoin that one need to understand Bitcoin from scratch. Following are the contents that are being covered by the report:-
· Abstract
· Introduction
· History and its Creation
· Working of Bitcoin
· Advantages
· Disadvantages
· Challenges to Bitcoin
· Scope of Bitcoin
· Conclusion
Hope this will help
Digital Currencies- Block chain, Cryptocurrencies and Bitcoin Sai P Mishra
Digital currency is a money balance recorded electronically on a stored-value card or other devices. It exhibits properties similar to physical currencies, but can allow for instantaneous transactions. Digital Currencies like blockchain, bit coin, etherium are emerging and has great future.
As more and more transactions go digital, or plastic so to say, we look towards the future with a model that does away with currency notes and coins altogether and yet keeps alive the essential principle that money serves, without attaching any tangibility to it.
With cashless society being the current hot topic .. Digital Wallet surely covers one of them ...Here is a description about what is it and how it works .. may aid you during your final year seminar .. Cheers !!
Welcome to our channel,
A cryptocurrency (or cryptocurrency) is a digital asset designed to work as a medium of exchange that uses strong cryptography to secure financial transactions,
control the creation of additional units, and verify the transfer of assets. Cryptocurrencies use decentralized control as opposed to centralized digital currency and central banking systems. This channel was created to share news and opportunities related to crypto space.
Check our website: https://www.everythingcrypto.club/
Join our private channel group: http://bit.ly/2YoWzFr
Follow us on social media :
Youtube : https://bit.ly/3bkoeiE
Instagram: https://www.instagram.com/everythingincrypto
Telegram : https://t.me/everythingincrypto
vkontakte : https://vk.com/public184024328
Twitter : https://twitter.com/everythingcryp5
Medium : https://medium.com/everythingincrypto
Linkedin: https://www.linkedin.com/company/everythingcrypto
what's cryptocurrency all about?
What's cryptocurrency?
What does cryptocurrency mean?
What does crypto mean?
#everythingcrypto #whatscryptocurrency #cryptocurrency #bitcoin #crypto #ethereum #freecrypto #freebitcoin #earnfreetoken #earnfreebitcoin
An Introduction to Cryptocurrency Funds | Timothy Spangler | Lunch & LearnUCICove
About UCI Applied Innovation:
UCI Applied Innovation is a dynamic, innovative central platform for the UCI campus, entrepreneurs, inventors, the business community and investors to collaborate and move UCI research from lab to market.
About the Cove @ UCI:
To accelerate collaboration by better connecting innovation partners in Orange County, UCI Applied Innovation created the Cove, a physical, state-of-the-art hub for entrepreneurs to gather and navigate the resources available both on and off campus. The Cove is headquarters for UCI Applied Innovation, as well as houses several ecosystem partners including incubators, accelerators, angel investors, venture capitalists, mentors and legal experts.
Follow us on social media:
Facebook: @UCICove
Twitter: @UCICove
Instagram: @UCICove
LinkedIn: @UCIAppliedInnovation
For more information:
cove@uci.edu
http://innovation.uci.edu/
Central banks and the future of digital money. A practical proposal for centr...eraser Juan José Calderón
Central banks and the future of digital money
A practical proposal for central bank digital currencies on the Ethereum blockchain.
CONSENSYS WHITE PAPER
Looks at the different AI approaches and provides some practical categorisation and case studies. Then talks about the data fabric you need to put in place to improve model accuracy and deployment. Covers: supervised, unsupervised, machine learning, deep learning, RPA, etc. Finishes with how to create successful AI projects.
As more and more transactions go digital, or plastic so to say, we look towards the future with a model that does away with currency notes and coins altogether and yet keeps alive the essential principle that money serves, without attaching any tangibility to it.
With cashless society being the current hot topic .. Digital Wallet surely covers one of them ...Here is a description about what is it and how it works .. may aid you during your final year seminar .. Cheers !!
Welcome to our channel,
A cryptocurrency (or cryptocurrency) is a digital asset designed to work as a medium of exchange that uses strong cryptography to secure financial transactions,
control the creation of additional units, and verify the transfer of assets. Cryptocurrencies use decentralized control as opposed to centralized digital currency and central banking systems. This channel was created to share news and opportunities related to crypto space.
Check our website: https://www.everythingcrypto.club/
Join our private channel group: http://bit.ly/2YoWzFr
Follow us on social media :
Youtube : https://bit.ly/3bkoeiE
Instagram: https://www.instagram.com/everythingincrypto
Telegram : https://t.me/everythingincrypto
vkontakte : https://vk.com/public184024328
Twitter : https://twitter.com/everythingcryp5
Medium : https://medium.com/everythingincrypto
Linkedin: https://www.linkedin.com/company/everythingcrypto
what's cryptocurrency all about?
What's cryptocurrency?
What does cryptocurrency mean?
What does crypto mean?
#everythingcrypto #whatscryptocurrency #cryptocurrency #bitcoin #crypto #ethereum #freecrypto #freebitcoin #earnfreetoken #earnfreebitcoin
An Introduction to Cryptocurrency Funds | Timothy Spangler | Lunch & LearnUCICove
About UCI Applied Innovation:
UCI Applied Innovation is a dynamic, innovative central platform for the UCI campus, entrepreneurs, inventors, the business community and investors to collaborate and move UCI research from lab to market.
About the Cove @ UCI:
To accelerate collaboration by better connecting innovation partners in Orange County, UCI Applied Innovation created the Cove, a physical, state-of-the-art hub for entrepreneurs to gather and navigate the resources available both on and off campus. The Cove is headquarters for UCI Applied Innovation, as well as houses several ecosystem partners including incubators, accelerators, angel investors, venture capitalists, mentors and legal experts.
Follow us on social media:
Facebook: @UCICove
Twitter: @UCICove
Instagram: @UCICove
LinkedIn: @UCIAppliedInnovation
For more information:
cove@uci.edu
http://innovation.uci.edu/
Central banks and the future of digital money. A practical proposal for centr...eraser Juan José Calderón
Central banks and the future of digital money
A practical proposal for central bank digital currencies on the Ethereum blockchain.
CONSENSYS WHITE PAPER
Looks at the different AI approaches and provides some practical categorisation and case studies. Then talks about the data fabric you need to put in place to improve model accuracy and deployment. Covers: supervised, unsupervised, machine learning, deep learning, RPA, etc. Finishes with how to create successful AI projects.
Fraud detection is a topic which is applicable to many industries including banking and financial sectors, insurances, government agencies, and low enforcement and more.Through the use of sophisticeted use of data mining tools, millions of transactions can be searched to spot patterns and detect fraudulent transactions.
Its a process of identifying fraudulent transaction.
This technique used to recognize fraudulent creddit card transactions so that customers are not charged for items that they did not purchases
[Ai in finance] AI in regulatory compliance, risk management, and auditingNatalino Busa
AI to Improve Regulatory Compliance, Governance & Auditing. How AI identifies and prevents risks, above and beyond traditional methods. Techniques and analytics that protect customers and firms from cyber-attacks and fraud. Using AI to quickly and efficiently provide evidence for auditing requests.
This deck is from Interpol Conference 2017, these slides shows the holistic view of machine learning in cyber security for better organization readiness
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4jIvan Zoratti
I gave this presentation at DataOps 19 in Barcelona.
You will find information about Neo4j and how to use it with Graph Algorithms for Machine Learning and Artificial Intelligence.
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...TigerGraph
Full Webinar: https://info.tigergraph.com/graph-gurus-34
During this webinar we:
-Examine how graph analytics can lower the total cost of fraud;
-Describe how graph analytics can improve credit card fraud detection;
-Explore the application of graph analytics to an anti-money laundering use case.
Data is being generated at a feverish pace and forward thinking companies are integrating big data and analytics as part of their core strategy from day one. However, it is often hard to sift through the hype around big data and many companies start with only a small subset of data. Can smaller companies benefit from big data efforts? We will discuss several use cases and examples of how startups are using data to optimize their operations, connect with their users, and expand their market.
Network security monitoring elastic webinar - 16 june 2021Mouaz Alnouri
The difference between successfully defending an attack or failing to compromise is your ability to understand what’s happening in your network better than your adversary. Choosing the right network security monitoring (NSM) toolset is crucial to effectively monitor, detect, and respond to any potential threats in an organisation’s network.
In this webinar, we’ll uncover the best practices, trends, and challenges in network security monitoring (NSM) and how Elastic is being used as a core component to network security monitoring.
Highlights:
- What is network security monitoring (NSM)?
- Types of network data
- Common toolset
- Overcoming challenges with network security monitoring
- Using Machine Learning for network security monitoring
- Demo
AI in the Enterprise: Past, Present & Future - StampedeCon AI Summit 2017StampedeCon
Artificial Intelligence has entered a renaissance thanks to rapid progress in domains as diverse as self-driving cars, intelligent assistants, and game play. Underlying this progress is Deep Learning – driven by significant improvements in Graphic Processing Units and computational models inspired by the human brain that excel at capturing structures hidden in massive complex datasets. These techniques have been pioneered at research universities and digital giants but mainstream enterprises are starting to apply them as open source tools and improved hardware become available. Learn how AI is impacting analytics today and in the future.
Learn how AI is affecting the enterprise including applications like fraud detection, mobile personalization, predicting failures for IoT and text analysis to improve call center interactions. We look at how practical examples of assessing the opportunity for AI, phased adoption, and lessons going from research, to prototype, to scaled production deployment.
Folks, recently I was invited by re-work to be a speaker at the Deep Learning in Finance Summit held in Singapore. First of all, I wanted to thank the folks @ rework for organizing this fantastic event and inviting many talented speakers from the industry and academia. The entire 2 days agenda was a great platform to learn more about the latest happening in this area.
Regarding my presentation- The topic was “ Deep Learning & Fraud Detection in Fintech Lending”. Some of the key points that were covered during this presentation are-
Types of fintech
Key drivers for fraud in fintech lending
Common fraud modus operandi ( MOs) in fintech lending
Why deep learning for fraud detection
Sample deep learning application areas in fraud detection-
Anomaly detection using Autoencoder/ Replicator Neural Network
Social network analysis ( SNA)
Demo of Multi Layer Perceptron ( MLP) deep learning classifier built using Python, Tensorflow and Keras along with vital statistical parameters such as accuracy, logloss, precision, recall, fscore etc.
I am attaching the full presentation here. Do share your thoughts…
Happy reading.
Cheers!
-RP
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Nasscom how can you identify fraud in fintech lending using deep learning
1. How can you Identify Fraud in Fintech Lending using
Deep Learning
RATNAKAR PANDEY, HEAD OF INDIA ANALYTICS & DATA SCIENCE, KABBAGE
Disclaimer: The views expressed here are solely those of the presenter in his private capacity.
16th October 2018
2. “This series is solely for educational purposes only. This series does not intend to be complete or universal in nature and cannot be
considered as an alternative to an expert opinion on any specific issue. The series is based on views of the speaker/facilitator and
NASSCOM does not recommend/endorse the view-points per se and is primarily a medium to disseminate knowledge for the
greater good of the Products ecosystem. Any attendee who opens or otherwise accesses the content of the series at any point of
time, does so at their own risk and acknowledges and agrees that neither NASSCOM and nor its members and affiliates will not
be responsible for any loss or damage suffered by any person.
The content of this webinar series is solely for the purpose of NASSCOM members and NASSCOM digital channels and any
copying/distribution is liable for legal action.”
Legal Disclaimer
2
4. Outline
Demo of Multi Level Perceptron (MLP)
Classification Case Approach and Performance
Suggested Deep Learning Application Areas
Supervised Unsupervised
Need for Deep Learning
Existing Methods Why Deep Learning?
Frauds in Fintech Lending
Drivers Modus Operandi
Introduction
About Fintech About Kabbage
4
5. Fintech is an Integral Part of Our Life Now
$24.7 B
Invested in 2016 in
global fintech companies
1076
Deals in 2016 in
global fintech companies
Sources: KPMG, The Pulse of Fintech Q4 2016 | Capgemini World Fintech Report 2017 | PwC Global Fintech Report 2017 | www.forbes.com
50.2%
Of global customers have
done business with fintech
20%
Expected ROI on
fintech projects
20+
Global fintech
Unicorns
10K+
Global fintech
companies
Types
of
Fintech
Alternative Lending- Kabbage, Lendingclub, Prosper, Zopa
Payment / Billing Tech - Stripe, Paytm, Adyen, Ant Financial,
Square
Personal Finance / Asset Management Creditkarma, Bankrate,
NerdWallet
Robo Advisory- Wealthfront, Betterment, NerdWallet
Blockchain- Abra, 21, coinbase, Ethereum
5
6. Kabbage is Blazing a Trail in Big Data & Fintech
Kabbage is more than a lender for small businesses; our data and technology
platform is now being used as a fully branded product by other lenders, and
our products are expanding. We’ve received numerous awards & recognition,
including-
• CNBC Disruptors 50 list
• Inc. 500 list for three consecutive years
• The Forbes Most Promising Companies lists twice
• Glassdoor’s 2017 Best Places to Work list
6
7. Fraud Drivers- Superfast Decision Making and Faceless Channels
Decisioning within few minutes
Application on web and Mobile
May have higher exposure to
thin file and new to credit
More prone to invisible window
applications
Unconventional and evolving
data sources
Note: Even with these challenges the fraud rate in the industry is typically less than 20 bps for more data savvy lenders 7
8. How a Lending Fraud can be Classified?
Who
Commits?
How?
Who is the
Victim?
Borrower
Someone known to the
borrower- lead
generator, friends, family
employees etc.
Someone unknown to
the borrower
First Payment Default,
Bust Out, Synthetic
Identity, Stacking etc.
Friendly Fraud-
someone misuses the
trust
Fraud rings, Identity
Theft, Account Takeover
Lender Borrower, Lender Borrower, Lender
First Party Second Party Third Party
8
9. Sample Modus Operandi
• Stolen identity
• Synthetic identity
• May replicate best
customer (prime
and super prime)
• Falsified info
• No willingness to
pay
• Acquire multiple loans
in a short window (
invisible window)
• May provide all info
correctly
• More likely to be on
higher side in the risk
spectrum
• No or low willingness to
pay
• Mimic good payment
behavior for significant
time
• Bust out when gains
are highestCommon Fraud Related Terms- http://www.cpp.co.uk/helpful-info/fraud-glossary-of-terms
9
10. Current Situation- Heuristics and Regression Driven Approaches
Intuitive
Heuristics
Statistical
• Manual Reviews
• Experts Driven
• Gut feeling
• Thumb rules
• Driven by past experience
• Quick decision making
• Control/ confidence limits
• Outlier detection/ deviation from norm
• Decision tree, regression, time series
10
11. 10,000 +
Features
Unstructured
Transactional
Social
Device
&
IP
Third Parties
Bureau
Why go Deep? Explosion of Features and Data Sources
• Uncover hard to detect patterns
(using traditional techniques) when
the incidence rate is low
• Find latent features (super variables)
without significant manual feature
engineering
• Real time fraud detection and self
learning models using streaming data
(KAFKA, MapR)
• Ensure consistent customer
experience and regulatory
compliance
• Higher operational efficiency
• Big data and data exhaust handling
capabilities
11
13. Find Anomalies- Autoencoder
• Traditional techniques based on density or
distance works better with linearly separable
data
• Stacked Autoencoders (SAE) and Deep Belief
Networks ( DBN) make no assumptions about
the distribution of data and work better on non
linearly separable data
• Unsupervised learning algorithms for feature
learning, feature reduction and outlier detection
• Input vectors are used as output vectors and
reconstruction error computed
• The data points with higher reconstruction error
( MSE) are more likely to be outliers
• Helps in detecting different modus operandi of
fraudsters
Use Case- Deployment of Autoencoder for Credit Card Fraud Detection
13
14. Sequence Analysis- Recurrent Neural Network (LSTM)
• Recurrent Neural Network (RNN) are a special
type of feed-forward network used for
sequential data analysis where inputs are not
independent and are not of fixed length
• Rather in this case, inputs are dependent on
each other along the time dimension. In other
words, what happens in time ‘t’ may depend on
what happened in time ‘t-1’, ‘t-2’ and so on
• These are also called ‘memory’ networks as
previous inputs and states persist in the model
for doing a more optimal sequential analysis.
They can have both short term and long term
time dependence.
• Long Short Term Memory (LSTM) is one of the
most popular Deep Network used for sequential
data analysis.
• More on LSTM Here-
https://datafai.com/2018/03/08/recurrent-
neural-network-rnn-in-python/
Use Case- Use RNN (LSTM) to analyse web behaviour and logs to detect
fraudulent behavior
14
15. Find Networks - Clique and Links Graphs
Detect
Fraudulent
Cases
Find
Commonalities
Form Network
• Use variety of attributes (on-us/ off-us) to build linkage between known bad
customers and other customers with unknown status
• Larger the size of network, easier the detection and vice versa
• Overlap networks using enumerative approaches and find commonalities
• Use graph transduction (t-SNE) to detect potential fraudulent cases by doing peer
group (archetype) analysis to separate routine behavior from suspicious behavior -
“birds of same feather flock together”
15
17. Real Time Detection- Convolution Neural Network (CNN)
• Convolution Neural Network (CNN) are
particularly useful for spatial data analysis, image
recognition, computer vision, natural language
processing, signal processing and variety of
other different purposes. They are biologically
motivated by functioning of neurons in visual
cortex to a visual stimuli.
• What makes CNN much more powerful
compared to the other feedback forward
networks for image recognition is the fact that
they do not require as much human
intervention and parameters as some of the
other networks such as MLP do. This is primarily
driven by the fact that CNNs have neurons
arranged in three dimensions.
• More on CNN Here-
https://datafai.com/2018/02/25/deep-learning-
convolution-neural-network-cnn-in-python/
Use Case- CNN for real time classification
17
18. Labeled Data- Multilayer Perceptron (MLP)
• These are the most basic networks and feed
forward the inputs to create output. They
consist of an input layer and an output layer
and many interconnected hidden layers and
neurons between the input and the output
layers.
• They can be used for any supervised regression
or classification problems
• Since they generally use some non linear
activation function such as Relu or Tanh to
compute the losses ( the difference between the
true output and computed output) such as
Mean Square Error ( MSE), Logloss, they are
more suitable for handling non linear problems.
• We will do a MLP Demo on credit card fraud
data
18
19. MLP Demo- Case Details
• Anonymized credit card transactions data from European customers
• 30 features ( 28 anonymized, duration elapsed, amount of transactions)
• Label- fraud or normal transaction
• 17bps incidence rate for fraudulent transactions
• 284,807 total transaction in data
Sources: http://mlg.ulb.ac.be | https://www.kaggle.com/dalpozz/creditcardfraud
19
20. MLP Demo- Tools and Techniques used
Python
2.7 or 3.6
Keras
2.0.2
TensorFlow
1.0.1
20
21. MLP Demo- Traditional Modeling Techniques Process
Manual
Feature
Engineering
After variable
treatments
drop variables
with little or no
explaining
power- WOE,
IV, Distribution
Look at WOE
to create bins
etc.
WOEDensity Dist.
21
22. MLP Demo- Network Training
Little or No Manual Feature Engineering
• No over or under sampling
• No variables dropped
• Only standardization of features done
• 75% training/ 25% validation
• No manual binning
Fitted Network
• Multi Layer Perceptron with three hidden layers.
o Activation function = Sigmoid
o # of neurons = 512 in the input layer
o Each consequent layer has half the neurons
o Cost function = logloss
o Optimizer = adam
o Epochs= 5
o Dropout rate = 30%
22
23. MLP Demo- Performance Summary
Metric Value
Accuracy Score 99.9%
Logloss 0.003
Precision Score 77%
Recall Score 75%
Area Under the
Curve (AUC)
87.4%
FScore 76.5%
23
24. MLP Demo- Hyperparameters Optimization
• Epochs = [5,10,15,20,25…]
• Batch Size = [5,10,20,30,40…]
• Optimizer= [‘SGD’, ’Adam’, ’RMSprop’…]
• Learning Rate = [0.01,0.05,0.1,0.2…]
• Momentum = [0.2,0.4,0.6,…]
• Weights Initiation= [‘Uniform’, ‘Normal’, …]
• Activation Function= [‘relu’,’sigmoid’, ‘tanh’, ‘softmax’,…]
• Drop-out rate= [0.0,0.2,0.4,0.5,…]
• Neurons= [5,10,20,30,40…]
Python scikit-learn gridsearch function, design of experiment( screening
design, fractional designs) needs to be combined with intutition and expertise
to come out with the best network!
24
25. Thank You!
Christopher McDougall- “Every morning in Africa, a gazelle wakes up, it knows it must outrun the fastest lion
or it will be killed. Every morning in Africa, a lion wakes up. It knows it must run faster than the slowest
gazelle, or it will starve. It doesn't matter whether you're the lion or a gazelle-when the sun comes up, you'd
better be running.
Working in the fraud analytics is the same way.
25
25
26. Next Webinar : Go-to-market strategy / Planning
Date : 2nd Nov 2018
Speaker: Ashok Munirathinam, Sr. Director, SAP Cloud Platform
SAP Asia Pacific & Japan
Queries: Ankita@nasscom.in
26