SlideShare a Scribd company logo
Real-World	Data	Science
Fraud	Detection,	Customer	Churn	&	Predictive	Maintenance
Dr.	Shirin	Glander
About	me
Fraud	Detection
What	is	fraud	and	why	is	it	interesting	for	Data
Science?
“The	crime	of	getting	money	by	deceiving	people”	(Cambridge	Dictionary)
E-commerce	and	online	transactions	pose	risks	for	companies
What	is	fraud	and	why	is	it	interesting	for	Data
Science?
“The	crime	of	getting	money	by	deceiving	people”	(Cambridge	Dictionary)
E-commerce	and	online	transactions	pose	risks	for	companies
Traditional	Fraud	Detection
Rule-based
Inflexible
Leads	to	arms-race	between	companies	and	fraudsters
Leveraging	Big	Data	and	Machine	Learning	in
modern	Fraud	Detection
Collect	information	about	customers	&	transactions
Learn	from	this	data
Leveraging	Big	Data	and	Machine	Learning	in
modern	Fraud	Detection
Collect	information	about	customers	&	transactions
Learn	from	this	data
Unsupervised
Data	without	labels	or	class
information
Aim
Finding	similar	instances	or
patterns
Ranking	instances
Finding	outliers
The	two	main	approaches	in	Machine	Learning
Unsupervised
Data	without	labels	or	class
information
Aim
Finding	similar	instances	or
patterns
Ranking	instances
Finding	outliers
Supervised
Data	with	labels	or	class
information
Aim
Classification
Regression
Forecasting
The	two	main	approaches	in	Machine	Learning
What	can	Machine	Learning	do?
Exploring	a	fraud	example	dataset
Synthetic	financial	dataset	for	fraud	detection	from	Kaggle1
6,362,620	transactions	over	30	days
Fraudulent	(Class	=	1)	&	regular	(Class	=	0)	transactions.
[1]	https://www.kaggle.com/ntnu-testimon/paysim1
Exploring	a	fraud	example	dataset
Synthetic	financial	dataset	for	fraud	detection	from	Kaggle1
6,362,620	transactions	over	30	days
Fraudulent	(Class	=	1)	&	regular	(Class	=	0)	transactions.
[1]	https://www.kaggle.com/ntnu-testimon/paysim1
We	can	already	learn	a	lot	just	by	looking	at	the
data
Fraud	Detection	with	unsupervised
dimensionality	reduction
Identify	hidden	patterns
Principal	Component
Analysis	(PCA)
Linear	relationships	between
features
Reflects	the	majority	of
variation	in	our	data
Shows	sample	dissimilarity
Fraud	Detection	with	unsupervised
dimensionality	reduction
Identify	hidden	patterns
t-distributed	Stochastic
Neighbor	Embedding	(t-
SNE)
Complex	relationships	between
features
Shows	also	similarity	by
clustering	samples
Fraud	Detection	with	unsupervised
dimensionality	reduction
Identify	hidden	patterns
Fraud	Detection	with	supervised	Machine
Learning
Train	a	classification	model	on	the	class	label	e.g.	with	Gradient	Boosting1	or
Random	Forest2
[1]	https://shirinsplayground.netlify.com/2018/11/ml_basics_gbm/
[2]	https://shirinsplayground.netlify.com/2018/10/ml_basics_rf/
Why	Fraud	Detection	is	particularly	tricky
Fraud	is	rare	=>	highly	unbalanced	class	distribution
This	makes	using	normal	approaches	and	algorithms	difficult
Preprocessing/balancing	brings	other	problems
Prediction	accuracy	is	misleading	(more	on	that	later)
Why	Fraud	Detection	is	particularly	tricky
Fraud	is	rare	=>	highly	unbalanced	class	distribution
This	makes	using	normal	approaches	and	algorithms	difficult
Preprocessing/balancing	brings	other	problems
Prediction	accuracy	is	misleading	(more	on	that	later)
Fraud	is	hard	to	detect	=>	high	number	of	mislabelled	data
Fraud	methods	change	often	and	unpredictably
Simple	fraud	is	easy	to	detect	with	rules
Unknown/new	fraud	methods	require	Machine	Learning
Fraud	Detection	with	unsupervised	Anomaly
Detection
If	we	assume	that	fraud	is	sufficiently	different	from	regular	transactions,
unsupervised	learning	will	flag	them	as	anomalies
Fraud	Detection	with	unsupervised	Anomaly
Detection
If	we	assume	that	fraud	is	sufficiently	different	from	regular	transactions,
unsupervised	learning	will	flag	them	as	anomalies
Anomaly	detection	with	Deep	Learning	autoencoders
What	are	Neural	Nets
A	particular	type	of	algorithm	for	Machine	Learning
Used	in	supervised	and	unsupervised	learning
What	are	Neural	Nets
A	particular	type	of	algorithm	for	Machine	Learning
Used	in	supervised	and	unsupervised	learning
Modeled	after	the	human	brain
How	Neural	Nets	learn	classification	tasks
Input:	instances	+	features	(data)
Output:	class	label
Neural	Nets	learn	by	optimizing	weights	(and	biases)
Activation	functions
Minimizing	loss	functions
Backpropagation
Optimization,	e.g.	with	Gradient	Descent
How	Neural	Nets	learn	classification	tasks
Input:	instances	+	features	(data)
Output:	class	label
Neural	Nets	learn	by	optimizing	weights	(and	biases)
Activation	functions
Minimizing	loss	functions
Backpropagation
Optimization,	e.g.	with	Gradient	Descent
More	info:	https://shirinsplayground.netlify.com/2018/11/neural_nets_explained/
The	most	important	things	to	know	about	Deep
Learning
Deep	Learning	vs.	Machine	Learning
Deep	Learning	autoencoders
Anomaly	detection
Semi-supervised:	input	=	output
Minimizing	reconstruction	error	or	loss
Outlier	samples	will	have	a	larger	reconstruction	error1
[1]	https://shiring.github.io/machine_learning/2017/05/01/fraud	&
https://shiring.github.io/machine_learning/2017/05/02/fraud_2
Deep	Learning	autoencoders
Anomaly	detection
Semi-supervised:	input	=	output
Minimizing	reconstruction	error	or	loss
Outlier	samples	will	have	a	larger	reconstruction	error1
[1]	https://shiring.github.io/machine_learning/2017/05/01/fraud	&
https://shiring.github.io/machine_learning/2017/05/02/fraud_2
Pre-training	supervised	models	with
autoencoders
Using	the	weights	from	the	autoencoder	model	for	initialising	the	training	of
a	supervised	classification	model
A	few	words	on	performance	evaluation
Accuracy	is	easy	to	understand	but	not	necessarily	correct!
A	few	words	on	performance	evaluation
Accuracy	is	easy	to	understand	but	not	necessarily	correct!
Performance	is	evaluated	on	an	(independent)	test	set
A	few	words	on	performance	evaluation
Accuracy	is	easy	to	understand	but	not	necessarily	correct!
Performance	is	evaluated	on	an	(independent)	test	set
We	basically	want	to	know:
How	many	predictions	were	correct?	(Accuracy)
BUT:	With	<	1%	of	fraud	cases,	a	model	that	never	identifies	instances	as	fraud
would	still	achieve	a	>	99%	accuracy.
Precision
How	many	predicted	fraud	cases	in
the	test	data	were	correctly
classified?
So,	what's	a	better	way	to	measure
performance?
Precision
How	many	predicted	fraud	cases	in
the	test	data	were	correctly
classified?
Sensitivity	or	recall
How	many	fraud	cases	in	the	test
data	were	correctly	classified	as
fraud?
So,	what's	a	better	way	to	measure
performance?
Precision
How	many	predicted	fraud	cases	in
the	test	data	were	correctly
classified?
Sensitivity	or	recall
How	many	fraud	cases	in	the	test
data	were	correctly	classified	as
fraud?
So,	what's	a	better	way	to	measure
performance?
F1-Score
Harmonic	average	of	precision	and	recall:
F1 = (
recall −
1 + precision −
1
2
) = 2 ∗
precision ∗ recall
precision + recall
A	Shiny	demo
https://shiring.shinyapps.io/fraud_example_dashboard/
Customer	Churn
What	is	Customer	Churn?
Loss	of	revenue	due	to	customers	cancelling	contract,	not	returning,	etc.
Affects	e-commerce,	telecommunication,	internet	service	providers	and	other
businesses	dealing	with	customers
What	is	Customer	Churn?
Loss	of	revenue	due	to	customers	cancelling	contract,	not	returning,	etc.
Affects	e-commerce,	telecommunication,	internet	service	providers	and	other
businesses	dealing	with	customers
Goal
Identify	customers	that	are	likely	to	churn
And	try	to	prevent	churn	with	targeted	actions,	like	ads
What	is	Customer	Churn?
Loss	of	revenue	due	to	customers	cancelling	contract,	not	returning,	etc.
Affects	e-commerce,	telecommunication,	internet	service	providers	and	other
businesses	dealing	with	customers
Goal
Identify	customers	that	are	likely	to	churn
And	try	to	prevent	churn	with	targeted	actions,	like	ads
=>	Reduce	the	proportion	of	churned	customers!
How	can	Machine	Learning	help	prevent	churn?
Learn	from	historical	data	about	customer	behavior
How	can	Machine	Learning	help	prevent	churn?
Learn	from	historical	data	about	customer	behavior
Generate	and	use	predictive	models	that	put	customers	into	segments:
1.	 Customers	with	low	risk	of	churn;	generally	don't	need	particular	attention;
attentions	could	even	be	harmful	and	costs	time	and	money;
How	can	Machine	Learning	help	prevent	churn?
Learn	from	historical	data	about	customer	behavior
Generate	and	use	predictive	models	that	put	customers	into	segments:
1.	 Customers	with	low	risk	of	churn;	generally	don't	need	particular	attention;
attentions	could	even	be	harmful	and	costs	time	and	money;
2.	 Customers	with	high	risk	of	churn;	(targeted)	advertisement	or	other	actions
are	advised;
How	can	Machine	Learning	help	prevent	churn?
Learn	from	historical	data	about	customer	behavior
Generate	and	use	predictive	models	that	put	customers	into	segments:
1.	 Customers	with	low	risk	of	churn;	generally	don't	need	particular	attention;
attentions	could	even	be	harmful	and	costs	time	and	money;
2.	 Customers	with	high	risk	of	churn;	(targeted)	advertisement	or	other	actions
are	advised;
3.	 Customers	with	particularly	high	'value';	investment	into	preventing	churn	will
be	especially	important	to	maximize	revenue;
Predicting	customer	churn
Traditional	statistical	methods,	like	logistic	regression
Machine	Learning	approaches,	e.g.	with	Random	Forests,	Gradient	Boosting	or
Neural	Nets
Predicting	customer	churn
Traditional	statistical	methods,	like	logistic	regression
Machine	Learning	approaches,	e.g.	with	Random	Forests,	Gradient	Boosting	or
Neural	Nets
Supervised	learning
Classification:	segment	customers	into	groups,	e.g.	"Churn"	vs.	"No	Churn"
Regression:	predict	churn	probability	for	each	customer
A	customer	churn	case-study1
Telco	Customer	Churn	dataset	from	IBM	Watson2
[1]	https://shirinsplayground.netlify.com/2018/12/customer_churn_code/
[2]	https://www.ibm.com/communities/analytics/watson-analytics-blog/predictive-
insights-in-the-telco-customer-churn-data-set/
A	customer	churn	case-study1
Telco	Customer	Churn	dataset	from	IBM	Watson2
7,043	customers
19	feature
1	response	variable:	Churn	("No	Churn":	5174,	"Churn":	1869)
[1]	https://shirinsplayground.netlify.com/2018/12/customer_churn_code/
[2]	https://www.ibm.com/communities/analytics/watson-analytics-blog/predictive-
insights-in-the-telco-customer-churn-data-set/
A	customer	churn	case-study1
Telco	Customer	Churn	dataset	from	IBM	Watson2
7,043	customers
19	feature
1	response	variable:	Churn	("No	Churn":	5174,	"Churn":	1869)
[1]	https://shirinsplayground.netlify.com/2018/12/customer_churn_code/
[2]	https://www.ibm.com/communities/analytics/watson-analytics-blog/predictive-
insights-in-the-telco-customer-churn-data-set/
Modeling	customer	churn	with	Keras	&
TensorFlow
Open-Source	Deep	Learning	API
Train	and	prototype	neural	nets	fast	&	easy
Modular	layer	structure	makes	it	very	flexible
Mathematical	operations	done	by	backend,	e.g.	TensorFlow	(default)
https://blog.keras.io/keras-as-a-simplified-interface-to-tensorflow-tutorial.html
Training	with	Keras	&	TensorFlow
1.	 Initialising	sequential	model
2.	 Adding	layers
3.	 Compiling	model
4.	 Fitting	model
Training	with	Keras	&	TensorFlow
1.	 Initialising	sequential	model
2.	 Adding	layers
3.	 Compiling	model
4.	 Fitting	model
H2O.ai
Open-Source	Machine	Learning
API
Optimized	for	distributed	and
parallel	training
Stacked	Ensembles	mit	H2O
H2O.ai
Open-Source	Machine	Learning
API
Optimized	for	distributed	and
parallel	training
Stacked	Ensembles	mit	H2O
Stacked	Ensembles
Combined	models	tend	to	perform	better	than	individual	models!
Precision
How	many	predicted	fraud	cases	in
the	test	data	were	correctly
classified?
Sensitivity	or	recall
How	many	fraud	cases	in	the	test
data	were	correctly	classified	as
fraud?
Evaluation	of	customer	churn	models
Rinse	and	repeat
F1-Score
Harmonic	average	of	precision	and	recall
Evaluation	of	customer	churn	models
Area	under	the	ROC	curve
Receiver	Operator	Characteristic
Proportion	false	positives	vs.	true	positives
Thresholds	influence	prediction	accuracy
In	binary	classification:	default	=	0.5
Best	threshold	depends	on	task	and	costs	of	wrong	predictions!
Thresholds	influence	prediction	accuracy
In	binary	classification:	default	=	0.5
Best	threshold	depends	on	task	and	costs	of	wrong	predictions!
Thresholds	influence	prediction	accuracy
Confusion	matrices
Table	of	wrong	and	correct	predictions
actual predict_0 predict_1 error rate
0 667 107 0.14 107/774
1 86 194 0.31 86/280
Total 753 301 0.18 193/1054
Confusion	matrices
Table	of	wrong	and	correct	predictions
actual predict_0 predict_1 error rate
0 667 107 0.14 107/774
1 86 194 0.31 86/280
Total 753 301 0.18 193/1054
But	what	does	that	really	tell	us?
Not	that	much	without	a	cost/revenue	calculation!
Cost/revenue	calculation
Let’s	assume	that
Cost/revenue	calculation
Let’s	assume	that
1.	 A	marketing	campaign	+	employee	time	will	cost	the	company	1000€	per	year
for	every	customer	that	is	included	in	the	campaign.
Cost/revenue	calculation
Let’s	assume	that
1.	 A	marketing	campaign	+	employee	time	will	cost	the	company	1000€	per	year
for	every	customer	that	is	included	in	the	campaign.
2.	 The	annual	average	revenue	per	customer	is	2000€	(in	more	complex
scenarios	customers	could	be	further	divided	into	revenue	groups	to	calculate
how	“valuable”	they	are	and	how	harmful	loosing	them	would	be)
Cost/revenue	calculation
Let’s	assume	that
1.	 A	marketing	campaign	+	employee	time	will	cost	the	company	1000€	per	year
for	every	customer	that	is	included	in	the	campaign.
2.	 The	annual	average	revenue	per	customer	is	2000€	(in	more	complex
scenarios	customers	could	be	further	divided	into	revenue	groups	to	calculate
how	“valuable”	they	are	and	how	harmful	loosing	them	would	be)
3.	 Investing	into	unnecessary	marketing	doesn’t	cause	churn	by	itself	(i.e.	a
customer	who	isn’t	going	to	churn	isn’t	reacting	negatively	to	the	add	campaign	-
which	could	happen	in	more	complex	scenarios).
Cost/revenue	calculation
Let’s	assume	that
1.	 A	marketing	campaign	+	employee	time	will	cost	the	company	1000€	per	year
for	every	customer	that	is	included	in	the	campaign.
2.	 The	annual	average	revenue	per	customer	is	2000€	(in	more	complex
scenarios	customers	could	be	further	divided	into	revenue	groups	to	calculate
how	“valuable”	they	are	and	how	harmful	loosing	them	would	be)
3.	 Investing	into	unnecessary	marketing	doesn’t	cause	churn	by	itself	(i.e.	a
customer	who	isn’t	going	to	churn	isn’t	reacting	negatively	to	the	add	campaign	-
which	could	happen	in	more	complex	scenarios).
4.	 Without	a	customer	churn	model	the	company	would	target	half	of	their
customer	(by	chance)	for	ad-campaigns
Cost/revenue	calculation
Let’s	assume	that
1.	 A	marketing	campaign	+	employee	time	will	cost	the	company	1000€	per	year
for	every	customer	that	is	included	in	the	campaign.
2.	 The	annual	average	revenue	per	customer	is	2000€	(in	more	complex
scenarios	customers	could	be	further	divided	into	revenue	groups	to	calculate
how	“valuable”	they	are	and	how	harmful	loosing	them	would	be)
3.	 Investing	into	unnecessary	marketing	doesn’t	cause	churn	by	itself	(i.e.	a
customer	who	isn’t	going	to	churn	isn’t	reacting	negatively	to	the	add	campaign	-
which	could	happen	in	more	complex	scenarios).
4.	 Without	a	customer	churn	model	the	company	would	target	half	of	their
customer	(by	chance)	for	ad-campaigns
5.	 Without	a	customer	churn	model	the	company	would	lose	about	25%	of	their
customers	to	churn
Cost/revenue	calculation
This	would	mean	that	compared	to	no	intervention	we	would	have
Cost/revenue	calculation
This	would	mean	that	compared	to	no	intervention	we	would	have
prop_p0_true	==	customers	who	were	correctly	predicted	to	not	churn	did	not
cost	anything	(no	marketing	money	was	spent):	+/-0€
Cost/revenue	calculation
This	would	mean	that	compared	to	no	intervention	we	would	have
prop_p0_true	==	customers	who	were	correctly	predicted	to	not	churn	did	not
cost	anything	(no	marketing	money	was	spent):	+/-0€
prop_p0_false	==	customers	that	did	not	churn	who	are	predicted	to	churn	will
be	an	empty	investment:	+/-0€	-	1500€
Cost/revenue	calculation
This	would	mean	that	compared	to	no	intervention	we	would	have
prop_p0_true	==	customers	who	were	correctly	predicted	to	not	churn	did	not
cost	anything	(no	marketing	money	was	spent):	+/-0€
prop_p0_false	==	customers	that	did	not	churn	who	are	predicted	to	churn	will
be	an	empty	investment:	+/-0€	-	1500€
prop_p1_false	==	customer	that	were	predicted	to	stay	but	churned:	-2000€
Cost/revenue	calculation
This	would	mean	that	compared	to	no	intervention	we	would	have
prop_p0_true	==	customers	who	were	correctly	predicted	to	not	churn	did	not
cost	anything	(no	marketing	money	was	spent):	+/-0€
prop_p0_false	==	customers	that	did	not	churn	who	are	predicted	to	churn	will
be	an	empty	investment:	+/-0€	-	1500€
prop_p1_false	==	customer	that	were	predicted	to	stay	but	churned:	-2000€
prop_p1_true	==	customers	that	were	correctly	predicted	to	churn:
Let’s	say	100%	of	those	could	be	kept	by	investing	into	marketing:	+2000€
-1500€
Let’s	say	50%	could	be	kept	by	investing	into	marketing:	+2000€	*	0.5	-1500€
https://shirinsplayground.netlify.com/2018/12/customer_churn_code/
Cost/revenue	calculation
How	much	revenue	can	we	gain	from	predicting	customer	churn	(assuming
conversion	rate	of	0.7)?
Explaining	model	predictions
https://shirinsplayground.netlify.com/2018/12/customer_churn_code/
Predictive	Maintenance
Predictive	Maintenance
Industry	4.0	&	IoT
Uses	advanced	analytics	and	Machine	Learning	to	optimize	machine	costs
and	output
Monitor	machines,	e.g	with	sensors
Goal:	Predict	machine	failure
before	it	happens	to
Save	costs
Reduce	downtime
Optimize	asset	availability,
productivity	and	output
quality
Extend	machine	life
Lower	safety	risks
Predictive	Maintenance
Industry	4.0	&	IoT
Uses	advanced	analytics	and	Machine	Learning	to	optimize	machine	costs
and	output
Monitor	machines,	e.g	with	sensors
Goal:	Predict	machine	failure
before	it	happens	to
Save	costs
Reduce	downtime
Optimize	asset	availability,
productivity	and	output
quality
Extend	machine	life
Lower	safety	risks
compared	to
Preventive	Maintenance
Repair	at	Failure
Predictive	Maintenance
Industry	4.0	&	IoT
Uses	advanced	analytics	and	Machine	Learning	to	optimize	machine	costs
and	output
Monitor	machines,	e.g	with	sensors
Wind	turbines
Motor	Engines
Cars
Planes
Industrial	machinery
Examples	for	Predictive	Maintenance
Predictive	Maintenance	and	Big	Data
Relies	on	large	amounts	of	data	collected	over	long	periods	of	time
Predictive	Maintenance	and	Big	Data
Relies	on	large	amounts	of	data	collected	over	long	periods	of	time
Databases
Collect	and	store	data	in	an	efficient	and	scalable	way,	e.g.	Hadoop,	AWS,	etc.
(cloud	vs	locally)
Predictive	Maintenance	and	Big	Data
Relies	on	large	amounts	of	data	collected	over	long	periods	of	time
Databases
Collect	and	store	data	in	an	efficient	and	scalable	way,	e.g.	Hadoop,	AWS,	etc.
(cloud	vs	locally)
Modeling
Model	scalability	and	distributed	computing,	e.g.	Apache	Spark,	AWS,	Google
Cloud,	H2O,	etc.
Predictive	Maintenance	and	Big	Data
Relies	on	large	amounts	of	data	collected	over	long	periods	of	time
Databases
Collect	and	store	data	in	an	efficient	and	scalable	way,	e.g.	Hadoop,	AWS,	etc.
(cloud	vs	locally)
Modeling
Model	scalability	and	distributed	computing,	e.g.	Apache	Spark,	AWS,	Google
Cloud,	H2O,	etc.
Prediction
(Near)	real-time	analysis!	Streaming...
Why	can	Predictive	Maintenance	be	tricky?
Data	quality
Raw	data	usually	needs	preprocessing	&	feature	extraction
Why	can	Predictive	Maintenance	be	tricky?
Data	quality
Raw	data	usually	needs	preprocessing	&	feature	extraction
We	don't	always	have	(enough	or	proper)	data	on	machine	failure	and	repairs
(like	log	files)
Why	can	Predictive	Maintenance	be	tricky?
Data	quality
Raw	data	usually	needs	preprocessing	&	feature	extraction
We	don't	always	have	(enough	or	proper)	data	on	machine	failure	and	repairs
(like	log	files)
Feature	engineering	can	become	complex	&	require	domain	expertise
Why	can	Predictive	Maintenance	be	tricky?
Data	quality
Raw	data	usually	needs	preprocessing	&	feature	extraction
We	don't	always	have	(enough	or	proper)	data	on	machine	failure	and	repairs
(like	log	files)
Feature	engineering	can	become	complex	&	require	domain	expertise
Production	may	change	/	vary
Why	can	Predictive	Maintenance	be	tricky?
Data	quality
Raw	data	usually	needs	preprocessing	&	feature	extraction
We	don't	always	have	(enough	or	proper)	data	on	machine	failure	and	repairs
(like	log	files)
Feature	engineering	can	become	complex	&	require	domain	expertise
Production	may	change	/	vary
We	often	don't	know	the	reason	for	machine	failure
Why	can	Predictive	Maintenance	be	tricky?
Data	quality
Raw	data	usually	needs	preprocessing	&	feature	extraction
We	don't	always	have	(enough	or	proper)	data	on	machine	failure	and	repairs
(like	log	files)
Feature	engineering	can	become	complex	&	require	domain	expertise
Production	may	change	/	vary
We	often	don't	know	the	reason	for	machine	failure
Production	environment	is	usually	not	robust
Why	can	Predictive	Maintenance	be	tricky?
Data	quality
Raw	data	usually	needs	preprocessing	&	feature	extraction
We	don't	always	have	(enough	or	proper)	data	on	machine	failure	and	repairs
(like	log	files)
Feature	engineering	can	become	complex	&	require	domain	expertise
Production	may	change	/	vary
We	often	don't	know	the	reason	for	machine	failure
Production	environment	is	usually	not	robust
Fail	score	is	predicted	for	an	interval	of	time	in	the	future
Probabilistic	models	(Bayesian)
Predicting	machine	failure
An	example	analysis
Data	set	for	predictive	maintenance
Machine	failure	of	1000	instances
Labels:	broken	(1:	397	instances,	or	39.7%)	&	not	broken	(0:	603	instances,
or	60.3%)
6	features
Time-series	forecasting
Classification
Regression
Anomaly	detection
Survival	Analysis
Predicting	machine	failure
An	example	analysis
Data	set	for	predictive	maintenance
Machine	failure	of	1000	instances
Labels:	broken	(1:	397	instances,	or	39.7%)	&	not	broken	(0:	603	instances,
or	60.3%)
6	features
Time-series	forecasting
Classification
Regression
Anomaly	detection
Survival	Analysis
Predicting	machine	failure
An	example	analysis
Data	set	for	predictive	maintenance
Machine	failure	of	1000	instances
Labels:	broken	(1:	397	instances,	or	39.7%)	&	not	broken	(0:	603	instances,
or	60.3%)
6	features
Same	techniques	as	used	before
in	fraud	detection	&	customer
churn
Classification:	Predict	whether
machine	will	likely	break	in	a
given	period	of	time
Regression:	Calculate	fail	score
(probability	of	breakage	in	given
period	of	time)
Predictive	Maintenance	with	Machine	Learning
Same	techniques	as	used	before
in	fraud	detection	&	customer
churn
Classification:	Predict	whether
machine	will	likely	break	in	a
given	period	of	time
Regression:	Calculate	fail	score
(probability	of	breakage	in	given
period	of	time)
Predictive	Maintenance	with	Machine	Learning
Predictive	Maintenance	with	Survival	Analysis
Cox	Proportional	Hazards	regression	model
Predictive	Maintenance	with	Time-Series
Forecasting
Facebook's	prophet	algorithm1
logistic	growth	curve	trend
yearly	&	weekly	seasonal	components	+	holidays
https://research.fb.com/prophet-forecasting-at-scale/
Predictive	Maintenance	with	Time-Series
Forecasting
Facebook's	prophet	algorithm1
logistic	growth	curve	trend
yearly	&	weekly	seasonal	components	+	holidays
Moving	averages,	ARIMA,	ARFIMA,	etc.
https://research.fb.com/prophet-forecasting-at-scale/
Predictive	Maintenance	with	Time-Series
Forecasting
Facebook's	prophet	algorithm1
logistic	growth	curve	trend
yearly	&	weekly	seasonal	components	+	holidays
Moving	averages,	ARIMA,	ARFIMA,	etc.
https://research.fb.com/prophet-forecasting-at-scale/
Evaluating	Predictive	Maintenance
Cost/benefit	calculation
Similar	to	the	examples	before:
Probability	of	detection	=	recall
Probability	of	false	alarm	=	fallout
ROC	curve:
Evaluating	Predictive	Maintenance
Cost/benefit	calculation
Similar	to	the	examples	before:
Probability	of	detection	=	recall
Probability	of	false	alarm	=	fallout
ROC	curve:
Optimize	model	to
=>	avoid	false	alarms	but	maximize
true	alarms
iterative	Monte-Carlo-
Simulation	to	compare
costs/benefits	with	old	strategies
Evaluating	Predictive	Maintenance
Cost/benefit	calculation
Similar	to	the	examples	before:
Probability	of	detection	=	recall
Probability	of	false	alarm	=	fallout
A	Shiny	demo
https://shiring.shinyapps.io/demo_dashboard_pred_maint_fast/
Thank	you	and	keep	in	touch	:-)
		shirin.glander@gmail.com
		shirin-glander.de
		Twitter:	@ShirinGlander
	Github:	@ShirinG
		codecentric.ai
PS:	Werkstudenten,	Praktikanten,	Bachelor-/Masterarbeiten,	etc.	welcome!

More Related Content

What's hot

Pengamiran (isipadu)
Pengamiran (isipadu)Pengamiran (isipadu)
Pengamiran (isipadu)zabidah awang
 
Pantun bahasa
Pantun bahasaPantun bahasa
Pantun bahasa
Mohamed Naim Daipi
 
Bentuk piawai
Bentuk piawaiBentuk piawai
Bentuk piawai
Fdnfdn Fariduddin
 
Algoritma ASK Tingkatan 1
Algoritma ASK Tingkatan 1Algoritma ASK Tingkatan 1
Algoritma ASK Tingkatan 1
zamarezam
 
Inersia
InersiaInersia
Form 3 science chapter 1
Form 3 science chapter 1Form 3 science chapter 1
Form 3 science chapter 1
timothy yonglk
 
Nota Pendidikan Islam Tingkatan 4
Nota Pendidikan Islam Tingkatan 4 Nota Pendidikan Islam Tingkatan 4
Nota Pendidikan Islam Tingkatan 4
smktsj2
 
Teknik Menjawab Kertas 1 (BM) SPM
Teknik Menjawab Kertas 1 (BM) SPMTeknik Menjawab Kertas 1 (BM) SPM
Teknik Menjawab Kertas 1 (BM) SPM
Kementerian Pelajaran Malaysia
 
Ciri-ciri bentuk 3D
Ciri-ciri bentuk 3DCiri-ciri bentuk 3D
Ciri-ciri bentuk 3Dfaizahsaiful
 
10.0 keradioaktifan
10.0 keradioaktifan10.0 keradioaktifan
10.0 keradioaktifan
MrHan Physics
 
SPM Tingkatan 5 Fizik - Elektronik
SPM Tingkatan 5 Fizik - ElektronikSPM Tingkatan 5 Fizik - Elektronik
SPM Tingkatan 5 Fizik - Elektronik
Loo Carmen
 
Kata tunggal
Kata tunggal Kata tunggal
Kata tunggal firo HAR
 
1.4 pembelauan gelombang
1.4 pembelauan gelombang1.4 pembelauan gelombang
1.4 pembelauan gelombangAmb Jerome
 
PHYSICS KSSM FORM 4 (2.1 Linear Motions)
PHYSICS KSSM FORM 4 (2.1 Linear Motions)PHYSICS KSSM FORM 4 (2.1 Linear Motions)
PHYSICS KSSM FORM 4 (2.1 Linear Motions)
jelika8807
 
Bab 6 ungkapan algebra iii
Bab 6 ungkapan algebra iiiBab 6 ungkapan algebra iii
Bab 6 ungkapan algebra iii
Surryaraj Poobalan
 
Bahan bukti tentang penggunaan bahasa melayu klasik
Bahan bukti tentang penggunaan bahasa melayu klasikBahan bukti tentang penggunaan bahasa melayu klasik
Bahan bukti tentang penggunaan bahasa melayu klasikMuhdnoorAzizi
 
Latihan topikal-persamaan-linear-ii
Latihan topikal-persamaan-linear-iiLatihan topikal-persamaan-linear-ii
Latihan topikal-persamaan-linear-ii
Boyd Fredo
 

What's hot (20)

Pengamiran (isipadu)
Pengamiran (isipadu)Pengamiran (isipadu)
Pengamiran (isipadu)
 
Pantun bahasa
Pantun bahasaPantun bahasa
Pantun bahasa
 
Bentuk piawai
Bentuk piawaiBentuk piawai
Bentuk piawai
 
Algoritma ASK Tingkatan 1
Algoritma ASK Tingkatan 1Algoritma ASK Tingkatan 1
Algoritma ASK Tingkatan 1
 
Inersia
InersiaInersia
Inersia
 
Form 3 science chapter 1
Form 3 science chapter 1Form 3 science chapter 1
Form 3 science chapter 1
 
Nota Pendidikan Islam Tingkatan 4
Nota Pendidikan Islam Tingkatan 4 Nota Pendidikan Islam Tingkatan 4
Nota Pendidikan Islam Tingkatan 4
 
Teknik Menjawab Kertas 1 (BM) SPM
Teknik Menjawab Kertas 1 (BM) SPMTeknik Menjawab Kertas 1 (BM) SPM
Teknik Menjawab Kertas 1 (BM) SPM
 
Ciri-ciri bentuk 3D
Ciri-ciri bentuk 3DCiri-ciri bentuk 3D
Ciri-ciri bentuk 3D
 
10.0 keradioaktifan
10.0 keradioaktifan10.0 keradioaktifan
10.0 keradioaktifan
 
SPM Tingkatan 5 Fizik - Elektronik
SPM Tingkatan 5 Fizik - ElektronikSPM Tingkatan 5 Fizik - Elektronik
SPM Tingkatan 5 Fizik - Elektronik
 
Kata tunggal
Kata tunggal Kata tunggal
Kata tunggal
 
F4 chap 3.5
F4 chap 3.5F4 chap 3.5
F4 chap 3.5
 
1.4 pembelauan gelombang
1.4 pembelauan gelombang1.4 pembelauan gelombang
1.4 pembelauan gelombang
 
PHYSICS KSSM FORM 4 (2.1 Linear Motions)
PHYSICS KSSM FORM 4 (2.1 Linear Motions)PHYSICS KSSM FORM 4 (2.1 Linear Motions)
PHYSICS KSSM FORM 4 (2.1 Linear Motions)
 
Bab 6 ungkapan algebra iii
Bab 6 ungkapan algebra iiiBab 6 ungkapan algebra iii
Bab 6 ungkapan algebra iii
 
Sains tahun 6
Sains tahun 6Sains tahun 6
Sains tahun 6
 
Bahan bukti tentang penggunaan bahasa melayu klasik
Bahan bukti tentang penggunaan bahasa melayu klasikBahan bukti tentang penggunaan bahasa melayu klasik
Bahan bukti tentang penggunaan bahasa melayu klasik
 
Latihan topikal-persamaan-linear-ii
Latihan topikal-persamaan-linear-iiLatihan topikal-persamaan-linear-ii
Latihan topikal-persamaan-linear-ii
 
Pengamiran (luas)
Pengamiran (luas)Pengamiran (luas)
Pengamiran (luas)
 

Similar to Real-World Data Science (Fraud Detection, Customer Churn & Predictive Maintenance)

Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisOnline Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
CSCJournals
 
The shift to data driven marketing
The shift to data driven marketingThe shift to data driven marketing
The shift to data driven marketing
Gary Allemann
 
Big Data Analytics Fraud Detection and Risk Management in Fintech.pdf
Big Data Analytics Fraud Detection and Risk Management in Fintech.pdfBig Data Analytics Fraud Detection and Risk Management in Fintech.pdf
Big Data Analytics Fraud Detection and Risk Management in Fintech.pdf
Smartinfologiks
 
Machine Learning, Data Mining, and
Machine Learning, Data Mining, and Machine Learning, Data Mining, and
Machine Learning, Data Mining, and butest
 
datamining.ppt
datamining.pptdatamining.ppt
datamining.ppt
PerumalPitchandi
 
datamining.ppt
datamining.pptdatamining.ppt
datamining.ppt
ssusereadde9
 
datamining management slyabbus and ppt.pptx
datamining management slyabbus and ppt.pptxdatamining management slyabbus and ppt.pptx
datamining management slyabbus and ppt.pptx
shyam1985
 
datamining.ppt
datamining.pptdatamining.ppt
datamining.ppt
Arvind Bhisikar
 
Analytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface lookAnalytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface look
Deloitte Canada
 
Algorithmic Bias: Challenges and Opportunities for AI in Healthcare
Algorithmic Bias:  Challenges and Opportunities for AI in HealthcareAlgorithmic Bias:  Challenges and Opportunities for AI in Healthcare
Algorithmic Bias: Challenges and Opportunities for AI in Healthcare
Gregory Nelson
 
Detecting health insurance fraud using analytics
Detecting health insurance fraud using analytics Detecting health insurance fraud using analytics
Detecting health insurance fraud using analytics
Nitin Verma
 
Data mining 1 - Introduction (cheat sheet - printable)
Data mining 1 - Introduction (cheat sheet - printable)Data mining 1 - Introduction (cheat sheet - printable)
Data mining 1 - Introduction (cheat sheet - printable)
yesheeka
 
Data mining and its applications!
Data mining and its applications!Data mining and its applications!
Data mining and its applications!
COSTARCH Analytical Consulting (P) Ltd.
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of Hacking
Daniel Ross
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hacking
at MicroFocus Italy ❖✔
 
credit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstractcredit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstract
Venkat Projects
 
Performance Evaluation of Machine Learning.docx
Performance Evaluation of Machine Learning.docxPerformance Evaluation of Machine Learning.docx
Performance Evaluation of Machine Learning.docx
Sumankumar Kannaiyan
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Perficient, Inc.
 

Similar to Real-World Data Science (Fraud Detection, Customer Churn & Predictive Maintenance) (20)

Data mining
Data miningData mining
Data mining
 
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisOnline Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
 
The shift to data driven marketing
The shift to data driven marketingThe shift to data driven marketing
The shift to data driven marketing
 
Big Data Analytics Fraud Detection and Risk Management in Fintech.pdf
Big Data Analytics Fraud Detection and Risk Management in Fintech.pdfBig Data Analytics Fraud Detection and Risk Management in Fintech.pdf
Big Data Analytics Fraud Detection and Risk Management in Fintech.pdf
 
Dbm630 lecture10
Dbm630 lecture10Dbm630 lecture10
Dbm630 lecture10
 
Machine Learning, Data Mining, and
Machine Learning, Data Mining, and Machine Learning, Data Mining, and
Machine Learning, Data Mining, and
 
datamining.ppt
datamining.pptdatamining.ppt
datamining.ppt
 
datamining.ppt
datamining.pptdatamining.ppt
datamining.ppt
 
datamining management slyabbus and ppt.pptx
datamining management slyabbus and ppt.pptxdatamining management slyabbus and ppt.pptx
datamining management slyabbus and ppt.pptx
 
datamining.ppt
datamining.pptdatamining.ppt
datamining.ppt
 
Analytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface lookAnalytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface look
 
Algorithmic Bias: Challenges and Opportunities for AI in Healthcare
Algorithmic Bias:  Challenges and Opportunities for AI in HealthcareAlgorithmic Bias:  Challenges and Opportunities for AI in Healthcare
Algorithmic Bias: Challenges and Opportunities for AI in Healthcare
 
Detecting health insurance fraud using analytics
Detecting health insurance fraud using analytics Detecting health insurance fraud using analytics
Detecting health insurance fraud using analytics
 
Data mining 1 - Introduction (cheat sheet - printable)
Data mining 1 - Introduction (cheat sheet - printable)Data mining 1 - Introduction (cheat sheet - printable)
Data mining 1 - Introduction (cheat sheet - printable)
 
Data mining and its applications!
Data mining and its applications!Data mining and its applications!
Data mining and its applications!
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of Hacking
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hacking
 
credit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstractcredit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstract
 
Performance Evaluation of Machine Learning.docx
Performance Evaluation of Machine Learning.docxPerformance Evaluation of Machine Learning.docx
Performance Evaluation of Machine Learning.docx
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 

More from Shirin Elsinghorst

Transparente und Verantwortungsbewusste KI
Transparente und Verantwortungsbewusste KITransparente und Verantwortungsbewusste KI
Transparente und Verantwortungsbewusste KI
Shirin Elsinghorst
 
Datenstrategie in der Praxis
Datenstrategie in der PraxisDatenstrategie in der Praxis
Datenstrategie in der Praxis
Shirin Elsinghorst
 
RICHTIG GUT: DIE QUALITÄT VON MODELLEN VERSTEHEN
RICHTIG GUT: DIE QUALITÄT VON MODELLEN VERSTEHENRICHTIG GUT: DIE QUALITÄT VON MODELLEN VERSTEHEN
RICHTIG GUT: DIE QUALITÄT VON MODELLEN VERSTEHEN
Shirin Elsinghorst
 
SAP webinar: Explaining Keras Image Classification Models with LIME
SAP webinar: Explaining Keras Image Classification Models with LIMESAP webinar: Explaining Keras Image Classification Models with LIME
SAP webinar: Explaining Keras Image Classification Models with LIME
Shirin Elsinghorst
 
Workshop - Introduction to Machine Learning with R
Workshop - Introduction to Machine Learning with RWorkshop - Introduction to Machine Learning with R
Workshop - Introduction to Machine Learning with R
Shirin Elsinghorst
 
Deep learning - a primer
Deep learning - a primerDeep learning - a primer
Deep learning - a primer
Shirin Elsinghorst
 
HH Data Science Meetup: Explaining complex machine learning models with LIME
HH Data Science Meetup: Explaining complex machine learning models with LIMEHH Data Science Meetup: Explaining complex machine learning models with LIME
HH Data Science Meetup: Explaining complex machine learning models with LIME
Shirin Elsinghorst
 
HH Data Science Meetup: Explaining complex machine learning models with LIME
HH Data Science Meetup: Explaining complex machine learning models with LIMEHH Data Science Meetup: Explaining complex machine learning models with LIME
HH Data Science Meetup: Explaining complex machine learning models with LIME
Shirin Elsinghorst
 
Ruhr.PY - Introducing Deep Learning with Keras and Python
Ruhr.PY - Introducing Deep Learning with Keras and PythonRuhr.PY - Introducing Deep Learning with Keras and Python
Ruhr.PY - Introducing Deep Learning with Keras and Python
Shirin Elsinghorst
 
From Biology to Industry. A Blogger’s Journey to Data Science.
From Biology to Industry. A Blogger’s Journey to Data Science.From Biology to Industry. A Blogger’s Journey to Data Science.
From Biology to Industry. A Blogger’s Journey to Data Science.
Shirin Elsinghorst
 

More from Shirin Elsinghorst (10)

Transparente und Verantwortungsbewusste KI
Transparente und Verantwortungsbewusste KITransparente und Verantwortungsbewusste KI
Transparente und Verantwortungsbewusste KI
 
Datenstrategie in der Praxis
Datenstrategie in der PraxisDatenstrategie in der Praxis
Datenstrategie in der Praxis
 
RICHTIG GUT: DIE QUALITÄT VON MODELLEN VERSTEHEN
RICHTIG GUT: DIE QUALITÄT VON MODELLEN VERSTEHENRICHTIG GUT: DIE QUALITÄT VON MODELLEN VERSTEHEN
RICHTIG GUT: DIE QUALITÄT VON MODELLEN VERSTEHEN
 
SAP webinar: Explaining Keras Image Classification Models with LIME
SAP webinar: Explaining Keras Image Classification Models with LIMESAP webinar: Explaining Keras Image Classification Models with LIME
SAP webinar: Explaining Keras Image Classification Models with LIME
 
Workshop - Introduction to Machine Learning with R
Workshop - Introduction to Machine Learning with RWorkshop - Introduction to Machine Learning with R
Workshop - Introduction to Machine Learning with R
 
Deep learning - a primer
Deep learning - a primerDeep learning - a primer
Deep learning - a primer
 
HH Data Science Meetup: Explaining complex machine learning models with LIME
HH Data Science Meetup: Explaining complex machine learning models with LIMEHH Data Science Meetup: Explaining complex machine learning models with LIME
HH Data Science Meetup: Explaining complex machine learning models with LIME
 
HH Data Science Meetup: Explaining complex machine learning models with LIME
HH Data Science Meetup: Explaining complex machine learning models with LIMEHH Data Science Meetup: Explaining complex machine learning models with LIME
HH Data Science Meetup: Explaining complex machine learning models with LIME
 
Ruhr.PY - Introducing Deep Learning with Keras and Python
Ruhr.PY - Introducing Deep Learning with Keras and PythonRuhr.PY - Introducing Deep Learning with Keras and Python
Ruhr.PY - Introducing Deep Learning with Keras and Python
 
From Biology to Industry. A Blogger’s Journey to Data Science.
From Biology to Industry. A Blogger’s Journey to Data Science.From Biology to Industry. A Blogger’s Journey to Data Science.
From Biology to Industry. A Blogger’s Journey to Data Science.
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 

Real-World Data Science (Fraud Detection, Customer Churn & Predictive Maintenance)