The present disclosure relates generally to machine learning and artificial intelligence. More specifically, but not by way of limitation, this disclosure relates to machine learning based on wavelet analysis for assessing risks or performing other operations and for providing explainable outcomes associated with these outputs.
In machine learning, various models (e.g., artificial neural networks) have been used to perform functions such as providing a prediction of an outcome based on input values. These models can provide predictions with high accuracy because of their intricate structures, such as the interconnected nodes in a neural network. However, this also renders these machine learning models black-box models where the output of the model cannot be explained or interpreted. In other words, it is hard to explain why these models generate the specific results from the input values. As a result, it is hard, if not impossible, to justify, track or verify the results and to improve the model based on the results.
Various aspects of the present disclosure provide systems and methods for performing machine learning based on wavelet analysis for assessing risks or performing other operations and for providing explainable outcomes associated with the outputs. A risk prediction model can be applied to time-series data for an attribute associated with a target entity to generate a risk indicator for the target entity. The risk prediction model can include a feature learning model configured to receive the time-series data as input and a risk classification model configured to receive output of the feature learning model and generate the risk indicator as output. Parameters of the feature learning model can be accessed and a plurality of basis functions of a wavelet transformation can be applied on the parameters of the feature learning model to generate a set of parameter wavelet coefficients. Explanatory data can be generated for the risk indicator based on the set of parameter wavelet coefficients. A responsive message can be transmitted to a remote computing device including at least the risk indicator and the explanatory data for use in controlling access of the target entity to one or more interactive computing environments.
In other aspects, a system can include a processor and a non-transitory computer-readable medium including instructions that are executable by the processor to cause the processor to perform various operations. The system can apply a risk prediction model to time-series data for an attribute associated with a target entity to generate a risk indicator for the target entity. The risk prediction model can include a feature learning model configured to receive the time-series data as input and a risk classification model configured to receive output of the feature learning model and generate the risk indicator as output. The system can access parameters of the feature learning model and apply a plurality of basis functions of a wavelet transformation on the parameters of the feature learning model to generate a set of parameter wavelet coefficients. The system can generate explanatory data for the risk indicator based on the set of parameter wavelet coefficients. The system can transmit, to a remote computing device, a responsive message including at least the risk indicator and the explanatory data for use in controlling access of the target entity to one or more interactive computing environments.
In other aspects, a non-transitory computer-readable medium can include instructions that are executable by a processing device for causing the processing device to perform various operations. The operations can include applying risk prediction model to time-series data for an attribute associated with a target entity to generate a risk indicator for the target entity. The risk prediction model can include a feature learning model configured to receive the time-series data as input and a risk classification model configured to receive output of the feature learning model and generate the risk indicator as output. The operations can further include accessing parameters of the feature learning model and applying a plurality of basis functions of a wavelet transformation on the parameters of the feature learning model to generate a set of parameter wavelet coefficients. The operations can further include generating explanatory data for the risk indicator based on the set of parameter wavelet coefficients. The operations can further include transmitting, to a remote computing device, a responsive message including at least the risk indicator and the explanatory data for use in controlling access of the target entity to one or more interactive computing environments.
This summary is not intended to identify key or essential features of the claimed subject matter, nor is it intended to be used in isolation to determine the scope of the claimed subject matter. The subject matter should be understood by reference to appropriate portions of the entire specification, any or all drawings, and each claim.
The foregoing, together with other features and examples, will become more apparent upon referring to the following specification, claims, and accompanying drawings.
Certain aspects described herein are provided for generating explanatory data for a prediction model based on wavelet analysis on time-series data. A risk assessment computing system, in response to receiving a risk assessment query for a target entity, can access a risk prediction model trained to generate a risk indicator for the target entity based on time-series data for an attribute associated with the target entity. The risk assessment computing system can apply the risk prediction model on time-series data to compute the risk indicator. The risk assessment computing system may also generate explanatory data by applying wavelet analysis on parameters of the risk prediction model to explain the impact of the attribute on the risk indicator. The risk assessment computing system can transmit a response to the risk assessment query for use by a remote computing system in controlling access of the target entity to one or more interactive computing environments. The response can include the risk indicator and the explanatory data.
For example, the risk prediction model can be a convolutional neural network (CNN)-based model including a feature learning model and a risk classification model. The feature learning model can be a convolutional neural network configured to accept time-series data as input and output a feature vector. The time-series data can be values for an attribute associated with the target entity. The time-series data instances of an attribute can contain different values of the attribute at different time points. For example, if the attribute describes the amount of available storage space of a computing device, a time-series data of the attribute can include 32 instances each representing the available storage space at 5:00 pm on each day for 32 consecutive days. The time-series data of the attribute captures the changes of the attribute over time. The risk classification model can be a neural network configured to accept the feature vector as input and output a risk indicator for the target entity.
The training of the risk prediction model can involve adjusting the parameters of the model based on time-series data instances of the attribute and risk indicator labels. The adjustable parameters of the neural network can include the weights of the connections among the nodes in different layers, the number of nodes in a layer of the network, the number of layers in the network, and so on. The parameters can be adjusted to optimize a loss function determined based on the risk indicators generated by the risk prediction model from the time-series data instances of the training attributes and the risk indicator labels.
In some aspects, the trained risk prediction model can be used to predict risk indicators. For example, a risk assessment query for a target entity can be received from a remote computing device. In response to the assessment query, time-series data instances can be generated for an attribute associated with the target entity. An output risk indicator for the target entity can be computed by applying the risk prediction model to the time-series data instances of the attribute.
Further, explanatory data indicating features or characteristics of the time-series data instances of the attribute that have higher contribution to the determined risk indicator can also be calculated or determined. To generate the explanatory data, basis functions of a wavelet transformation can be applied on parameters of the trained feature learning model (e.g., convolutional neural network). Applying the basis functions on the parameters can generate a set of parameter wavelet coefficients. Parameter wavelet coefficients in the set that have higher values than other coefficients can be used to explain the features or characteristics that lead to the predicted risk prediction. A responsive message including at least the output risk indicator and the explanatory data can be transmitted to the remote computing device.
To determine the set of basis functions, parameters of the feature learning model can be accessed. The parameters can be weights, coefficients, or other parameters of the feature learning model. Basis functions of the wavelet transformation can be applied on the parameters of the feature learning model to generate corresponding parameter wavelet coefficients. A subset of parameter wavelet coefficients can be selected from the parameter wavelet coefficients. For example, parameter wavelet coefficients that are higher than remaining parameter wavelet coefficients in the set may be selected. Each parameter wavelet coefficient in the subset of parameter wavelet coefficients corresponds to a basis function and this subset of basis functions can be applied to the time-series data to generate the subset of wavelet coefficients used to generate the explanatory data.
Certain aspects described herein, which can include operations and data structures with respect to the convolutional neural network, can provide accurate explanatory data for a CNN-based prediction model by applying wavelet basis functions on input time-series data, thereby overcoming the issues identified above. For instance, by identifying wavelet basis function from the trained convolutional neural network and applying these basis functions on the time-series data instances, explanatory data can be generated to reflect features learned and used by the model for prediction. Applying the basis functions provides insights to the time-series data and the prediction results, thereby allowing the prediction results to be explained accurately.
These illustrative examples are given to introduce the reader to the general subject matter discussed here and are not intended to limit the scope of the disclosed concepts. The following sections describe various additional features and examples with reference to the drawings in which like numerals indicate like elements, and directional descriptions are used to describe the illustrative examples but, like the illustrative examples, should not be used to limit the present disclosure.
Referring now to the drawings,
The network training server 110 can include one or more processing devices that execute program code, such as a network training application 112. The program code can be stored on a non-transitory computer-readable medium. The network training application 112 can execute one or more processes to train and optimize a model for predicting risk indicators based on time-series data for attributes 124.
In some aspects, the network training application 112 can build and train a risk prediction model 120 utilizing a training dataset 126. The training dataset 126 can include multiple training vectors consisting of training time-series data for attributes and training risk indicator outputs corresponding to the training vectors. The training dataset 126 can be stored in one or more network-attached storage units on which various repositories, databases, or other structures are stored. Examples of these data structures are the risk data repository 122.
Network-attached storage units may store a variety of different types of data organized in a variety of different ways and from a variety of different sources. For example, the network-attached storage unit may include storage other than primary storage located within the network training server 110 that is directly accessible by processors located therein. In some aspects, the network-attached storage unit may include secondary, tertiary, or auxiliary storage, such as large hard drives, servers, virtual memory, among other types. Storage devices may include portable or non-portable storage devices, optical storage devices, and various other mediums capable of storing and containing data. A machine-readable storage medium or computer-readable storage medium may include a non-transitory medium in which data can be stored and that does not include carrier waves or transitory electronic signals. Examples of a non-transitory medium may include, for example, a magnetic disk or tape, optical storage media such as a compact disk or digital versatile disk, flash memory, memory, or memory devices.
The risk assessment server 118 can include one or more processing devices that execute program code, such as a risk assessment application 114. The program code can be stored on a non-transitory computer-readable medium. The risk assessment application 114 can execute one or more processes to utilize the risk prediction model 120 trained by the network training application 112 to predict risk indicators based on input time-series data for attributes 124. In addition, the risk prediction model 120 can also be utilized to generate explanatory data for the time-series data for attributes 124 by applying basis functions of a wavelet transformation on parameters of the feature learning model 128, which can indicate an effect or an amount of impact that one or more attributes have on the risk indicator.
The output of the trained risk prediction model 120 can be utilized to modify a data structure in the memory or a data storage device. For example, the predicted risk indicator and/or the explanatory data can be utilized to reorganize, flag, or otherwise change the time-series data for attributes 124 involved in the prediction by the risk prediction model 120. For instance, time-series data for attributes 124 stored in the risk data repository 122 can be attached with flags indicating their respective amount of impact on the risk indicator. Different flags can be utilized for different time-series data for attributes 124 to indicate different levels of impact. Additionally, or alternatively, the locations of the time-series data for attributes 124 in the storage, such as the risk data repository 122, can be changed so that the time-series data for attributes 124 or groups of time-series data for attributes 124 are ordered, ascendingly or descendingly, according to their respective amounts of impact on the risk indicator.
By modifying the attributes 124 in this way, a more coherent data structure can be established which enables the data to be searched more easily. In addition, further analysis of the risk prediction model 120 and the outputs of the risk prediction model 120 can be performed more efficiently. For instance, time-series data for attributes 124 having the most impact on the risk indicator can be retrieved and identified more quickly based on the flags and/or their locations in the risk data repository 122. Further, updating the risk prediction model 120, such as re-training the risk prediction model 120 based on new values of the time-series data for attributes 124, can be performed more efficiently especially when computing resources are limited. For example, updating or retraining the risk prediction model 120 can be performed by incorporating new values of the time-series data for attributes 124 having the most impact on the output risk indicator based on the attached flags without utilizing new values of all the time-series data for attributes 124.
Furthermore, the risk assessment computing system 130 can communicate with various other computing systems, such as client computing systems 104. For example, client computing systems 104 may send risk assessment queries to the risk assessment server 118 for risk assessment, or may send signals to the risk assessment server 118 that control or otherwise influence different aspects of the risk assessment computing system 130. The client computing systems 104 may also interact with user computing systems 106 via one or more public data networks 108 to facilitate interactions between users of the user computing systems 106 and interactive computing environments provided by the client computing systems 104.
Each client computing system 104 may include one or more third-party devices, such as individual servers or groups of servers operating in a distributed manner. A client computing system 104 can include any computing device or group of computing devices operated by a seller, lender, or other providers of products or services. The client computing system 104 can include one or more server devices. The one or more server devices can include or can otherwise access one or more non-transitory computer-readable media. The client computing system 104 can also execute instructions that provide an interactive computing environment accessible to user computing systems 106. Examples of the interactive computing environment include a mobile application specific to a particular client computing system 104, a web-based application accessible via a mobile device, etc. The executable instructions are stored in one or more non-transitory computer-readable media.
The client computing system 104 can further include one or more processing devices that are capable of providing the interactive computing environment to perform operations described herein. The interactive computing environment can include executable instructions stored in one or more non-transitory computer-readable media. The instructions providing the interactive computing environment can configure one or more processing devices to perform operations described herein. In some aspects, the executable instructions for the interactive computing environment can include instructions that provide one or more graphical interfaces. The graphical interfaces are used by a user computing system 106 to access various functions of the interactive computing environment. For instance, the interactive computing environment may transmit data to and receive data from a user computing system 106 to shift between different states of the interactive computing environment, where the different states allow one or more electronics transactions between the user computing system 106 and the client computing system 104 to be performed.
In some examples, a client computing system 104 may have other computing resources associated therewith (not shown in
A user computing system 106 can include any computing device or other communication device operated by a user, such as a consumer or a customer. The user computing system 106 can include one or more computing devices, such as laptops, smartphones, and other personal computing devices. A user computing system 106 can include executable instructions stored in one or more non-transitory computer-readable media. The user computing system 106 can also include one or more processing devices that are capable of executing program code to perform operations described herein. In various examples, the user computing system 106 can allow a user to access certain online services from a client computing system 104 or other computing resources, to engage in mobile commerce with a client computing system 104, to obtain controlled access to electronic content hosted by the client computing system 104, etc.
For instance, the user can use the user computing system 106 to engage in an electronic transaction with a client computing system 104 via an interactive computing environment. An electronic transaction between the user computing system 106 and the client computing system 104 can include, for example, the user computing system 106 being used to request online storage resources managed by the client computing system 104, acquire cloud computing resources (e.g., virtual machine instances), and so on. An electronic transaction between the user computing system 106 and the client computing system 104 can also include, for example, query a set of sensitive or other controlled data, access online financial services provided via the interactive computing environment, submit an online credit card application or other digital application to the client computing system 104 via the interactive computing environment, operating an electronic tool within an interactive computing environment hosted by the client computing system (e.g., a content-modification feature, an application-processing feature, etc.).
In some aspects, an interactive computing environment implemented through a client computing system 104 can be used to provide access to various online functions. As a simplified example, a website or other interactive computing environment provided by an online resource provider can include electronic functions for requesting computing resources, online storage resources, network resources, database resources, or other types of resources. In another example, a website or other interactive computing environment provided by a financial institution can include electronic functions for obtaining one or more financial services, such as loan application and management tools, credit card application and transaction management workflows, electronic fund transfers, etc. A user computing system 106 can be used to request access to the interactive computing environment provided by the client computing system 104, which can selectively grant or deny access to various electronic functions. Based on the request, the client computing system 104 can collect data associated with the user and communicate with the risk assessment server 118 for risk assessment. Based on the risk indicator predicted by the risk assessment server 118, the client computing system 104 can determine whether to grant the access request of the user computing system 106 to certain features of the interactive computing environment.
In a simplified example, the system depicted in FIG. I can configure a risk prediction to be used both for accurately determining risk indicators, such as credit scores, using time-series data for attributes and determining explanatory data for the attributes. An attribute can be any variable predictive of risk that is associated with an entity. Any suitable attribute that is authorized for use by an appropriate legal or regulatory framework may be used.
Examples of time-series data for attributes used for predicting the risk associated with an entity accessing online resources include, but are not limited to, variables indicating the demographic characteristics of the entity over a predefined period of time (e.g., the revenue of the company over the past twenty-four consecutive months), variables indicative of prior actions or transactions involving the entity over a predefined period of time (e.g., past requests of online resources submitted by the entity over the past twenty-four consecutive months, the amount of online resource currently held by the entity over the past twenty-four consecutive months, and so on.), variables indicative of one or more behavioral traits of an entity over a predefined period of time (e.g., the timeliness of the entity releasing the online resources over the past twenty-four consecutive months), etc. Similarly, examples of time-series data of attributes used for predicting the risk associated with an entity accessing services provided by a financial institute include, but are not limited to, indicative of one or more demographic characteristics of an entity over a predefined period of time (e.g., income, etc.), variables indicative of prior actions or transactions involving the entity over a predefined period of time (e.g., information that can be obtained from credit files or records, financial records, consumer records, or other data about the activities or characteristics of the entity), variables indicative of one or more behavioral traits of an entity over the past twenty-four consecutive months, etc. For example, time-series data for an account balance attribute can include the account balance for the past thirty-two consecutive months.
The predicted risk indicator can be utilized by the service provider to determine the risk associated with the entity accessing a service provided by the service provider, thereby granting or denying access by the entity to an interactive computing environment implementing the service. For example, if the service provider determines that the predicted risk indicator is lower than a threshold risk indicator value, then the client computing system 104 associated with the service provider can generate or otherwise provide access permission to the user computing system 106 that requested the access. The access permission can include, for example, cryptographic keys used to generate valid access credentials or decryption keys used to decrypt access credentials. The client computing system 104 associated with the service provider can also allocate resources to the user and provide a dedicated web address for the allocated resources to the user computing system 106, for example, by adding it in the access permission. With the obtained access credentials and/or the dedicated web address, the user computing system 106 can establish a secure network connection to the computing environment hosted by the client computing system 104 and access the resources via invoking API calls, web service calls, HTTP requests, or other proper mechanisms.
Each communication within the operating environment 100 may occur over one or more data networks, such as a public data network 108, a network 116 such as a private data network, or some combination thereof. A data network may include one or more of a variety of different types of networks, including a wireless network, a wired network, or a combination of a wired and wireless network. Examples of suitable networks include the Internet, a personal area network, a local area network (“LAN”), a wide area network (“WAN”), or a wireless local area network (“WLAN”). A wireless network may include a wireless interface or a combination of wireless interfaces. A wired network may include a wired interface. The wired or wireless networks may be implemented using routers, access points, bridges, gateways, or the like, to connect devices in the data network.
The number of devices depicted in
At block 202, the process 200 involves receiving a risk assessment query for a target entity from a remote computing device, such as a computing device associated with the target entity requesting the risk assessment. The risk assessment query can also be received by the risk assessment server 118 from a remote computing device associated with an entity authorized to request risk assessment of the target entity.
At operation 204, the process 200 involves accessing a risk prediction model trained to generate risk indicator values based on input time-series data or other data suitable for assessing risks associated with an entity. As described in more detail with respect to
The risk prediction model can be constructed and trained based on training samples including training attributes and training risk indicator outputs (also referred to as “risk indicator labels”). The risk prediction model can include a feature learning model that receives time-series data and a risk classification model that receives an output of the feature learning model and generates the risk indicator.
At operation 206, the process 200 involves computing a risk indicator for the input time-series data associated with the risk assessment query using the risk prediction model. Time-series data of an attribute associated with the target entity can be used as input to the risk prediction model. The attribute associated with the target entity can be obtained from an attribute database configured to store attributes associated with various entities. The output of the risk prediction model can include the risk indicator for the target entity based on its current attribute.
At operation 208, the process 200 involves generating explanatory data using the risk prediction model. The explanatory data can indicate features or characteristics for the time-series data instances of the attribute that have a higher contribution to the determined risk indicator. The explanatory data may indicate an impact a time-series data instance has or a group of time-series data instances have on the value of the risk indicator, such as credit score (e.g., the relative impact of the attribute(s) on a risk indicator). To generate the explanatory data, a set of basis functions of a wavelet transformation can be applied on the parameters of the trained feature learning model (e.g., convolutional neural network) to generate a set of wavelet coefficients. Wavelet coefficients in the set that have higher values than other coefficients can be used to explain the features or characteristics that lead to the predicted risk prediction. To determine the set of basis functions, parameters of the feature learning model can be accessed. The parameters can be weights, coefficients, or other parameters of the feature learning model. Basis functions of the wavelet transformation can be applied on the parameters of the feature learning model to generate corresponding parameter wavelet coefficients. A subset of parameter wavelet coefficients can be selected from the set of parameter wavelet coefficients. For example, parameter wavelet coefficients that are higher than remaining parameter wavelet coefficients in the set may be selected. Each parameter wavelet coefficient in the subset of parameter wavelet coefficients corresponds to a basis function and this subset of basis functions can be applied to the time-series data to generate the subset of wavelet coefficients used to generate the explanatory data.
The explanatory data can then be generated based on the subset of wavelet coefficients. For example, the subset of wavelet coefficients including a particular wavelet coefficient can correspond to particular explanatory data for the attribute. In some aspects, the risk assessment application uses the risk prediction model to provide explanatory data that are compliant with regulations, business policies, or other criteria used to generate risk evaluations. Examples of regulations to which the PGCN conforms and other legal requirements include the Equal Credit Opportunity Act (“ECOA”), Regulation B, and reporting requirements associated with ECOA, the Fair Credit Reporting Act (“FCRA”), the Dodd-Frank Act, and the Office of the Comptroller of the Currency (“OCC”).
In some implementations, the explanatory data can be generated for a subset of the attributes that have the highest impact on the risk indicator. For example, the risk assessment application 114 can determine the rank of each attribute based on the impact of the attribute on the risk indicator. A subset of the attributes including a certain number of highest-ranked attributes can be selected and explanatory data can be generated for the selected attributes.
At operation 210, the process 200 involves transmitting a response to the risk assessment query. The response can include the risk indicator generated using the risk prediction model and the explanatory data. The risk indicator can be used for one or more operations that involve performing an operation with respect to the target entity based on a predicted risk associated with the target entity. In one example, the risk indicator can be utilized to control access to one or more interactive computing environments by the target entity. As discussed above with regard to
For example, a customer can submit a request to access the interactive computing environment using a user computing system 106. Based on the request, the client computing system 104 can generate and submit a risk assessment query for the customer to the risk assessment server 118. The risk assessment query can include, for example, an identity of the customer and other information associated with the customer that can be utilized to generate attributes. The risk assessment server 118 can perform a risk assessment based on attributes generated for the customer and return the predicted risk indicator and explanatory data to the client computing system 104.
Based on the received risk indicator, the client computing system 104 can determine whether to grant the customer access to the interactive computing environment. If the client computing system 104 determines that the level of risk associated with the customer accessing the interactive computing environment and the associated technical or financial service is too high, the client computing system 104 can deny access by the customer to the interactive computing environment. Conversely, if the client computing system 104 determines that the level of risk associated with the customer is acceptable, the client computing system 104 can grant access to the interactive computing environment by the customer and the customer would be able to utilize the various services provided by the service providers. For example, with the granted access, the customer can utilize the user computing system 106 to access clouding computing resources, online storage resources, web pages or other user interfaces provided by the client computing system 104 to execute applications, store data, query data, submit an online digital application, operate electronic tools, or perform various other operations within the interactive computing environment hosted by the client computing system 104.
The risk assessment application 114 may provide recommendations to a target entity based on the generated explanatory data. The recommendations may indicate one or more actions that the target entity can take to improve the risk indicator (e.g., improve a credit score).
The feature learning model includes several convolutional layers followed by a flattening operation to provide a feature vector to a risk classification model. Each convolutional layer can extract more abstract features from the preceding layer. Each convolutional layer includes three stages-a convolution stage, a detector stage, and an optional pooling stage. During training, parameters, such as weights, of the feature learning model are tuned. The detector stage corresponds to the activation function, and may involve a sigmoid function, a rectified linear unit, or another suitable function. For the pooling stage, maximum pooling, average pooling, global pooling, or a different pooling function may be used.
The classification model can be a neural network, a constrained neural network, or a logistic regression model. The classification model receives the feature vector from the feature learning model and generates a risk indicator. As discussed with respect to
Matrix 406 demonstrates the convolution operation as a vector-matrix multiplication, where the N×1 vector 408 corresponds to the input time series data with N samples, and the M×N matrix 406 consists of a set of M shifted versions of the pattern. Each row in the matrix corresponds to a single shift in the convolution operation. A result of this product (shown as an M×1 vector 410) is presented to the detector stage (the activation functions), resulting in an output vector having the same length as the number of shifts.
In a CNN, there may be only a single time step for each shift or multiple time steps for each shift. The size of the step is known as the stride of the convolutional layer. The effect of a stride greater than one is to downsample the incoming data to a lower time resolution.
Each matrix in each cube corresponds to a unique feature learned by the feature learning model, where the parameters represented by the grid-patterned boxes are network weights. The weights are shared over all of the rows in the particular feature matrix, but are shifted by one or more time steps to the right as shown in
Matrix 704 shows results of applying basis functions of a wavelet transformation on the parameters. The wavelet transformation can be a Haar wavelet transformation. Summing each row of the matrix 704 results in a reconstruction of the original parameter pattern, meaning no information is lost. Parameter wavelet coefficients are generated by applying the basis functions on the parameters. The parameter wavelet coefficients are shown on the right of the matrix 704. A subset of parameter wavelet coefficients that are higher than remaining parameter wavelet coefficients may be selected. For example, the parameter wavelet coefficients underlined in
The basis functions of a wavelet transformation shown in
The basis functions corresponding to the first three wavelet coefficients, which correspond to c0, d0,0, and d1,1, are then applied to the time-series data to generate explanatory data. The first wavelet coefficient, shown in graph 904, corresponds to the mean balance for the last thirty-two months. The second wavelet coefficient, shown in graph 906, is directly proportional to the difference between the average balances of the last sixteen months and the sixteen months prior to that, and thus gives an indication of how much the balance is changing over the thirty-two-month period. The third wavelet coefficient, shown in graph 908, is directly proportional to the difference between average balances of the last eight months and the eight months prior to that in the last sixteen-month period. As a result, features or characteristics such as the overall balance level, how much the balance has changed over different time-scales, and where the changes have occurred in time can be determined. Based on the determination, explanatory data can be generated for the time-series data to include these features or characteristics as the most significant contributing factors of the risk prediction.
Any suitable computing system or group of computing systems can be used to perform the operations for the machine-learning operations described herein. For example,
The computing device 1000 can include a processor 1002 that is communicatively coupled to a memory 1004. The processor 1002 executes computer-executable program code stored in the memory 1004, accesses information stored in the memory 1004, or both. Program code may include machine-executable instructions that may represent a procedure, a function, a subprogram, a program, a routine, a subroutine, a module, a software package, a class, or any combination of instructions, data structures, or program statements. A code segment may be coupled to another code segment or a hardware circuit by passing or receiving information, data, arguments, parameters, or memory contents. Information, arguments, parameters, data, etc. may be passed, forwarded, or transmitted via any suitable means including memory sharing, message passing, token passing, network transmission, among others.
Examples of a processor 1002 include a microprocessor, an application-specific integrated circuit, a field-programmable gate array, or any other suitable processing device. The processor 1002 can include any number of processing devices, including one. The processor 1002 can include or communicate with a memory 1004. The memory 1004 stores program code that, when executed by the processor 1002, causes the processor to perform the operations described in this disclosure.
The memory 1004 can include any suitable non-transitory computer-readable medium. The computer-readable medium can include any electronic, optical, magnetic, or other storage device capable of providing a processor with computer-readable program code or other program code. Non-limiting examples of a computer-readable medium include a magnetic disk, memory chip, optical storage, flash memory, storage class memory, ROM, RAM, an ASIC, magnetic storage, or any other medium from which a computer processor can read and execute program code. The program code may include processor-specific program code generated by a compiler or an interpreter from code written in any suitable computer-programming language. Examples of suitable programming language include Hadoop, C, C++, C#, Visual Basic, Java, Python, Perl, JavaScript, ActionScript, etc.
The computing device 1000 may also include a number of external or internal devices such as input or output devices. For example, the computing device 1000 is shown with an input/output interface 1008 that can receive input from input devices or provide output to output devices. A bus 1006 can also be included in the computing device 1000. The bus 1006 can communicatively couple one or more components of the computing device 1000.
The computing device 1000 can execute program code 1014 that includes the risk assessment application 114 and/or the network training application 112. The program code 1014 for the risk assessment application 114 and/or the network training application 112 may be resident in any suitable computer-readable medium and may be executed on any suitable processing device. For example, as depicted in
In some aspects, the computing device 1000 can include one or more output devices. One example of an output device is the network interface device 1010 depicted in
Another example of an output device is the presentation device 1012 depicted in
The foregoing description of some examples has been presented only for the purpose of illustration and description and is not intended to be exhaustive or to limit the disclosure to the precise forms disclosed. Numerous modifications and adaptations thereof will be apparent to those skilled in the art without departing from the spirit and scope of the disclosure.
This application claims priority to and the benefit of U.S. Provisional Patent Application No. 63/265,687, filed Dec. 17, 2021, entitled “EXPLAINABLE MACHINE LEARNING BASED ON WAVELET ANALYSIS” the entire contents of which is hereby incorporated by reference in its entirety for all purposes.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2022/081836 | 12/16/2022 | WO |
Number | Date | Country | |
---|---|---|---|
63265687 | Dec 2021 | US |