This U.S. patent application claims priority under 35 U.S.C. § 119 to: India Application No. 202221037124, filed on Jun. 28, 2022. The entire contents of the aforementioned application are incorporated herein by reference.
The disclosure herein generally relates to analyzing process exceptions, and, more particularly, to a method and system for generating a data model to analyze and predict process exceptions.
Business processes often do not follow a straight-through processing and observe exceptions. These exceptions lead to delayed processing, financial penalties, and poor customer experience.
The inventors here have recognized several technical problems with such conventional systems, as explained below. Current methods are reactive, manual, and intuition-driven. Command center teams often react to such exceptions. They also use Business intelligence (BI) tools which only provide statistical observation, but fail to mine domain-aware insights and actionable recommendations.
Embodiments of the present disclosure present technological improvements as solutions to one or more of the above-mentioned technical problems recognized by the inventors in conventional systems. For example, in one embodiment, a processor implemented method of generating a data model for exception management is provided. The method involves obtaining exception data corresponding to a plurality of exceptions as input data, wherein the exception data comprising a) date of exception, b) type of exception, and c) a plurality of attributes of exception. Further, a plurality of data properties and a plurality of quality properties of the exception data are generated by executing a plurality of classification algorithms on the obtained exception data. Further, an algorithm matching the obtained exception data is determined based on the data properties and the quality properties. Further, a data model is generated by using a) the data properties, b) the quality properties, and c) information on the algorithm matching the obtained exception data, of the plurality of exceptions, as training data.
In another embodiment, determining the algorithm matching the obtained exception data includes the following steps. A classification with entropy is selected as the algorithm if the data properties and the quality properties indicate that the exception has dimension exceeding a threshold of dimension and has a highly skewed population. A classification with gini index is selected as the algorithm if the data properties and the quality properties indicate that the exception has dimension below a threshold of dimension and has a uniform population. Regression trees is selected as the algorithm if numeric attributes in the exception exceeds a threshold of numeric attributes. Classification and regression trees (CART) is selected as the algorithm if the exception contains a mix of attributes.
In yet another embodiment, the data model is used to derive one or more actionable recommendations by executing the following steps. Initially, at least one rule and corresponding data properties and quality properties are fetched as input. Further, at least one exception associated with the at least one rule is identified, by processing the input using the data model. Further, a root cause analysis of the identified at least one exception is performed to identify at least one cause of the identified at least one exception, using the data model. Further, a categorization of the at least one cause is performed as related to one of a) process improvements, or b) potential mavericks, using the data model. Further, at least one recommendation is generated based on the categorization of the at least one cause.
In yet another embodiment, a system for generating a data model for exception management is provided. The system includes one or more hardware processors, a communication interface, and a memory storing a plurality of instructions. The plurality of instructions when executed, cause the one or more hardware processors to initially obtain exception data corresponding to a plurality of exceptions as input data, wherein the exception data comprising a) date of exception, b) type of exception, and c) a plurality of attributes of exception. The system then generates a plurality of data properties and a plurality of quality properties of the exception data by executing a plurality of classification algorithms on the obtained exception data. The system further determines an algorithm matching the obtained exception data, based on the data properties and the quality properties. The system then generates the data model by using a) the data properties, b) the quality properties, and c) information on the algorithm matching the obtained exception data, of the plurality of exceptions, as training data.
In yet another embodiment, the one or more hardware processors of the system are configured to determine the algorithm matching the obtained exception data as below. A classification with entropy is selected as the algorithm if the data properties and the quality properties indicate that the exception has dimension exceeding a threshold of dimension and has a highly skewed population. A classification with gini index is selected as the algorithm if the data properties and the quality properties indicate that the exception has dimension below a threshold of dimension and has a uniform population. Regression trees is selected as the algorithm if numeric attributes in the exception exceeds a threshold of numeric attributes. Classification and regression trees (CART) is selected as the algorithm if the exception contains a mix of attributes.
In yet another embodiment, the one or more hardware processors are configured to derive one or more actionable recommendations using the data model, by executing the following steps. Initially, at least one rule and corresponding data properties and quality properties are fetched as input. Further, at least one exception associated with the at least one rule is identified, by processing the input using the data model. Further, a root cause analysis of the identified at least one exception is performed to identify at least one cause of the identified at least one exception, using the data model. Further, a categorization of the at least one cause is performed as related to one of a) process improvements, or b) potential mavericks, using the data model. Further, at least one recommendation is generated based on the categorization of the at least one cause.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
The accompanying drawings, which are incorporated in and constitute a part of this disclosure, illustrate exemplary embodiments and, together with the description, serve to explain the disclosed principles.
Exemplary embodiments are described with reference to the accompanying drawings. \ In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. Wherever convenient, the same reference numbers are used throughout the drawings to refer to the same or like parts. While examples and features of disclosed principles are described herein, modifications, adaptations, and other implementations are possible without departing from the scope of the disclosed embodiments.
Business process often do not follow a straight-through processing and observe exceptions. These exceptions lead to delayed processing, financial penalties, and poor customer experience. Current methods are reactive, manual, and intuition-driven. Command center teams often react to such exceptions. They also use Business intelligence (BI) tools which only provide statistical observation, but fail to mine domain-aware insights and actionable recommendations.
Referring now to the drawings, and more particularly to
The I/O interface 112 may include a variety of software and hardware interfaces, for example, a web interface, a graphical user interface, and the like. The I/O interface 112 may include a variety of software and hardware interfaces, for example, interfaces for peripheral device(s), such as a keyboard, a mouse, an external memory, a printer and the like. Further, the I/O interface 112 may enable the system 100 to communicate with other devices, such as web servers, and external databases.
The I/O interface 112 can facilitate multiple communications within a wide variety of networks and protocol types, including wired networks, for example, local area network (LAN), cable, etc., and wireless networks, such as Wireless LAN (WLAN), cellular, or satellite. For the purpose, the I/O interface 112 may include one or more ports for connecting several computing systems with one another or to another server computer. The I/O interface 112 may include one or more ports for connecting several devices to one another or to another server.
The one or more hardware processors 102 may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, node machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions. Among other capabilities, the one or more hardware processors 102 is configured to fetch and execute computer-readable instructions stored in the memory 104.
The memory 104 may include any computer-readable medium known in the art including, for example, volatile memory, such as static random-access memory (SRAM) and dynamic random-access memory (DRAM), and/or non-volatile memory, such as read only memory (ROM), erasable programmable ROM, flash memories, hard disks, optical disks, and magnetic tapes. In an embodiment, the memory 104 includes a plurality of modules 106.
The plurality of modules 106 include programs or coded instructions that supplement applications or functions performed by the system 100 for executing different steps involved in the exception handling, being performed by the system 100. The plurality of modules 106, amongst other things, can include routines, programs, objects, components, and data structures, which performs particular tasks or implement particular abstract data types. The plurality of modules 106 may also be used as, signal processor(s), node machine(s), logic circuitries, and/or any other device or component that manipulates signals based on operational instructions. Further, the plurality of modules 106 can be used by hardware, by computer-readable instructions executed by the one or more hardware processors 102, or by a combination thereof. The plurality of modules 106 can include various sub-modules (not shown). The plurality of modules 106 may include computer-readable instructions that supplement applications or functions performed by the system 100 for the exception handling.
The data repository (or repository) 110 may include a plurality of abstracted piece of code for refinement and data that is processed, received, or generated as a result of the execution of the plurality of modules in the module(s) 106.
Although the data repository 110 is shown internal to the system 100, it will be noted that, in alternate embodiments, the data repository 110 can also be implemented external to the system 100, where the data repository 110 may be stored within a database (repository 110) communicatively coupled to the system 100. The data contained within such external database may be periodically updated. For example, new data may be added into the database (not shown in
At step 202 of the method 200, the system 100 obtains exception data corresponding to a plurality of exceptions as input data, wherein the exception data comprising a) date of exception, b) type of exception, and c) a plurality of attributes of exception. For example, if a supply chain management is considered, the exception data may be transaction failure as type of exception, date of the transaction which failed, as the date of exception, and attributes of the transaction such as vendor name, buyer name, item name, and delivery location and so on, as the plurality of attributes of exception. Further, at step 204 of the method 200, the system 100 generates a plurality of data properties and a plurality of quality properties by executing a plurality of classification algorithms on the obtained exception data. An example of output of the classification algorithm is in the format {Attribute1=Value1 & Attribute2=value2 . . . } then {Exception=exception1}. Here first part of the pattern is termed as antecedent, which contains a set of attributes and second part is termed as Exception. Wherein data properties include i) Data dimension count—number of attribute columns in the exception data ii) Data distribution or skewness score—computed using entropy of attribute columns, and iii) Numeric attribute count—Number of attribute columns with type numeric. Example of such attributes are age column, price column, distance columns and so on. The properties contributing to the quality properties are i) Coverage—Coverage of pattern is calculated as “Number of exception data rows that holds true for the pattern/total number of rows in the exception data”, ii) Confidence—patterns confidence is computed as “Number of input exception data rows which hold true for antecedent/Number of exception data rows holds true for complete pattern”. To compute the next two attributes at any stage, the system 100 creates N equal duration buckets of the complete exception data duration using its date column (maximum date in exception—minimum date in exception)/N, iii) Persistence—is computed using Number of duration buckets the pattern occurrence are present in/N (total number of duration buckets), and iv) Recency is computed as “Last observed duration bucket number/N (total number of duration buckets)”. Further, at step 206 of the method 200, the system 100 determines an algorithm matching the obtained exception data, based on the data properties and the quality properties. Various steps involved in the process of determining the algorithm, matching the obtained exception data, are depicted in a method 300 in
Once the data model is generated, the system 100 may use the data mode to derive one or more actionable recommendations. Steps in deriving the actionable recommendations are depicted in method 400 in
The illustrated steps are set out to explain the exemplary embodiments shown, and it should be anticipated that ongoing technological development will change the manner in which particular functions are performed. These examples are presented herein for purposes of illustration, and not limitation. Further, the boundaries of the functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternative boundaries can be defined so long as the specified functions and relationships thereof are appropriately performed. Alternatives (including equivalents, extensions, variations, deviations, etc., of those described herein) will be apparent to persons skilled in the relevant art(s) based on the teachings contained herein. Such alternatives fall within the scope of the disclosed embodiments. Also, the words “comprising,” “having,” “containing,” and “including,” and other similar forms are intended to be equivalent in meaning and be open ended in that an item or items following any one of these words is not meant to be an exhaustive listing of such item or items, or meant to be limited to only the listed item or items. It must also be noted that as used herein and in the appended claims, the singular forms “a,” “an,” and “the” include plural references unless the context clearly dictates otherwise.
Furthermore, one or more computer-readable storage media may be utilized in implementing embodiments consistent with the present disclosure. A computer-readable storage medium refers to any type of physical memory on which information or data readable by a processor may be stored. Thus, a computer-readable storage medium may store instructions for execution by one or more processors, including instructions for causing the processor(s) to perform steps or stages consistent with the embodiments described herein. The term “computer-readable medium” should be understood to include tangible items and exclude carrier waves and transient signals, i.e., be non-transitory. Examples include random access memory (RAM), read-only memory (ROM), volatile memory, nonvolatile memory, hard drives, CD ROMs, DVDs, flash drives, disks, and any other known physical storage media.
It is intended that the disclosure and examples be considered as exemplary only, with a true scope of disclosed embodiments being indicated by the following claims.
Number | Date | Country | Kind |
---|---|---|---|
202221037124 | Jun 2022 | IN | national |