Invented by Tu Truong, Fuming Wu, Julio Navas, Ajain Kuzhimattathil, Hanxiang Chen, Nazanin Zaker Habibabadi, Omar Rahman, Han Li, SAP SE
The SAP SE invention works as follows
In an example, machine learning algorithms are used to train a model for entity risk evaluation to generate an entity score based on data from a computer network. The entity risk scores of various entities can be stored in a data base, and then retrieved and displayed when interacting with reports that involve corresponding entities.Background for Machine Learning Models for Evaluating Entities in a High-Volume Computer Network
Certain types of computer networks handle high volumes both of transactions and of entities involved in those transactions. It can be challenging to evaluate entities within a large business network due to the technical difficulties involved in analyzing so many entities and transactions. When the entities are buyers (or recipients) of goods and services and suppliers, it is difficult to evaluate suppliers in order to determine if they will be a match for one buyer. It can also be difficult to evaluate buyers in order to determine if they will be a match for another supplier. When used with computer networks that have high transaction volumes, traditional evaluation techniques such as those in the financial industry fail to evaluate partner strengths and weaknesses and risk. The traditional methods fail when applied to a large-scale business network.
BRIEF DESCRIPTION DES DRAWINGS
The accompanying figures illustrate the present disclosure by way of illustration and not limitation, and they include:
FIG. “FIG.
FIG. “FIG.
FIG. “FIG.
FIG. “FIG.
FIG. “FIG.
FIG. “FIG.
FIG. “FIG.
FIG. “FIG.
FIG. “FIG.
FIG. “FIG.
The following description includes examples of systems, methods, instructions, and computer program products that embody illustrations. To provide a better understanding of the various embodiments, many specific details will be provided in the following description. It will however be obvious to those in the know that embodiments of inventive subject matter can be practiced even without these specific details. “In general, well-known instructions, protocols, structures and techniques are not shown in detail.
In an example embodiment advanced machine learning and deeper learning techniques are applied on a large volume transaction data to evaluate entities that were involved in the transaction. The models that are trained using these advanced machine-learning and deep-learning techniques produce a score, also known as entity risk score, for each entity. The entity risk score is a number that represents the financial and business sustainability of an entity.
In an example embodiment Key Performance Indices are generated based on high-volume transaction data within a computer network. The generated KPIs are then used to create an entity risk score based on one or more entities that were involved in the transactional data. Machine learning training functions may be called periodically, in batch mode, while inference functions (predictions), can be called real-time. In some embodiments, a high-volume computer system is a network of businesses, such as e-commerce.
FIG. Block diagram 1 shows a high-volume network of computers 100 in accordance to an example embodiment. The high-volume network 100 is comprised of different heterogeneous hardware and/or software components. A supplier user 102 can access functionality in business network 104 through a dashboard 106. The network may include an application-layer 108, database persistence functionality 110 and extract, transform and load (ETL), functionality 112, among others. The application layer 108 delivers business network functionality via the dashboard 106 to the user of the supplier 102. Application layer 108 can also provide business networking functionality to other users through other dashboards, not shown here. These include buyer users and third party users. This business network functionality can include, for instance, functionality related with the procurement of goods or services from one entity (supplier), to another entity (buyer). The database persistence functionality can store transaction data and retrieve it using the ETL functionality 112.
A machine learning model architecture may also include a machine-learning model metric service, which maintains a number of application program interfaces to provide entity scores and related information. These APIs can be maintained by an API Management component 118. “The machine learning model metric services 116 can be invoked using the application layer 108, such as the Hyper Text Transfer Protocol Secure (HTTPS)
In certain example embodiments, machine learning model metrics service 116 can provide a stateless connectivity mechanism according to the Representational States Transfer (REST architecture paradigm). The ETL functionality 112 transfers data from the business network 104 to the machine-learning model architecture 114 periodically (e.g. monthly, quarterly) in order to train. This training results in a machine-learning model 112. It is trained by using a dataset 124 that is extracted from the database persistence functionality (via the ETL functionality, for example).
The modeling runtime 120 can generate features 126 based on the transaction data. KPIs, as described above, may be an example of features 126. “The one or more features may be used to train a machine learning model, as described later.
When the application 108 calls an API through API management component (118) to the machine-learning model metric service to obtain a risk score for a particular entity, the non-training data from the transaction is fed into the machine-learning model (122) to get an entity risk score. This is a real-time process that can be called prediction or inference.