Unit 5
Unit 5
What is the purpose of sales if the retailer doesn’t know who their customers are?
It’s a definite need to understand about their customers. It starts by analyzing them
with various factors. Finding the source by which the customer gets to know about
that retailing platform would help in enhancing the advertisement of retailers to
attract a completely new set of people. By finding the days they have frequently
purchased can help in discount sales or special boost up on festival days. The time
they spend buying per order can give us useful statistical data to enhance growth.
The amount of money spent on the order can help the retailer in separating the
customer crowd into groups of High paid orders, medium-paid orders, and low-paid
orders. This will increase the targeted customers or help in introducing customized
packages depending on price. By knowing the language and payment method
preferences, retailers can provide required services to satisfy the customers.
Managing a good business relationship with the customer can gain trust and loyalty
that can bring a rapid profit for the retailer. The retention of customers in their
company will help them to withstand the competition between similar other
companies.
RFM Value:
RFM stands for Recency, Frequency, Monetary value. Recency is nothing but the
nearest or recent time when the customer made a purchase. Frequency is how often
the purchase had taken place and Monetary value is the amount spent by the
customers on the purchase. RFM can surge monetization by holding on to the
regular and potential customers by keeping them happy with satisfying results. It can
also help in pulling back the trailing customers who tend to reduce the purchase. The
more the RFM score, the more the growth of sales is. RFM also prevents from
sending over requests to engaged customers and it helps to implement new
marketing techniques to low ordering customers. RFM helps in identifying
innovative solutions.
Market-based analysis:
The market-based analysis is a technique used to study and analyze the shopping
sequence of a customer to increase revenue/sales. This is done by analyzing datasets
of a particular customer by learning their shopping history, frequently bought items,
items grouped like a combination to use.
A very good example is the loyalty card issued by the retailer to customers. From the
customer’s point of view, the card is needed to keep track of discounts in the future,
incentive criteria details, and the history of transactions. But, if we take this loyalty
card from a retailer point of view, the applications of market-based analysis will be
layered inside to collect the details about the transaction.
This analysis can be achieved with data science techniques or various algorithms.
This can even be achieved without technical skills. Microsoft Excel platform is used
to analyze the customer purchases, frequently bought or frequently grouped items.
The spreadsheets can be organized by using ID as specified for different
transactions. This analysis helps in suggesting products for the customer which may
pair well with their current purchase which leads to cross-selling and improved
profits. It also helps to track the purchase rate per month or year. It manifests the
correct time for the retailer to make the desired offers to attract the right customers
for the targeted products.
Whenever a call starts in the telecommunication network, the details of the call are
recorded. The date and instant of time in which it happens, the duration of call along
with the time when it ends. Since all the data of a call is collected in real-time, it is
ready to be processed with data mining techniques. But we should segregate data
from the customer level not from isolated single phone call levels. Thus, by efficient
extraction of data, one can find the customer calling pattern.
Some of the data that help to find the pattern are
average time duration of calls
Time in which the call took place (Daytime/Night-time)
The average number of calls on weekdays
Calls generated with varied area code
Calls generated per day, etc.
By sensing the proper customer call details, one can progress the business growth. If
a customer makes more calls during dayshift working hours, that makes them
distinguished as a part of a business firm. If the night-time call rate is high, it may be
used only for residential or domestic purposes. By the frequent variance in the area
code, one can segregate the business calls because people calling for the residential
purpose may call over limited area codes in a period. But the data collected in the
evening time cannot give the exact detail of whether the customer belongs to a
business or residential firm.
0 seconds of 15 secondsVolume 0%
Data of customers:
Network Data:
Even though raw data are processed in data mining, it must be in a well sensed and
properly arranged format to be processed. And, in the telecommunication industry
dealing with the giant database, it’s an important need. First, clashing and contrary
data must be identified to avoid inconsistency. Making sure of the removal of
undesired data fields heaping space. The data must be organized and mapped by
finding the relationship between datasets to avoid redundancy.
Clustering or grouping similar data can be done by algorithms in the data mining
field. It can help in analyzing the patterns like calling patterns or customer behavior
patterns. Group of frequencies is made by analyzing the similarities between them.
By doing this, data can easily be understood which leads to easy manipulation and
use.
Customer profiling:
The telecommunication industry deals with a large scale of customer details. It starts
observing patterns of the customer from call data to profile the customers to predict
future trends. By knowing the customer pattern, the company can decide the
promotion methods offered to the customer. If the call ranges within an area code.
The promotion made in that aspect would gain a group of customers. This can
efficiently monetize the promotion techniques and stop the company from investing
in a single subscriber but it can attract a group of people with the right plan. Privacy
issues arise when the customer’s call history or details are monitored.
One of the significant problems that the telecommunication industry faces is
that Customer churn. This can also be stated as customer turnover in which the
company loses its client. In this case, the client leaves and switches to another
telecommunication company. If the customer churn rate is high in a company, the
respective company will experience severe loss of revenue and profit which will lead
to its decline in growth. This issue can be fixed by data mining techniques to collect
patterns of customers and profiling them. Incentive offers provided by companies
attract the regular user of some other company. By profiling the data, the customer
churn can be effectively forecasted by their behaviors like subscription history, the
plan they choose, and so on. While collecting data from the paid customers, it’s also
possible to collect data of the receiver or non-customer but with a set of restrictions.
Fraud detection:
Web Mining
Web Mining is the process of Data Mining techniques to automatically discover and
extract information from Web documents and services. The main purpose of web
mining is discovering useful information from the World-Wide Web and its usage
patterns.
Applications of Web Mining:
Web mining is the process of discovering patterns, structures, and relationships in
web data. It involves using data mining techniques to analyze web data and extract
valuable insights. The applications of web mining are wide-ranging and include:
Personalized marketing:
Web mining can be used to analyze customer behavior on websites and social media
platforms. This information can be used to create personalized marketing campaigns
that target customers based on their interests and preferences.
E-commerce
Web mining can be used to analyze customer behavior on e-commerce websites.
This information can be used to improve the user experience and increase sales by
recommending products based on customer preferences.
Search engine optimization:
Web mining can be used to analyze search engine queries and search engine results
pages (SERPs). This information can be used to improve the visibility of websites in
search engine results and increase traffic to the website.
Fraud detection:
Web mining can be used to detect fraudulent activity on websites. This information
can be used to prevent financial fraud, identity theft, and other types of online fraud.
Sentiment analysis:
Web mining can be used to analyze social media data and extract sentiment from
posts, comments, and reviews. This information can be used to understand customer
sentiment towards products and services and make informed business decisions.
0 seconds of 0 secondsVolume 0%
Loading ad
Web mining can be broadly divided into three different types of techniques of
mining: Web Content Mining, Web Structure Mining, and Web Usage Mining.
These are explained as following below.
Data Mining is the process that Web Mining is the process of data
attempts to discover pattern and mining techniques to automatically
Definition
hidden knowledge in large data discover and extract information
sets in any system. from web documents.
Data Mining is very useful for Web Mining is very useful for a
Application
web page analysis. particular website and e-service.
Clustering, classification,
Problem Web content mining, Web
regression, prediction,
Type structure mining.
optimization and control.
As we know that data mining is the system of extracting patterns from huge datasets
through combining techniques from statistician artificial intelligence with database
management. In intrusion detection (ID) and intrusion prevention device (IPS) we
recollect a few things which might be utilized in data mining for intrusion
detection systems (IDS) and intrusion prevention devices (IPS).
Modern network technologies require a high level of security controls to ensure safe
and trusted communication of information between the user and a client. An
intrusion Detection System is to protect the system after the failure of traditional
technologies. Data mining is the extraction of appropriate features from a large
amount of data. And, it supports various learning algorithms, i.e. supervised and
unsupervised. Intrusion detection is basically a data-centric process so, with the help
of data mining algorithms, IDS will also learn from past intrusions, and improve
performance from experience along with find unusual activities. It helps in exploring
the large increase in the database and gather only valid information by improving
segmentation and help organizations in real-time plan and save time. It has various
applications such as detecting anomalous behavior, detecting fraud and abuse,
terrorist activities, and investigating crimes through lie detection. Below list of areas
in which data mining technology can be carried out for intrusion detection.
Using data mining algorithms for developing a new model for IDS: Data
mining algorithm for the IDS model having a higher efficiency rate and lower
false alarms. Data mining algorithms can be used for both signature-based and
anomaly-based detection. In signature-
based detection, training information is classified as either “normal” or
“intrusion.” A classifier can then be derived to discover acknowledged intrusions.
Research on this place has included the software of
clarification algorithms, association rule mining, and cost-sensitive modeling.
Anomaly-primarily based totally detection
builds models of normal behavior and automatically detects massive deviations
from it. Methods consist of the software of clustering, outlier analysis,
and class algorithms, and statistical approaches. The strategies used have
to be efficient and scalable, and able to dealing
with community information of excessive volume, dimensional, and
heterogeneity.
Analysis of Stream data: Analysis of stream data means is analyzing the data in
a continuous manner but data mining is basically used on static data rather than
Streaming due to complex calculation and high processing time. Due
to the dynamic nature of intrusions and malicious attacks, it is
more critical to perform intrusion detection withinside
the records stream environment. Moreover, an event can be ordinary on
its own but taken into consideration malicious if regarded as a part of a
series of activities. Thus, it’s far essential to look at what sequences
of activities are regularly encountered together, locate sequential patterns,
and pick out outliers. Other data mining strategies for locating evolving clusters
and constructing dynamic class models in records streams also are essential for
real-time intrusion detection.
Distributed data mining: It is used to analyze the random data which is
inherently distributed into various databases so, it becomes difficult to integrate
processing of the data. Intrusions may
be launched from numerous distinctive places and focused on many distinctive de
stinations. Distributed data mining strategies can be used to
investigate community data from numerous network places to detect those distrib
uted attacks.
Visualization tools: These tools are used to represent the data in the form of
graphs which helps the user to get a visual understanding of the data. These tools
are also used for viewing any anomalous patterns
detected. Such tools may encompass capabilities for viewing associations,
discriminative patterns, clusters, and outliers. Intrusion
detection structures must actually have a graphical user interface
that permits safety analysts to pose queries concerning the network data or
intrusion detection results.
Given a query to a Search Engine, the set of highly relevant web pages are
called Roots. They are potential Authorities.
Pages that are not very relevant but point to pages in the Root are called Hubs.
Thus, an Authority is a page that many hubs link to whereas a Hub is a page that
links to many authorities.
Hyperlink Induced Topic Search (HITS) Algorithm is a Link Analysis Algorithm
that rates webpages, developed by Jon Kleinberg. This algorithm is used to the web
link-structures to discover and rank the webpages relevant for a particular search.
HITS uses hubs and authorities to define a recursive relationship between webpages.
Before understanding the HITS Algorithm, we first need to know about Hubs and
Authorities.
Given a query to a Search Engine, the set of highly relevant web pages are
called Roots. They are potential Authorities.
Pages that are not very relevant but point to pages in the Root are called Hubs.
Thus, an Authority is a page that many hubs link to whereas a Hub is a page that
links to many authorities.