| CPC G06N 5/04 (2013.01) [G06F 16/24 (2019.01); G06N 5/027 (2013.01); G06N 20/00 (2019.01); G06Q 30/0201 (2013.01); G06Q 30/0204 (2013.01)] | 15 Claims |

|
1. A method for improving a protocol for configuring a model, the method comprising:
generating, by a processor, a graphical user interface;
receiving, by the processor at the graphical user interface, a plurality of user inputs for configuring a plurality of parameters of a network operation evaluation protocol;
responsive to receiving the plurality of user inputs at the graphical user interface:
obtaining, by the processor, data from a database, the data including a plurality of events each corresponding to a different network operation authorization;
identifying, by the processor, an exposure event from the plurality of events, the exposure event having a corresponding token and timestamp, the timestamp of the exposure event indicating a first time at which the corresponding token was exposed to a control or treatment of the network operation evaluation protocol;
identifying, by the processor and from the plurality of events, one or more potential outcome events having the corresponding token;
dynamically determining, by the processor, a horizon time window based on a user inputting the plurality of user inputs to generate a set of the one or more potential outcome events that each correspond to a timestamp that is within the horizon time window having a defined end time and beginning with the timestamp of the exposure event having the corresponding token, wherein the processor iteratively generates a set of additional one or more potential outcome events within the horizon time window and having at least a second token;
labeling, by the processor, each potential outcome event of the set of potential outcome events as an actual outcome event;
assigning, by the processor, the exposure event having the corresponding token and one or more actual outcome events having the corresponding token to either a control group or a treatment group of the network operation evaluation protocol; and
executing, by the processor, one or more functions of the network operation evaluation protocol that map to the plurality of user inputs in a function mapping database, wherein the one or more functions are executed based on indications of successful or unsuccessful network operation authorizations of the one or more tokens corresponding to the one or more actual outcome events for the treatment group; and
responsive to the network operation evaluation protocol identifying an increased accuracy in evaluating an updated trained network operation authorization model over a previous network operation authorization model, deploying, by the processor, the updated trained network operation authorization model for a new event.
|