SlideShare a Scribd company logo
1 of 3
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 08, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 7
Data Mining in Telecommunication Industry
Hiren H Darji1
1
Assistant Professor
Abstract— Telecommunication companies today are
operating in highly competitive and challenging
environment. Vast volume of data is generated from various
operational systems and these are used for solving many
business problems that required urgent handling. These data
include call detail data, customer data and network data.
Data Mining methods and business intelligence technology
are widely used for handling the business problems in this
industry. The goal of this paper is to provide a broad review
of data mining concepts.
Key words: Data mining, Telecommunications, Fraud
Detection, Neural Networks, Churn management
I. INTRODUCTION
The concept of Data Mining has gained a common
market acceptance. Telecommunication is one of the
most data intensive industries in the world. One of the
first industries to accept Data Mining is the
telecommunications. Companies in the telecom industry are
making use of Data Mining technologies to improve their
marketing techniques, for identification of customer fraud
and for the better management of their networks.[1]
Most of the telecom companies have realized
that the vast volume of data they collect and possess
could be effectively utilized for solving their business
problems by converting them into information and
knowledge. Data Mining can be viewed as a technique
automatically generating this knowledge from the data
available. One of the first industry to experience the
benefits from the application if Business Intelligence
(BI) and Data Mining technologies in the
telecommunications industry. [1]
II. DATA MINING: AN OVERVIEW
A. Definition
“Data mining” is defined as a sophisticated data search
capability that uses statistical algorithms to discover patterns
and correlations in data. Data mining finds and extracts
knowledge (“data pieces”) hidden in corporate data
warehouses, or information that visitors have dropped on a
website, most of which can lead to improvements in the
understanding and use of the data. Data mining discovers
patterns and relationships hidden in data, and is actually part
of a larger process called “knowledge discovery” which
describes the steps that must be taken to ensure meaningful
results. Data mining helps business analysts to generate
suggestions, but it does not validate the hypotheses. [7]
B. The evolution of data mining
Data mining techniques are the result of a long research and
product development process. The origin of data mining lies
with the first storage of data on computers continues with
improvements in data access, until today technology allows
users to navigate through data in real time. In the evolution
from business data to useful information, each step is built
on the previous ones. [7]
C. Data mining techniques
Data mining tools take data and construct a representation of
reality in the form of a model. The resulting model describes
patterns and relationships present in the data. From a
process orientation, data mining activities fall into three
general categories [7]
1) Discovery:
The process of looking in a database to find hidden patterns
without a fixed idea or hypothesis about what the patterns
may be.
2) Predictive Modeling:
The process of taking patterns discovered from the database
and using them to predict the future.
3) Forensic Analysis:
The process of applying the extracted patterns to find
strange or unusual data elements. Data mining is used to
construct six types of models expected at solving business
problems: classification, regression, time series, clustering,
association analysis, and sequence discovery. The first two,
classification and regression, are used to make predictions,
while association and sequence discovery are used to
describe behavior. Clustering can be used for either
forecasting or description.
III. TYPES OF TELECOMMUNICATION DATA
The different kinds of data used in this industry are mainly
grouped into 3 different types.
A. Call detail data
This is the information about the call, which stores as the
call detail record. The number of call detail records
generated is huge since every call is placed on the network,
the details are stored. Call detail record includes information
like making and ending phone numbers, date, time and
duration of call. Usually these call detail records are not
directly used for Data Mining. A list of features can be
generated from the call detail data such as [1]
 Average call duration
 Average number of call created per day
 Average number of call received per day
 Percentage of no-answer calls
Data Mining in Telecommunication Industry
(IJSRD/Vol. 2/Issue 08/2014/002)
All rights reserved by www.ijsrd.com 8
 Percentage of day time calls
 Percentage of weekday calls
B. Network data
Telecommunication networks contain thousands of
components, which are interconnected. These components
are capable of generating error and status messages which
leads to a large volume of network data. These network data
are used for network management functions like fault
detection. Expert systems have been developed to
analysis these messages automatically, since the huge
volume of network messages generated cannot be
handles by technicians. Hence Data Mining
technologies are used in identification of network faults
by automatically extracting knowledge from network
data. Network data is also generated in real time
which can be accomplished by applying a time window
to the data. [1]
C. Customer data
Like any other business, telecommunication companies also
have millions customers. Hence it is very much essential to
have a database for storing the information about these
customers. Information about the customer will include:
 Name of the customer
 Address details
 Payment history
 Service plan and so on
Group customer data is used to provide call detail
data in order to identify fraud. [1]
IV. CHURN PREDICTION - PROBLEM DESCRIPTION
In a business environment, the term, customer attrition
simply refers to the customers leaving one business
service to another. Customer churn or subscriber churn is
also similar to attrition, which is the process of
customers switching from One service provider to another
anonymously. From a machine learning perspective, churn
prediction is a managed problem defined as follows: Given a
predefined forecast horizon, the goal is to predict the future
churners over that horizon, given the data associated with
each subscriber in the network. The churn prediction
problem represented here involves 3 phases, namely, I)
training phase, ii) test phase, iii) prediction phase. The
input for this problem includes the data on past calls
for each mobile subscriber, together with all personal
and business information that is maintained by the
service provider. In addition, for the training phase,
labels are provided in the form of a list of churners.
After the model is trained with highest accuracy, the model
must be able to predict the list of churners from the real
dataset which does not include any churn label. In the
viewpoint of knowledge discovery process, this problem
is categorized as predictive mining or predictive modeling.
Churn Prediction is a occurrence which is used to
identify the possible churners in advance before they
leave the network. This helps the CRM department to
prevent subscribers who are likely to churn in future
by taking the required retention policies to attract the
likely churners and to retain them. Thereby, the potential
loss of the company could be avoided. This study utilizes
data mining techniques to identify the churners. [3]
V. METHODOLOGY
KDD (Knowledge Discovery in Databases) is defined as the
“nontrivial process of identifying valid, novel, potentially
useful and ultimately understandable patterns of in data”.
The first step in predictive modeling is the acquisition and
preparation of data. Having the correct data is as important
as having the correct method. [3]
A. Data Acquisition
It is a difficult problem for the researchers to acquire
the actual dataset from the telecom industries. This is
because the customer’s private details may be misused.
Since churn prediction models requires the past history
or the usage behavior of customers during a specific
period of time to predict their behavior in the near
future, they cannot be applied directly to the actual
dataset. Therefore, it is the usual practice to perform
some kind of aggregation on the dataset. During the
process of aggregation, in addition to the actual
variables, new variables will be generated which display
the periodic consuming behavior of the customers. These
variables have vital information to be used by the prediction
models in forecasting the behavior of customers in advance.
The dataset used here was aggregated for 6 months duration.
B. Data Preparation
In data mining problems, data preparation consumes
considerable amount of time. In the data preparation
phase, data is collected, integrated and cleaned.
Integration of data may require extraction of data from
multiple sources. Once the data has been arranged in
tabular form, it needs to be fully characterized. Data needs
to be cleaned by resolving any ambiguities, errors. Also
redundant and problematic data items are to be removed at
this stage.
C. Derived Variables
Derived variables are new variables based on original
variables. The most effective derived variables are those that
represent something in the real world, such as a description
of some original customer behavior. There are some general
classes of derived variables, like total values, average
values, and ratios. Some examples are:
 The average number of calls in last 6 months
 The average number of late in last 6 months
 The ratio of incoming and outgoing calls
 Average payment amount for last six months
 Average late count in last 6 months
D. Variable Extraction
The selected variables are grouped under 4 categories and
are described below
1) Customer Demography:
 Age: It is found that the customers between the age
group of 45 – 48 have high probability to churn.
 Line_Tenure: Customers with 25 – 30 months of
tenure period are about to churn.
 Customer_Class : Generally the churn probability
of the corporate account holders is high. This
is due to the fact that their account will be
maintained by the company and customers who
Data Mining in Telecommunication Industry
(IJSRD/Vol. 2/Issue 08/2014/002)
All rights reserved by www.ijsrd.com 9
quit the company would churn. The Customer
Class can be any one of VIP /Individual/Corporate.
 Days_to_Contract_Expiry: Most of the customers
would subscribe to a new service with the
intention
Acquiring new HAND_SET. These people would leave
the network after the contract expires.
2) Bill and Payment
 Average_Bill_Amount
 Avg_Pay_Amount
 Overdue_Payment_Count
3) Call Detail Record
 Avg_Min_OB: If the average out bound call is less
than 168 minutes they will churn.
 Tot_Past_Delink: If the count of total past delink
is greater than 3 then they will churn.
 Tot_Dis_Int: If the customers who make more
number of distinct international calls then they will
churn. If the count is greater than 6 they may
churn.
VI. CONCLUSION
Data Mining play a significant role in the
telecommunication industry due to the availability of large
volume of data and the rigorous competition in the
sector. The primary application areas include marketing and
Customer Relationship Management, Fraud detection and
Network Management. The recent developments in the
Data Mining and the implementation and enhancement of
existing techniques and methods ensure the continuous
growth and compatibility of telecommunication companies
that make use of them.
REFERENCES
[1] Madhuri V. Joseph, “Data Mining and Business
Intelligence Applications in Telecommunication
Industry”.
[2] D. Ćamilović*, “DATA MINING AND CRM IN
TELECOMMUNICATIONS”.
[3] V. Umayaparvathi, K. Iyakutti, “Applications of Data
Mining Techniques in Telecom Churn Prediction “.
[4] Khalida binti Oseman, Sunarti binti Mohd Shukor,
Norazrina Abu Haris, Faizin bin Abu Bakar, “Data
Mining in Churn Analysis Model for
Telecommunication Industry”.
[5] N.Kamalraj, Dr.A.Malathi, “Applying Data Mining
Techniques in Telecom Churn Prediction”.
[6] Wiktor Daszczuk, Piotr Gawrysiak, Tomasz
Gerszberg, “Data Mining for Technical Operation of
Telecommunications Companies: a Case Study”.
[7] Anita B. Desai, Dr. Ravindra Deshmukh, “Data mining
techniques for Fraud Detection”.
[8] Pareek, D.: Business Intelligence for
Telecommunications. Auerbach Publications, Taylor &
Francis Group LLC. (2007).
[9] Yu-Teng Chang, “Applying Data Mining To Telecom
Churn Management”, IJRIC, 2009 67 – 77.

More Related Content

What's hot

USE OF DATA MINING IN BANKING SECTOR
USE OF DATA MINING IN BANKING SECTORUSE OF DATA MINING IN BANKING SECTOR
USE OF DATA MINING IN BANKING SECTORarpit bhadoriya
 
Data mining & data warehousing
Data mining & data warehousingData mining & data warehousing
Data mining & data warehousingShubha Brota Raha
 
A Comparative Study of Techniques to Predict Customer Churn in Telecommunicat...
A Comparative Study of Techniques to Predict Customer Churn in Telecommunicat...A Comparative Study of Techniques to Predict Customer Churn in Telecommunicat...
A Comparative Study of Techniques to Predict Customer Churn in Telecommunicat...IRJET Journal
 
Application of data mining
Application of data miningApplication of data mining
Application of data miningSHIVANI SONI
 
Data Mining – analyse Bank Marketing Data Set
Data Mining – analyse Bank Marketing Data SetData Mining – analyse Bank Marketing Data Set
Data Mining – analyse Bank Marketing Data SetMateusz Brzoska
 
Lecture 2 1_11_2012_data_mining_process
Lecture 2 1_11_2012_data_mining_processLecture 2 1_11_2012_data_mining_process
Lecture 2 1_11_2012_data_mining_processkittynmhao
 
Using Data Mining Techniques in Customer Segmentation
Using Data Mining Techniques in Customer SegmentationUsing Data Mining Techniques in Customer Segmentation
Using Data Mining Techniques in Customer SegmentationIJERA Editor
 
Predictive analytics km chicago
Predictive analytics km chicagoPredictive analytics km chicago
Predictive analytics km chicagoKM Chicago
 
Discovering diamonds under coal piles: Revealing exclusive business intellige...
Discovering diamonds under coal piles: Revealing exclusive business intellige...Discovering diamonds under coal piles: Revealing exclusive business intellige...
Discovering diamonds under coal piles: Revealing exclusive business intellige...IJERA Editor
 
DSO528GroupProject-PortugueseBank
DSO528GroupProject-PortugueseBankDSO528GroupProject-PortugueseBank
DSO528GroupProject-PortugueseBankEric Esajian
 
Data warehouse Vs Big Data
Data warehouse Vs Big Data Data warehouse Vs Big Data
Data warehouse Vs Big Data Lisette ZOUNON
 
Secondary Research in Applied Marketing Research
Secondary Research in Applied Marketing ResearchSecondary Research in Applied Marketing Research
Secondary Research in Applied Marketing ResearchKelly Page
 

What's hot (20)

USE OF DATA MINING IN BANKING SECTOR
USE OF DATA MINING IN BANKING SECTORUSE OF DATA MINING IN BANKING SECTOR
USE OF DATA MINING IN BANKING SECTOR
 
Data mining & data warehousing
Data mining & data warehousingData mining & data warehousing
Data mining & data warehousing
 
A Comparative Study of Techniques to Predict Customer Churn in Telecommunicat...
A Comparative Study of Techniques to Predict Customer Churn in Telecommunicat...A Comparative Study of Techniques to Predict Customer Churn in Telecommunicat...
A Comparative Study of Techniques to Predict Customer Churn in Telecommunicat...
 
Application of data mining
Application of data miningApplication of data mining
Application of data mining
 
Data Mining – analyse Bank Marketing Data Set
Data Mining – analyse Bank Marketing Data SetData Mining – analyse Bank Marketing Data Set
Data Mining – analyse Bank Marketing Data Set
 
Lecture 2 1_11_2012_data_mining_process
Lecture 2 1_11_2012_data_mining_processLecture 2 1_11_2012_data_mining_process
Lecture 2 1_11_2012_data_mining_process
 
20 ccp using logistic
20 ccp using logistic20 ccp using logistic
20 ccp using logistic
 
Using Data Mining Techniques in Customer Segmentation
Using Data Mining Techniques in Customer SegmentationUsing Data Mining Techniques in Customer Segmentation
Using Data Mining Techniques in Customer Segmentation
 
Data mining
Data miningData mining
Data mining
 
Unit ii data analytics
Unit ii data analytics Unit ii data analytics
Unit ii data analytics
 
Data Mining
Data MiningData Mining
Data Mining
 
Predictive analytics km chicago
Predictive analytics km chicagoPredictive analytics km chicago
Predictive analytics km chicago
 
Discovering diamonds under coal piles: Revealing exclusive business intellige...
Discovering diamonds under coal piles: Revealing exclusive business intellige...Discovering diamonds under coal piles: Revealing exclusive business intellige...
Discovering diamonds under coal piles: Revealing exclusive business intellige...
 
DSO528GroupProject-PortugueseBank
DSO528GroupProject-PortugueseBankDSO528GroupProject-PortugueseBank
DSO528GroupProject-PortugueseBank
 
Data warehouse Vs Big Data
Data warehouse Vs Big Data Data warehouse Vs Big Data
Data warehouse Vs Big Data
 
Data mining
Data miningData mining
Data mining
 
Secondary Research in Applied Marketing Research
Secondary Research in Applied Marketing ResearchSecondary Research in Applied Marketing Research
Secondary Research in Applied Marketing Research
 
Data mining
Data miningData mining
Data mining
 
Gc3310851089
Gc3310851089Gc3310851089
Gc3310851089
 
Aanlytics on Telecom
Aanlytics on TelecomAanlytics on Telecom
Aanlytics on Telecom
 

Similar to Data Mining in Telecommunication Industry

A Survey on Data Mining
A Survey on Data MiningA Survey on Data Mining
A Survey on Data MiningIOSR Journals
 
IRJET- Fault Detection and Prediction of Failure using Vibration Analysis
IRJET-	 Fault Detection and Prediction of Failure using Vibration AnalysisIRJET-	 Fault Detection and Prediction of Failure using Vibration Analysis
IRJET- Fault Detection and Prediction of Failure using Vibration AnalysisIRJET Journal
 
Automated Feature Selection and Churn Prediction using Deep Learning Models
Automated Feature Selection and Churn Prediction using Deep Learning ModelsAutomated Feature Selection and Churn Prediction using Deep Learning Models
Automated Feature Selection and Churn Prediction using Deep Learning ModelsIRJET Journal
 
Proposed ranking for point of sales using data mining for telecom operators
Proposed ranking for point of sales using data mining for telecom operatorsProposed ranking for point of sales using data mining for telecom operators
Proposed ranking for point of sales using data mining for telecom operatorsijdms
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applicationsSubrat Swain
 
Overview of Data Mining
Overview of Data MiningOverview of Data Mining
Overview of Data Miningijtsrd
 
Study of Data Mining Methods and its Applications
Study of  Data Mining Methods and its ApplicationsStudy of  Data Mining Methods and its Applications
Study of Data Mining Methods and its ApplicationsIRJET Journal
 
Data mining by_ashok
Data mining by_ashokData mining by_ashok
Data mining by_ashokAshok Kumar
 
Data Mining: What is Data Mining?
Data Mining: What is Data Mining?Data Mining: What is Data Mining?
Data Mining: What is Data Mining?Seerat Malik
 
IRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom IndustryIRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom IndustryIRJET Journal
 
Full Paper: Analytics: Key to go from generating big data to deriving busines...
Full Paper: Analytics: Key to go from generating big data to deriving busines...Full Paper: Analytics: Key to go from generating big data to deriving busines...
Full Paper: Analytics: Key to go from generating big data to deriving busines...Piyush Malik
 
An efficient data pre processing frame work for loan credibility prediction s...
An efficient data pre processing frame work for loan credibility prediction s...An efficient data pre processing frame work for loan credibility prediction s...
An efficient data pre processing frame work for loan credibility prediction s...eSAT Journals
 
EVALUTION OF CHURN PREDICTING PROCESS USING CUSTOMER BEHAVIOUR PATTERN
EVALUTION OF CHURN PREDICTING PROCESS USING CUSTOMER BEHAVIOUR PATTERNEVALUTION OF CHURN PREDICTING PROCESS USING CUSTOMER BEHAVIOUR PATTERN
EVALUTION OF CHURN PREDICTING PROCESS USING CUSTOMER BEHAVIOUR PATTERNIRJET Journal
 
Data mining and business intelligence
Data mining and business intelligenceData mining and business intelligence
Data mining and business intelligencechirag patil
 
A LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMININGA LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMININGCarrie Romero
 

Similar to Data Mining in Telecommunication Industry (20)

A Survey on Data Mining
A Survey on Data MiningA Survey on Data Mining
A Survey on Data Mining
 
ii mca juno
ii mca junoii mca juno
ii mca juno
 
IRJET- Fault Detection and Prediction of Failure using Vibration Analysis
IRJET-	 Fault Detection and Prediction of Failure using Vibration AnalysisIRJET-	 Fault Detection and Prediction of Failure using Vibration Analysis
IRJET- Fault Detection and Prediction of Failure using Vibration Analysis
 
Automated Feature Selection and Churn Prediction using Deep Learning Models
Automated Feature Selection and Churn Prediction using Deep Learning ModelsAutomated Feature Selection and Churn Prediction using Deep Learning Models
Automated Feature Selection and Churn Prediction using Deep Learning Models
 
Proposed ranking for point of sales using data mining for telecom operators
Proposed ranking for point of sales using data mining for telecom operatorsProposed ranking for point of sales using data mining for telecom operators
Proposed ranking for point of sales using data mining for telecom operators
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applications
 
Overview of Data Mining
Overview of Data MiningOverview of Data Mining
Overview of Data Mining
 
Study of Data Mining Methods and its Applications
Study of  Data Mining Methods and its ApplicationsStudy of  Data Mining Methods and its Applications
Study of Data Mining Methods and its Applications
 
Data mining by_ashok
Data mining by_ashokData mining by_ashok
Data mining by_ashok
 
Data Mining: What is Data Mining?
Data Mining: What is Data Mining?Data Mining: What is Data Mining?
Data Mining: What is Data Mining?
 
IRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom IndustryIRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom Industry
 
Full Paper: Analytics: Key to go from generating big data to deriving busines...
Full Paper: Analytics: Key to go from generating big data to deriving busines...Full Paper: Analytics: Key to go from generating big data to deriving busines...
Full Paper: Analytics: Key to go from generating big data to deriving busines...
 
An efficient data pre processing frame work for loan credibility prediction s...
An efficient data pre processing frame work for loan credibility prediction s...An efficient data pre processing frame work for loan credibility prediction s...
An efficient data pre processing frame work for loan credibility prediction s...
 
EVALUTION OF CHURN PREDICTING PROCESS USING CUSTOMER BEHAVIOUR PATTERN
EVALUTION OF CHURN PREDICTING PROCESS USING CUSTOMER BEHAVIOUR PATTERNEVALUTION OF CHURN PREDICTING PROCESS USING CUSTOMER BEHAVIOUR PATTERN
EVALUTION OF CHURN PREDICTING PROCESS USING CUSTOMER BEHAVIOUR PATTERN
 
Abstract
AbstractAbstract
Abstract
 
F035431037
F035431037F035431037
F035431037
 
Business Analytics Unit III: Developing analytical talent
Business Analytics Unit III: Developing analytical talentBusiness Analytics Unit III: Developing analytical talent
Business Analytics Unit III: Developing analytical talent
 
Data mining and business intelligence
Data mining and business intelligenceData mining and business intelligence
Data mining and business intelligence
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
A LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMININGA LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMINING
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 

Data Mining in Telecommunication Industry

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 08, 2014 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 7 Data Mining in Telecommunication Industry Hiren H Darji1 1 Assistant Professor Abstract— Telecommunication companies today are operating in highly competitive and challenging environment. Vast volume of data is generated from various operational systems and these are used for solving many business problems that required urgent handling. These data include call detail data, customer data and network data. Data Mining methods and business intelligence technology are widely used for handling the business problems in this industry. The goal of this paper is to provide a broad review of data mining concepts. Key words: Data mining, Telecommunications, Fraud Detection, Neural Networks, Churn management I. INTRODUCTION The concept of Data Mining has gained a common market acceptance. Telecommunication is one of the most data intensive industries in the world. One of the first industries to accept Data Mining is the telecommunications. Companies in the telecom industry are making use of Data Mining technologies to improve their marketing techniques, for identification of customer fraud and for the better management of their networks.[1] Most of the telecom companies have realized that the vast volume of data they collect and possess could be effectively utilized for solving their business problems by converting them into information and knowledge. Data Mining can be viewed as a technique automatically generating this knowledge from the data available. One of the first industry to experience the benefits from the application if Business Intelligence (BI) and Data Mining technologies in the telecommunications industry. [1] II. DATA MINING: AN OVERVIEW A. Definition “Data mining” is defined as a sophisticated data search capability that uses statistical algorithms to discover patterns and correlations in data. Data mining finds and extracts knowledge (“data pieces”) hidden in corporate data warehouses, or information that visitors have dropped on a website, most of which can lead to improvements in the understanding and use of the data. Data mining discovers patterns and relationships hidden in data, and is actually part of a larger process called “knowledge discovery” which describes the steps that must be taken to ensure meaningful results. Data mining helps business analysts to generate suggestions, but it does not validate the hypotheses. [7] B. The evolution of data mining Data mining techniques are the result of a long research and product development process. The origin of data mining lies with the first storage of data on computers continues with improvements in data access, until today technology allows users to navigate through data in real time. In the evolution from business data to useful information, each step is built on the previous ones. [7] C. Data mining techniques Data mining tools take data and construct a representation of reality in the form of a model. The resulting model describes patterns and relationships present in the data. From a process orientation, data mining activities fall into three general categories [7] 1) Discovery: The process of looking in a database to find hidden patterns without a fixed idea or hypothesis about what the patterns may be. 2) Predictive Modeling: The process of taking patterns discovered from the database and using them to predict the future. 3) Forensic Analysis: The process of applying the extracted patterns to find strange or unusual data elements. Data mining is used to construct six types of models expected at solving business problems: classification, regression, time series, clustering, association analysis, and sequence discovery. The first two, classification and regression, are used to make predictions, while association and sequence discovery are used to describe behavior. Clustering can be used for either forecasting or description. III. TYPES OF TELECOMMUNICATION DATA The different kinds of data used in this industry are mainly grouped into 3 different types. A. Call detail data This is the information about the call, which stores as the call detail record. The number of call detail records generated is huge since every call is placed on the network, the details are stored. Call detail record includes information like making and ending phone numbers, date, time and duration of call. Usually these call detail records are not directly used for Data Mining. A list of features can be generated from the call detail data such as [1]  Average call duration  Average number of call created per day  Average number of call received per day  Percentage of no-answer calls
  • 2. Data Mining in Telecommunication Industry (IJSRD/Vol. 2/Issue 08/2014/002) All rights reserved by www.ijsrd.com 8  Percentage of day time calls  Percentage of weekday calls B. Network data Telecommunication networks contain thousands of components, which are interconnected. These components are capable of generating error and status messages which leads to a large volume of network data. These network data are used for network management functions like fault detection. Expert systems have been developed to analysis these messages automatically, since the huge volume of network messages generated cannot be handles by technicians. Hence Data Mining technologies are used in identification of network faults by automatically extracting knowledge from network data. Network data is also generated in real time which can be accomplished by applying a time window to the data. [1] C. Customer data Like any other business, telecommunication companies also have millions customers. Hence it is very much essential to have a database for storing the information about these customers. Information about the customer will include:  Name of the customer  Address details  Payment history  Service plan and so on Group customer data is used to provide call detail data in order to identify fraud. [1] IV. CHURN PREDICTION - PROBLEM DESCRIPTION In a business environment, the term, customer attrition simply refers to the customers leaving one business service to another. Customer churn or subscriber churn is also similar to attrition, which is the process of customers switching from One service provider to another anonymously. From a machine learning perspective, churn prediction is a managed problem defined as follows: Given a predefined forecast horizon, the goal is to predict the future churners over that horizon, given the data associated with each subscriber in the network. The churn prediction problem represented here involves 3 phases, namely, I) training phase, ii) test phase, iii) prediction phase. The input for this problem includes the data on past calls for each mobile subscriber, together with all personal and business information that is maintained by the service provider. In addition, for the training phase, labels are provided in the form of a list of churners. After the model is trained with highest accuracy, the model must be able to predict the list of churners from the real dataset which does not include any churn label. In the viewpoint of knowledge discovery process, this problem is categorized as predictive mining or predictive modeling. Churn Prediction is a occurrence which is used to identify the possible churners in advance before they leave the network. This helps the CRM department to prevent subscribers who are likely to churn in future by taking the required retention policies to attract the likely churners and to retain them. Thereby, the potential loss of the company could be avoided. This study utilizes data mining techniques to identify the churners. [3] V. METHODOLOGY KDD (Knowledge Discovery in Databases) is defined as the “nontrivial process of identifying valid, novel, potentially useful and ultimately understandable patterns of in data”. The first step in predictive modeling is the acquisition and preparation of data. Having the correct data is as important as having the correct method. [3] A. Data Acquisition It is a difficult problem for the researchers to acquire the actual dataset from the telecom industries. This is because the customer’s private details may be misused. Since churn prediction models requires the past history or the usage behavior of customers during a specific period of time to predict their behavior in the near future, they cannot be applied directly to the actual dataset. Therefore, it is the usual practice to perform some kind of aggregation on the dataset. During the process of aggregation, in addition to the actual variables, new variables will be generated which display the periodic consuming behavior of the customers. These variables have vital information to be used by the prediction models in forecasting the behavior of customers in advance. The dataset used here was aggregated for 6 months duration. B. Data Preparation In data mining problems, data preparation consumes considerable amount of time. In the data preparation phase, data is collected, integrated and cleaned. Integration of data may require extraction of data from multiple sources. Once the data has been arranged in tabular form, it needs to be fully characterized. Data needs to be cleaned by resolving any ambiguities, errors. Also redundant and problematic data items are to be removed at this stage. C. Derived Variables Derived variables are new variables based on original variables. The most effective derived variables are those that represent something in the real world, such as a description of some original customer behavior. There are some general classes of derived variables, like total values, average values, and ratios. Some examples are:  The average number of calls in last 6 months  The average number of late in last 6 months  The ratio of incoming and outgoing calls  Average payment amount for last six months  Average late count in last 6 months D. Variable Extraction The selected variables are grouped under 4 categories and are described below 1) Customer Demography:  Age: It is found that the customers between the age group of 45 – 48 have high probability to churn.  Line_Tenure: Customers with 25 – 30 months of tenure period are about to churn.  Customer_Class : Generally the churn probability of the corporate account holders is high. This is due to the fact that their account will be maintained by the company and customers who
  • 3. Data Mining in Telecommunication Industry (IJSRD/Vol. 2/Issue 08/2014/002) All rights reserved by www.ijsrd.com 9 quit the company would churn. The Customer Class can be any one of VIP /Individual/Corporate.  Days_to_Contract_Expiry: Most of the customers would subscribe to a new service with the intention Acquiring new HAND_SET. These people would leave the network after the contract expires. 2) Bill and Payment  Average_Bill_Amount  Avg_Pay_Amount  Overdue_Payment_Count 3) Call Detail Record  Avg_Min_OB: If the average out bound call is less than 168 minutes they will churn.  Tot_Past_Delink: If the count of total past delink is greater than 3 then they will churn.  Tot_Dis_Int: If the customers who make more number of distinct international calls then they will churn. If the count is greater than 6 they may churn. VI. CONCLUSION Data Mining play a significant role in the telecommunication industry due to the availability of large volume of data and the rigorous competition in the sector. The primary application areas include marketing and Customer Relationship Management, Fraud detection and Network Management. The recent developments in the Data Mining and the implementation and enhancement of existing techniques and methods ensure the continuous growth and compatibility of telecommunication companies that make use of them. REFERENCES [1] Madhuri V. Joseph, “Data Mining and Business Intelligence Applications in Telecommunication Industry”. [2] D. Ćamilović*, “DATA MINING AND CRM IN TELECOMMUNICATIONS”. [3] V. Umayaparvathi, K. Iyakutti, “Applications of Data Mining Techniques in Telecom Churn Prediction “. [4] Khalida binti Oseman, Sunarti binti Mohd Shukor, Norazrina Abu Haris, Faizin bin Abu Bakar, “Data Mining in Churn Analysis Model for Telecommunication Industry”. [5] N.Kamalraj, Dr.A.Malathi, “Applying Data Mining Techniques in Telecom Churn Prediction”. [6] Wiktor Daszczuk, Piotr Gawrysiak, Tomasz Gerszberg, “Data Mining for Technical Operation of Telecommunications Companies: a Case Study”. [7] Anita B. Desai, Dr. Ravindra Deshmukh, “Data mining techniques for Fraud Detection”. [8] Pareek, D.: Business Intelligence for Telecommunications. Auerbach Publications, Taylor & Francis Group LLC. (2007). [9] Yu-Teng Chang, “Applying Data Mining To Telecom Churn Management”, IJRIC, 2009 67 – 77.