Telecommunication is very important as it serves various activities, services of electronic systems to transmit messages via physical cables, telephones, or cell phones. The two main factors that affect the growth of telecommunications are the rapid growth of modern technology and the market demand and its competition. These two factors in return, create new technologies and products, which open a series of options and offers to customers, in order to satisfy their needs and requirements. However, one crucial problem that commercial companies in general and telecommunication in particular, suffer from is a loss of valuable customers to competitors; this is called customer churn prediction. In this paper, the dynamic training technique is introduced. The dynamic training is used to improve the prediction of performance. This technique is based on two ANN network configurations to minimise the total error of the network to predict two different classes; names churn and non-customers.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...ijaia
In the era of the fourth industrial revolution, measuring and ensuring the reliability, efficiency and safety of the industrial systems and components are one of the uppermost key concern. In addition, predicting performance degradation or remaining useful life (RUL) of an equipment over time based on its historical sensor data enables companies to greatly reduce their maintenance cost. In this way, companies can prevent costly unexpected breakdown and become more profitable and competitive in the marketplace. This paper introduces a deep learning-based method by combining CNN(Convolutional Neural Networks) and LSTM (Long Short-Term Memory)neural networks to predict RUL for industrial equipment. The proposed method does not depend upon any degradation trend assumptions and it can learn complex temporal representative and distinguishing patterns in the sensor data. In order to evaluate the efficiency and effectiveness of the proposed method, we evaluated it on two different experiment: RUL estimation and predicting the status of the IoT devices in 2-week period. Experiments are conducted on a publicly available NASA’s turbo fan-engine dataset. Based on the experiment results, the deep learning-based approach achieved high prediction accuracy. Moreover, the results show that the method outperforms standard well-accepted machine learning algorithms and accomplishes competitive performance when compared to the state-of-the art methods
Improving face recognition by artificial neural network using principal compo...TELKOMNIKA JOURNAL
The face-recognition system is among the most effective pattern recognition and image analysis techniques. This technique has met great attention from academic and industrial fields because of its extensive use in detecting the identity of individuals for monitoring systems, security and many other practical fields. In this paper, an effective method of face recognition was proposed. Ten person's faces images were selected from ORL dataset, for each person (42) image with total of (420) images as dataset. Features are extracted using principle component analysis PCA to reduce the dimensionality of the face images. Four models where created, the first one was trained using feed forward back propagation learning (FFBBL) with 40 features, the second was trained using 50 features with FFBBL, the third was trained using the same features but using Elman Neural Network. For each person (24) image used as training set for the neural networks, while the remaining images used as testing set. The results showed that the proposed method was effective and highly accurate. FFBBL give accuracy of (98.33,97.14) with (40, 50) features respectively, while Elman gives (98.33, 98.80) for with (40, 50) features respectively.
Throughput in cooperative wireless networksjournalBEEI
Cognitive radio networks emerge as a solution to fixed allocation issues and spectrum scarcity through the dynamic access to spectrum. In cognitive networks, users must make intelligent decisions based on spectrum variation and actions taken by other users. Under this dynamic, cooperative systems can significantly improve quality of service parameters. This article presents the comparative study of the multi-criteria decision-making algorithms SAW and FFAHP through four levels of cooperation (10%, 20%, 50%, 80% y 100%) established between secondary users. The results show the performance evaluation obtained through of simulations and experimental measurements. The analysis is carried out based on throughput, depending on the class of service and the type of traffic.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...ijaia
In the era of the fourth industrial revolution, measuring and ensuring the reliability, efficiency and safety of the industrial systems and components are one of the uppermost key concern. In addition, predicting performance degradation or remaining useful life (RUL) of an equipment over time based on its historical sensor data enables companies to greatly reduce their maintenance cost. In this way, companies can prevent costly unexpected breakdown and become more profitable and competitive in the marketplace. This paper introduces a deep learning-based method by combining CNN(Convolutional Neural Networks) and LSTM (Long Short-Term Memory)neural networks to predict RUL for industrial equipment. The proposed method does not depend upon any degradation trend assumptions and it can learn complex temporal representative and distinguishing patterns in the sensor data. In order to evaluate the efficiency and effectiveness of the proposed method, we evaluated it on two different experiment: RUL estimation and predicting the status of the IoT devices in 2-week period. Experiments are conducted on a publicly available NASA’s turbo fan-engine dataset. Based on the experiment results, the deep learning-based approach achieved high prediction accuracy. Moreover, the results show that the method outperforms standard well-accepted machine learning algorithms and accomplishes competitive performance when compared to the state-of-the art methods
Improving face recognition by artificial neural network using principal compo...TELKOMNIKA JOURNAL
The face-recognition system is among the most effective pattern recognition and image analysis techniques. This technique has met great attention from academic and industrial fields because of its extensive use in detecting the identity of individuals for monitoring systems, security and many other practical fields. In this paper, an effective method of face recognition was proposed. Ten person's faces images were selected from ORL dataset, for each person (42) image with total of (420) images as dataset. Features are extracted using principle component analysis PCA to reduce the dimensionality of the face images. Four models where created, the first one was trained using feed forward back propagation learning (FFBBL) with 40 features, the second was trained using 50 features with FFBBL, the third was trained using the same features but using Elman Neural Network. For each person (24) image used as training set for the neural networks, while the remaining images used as testing set. The results showed that the proposed method was effective and highly accurate. FFBBL give accuracy of (98.33,97.14) with (40, 50) features respectively, while Elman gives (98.33, 98.80) for with (40, 50) features respectively.
Throughput in cooperative wireless networksjournalBEEI
Cognitive radio networks emerge as a solution to fixed allocation issues and spectrum scarcity through the dynamic access to spectrum. In cognitive networks, users must make intelligent decisions based on spectrum variation and actions taken by other users. Under this dynamic, cooperative systems can significantly improve quality of service parameters. This article presents the comparative study of the multi-criteria decision-making algorithms SAW and FFAHP through four levels of cooperation (10%, 20%, 50%, 80% y 100%) established between secondary users. The results show the performance evaluation obtained through of simulations and experimental measurements. The analysis is carried out based on throughput, depending on the class of service and the type of traffic.
Comparative Study of Different Techniques in Speaker Recognition: ReviewIJAEMSJORNAL
The speech is most basic and essential method of communication used by person.On the basis of individual information included in speech signals the speaker is recognized. Speaker recognition (SR) is useful to identify the person who is speaking. In recent years speaker recognition is used for security system. In this paper we have discussed the feature extraction techniques like Mel frequency cepstral coefficient (MFCC), Linear predictive coding (LPC), Dynamic time wrapping (DTW), and for classification Gaussian Mixture Models (GMM), Artificial neural network (ANN)& Support vector machine (SVM).
Comparative study between metaheuristic algorithms for internet of things wir...IJECEIAES
Wireless networks are currently used in a wide range of healthcare, military, or environmental applications. Wireless networks contain many nodes and sensors that have many limitations, including limited power, limited processing, and narrow range. Therefore, determining the coordinates of the location of a node of the unknown location at a low cost and a limited treatment is one of the most important challenges facing this field. There are many meta-heuristic algorithms that help in identifying unknown nodes for some known nodes. In this manuscript, hybrid metaheuristic optimization algorithms such as grey wolf optimization and salp swarm algorithm are used to solve localization problem of internet of things (IoT) sensors. Several experiments are conducted on every meta-heuristic optimization algorithm to compare them with the proposed method. The proposed algorithm achieved high accuracy with low error rate (0.001) and low power consumption.
Efficient power allocation method for non orthogonal multiple access 5G systemsIJECEIAES
One of the hot research topics for the upcoming 5G (fifth-generation) wireless communication networks is the non orthogonal multiple access (NOMA) systems, where it have attracted both industrial and academic fields to improve the existing spectral efficiency. In fact, the multiuser detection process for NOMA systems is largely affected by the power distribution of the received signals. In this paper, a new method has been proposed to control the transmit power among active users in one of the promising NOMA systems; the interleave division multiple access (IDMA) which has been adopted here for consideration. Unlike conventional methods, where tedious mathematical computations are required; a simple and direct method has been derived. The proposed method has been applied to IDMA system with different FEC codes. The obtained results show that the proposed method outperforms the conventional one as compared to optimal results.
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...ijwmn
Existing mobile networking systems lack the level of intelligence, scalability, and autonomous adaptability
required to optimally enable next-generation networks like 5G and beyond, which are expected to be Self -
Organizing Networks (SONs). It is anticipated that machine learning (ML) will be instrumental in designing
future “x”G SON networks with their demanding Quality of Experience (QoE) requirements. This paper
evaluates a methodology that uses supervised machine learning to predict the QoE level of the end user
experiences and uses this information to detect anomalous behavior of dysfunctional network nodes
(eNodeBs/base stations) in self-organizing mobile networks. An end-to-end network scenario is created using
the network simulator ns-3, where end users interact with a remote host that is accessed over the Internet to
run the most commonly used applications like file downloads and uploads and the resulting output is used as
a dataset to implement ML algorithms for QoE prediction and eNodeB (eNB) anomaly detection. Three ML
algorithms were implemented and compared to study their effectiveness and the scalability of the
methodology. In the test network, an accuracy score greater than 99% is achieved using the ML algorithms.
As suggested by the ns-3 simulation the use of ML for QoE prediction will help network operators understand
end-user needs and identify network elements that are failing and need attention and recovery.
Novel approach for hybrid MAC scheme for balanced energy and transmission in ...IJECEIAES
Hybrid medium access control (MAC) scheme is one of the prominent mechanisms to offer energy efficiency in wireless sensor network where the potential features for both contention-based and schedule-based approaches are mechanized. However, the review of existing hybrid MAC scheme shows many loopholes where mainly it is observed that there is too much inclusion of time-slotting or else there is an inclusion of sophisticated mechanism not meant for offering flexibility to sensor node towards extending its services for upcoming applications of it. Therefore, this manuscript introduces a novel hybrid MAC scheme which is meant for offering cost effective and simplified scheduling operation in order to balance the performance of energy efficiency along with data aggregation performance. The simulated outcome of the study shows that proposed system offers better energy consumption, better throughput, reduced memory consumption, and faster processing in contrast to existing hybrid MAC protocols.
MIM (Mobile Instant Messaging) Classification using Term Frequency-Inverse Do...IJMREMJournal
The focus of the study is based on binary sentiment classification on aspect level to develop a hybrid sentiment
classification framework of WhatsApp MIMs (Mobile Instant Messages). It has been carried out into two phases
i.e. training phase and testing phase. The training phase, 75% data is used for training dataset. Pre-processing
techniques like tokenization, removing stop words, case normalization, removing punctuation and stemming are
applied to acquire cleaner dataset to be used as input. The output is sent to the classifier after applying TF-IDF
for feature weighting. In the second phase, the classifier is trial with 25% testing dataset. Bernoulli’s Naïve
Bayesian classifier which is an improved form of traditional Naïve Bayesian classifier is used to classify
sentiments. There are 417 messages in total where 244 and 173 are classified as positive and negative
respectively. The proposed model has achieved satisfactory results up to 81.73% in comparison to base-line
classification model by getting 12 points higher accuracy i.e. 69.23%.
Implementation of miml framework using annotatedEditor IJMTER
As MIL (Multi-Instance Learning) considers only input ambiguity and MLL
(Multi-Label Learning) consider only output ambiguity, we require a framework which
consider both ambiguities together and solve the complex problems. MIML (Multi-Instance
Multi-Label) framework can solve this problem, but the implementation of MIML dataset is
more complex as it considers multiple labels and its multiple instances both together. This
research work focuses on implementation of MIML framework using 2014 annotated natural
scene image dataset. An image annotation task is closely related to MIML learning problem.
Multi class SVM (MSVMpack) used to handle classification of more than two classes
without depending on different decomposition methods. Bag of Regions (BoR) is used as a
bag generator which is well known framework to generate local features from images. SIFT
Scale-Invariant Feature Transform (SIFT) good descriptor can handle intensity, rotation and
scale with variations. During experiment for each image SIFT descriptors are extracted for
each shot. As a result it also provide vector of predicted labels, accuracy rate during
classification, hamming loss, one-error, coverage and R-loss after testing the model.
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueIJERA Editor
This paper presents a fuzzy type image fusion technique using Set Partitioning in Hierarchical Trees (SPIHT).
It is concluded that fusion with higher single levels provides better fusion quality. This technique can be used
for fusion of fuzzy images as well as multi model image fusion. The proposed algorithm is very simple, easy to
implement and could be used for real time applications. This is paper also provided comparatively studied
between proposed and previous existing technique and validation of the proposed algorithm as Peak Signal to
Noise Ratio (PSNR), Root Mean Square Error (RMSE).
Random Valued Impulse Noise Elimination using Neural FilterEditor IJCATR
A neural filtering technique is proposed in this paper for restoring the images extremely corrupted with random valued impulse noise. The proposed intelligent filter is carried out in two stages. In first stage the corrupted image is filtered by applying an asymmetric trimmed median filter. An asymmetric trimmed median filtered output image is suitably combined with a feed forward neural network in the second stage. The internal parameters of the feed forward neural network are adaptively optimized by training of three well known images. This is quite effective in eliminating random valued impulse noise. Simulation results show that the proposed filter is superior in terms of eliminating impulse noise as well as preserving edges and fine details of digital images and results are compared with other existing nonlinear filters.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Artificial Neural Network (ANN) is a fast-growing method which has been used in different
industries during recent years. The main idea for creating ANN which is a subset of artificial
intelligence is to provide a simple model of human brain in order to solve complex scientific and
industrial problems. ANNs are high-value and low-cost tools in modelling, simulation, control,
condition monitoring, sensor validation and fault diagnosis of different systems. It have high
flexibility and robustness in modeling, simulating and diagnosing the behavior of rotating machines
even in the presence of inaccurate input data. They can provide high computational speed for
complicated tasks that require rapid response such as real-time processing of several simultaneous
signals. ANNs can also be used to improve efficiency and productivity of energy in rotating
equipment
Have you ever get overwhelmed with the buzzwords like Business Intelligence, Big Data, Business Analytics, Data Warehouse, Data Mining, Data Visualization, Decision Support Systems, and Expert Systems? This presentation gives you a brief enlightening introduction and outlines how these technologies can help organizations earn competitive advantage.
Furthermore, the presentation explains the some important BI tools' adoption and return on investment considerations.
Comparative Study of Different Techniques in Speaker Recognition: ReviewIJAEMSJORNAL
The speech is most basic and essential method of communication used by person.On the basis of individual information included in speech signals the speaker is recognized. Speaker recognition (SR) is useful to identify the person who is speaking. In recent years speaker recognition is used for security system. In this paper we have discussed the feature extraction techniques like Mel frequency cepstral coefficient (MFCC), Linear predictive coding (LPC), Dynamic time wrapping (DTW), and for classification Gaussian Mixture Models (GMM), Artificial neural network (ANN)& Support vector machine (SVM).
Comparative study between metaheuristic algorithms for internet of things wir...IJECEIAES
Wireless networks are currently used in a wide range of healthcare, military, or environmental applications. Wireless networks contain many nodes and sensors that have many limitations, including limited power, limited processing, and narrow range. Therefore, determining the coordinates of the location of a node of the unknown location at a low cost and a limited treatment is one of the most important challenges facing this field. There are many meta-heuristic algorithms that help in identifying unknown nodes for some known nodes. In this manuscript, hybrid metaheuristic optimization algorithms such as grey wolf optimization and salp swarm algorithm are used to solve localization problem of internet of things (IoT) sensors. Several experiments are conducted on every meta-heuristic optimization algorithm to compare them with the proposed method. The proposed algorithm achieved high accuracy with low error rate (0.001) and low power consumption.
Efficient power allocation method for non orthogonal multiple access 5G systemsIJECEIAES
One of the hot research topics for the upcoming 5G (fifth-generation) wireless communication networks is the non orthogonal multiple access (NOMA) systems, where it have attracted both industrial and academic fields to improve the existing spectral efficiency. In fact, the multiuser detection process for NOMA systems is largely affected by the power distribution of the received signals. In this paper, a new method has been proposed to control the transmit power among active users in one of the promising NOMA systems; the interleave division multiple access (IDMA) which has been adopted here for consideration. Unlike conventional methods, where tedious mathematical computations are required; a simple and direct method has been derived. The proposed method has been applied to IDMA system with different FEC codes. The obtained results show that the proposed method outperforms the conventional one as compared to optimal results.
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...ijwmn
Existing mobile networking systems lack the level of intelligence, scalability, and autonomous adaptability
required to optimally enable next-generation networks like 5G and beyond, which are expected to be Self -
Organizing Networks (SONs). It is anticipated that machine learning (ML) will be instrumental in designing
future “x”G SON networks with their demanding Quality of Experience (QoE) requirements. This paper
evaluates a methodology that uses supervised machine learning to predict the QoE level of the end user
experiences and uses this information to detect anomalous behavior of dysfunctional network nodes
(eNodeBs/base stations) in self-organizing mobile networks. An end-to-end network scenario is created using
the network simulator ns-3, where end users interact with a remote host that is accessed over the Internet to
run the most commonly used applications like file downloads and uploads and the resulting output is used as
a dataset to implement ML algorithms for QoE prediction and eNodeB (eNB) anomaly detection. Three ML
algorithms were implemented and compared to study their effectiveness and the scalability of the
methodology. In the test network, an accuracy score greater than 99% is achieved using the ML algorithms.
As suggested by the ns-3 simulation the use of ML for QoE prediction will help network operators understand
end-user needs and identify network elements that are failing and need attention and recovery.
Novel approach for hybrid MAC scheme for balanced energy and transmission in ...IJECEIAES
Hybrid medium access control (MAC) scheme is one of the prominent mechanisms to offer energy efficiency in wireless sensor network where the potential features for both contention-based and schedule-based approaches are mechanized. However, the review of existing hybrid MAC scheme shows many loopholes where mainly it is observed that there is too much inclusion of time-slotting or else there is an inclusion of sophisticated mechanism not meant for offering flexibility to sensor node towards extending its services for upcoming applications of it. Therefore, this manuscript introduces a novel hybrid MAC scheme which is meant for offering cost effective and simplified scheduling operation in order to balance the performance of energy efficiency along with data aggregation performance. The simulated outcome of the study shows that proposed system offers better energy consumption, better throughput, reduced memory consumption, and faster processing in contrast to existing hybrid MAC protocols.
MIM (Mobile Instant Messaging) Classification using Term Frequency-Inverse Do...IJMREMJournal
The focus of the study is based on binary sentiment classification on aspect level to develop a hybrid sentiment
classification framework of WhatsApp MIMs (Mobile Instant Messages). It has been carried out into two phases
i.e. training phase and testing phase. The training phase, 75% data is used for training dataset. Pre-processing
techniques like tokenization, removing stop words, case normalization, removing punctuation and stemming are
applied to acquire cleaner dataset to be used as input. The output is sent to the classifier after applying TF-IDF
for feature weighting. In the second phase, the classifier is trial with 25% testing dataset. Bernoulli’s Naïve
Bayesian classifier which is an improved form of traditional Naïve Bayesian classifier is used to classify
sentiments. There are 417 messages in total where 244 and 173 are classified as positive and negative
respectively. The proposed model has achieved satisfactory results up to 81.73% in comparison to base-line
classification model by getting 12 points higher accuracy i.e. 69.23%.
Implementation of miml framework using annotatedEditor IJMTER
As MIL (Multi-Instance Learning) considers only input ambiguity and MLL
(Multi-Label Learning) consider only output ambiguity, we require a framework which
consider both ambiguities together and solve the complex problems. MIML (Multi-Instance
Multi-Label) framework can solve this problem, but the implementation of MIML dataset is
more complex as it considers multiple labels and its multiple instances both together. This
research work focuses on implementation of MIML framework using 2014 annotated natural
scene image dataset. An image annotation task is closely related to MIML learning problem.
Multi class SVM (MSVMpack) used to handle classification of more than two classes
without depending on different decomposition methods. Bag of Regions (BoR) is used as a
bag generator which is well known framework to generate local features from images. SIFT
Scale-Invariant Feature Transform (SIFT) good descriptor can handle intensity, rotation and
scale with variations. During experiment for each image SIFT descriptors are extracted for
each shot. As a result it also provide vector of predicted labels, accuracy rate during
classification, hamming loss, one-error, coverage and R-loss after testing the model.
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueIJERA Editor
This paper presents a fuzzy type image fusion technique using Set Partitioning in Hierarchical Trees (SPIHT).
It is concluded that fusion with higher single levels provides better fusion quality. This technique can be used
for fusion of fuzzy images as well as multi model image fusion. The proposed algorithm is very simple, easy to
implement and could be used for real time applications. This is paper also provided comparatively studied
between proposed and previous existing technique and validation of the proposed algorithm as Peak Signal to
Noise Ratio (PSNR), Root Mean Square Error (RMSE).
Random Valued Impulse Noise Elimination using Neural FilterEditor IJCATR
A neural filtering technique is proposed in this paper for restoring the images extremely corrupted with random valued impulse noise. The proposed intelligent filter is carried out in two stages. In first stage the corrupted image is filtered by applying an asymmetric trimmed median filter. An asymmetric trimmed median filtered output image is suitably combined with a feed forward neural network in the second stage. The internal parameters of the feed forward neural network are adaptively optimized by training of three well known images. This is quite effective in eliminating random valued impulse noise. Simulation results show that the proposed filter is superior in terms of eliminating impulse noise as well as preserving edges and fine details of digital images and results are compared with other existing nonlinear filters.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Artificial Neural Network (ANN) is a fast-growing method which has been used in different
industries during recent years. The main idea for creating ANN which is a subset of artificial
intelligence is to provide a simple model of human brain in order to solve complex scientific and
industrial problems. ANNs are high-value and low-cost tools in modelling, simulation, control,
condition monitoring, sensor validation and fault diagnosis of different systems. It have high
flexibility and robustness in modeling, simulating and diagnosing the behavior of rotating machines
even in the presence of inaccurate input data. They can provide high computational speed for
complicated tasks that require rapid response such as real-time processing of several simultaneous
signals. ANNs can also be used to improve efficiency and productivity of energy in rotating
equipment
Have you ever get overwhelmed with the buzzwords like Business Intelligence, Big Data, Business Analytics, Data Warehouse, Data Mining, Data Visualization, Decision Support Systems, and Expert Systems? This presentation gives you a brief enlightening introduction and outlines how these technologies can help organizations earn competitive advantage.
Furthermore, the presentation explains the some important BI tools' adoption and return on investment considerations.
Temporary and Permanent Waterline ServicesPaul Kanouff
In addition to the services we have provided for years, we are now designing and sizing waterlines and pumps. CEC designs waterlines to increase system efficiency and reduce construction and operational costs.
Start-Up School 101: Lessons For Big BrandsLeigh Himel
Big brands have a lot of things that they can learn from start-ups that have marketing budgets of zero and focus on engagement and community. These are some of the most important lessons.
Integration of a Predictive, Continuous Time Neural Network into Securities M...Chris Kirk, PhD, FIAP
This paper describes recent development and test implementation of a continuous time recurrent neural network that has been configured to predict rates of change in securities. It presents outcomes in the
context of popular technical analysis indicators and highlights the potential impact of continuous predictive capability on securities
market trading operations.
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...IJECEIAES
Cloud Computing is the most powerful computing model of our time. While the major IT providers and consumers are competing to exploit the benefits of this computing model in order to thrive their profits, most of the cloud computing platforms are still built on operating systems that uses basic CPU (Core Processing Unit) scheduling algorithms that lacks the intelligence needed for such innovative computing model. Correspdondingly, this paper presents the benefits of applying Artificial Neural Networks algorithms in regards to enhancing CPU scheduling for Cloud Computing model. Furthermore, a set of characteristics and theoretical metrics are proposed for the sake of comparing the different Artificial Neural Networks algorithms and finding the most accurate algorithm for Cloud Computing CPU Scheduling.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An intrusion detection algorithm for amiIJCI JOURNAL
Nowadays, using the smart metering devices for energy users to manage a wide variety of subscribers,
reading devices for measuring, billing, disconnection and connection of subscribers’ connection
management is an important issue. The performance of these intelligent systems is based on information
transfer in the context of information technology, so reported data from network should be managed to
avoid the malicious activities that including the issues that could affect the quality of service the system. In
this paper for control of the reported data and to ensure the veracity of the obtained information, using
intrusion detection system is proposed based on the support vector machine and principle component
analysis (PCA) to recognize and identify the intrusions and attacks in the smart grid. Here, the operation of
intrusion detection systems for different kernel of SVM when using support vector machine (SVM) and PCA
simultaneously is studied. To evaluate the algorithm, based on data KDD99, numerical simulation is done
on five different kernels for an intrusion detection system using support vector machine with PCA
simultaneously. Also comparison analysis is investigated for presented intrusion detection algorithm in
terms of time - response, rate of increase network efficiency and increase system error and differences in
the use or lack of use PCA. The results indicate that correct detection rate and the rate of attack error
detection have best value when PCA is used, and when the core of algorithm is radial type, in SVM
algorithm reduces the time for data analysis and enhances performance of intrusion detection.
Artificial intelligence based pattern recognition is
one of the most important tools in process control to identify
process problems. The objective of this study was to
evaluate the relative performance of a feature-based
Recognizer compared with the raw data-based recognizer.
The study focused on recognition of seven commonly
researched patterns plotted on the quality chart. The
artificial intelligence based pattern recognizer trained using
the three selected statistical features resulted in significantly
better performance compared with the raw data-based
recognizer.
Techniques to Apply Artificial Intelligence in Power Plantsijtsrd
In todays world, we are experiencing tremendous growth in the research and application of Artificial intelligence. Power plants are a vast sector where there is a scope of using AI to rectify the faults and optimize the overall running of the plants. The use of AI will help in reducing human dependence, and during a breakdown, will assist in rectifying the problem by determining the cause quickly. This paper focusses on proposing numerous methods to implement AI in various power plants and how it will help in the same. Anshika Gupta "Techniques to Apply Artificial Intelligence in Power Plants" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33050.pdf Paper Url :https://www.ijtsrd.com/engineering/information-technology/33050/techniques-to-apply-artificial-intelligence-in-power-plants/anshika-gupta
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
The automotive industry requires an automated system to sort different sizes and shapes
objects, images which are the mainly used component in the industry, to improve the overall
productivity. There are things at which humans are still way ahead of the machines in terms of
efficiency one of such thing is the recognition especially pattern recognition. There are several
methods which are tested for giving the machines the intelligence in efficient way for pattern
recognition purpose. The artificial neural network is one of the most optimization techniques used
for training the networks for efficient recognition. Computer vision is the science and technology of
machines that can see. The machine is made by integration of many parts to extract information from
an image in order to solve some task. Principle component analysis is a technique that will be
suitably used for the application purpose for sorting, inspection, fault diagnosis in various field.
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...Kashif Mehmood
Short Term Load Forecasting (STLF) can predict load from several minutes to week plays
the vital role to address challenges such as optimal generation, economic scheduling, dispatching and
contingency analysis. This paper uses Multi-Layer Perceptron (MLP) Artificial Neural Network
(ANN) technique to perform STFL but long training time and convergence issues caused by bias,
variance and less generalization ability, unable this algorithm to accurately predict future loads. This
issue can be resolved by various methods of Bootstraps Aggregating (Bagging) (like disjoint
partitions, small bags, replica small bags and disjoint bags) which helps in reducing variance and
increasing generalization ability of ANN. Moreover, it results in reducing error in the learning process
of ANN. Disjoint partition proves to be the most accurate Bagging method and combining outputs of
this method by taking mean improves the overall performance. This method of combining several
predictors known as Ensemble Artificial Neural Network (EANN) outperform the ANN and Bagging
method by further increasing the generalization ability and STLF accuracy.
AN IMPROVED METHOD FOR IDENTIFYING WELL-TEST INTERPRETATION MODEL BASED ON AG...IAEME Publication
This paper presents an approach based on applying an aggregated predictor formed by multiple versions of a multilayer neural network with a back-propagation optimization algorithm for helping the engineer to get a list of the most appropriate well-test interpretation models for a given set of pressure/ production data. The proposed method consists of three stages: (1) data decorrelation through principal component analysis to reduce the covariance between the variables and the dimension of the input layer in the artificial neural network, (2) bootstrap replicates of the learning set where the data is repeatedly sampled with a random split of the data into train sets and using these as new learning sets, and (3) automatic reservoir model identification through aggregated predictor formed by a plurality vote when predicting a new class. This method is described in detail to ensure successful replication of results. The required training and test dataset were generated by using analytical solution models. In our case, there were used 600 samples: 300 for training, 100 for cross-validation, and 200 for testing. Different network structures were tested during this study to arrive at optimum network design. We notice that the single net methodology always brings about confusion in selecting the correct model even though the training results for the constructed networks are close to 1. We notice also that the principal component analysis is an effective strategy in reducing the number of input features, simplifying the network structure, and lowering the training time of the ANN. The results obtained show that the proposed model provides better performance when predicting new data with a coefficient of correlation approximately equal to 95% Compared to a previous approach 80%, the combination of the PCA and ANN is more stable and determine the more accurate results with lesser computational complexity than was feasible previously. Clearly, the aggregated predictor is more stable and shows less bad classes compared to the previous approach.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Similar to Classification of Churn and non-Churn Customers in Telecommunication Companies (20)
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Classification of Churn and non-Churn Customers in Telecommunication Companies
1. Tarik Rashid
International Journal of Biometrics and Bioinformatics (IJBB), Volume 3, Issue 5 82
Classification of Churn and non-Churn Customers for
Telecommunication Companies
Tarik Rashid tarik@cct.ie
Computing Faculty/Research and Development Department
College of Computer Training (CCT)
102-103 Amiens Street, Dublin1, Ireland
Abstract
Telecommunication is very important as it serves various processes, using of
electronic systems to transmit messages via physical cables, telephones, or cell
phones. The two main factors that affect the vitality of telecommunications are
the rapid growth of modern technology and the market demand and its
competition. These two factors in return create new technologies and products,
which open a series of options and offers to customers, in order to satisfy their
needs and requirements. However, one crucial problem that commercial
companies in general and telecommunication companies in particular suffer from
is a loss of valuable customers to competitors; this is called customer-churn
prediction. In this paper the dynamic training technique is introduced. Dynamic
training is used to improve the prediction of performance. This technique is
based on two ANN network configurations to minimise the total error of the
network to predict two different classes: namely churn and non-customers.
Keywords: Artificial Neural Network, Classification, Prediction, Dynamic Training, Telecommunication.
1. INTRODUCTION
The telecommunication industry is volatile and rapidly growing, in terms of the market dynamicity
and competition. In return, it creates new technologies and products, which open a series of
options and offers to customers in order to satisfy their needs and requirements [1, 2]. However,
one crucial problem that commercial companies in general and telecommunication companies in
particular suffer from is a loss of valuable customers to competitors; this is called customer-churn
prediction. A customer who leaves a carrier in favor of competitor costs a carrier more than if it
gained a new customer [1].
Therefore, “customer-churn prediction” can be seen as one of the most imperative problems that
the telecommunication companies face in general. To tackle this problem one needs to
understand the behavior of customers, and classify the churn and non-churn customers, so that
the necessary decisions will be taken before the churn customers switch to a competitor. More
precisely, the goal is to build up an adaptive and dynamic data-mining model in order to efficiently
understand the system behavior and allow time to make the right decisions. This will also replace
deficiencies of previous work and existing techniques, which are very expensive and time
consuming, this problem is studied in the field of telephony with different techniques such as
Hidden Markov Model [3], Gaussian and mixture and Bayesian networks [4], association rules [5]
decision trees and neural networks [1].
2. Tarik Rashid
International Journal of Biometrics and Bioinformatics (IJBB), Volume 3, Issue 5 83
In the last two decades, machine learning techniques [6] have been widely used in many different
scientific fields.
Artificial Neural Network [7] is a very popular type of machine learning and it can be considered
as another model that is based on modern mathematical concepts. Artificial neural computations
are designed to carry out tasks such as pattern recognition, prediction and classification. The
performance of this type of machine learning depends on the learning algorithm and the given
application, the accuracy of the modeling and structure of each model. The most popular type of
learning algorithm for the feed forward neural network is the back propagation algorithm.
The reason for the selection of the feed forward neural network with back propagation learning
algorithm is mainly because the network is faster than some other types of network, such as a
recurrent neural network. This network has a context layer which copies and stores the hidden
neuron activations that can be fed along with the inputs back to the hidden neurons in an iterative
manner [8]. On the one hand the context layer (memory) will add more accuracy to the network,
than feed forward neural network. On the other hand the network will need more time to learn
when it is fed with large training data sets and enormous input features. The feed forward neural
network is used as a trade off technique to solve the customer churn and non churn prediction
problem.
In the next section the architecture of the artificial neural networks is explained, and then the back
propagation algorithm is outlined. Dynamic training is then introduced, after that simulation and
results are presented, and finally the main points are concluded.
2. METHODS: NEURAL NETWORK ARCHITECTURE
A standard feed forward ANN architecture is used in this paper. This is a fully connected feed
forward neural network also called Multi Layer Perceptron (MLP). The network has three layers
input, hidden, and output as shown in Fig 1.
For supervised learning networks, there are several learning techniques that are widely used by
researchers. The main three are: real time, back propagation, and back propagation through time,
back propagation being what is used here [8, 9, 10] in this paper depending on the application.
FIGURE 1: Standard feed forward neural network.
3. Tarik Rashid
International Journal of Biometrics and Bioinformatics (IJBB), Volume 3, Issue 5 84
3. LEARNING ALGORITHM: BACK PROPAGATION
The back propagation (BP) algorithm is an example of supervised learning [9, 10]. It is based on
the minimization of error by gradient descent. A new network is trained with BP. When a target
output pattern exists, the actual output pattern is computed. The gradient descent acts to adjust
each weight in the layers to reduce the error between the target and actual output patterns. The
adjustment of the weights is collected for all patterns and finally the weights are updated.
The sigmoid function is used to compute the output neurons as in equation (1).
Where represents the net input, the derivative of activation function is
The back propagation pass will find the difference between the target and actual output in the
output layer
Where and are the desired and actual outputs for neuron
Backpropagation learning defines the sum of error
)
For the output layer, the local gradient is calculated as follows:
For the hidden layer, the local gradient is calculated as follows:
The network learning algorithm adjusts the weights by using delta rule [9, 10], by calculating the
local gradients.
+
4. Tarik Rashid
International Journal of Biometrics and Bioinformatics (IJBB), Volume 3, Issue 5 85
+
When new is the current iteration and old is the previous iteration. is learning rate (0.009-
0.9999), is momentum constant.
4. DYNAMIC TRAINING
Dynamic training is introduced and used to improve the prediction performance of the classifiers.
This technique is based on two ANN network configurations. The first network is large and uses
the whole training set. After the training is done, a random portion from the training set is taken as
a testing set and presented to the network. The forecasting results of that portion are re-
organized and used as input patterns with their original targets from the trainings and then used
to train the second network; a smaller network. The termination of the learning phases is based
on the specified threshold error. Then for testing, the data of the required predicted data is
presented to the smaller network. The results of the larger network are reorganized in two inputs
to be presented to the smaller network. Bear in mind that the larger network structure will have
124-40-2 (124 input neurons, 40 neurons hidden neurons, 2 output neurons). The smaller
network configuration consists of 2–6-2.
5. Tarik Rashid
International Journal of Biometrics and Bioinformatics (IJBB), Volume 3, Issue 5 86
FIGURE 2: Figure displays dynamic training.
5. IMPLEMENTATION AND RESULTS
The prediction system can be processed as follows: obtain and analyze the historical data; pre-
processing and normalizing information; choosing the training and testing set; choosing the type
of network and its parameters; choosing a suitable learning algorithm; and finally implementation.
The prediction task mainly depends on the training and testing data sets. The size of data
selected was 13,000 samples out of a total 1,500,000 customers as neural networks have the
ability to learn and generalize.
The training and testing data sets were selected to perform the historical data. Given the nature
of our generic selection for the training set, our system is in fact able to predict any random 1000
customers that are not trained and seen by the network (see Table 1).
Population: Number of
customers
Size of the
samples
Training set Test set
1,500,000 13000 4000 customers 1000 customers
TABLE 1: Table displays the size of the historical data, training and testing patterns.
There are a lot of important features that have been taken into consideration. These features are
related to the customers of telecommunication in the historical data. The main features are the
customer’s contact data and details, customer behaviors and calls, customer’s request for
services, etc. The number of input features to the network was 124. And the number of the
output features is 2. The input features are scaled down, normalized and transformed. The
transformation involves manipulating the data input to create a single input to a neural network,
whereas the normalization is a conversion performed on a single data input to scale the data into
a suitable range for the neural network. Therefore there is no need to use binary code for the
input data. Furthermore there isn’t a strong trend in the data. All input data features are linearly
scaled and within the range of all variables which are chosen (between 0 and 1).
The number of output features is 2. The output pattern is organized in binary code as 0 1 which
represents churn customer and 1 0 represents non-churn customers (see Table 2).
Churn customer Non-churn customer
0 1 1 0
TABLE 2: displays output feature.
Two different network structures were used with different parameters for both feed forward
networks. A generic model was selected to include all the data. The first network structure was
consisted of 124-40-2 (124 input neurons, 40 hidden neurons, and 2 outputs), whereas the
second network structure has two networks, as explained in section 5; the large network was
124-40-2 and the small was 2-6-2. The hidden layer neurons were selected based on trial and
error and in tandem with each structure with each network (40 hidden neurons for the larger
structure and 6 hidden neurons for the smaller network structure). Each network structure used
relatively different network parameters. These parameters relied heavily on the size of training
and testing sets. Learning rates and momentum were varied. The training cycles were also
varied. The type of activation function was a logistic function for the hidden layer and linear for
output layer. For the ANN structures patterns of training data were trained and presented to the
network in cycles. After every cycle, the weight connection was modified and updated
automatically. The processes were iterative. It is important to mention that a specific value of
6. Tarik Rashid
International Journal of Biometrics and Bioinformatics (IJBB), Volume 3, Issue 5 87
tolerance should be declared to stop training. This threshold was chosen so that it ensured the
model fitted to the training data, and it also did not guarantee good out-of-sample performance.
The results with the first network with dynamic training technique was better than the standard
technique, the matrix confusion and matrix rate [11] for both networks were shown. Table 3
displays classification for the predicted values for both churn and non churn classes against the
actual target of the testing set. It also shows the matrix rate for prediction values for both churn
and non-churn values against the actual values. Likewise Table 4 shows results for the standard
network structure. As can be seen from Tables 3 and 4, clear misclassifications, in other words,
13 samples of churn class were misclassified and categorized as non-churn samples by the
network as seen in Table 3. The likewise with Table 4, 16 samples of churn class were
misclassified and categorized as non-churn class. We believe the reason behind this type of
misclassification is the misrepresentation of our training and testing data; in other words, the
imbalance of data sets caused this problem [11, 12, 13, 14]: as we have in our training set, the
number of non-churn class is 3782, and churn class is only 218, and in the testing data set, the
number of sample of non-churns 63, and the number of non-churn class is 937. The difference in
the results as shown in Table 3 and 4 is small enough to be not essential. Nevertheless, these
results for our relatively large sample of data are statistically significant.
matrix confusion
Actual
Predicted Churn Non-Churn
Churn 50 13
Non-Churn 0.0 937
matrix rate
Actual
Predicted Non-churn Churn
non-Churn 0.7936 0.2063
Churn 0.0 1.0
TABLE 3: Displays matrix confusion and matrix rate for the standard network with dynamic training.
matrix confusion
Actual
Predicted Churn Non-Churn
Churn 47.0 16.0
Non-Churn 0.0 937.0
7. Tarik Rashid
International Journal of Biometrics and Bioinformatics (IJBB), Volume 3, Issue 5 88
matrix rate
Actual
Predicted Non-churn Churn
non-Churn 0.7460 0.2539
Churn 0.0 1.0
TABLE 4: Displays matrix confusion and matrix rate for the standard neural network.
6 CONCLUSION
This paper deals with the problem of classification of churn and non-churn customers in
telecommunication companies. Telecommunication is very important as it provides various
services of electronic systems to transmit messages through telecommunication devices.
However, one crucial problem that commercial companies in general and telecommunication in
particular suffer from is a loss of valuable customers to competitors; this is called customer-churn
prediction. Machine learning techniques have been widely applied to solve various problems.
These machines have been showing great results in many applications. Artificial neural network
with the back propagation learning algorithm is used [7, 9, 10, 15, 16, 17]. Variant structures of
neural network are discussed. The dynamic training technique is also introduced in this paper. It
is used to improve the performance of prediction of the two classes, namely churn and non-churn
customers. This technique is based on two ANN network configurations to minimize the total error
of the network to predict two different types of customers. The artificial neural network with
dynamic training performed better than just an artificial neural network alone. The difference in
the results as shown in Table 3 and 4 is small enough to be not essential. However, these results
for our relatively large sample of data are statistically significant.
Software in Java language is implemented and used to compute the confusion and rate matrices.
The results are presented. As can be seen from our results, both networks showed clear
misclassifications. We believe the reason behind this type of misclassification is the
misrepresentation of our training and testing data. In other words, the imbalanced training and
testing data sets caused this problem. Therefore, further research work should be carried out in
order to tackle the misrepresentation of the historical data and to improve the dynamic training
technique.
7. REFERENCES
1. Mozer M.C., Dodier R., Colagrosso M.D., Guerra-Salcedo C., “Wolniewicz R., Prodding
the ROC Curve: Constrained Optimization of Classifier Performance Advances” in Neural
Information Processing Systems 14, MIT Press, 2002.
2. Cedric Archaux, H. Laanya, A. Martin and A. Khenchaf. “An SVM based Churn Detector
in Prepaid Mobile Telephony”, In IEEE. 2004.
3. Hollmen J., “User Profiling and Classification for Fraud Detection”. PhD Theses
doctorate, University of Helsinki, 2000.
4. Taniguchi M., Haft M., Hollmen J., Tresp V. “Fraud detection in communications networks
using neural and probabilistic methods”, ICCASP, Vol2, 1998, pp. 1241-1244.
8. Tarik Rashid
International Journal of Biometrics and Bioinformatics (IJBB), Volume 3, Issue 5 89
5. Rosset S., Murad U., Neumann E., Idan Y., Pinkas G., “Discovery of fraud rules for
telecommunications-challenges and solutions”, Proceedings ACM SIGKDD, 1999
6. H. Van Khuu, H.-KieLee, and J.-Liang Tsai. “Machine learning with neural networks and
support vector machines”, 2005.
7. K. Anil and J. Mao. “Artificial neural networks: A tutorial”. IEEE ComputerSociety, 29 (3),
1996, 31 - 44.
8. T. Rashid and M-T.Kechadi, ”Effective Neural Network Approach for Energy Load
Forecasting”. International Conference on Computational Intelligence, Calgary, Canada,
2005.
9. P. J. Werbos. “Backpropagation through time: What it does and how to do it”. In
Proceedings of the IEEE, volume 78, 1990, pp. 1550–1560.
10. M. Boden. “A guide to recurrent neural networks and back propagation”. The DALLAS
project. Report from the NUTEK-supported project AIS-8, SICS. Holst: Application of data
analysis with learning systems, 2001.
11. M . Hay, “The derivation of global estimates from a confusion matrix”, International
Journal of Remote Sensing, 1366-5901, Volume 9, Issue 8, 1988, pp. 1395 - 1398.
12. Zhi-Hua Zhou and Xu-Ying Liu, “On Multi-Class-Cost-Sensitive Learning”, The American
Association for Artificial Intelligence. 2006.
13. L. Breiman, J. H. Friedman (1998), R. A. Olshen and C. J. Stone, “Classfication and
Recognition Trees”, Wadsworth International Group, 1998, Belmont, CA.
14. U. Knoll, G. Nakhaeilzadeh, and B. Tausend, (1994), “Cost-sensitive pruning of decision
trees”, in Pro, ECML 1994.
15. Shanthi Dhanushkodi, G.Sahoo , Saravanan Nallaperumal “Designing an Artificial Neural
Network Model for the Prediction of Thrombo-embolic Stroke” International Journal of
Biometrics and Bioinformatics (IJBB), Volume 3, Issue 1, pp: 10-18, 2009.
16. Chien-Wen Cho, Wen-Hung Chao, You-Yin Chen “A linear-discriminant-analysis-based
approach to enhance the performance of fuzzy c-means clustering in spike sorting with
low-SNR data” International Journal of Biometrics and Bioinformatics (IJBB) Volume 1,
Issue 1, pp 1-13, 2007.
17. Aloysius George “Multi-Modal Biometrics Human Verification using LDA and DFB”
International Journal of Biometrics and Bioinformatics (IJBB) Volume 2, Issue 4, pp :1-10,
2008.