SlideShare a Scribd company logo
Prepared by –
Mohsin Nadaf, TE IT
Trinity College of Engineering & Research, Pune
Contents
 Introduction
 What is Data Mining?
 Need of Data mining in Telecommunication
 Customer Segmentation and Profiling
 Types of Telecommunication Data
 Data Preparation and Clustering
 Applications
 Conclusion
Introduction
 Fast growing Industry
 Data, the base of Telecommunication
 Generation of tremendous amount of Data
 Knowledge based Expert-System
 Use of Data Mining and its tools
 Uncovering hidden information
 Future Decisions
What is Data Mining?
 Extracting Knowledge hidden in large volumes of data
 Identifying potentially useful and understandable data

 Technical approaches like
 Clustering,
 Data summarization
 Classification
 Analyzing Changes
 Detecting anomalies
Data Mining in
Telecommunications
 To detect frauds
 To know customers
 Retain Customers
 What products and services yield highest amount of
profit?
 What are the factors that influence customers to call
more at certain times?
Customer Segmentation and
Profiling
 Customer Segmentation
-To describe the process of dividing customers into
homogeneous groups on the basis of shared or
common attributes (habits, tastes, etc).
 Difficulties :
-Relevance and quality of data
-Intuition
-Continuous process
-Over-segmentation
 Customer Profiling
-Describing customers by their attributes, such as
age, gender, income and lifestyles
 Parameters-
-Geographic
-Cultural and ethnic
-Economic conditions
-Age and Gender
-Attitudes and beliefs
-Lifestyle
-Knowledge and Awareness
Types of Telecommunication Data
 Call-Detail Data
 Network Data
 Customer Data
 Call-Detail Data
-average call duration
-average call originated/generated
-call period
-call to/from different area code
 Network Data
-Complex configuration of equipments-
-Error Generation
-To support Network Management functions
 Customer Data
-Database of information of Customers
-Name
-Age
-Address
-Telephone type
-Subscription Type
-Payment History
Data Preparation and Clustering
 Data preparation
-To be prepared in the required format
 Tasks:
Discovering and Repairing inconsistent data
format
Deleting unwanted data fields
Combining data
Mapping of values
Normalization of the variables
 Clustering
-Grouping of Similar things
 Cluster Analysis
-Organization of objects into groups, according to
similarities among them.
Applications
 Marketing/Customer Profiling
 Fraud Detection
 Network Fault Isolation
CONCLUSION
 Early adopter of Data mining technology
 To detect frauds
 Helps to know the Customer
 Serve them Better
 Yield more profit
 Reduced much of Human based analysis
 Essential for Telecommunication companies
Future Trends
 Additional themes on data mining
 New Methods for Complex types of Data
 Invisible Data mining(mining as a built in function)
 Reduction in Human work
 Advanced methods in Data mining
REFERENCES
 Data mining in Telecommunication by Gray M. Weiss,
Fordham University
 Customer Segmentation and Customer Profiling for a Mobile
Telecommunications Company Based on Usage
Behaviour, S.M.H Jansen, July 17, 2007
 IJSETT -Applications of Data Mining by Simmi Bagga and Dr.
G.N.Singh
 A new approach to classify and describe telecommunication
services, A.Lehmann1,2, W.Fuhrmann3, U.Trick1, B.Ghita²
 Sasisekharan, R., Seshadri, V., Weiss, S. Data mining and
forecasting in large-scale telecommunication networks.
IEEE Expert 1996; 11(1):37-43.
 Liked the presentation? You can download it from my
website:
http://www.thetechworld21.com/2016/04/download-
data-mining-in.html
Data mining in Telecommunications

More Related Content

What's hot

Data warehouse architecture
Data warehouse architecture Data warehouse architecture
Data warehouse architecture
janani thirupathi
 
01 Data Mining: Concepts and Techniques, 2nd ed.
01 Data Mining: Concepts and Techniques, 2nd ed.01 Data Mining: Concepts and Techniques, 2nd ed.
01 Data Mining: Concepts and Techniques, 2nd ed.
Institute of Technology Telkom
 
Data Mining
Data MiningData Mining
Data Mining
SHIKHA GAUTAM
 
Data preprocessing
Data preprocessingData preprocessing
Data preprocessing
Jason Rodrigues
 
Data mining in retail industry
Data mining in retail industryData mining in retail industry
Data mining in retail industry
MonicaRaveshanker
 
Data preprocessing in Data Mining
Data preprocessing in Data MiningData preprocessing in Data Mining
Data preprocessing in Data Mining
DHIVYADEVAKI
 
Data Warehousing and Data Mining
Data Warehousing and Data MiningData Warehousing and Data Mining
Data Warehousing and Data Mining
idnats
 
Data mining primitives
Data mining primitivesData mining primitives
Data mining primitives
lavanya marichamy
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
DataminingTools Inc
 
Application of data mining
Application of data miningApplication of data mining
Application of data mining
SHIVANI SONI
 
Data warehouse concepts
Data warehouse conceptsData warehouse concepts
Data warehouse concepts
obieefans
 
Data Warehouse Basic Guide
Data Warehouse Basic GuideData Warehouse Basic Guide
Data Warehouse Basic Guide
thomasmary607
 
Dynamic Itemset Counting
Dynamic Itemset CountingDynamic Itemset Counting
Dynamic Itemset Counting
Tarat Diloksawatdikul
 
Data mining concepts and work
Data mining concepts and workData mining concepts and work
Data mining concepts and work
Amr Abd El Latief
 
Introduction to Data Warehouse
Introduction to Data WarehouseIntroduction to Data Warehouse
Introduction to Data WarehouseShanthi Mukkavilli
 
Data mining
Data mining Data mining
Data warehousing
Data warehousingData warehousing
Data warehousing
Shruti Dalela
 
OLAP & DATA WAREHOUSE
OLAP & DATA WAREHOUSEOLAP & DATA WAREHOUSE
OLAP & DATA WAREHOUSE
Zalpa Rathod
 
Data mining: Classification and prediction
Data mining: Classification and predictionData mining: Classification and prediction
Data mining: Classification and prediction
DataminingTools Inc
 

What's hot (20)

Data warehouse architecture
Data warehouse architecture Data warehouse architecture
Data warehouse architecture
 
01 Data Mining: Concepts and Techniques, 2nd ed.
01 Data Mining: Concepts and Techniques, 2nd ed.01 Data Mining: Concepts and Techniques, 2nd ed.
01 Data Mining: Concepts and Techniques, 2nd ed.
 
Data Mining
Data MiningData Mining
Data Mining
 
Data preprocessing
Data preprocessingData preprocessing
Data preprocessing
 
Data mining in retail industry
Data mining in retail industryData mining in retail industry
Data mining in retail industry
 
Data preprocessing in Data Mining
Data preprocessing in Data MiningData preprocessing in Data Mining
Data preprocessing in Data Mining
 
Web content mining
Web content miningWeb content mining
Web content mining
 
Data Warehousing and Data Mining
Data Warehousing and Data MiningData Warehousing and Data Mining
Data Warehousing and Data Mining
 
Data mining primitives
Data mining primitivesData mining primitives
Data mining primitives
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
 
Application of data mining
Application of data miningApplication of data mining
Application of data mining
 
Data warehouse concepts
Data warehouse conceptsData warehouse concepts
Data warehouse concepts
 
Data Warehouse Basic Guide
Data Warehouse Basic GuideData Warehouse Basic Guide
Data Warehouse Basic Guide
 
Dynamic Itemset Counting
Dynamic Itemset CountingDynamic Itemset Counting
Dynamic Itemset Counting
 
Data mining concepts and work
Data mining concepts and workData mining concepts and work
Data mining concepts and work
 
Introduction to Data Warehouse
Introduction to Data WarehouseIntroduction to Data Warehouse
Introduction to Data Warehouse
 
Data mining
Data mining Data mining
Data mining
 
Data warehousing
Data warehousingData warehousing
Data warehousing
 
OLAP & DATA WAREHOUSE
OLAP & DATA WAREHOUSEOLAP & DATA WAREHOUSE
OLAP & DATA WAREHOUSE
 
Data mining: Classification and prediction
Data mining: Classification and predictionData mining: Classification and prediction
Data mining: Classification and prediction
 

Similar to Data mining in Telecommunications

Data mining and its applications!
Data mining and its applications!Data mining and its applications!
Data mining and its applications!
COSTARCH Analytical Consulting (P) Ltd.
 
Data mining
Data miningData mining
Data mining
sagar dl
 
Aanlytics on Telecom
Aanlytics on TelecomAanlytics on Telecom
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data miningNeeda Multani
 
Data Mining Xuequn Shang NorthWestern Polytechnical University
Data Mining Xuequn Shang NorthWestern Polytechnical UniversityData Mining Xuequn Shang NorthWestern Polytechnical University
Data Mining Xuequn Shang NorthWestern Polytechnical Universitybutest
 
Data Mining in Telecommunication Industry
Data Mining in Telecommunication IndustryData Mining in Telecommunication Industry
Data Mining in Telecommunication Industry
ijsrd.com
 
1. What are the business costs or risks of poor data quality Sup.docx
1.  What are the business costs or risks of poor data quality Sup.docx1.  What are the business costs or risks of poor data quality Sup.docx
1. What are the business costs or risks of poor data quality Sup.docx
SONU61709
 
Big data analytics for telecom operators final use cases 0712-2014_prof_m erdas
Big data analytics for telecom operators final use cases 0712-2014_prof_m erdasBig data analytics for telecom operators final use cases 0712-2014_prof_m erdas
Big data analytics for telecom operators final use cases 0712-2014_prof_m erdas
Prof Dr Mehmed ERDAS
 
Big data analytics for telecom operators final use cases 0712-2014_prof_m erdas
Big data analytics for telecom operators final use cases 0712-2014_prof_m erdasBig data analytics for telecom operators final use cases 0712-2014_prof_m erdas
Big data analytics for telecom operators final use cases 0712-2014_prof_m erdas
Prof Dr Mehmed ERDAS
 
Data Mining
Data MiningData Mining
Data Mining
AbinayaJawahar
 
data analytics lecture2.pptx
data analytics lecture2.pptxdata analytics lecture2.pptx
data analytics lecture2.pptx
NamrataBhatt8
 
Capturing Marketing Information to Fuel Growth
Capturing Marketing Information to Fuel GrowthCapturing Marketing Information to Fuel Growth
Capturing Marketing Information to Fuel Growth
American Marketing Association | Journals
 
Statistika dan Analisis Data
Statistika dan Analisis DataStatistika dan Analisis Data
Statistika dan Analisis Data
kisti purwitosari
 
Data Mining
Data MiningData Mining
Data Mining
SOMASUNDARAM T
 
Data mining
Data mining Data mining
Data mining
sayalipatil528
 
Data mining-basic
Data mining-basicData mining-basic
Data mining-basic
gufranresearcher
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
George Krasadakis
 
Data mining final year project in ludhiana
Data mining final year project in ludhianaData mining final year project in ludhiana
Data mining final year project in ludhiana
deepikakaler1
 
Data mining final year project in jalandhar
Data mining final year project in jalandharData mining final year project in jalandhar
Data mining final year project in jalandhar
deepikakaler1
 

Similar to Data mining in Telecommunications (20)

Data mining and its applications!
Data mining and its applications!Data mining and its applications!
Data mining and its applications!
 
Data mining
Data miningData mining
Data mining
 
Data mining
Data miningData mining
Data mining
 
Aanlytics on Telecom
Aanlytics on TelecomAanlytics on Telecom
Aanlytics on Telecom
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data mining
 
Data Mining Xuequn Shang NorthWestern Polytechnical University
Data Mining Xuequn Shang NorthWestern Polytechnical UniversityData Mining Xuequn Shang NorthWestern Polytechnical University
Data Mining Xuequn Shang NorthWestern Polytechnical University
 
Data Mining in Telecommunication Industry
Data Mining in Telecommunication IndustryData Mining in Telecommunication Industry
Data Mining in Telecommunication Industry
 
1. What are the business costs or risks of poor data quality Sup.docx
1.  What are the business costs or risks of poor data quality Sup.docx1.  What are the business costs or risks of poor data quality Sup.docx
1. What are the business costs or risks of poor data quality Sup.docx
 
Big data analytics for telecom operators final use cases 0712-2014_prof_m erdas
Big data analytics for telecom operators final use cases 0712-2014_prof_m erdasBig data analytics for telecom operators final use cases 0712-2014_prof_m erdas
Big data analytics for telecom operators final use cases 0712-2014_prof_m erdas
 
Big data analytics for telecom operators final use cases 0712-2014_prof_m erdas
Big data analytics for telecom operators final use cases 0712-2014_prof_m erdasBig data analytics for telecom operators final use cases 0712-2014_prof_m erdas
Big data analytics for telecom operators final use cases 0712-2014_prof_m erdas
 
Data Mining
Data MiningData Mining
Data Mining
 
data analytics lecture2.pptx
data analytics lecture2.pptxdata analytics lecture2.pptx
data analytics lecture2.pptx
 
Capturing Marketing Information to Fuel Growth
Capturing Marketing Information to Fuel GrowthCapturing Marketing Information to Fuel Growth
Capturing Marketing Information to Fuel Growth
 
Statistika dan Analisis Data
Statistika dan Analisis DataStatistika dan Analisis Data
Statistika dan Analisis Data
 
Data Mining
Data MiningData Mining
Data Mining
 
Data mining
Data mining Data mining
Data mining
 
Data mining-basic
Data mining-basicData mining-basic
Data mining-basic
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
Data mining final year project in ludhiana
Data mining final year project in ludhianaData mining final year project in ludhiana
Data mining final year project in ludhiana
 
Data mining final year project in jalandhar
Data mining final year project in jalandharData mining final year project in jalandhar
Data mining final year project in jalandhar
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Data mining in Telecommunications

  • 1. Prepared by – Mohsin Nadaf, TE IT Trinity College of Engineering & Research, Pune
  • 2. Contents  Introduction  What is Data Mining?  Need of Data mining in Telecommunication  Customer Segmentation and Profiling  Types of Telecommunication Data  Data Preparation and Clustering  Applications  Conclusion
  • 3. Introduction  Fast growing Industry  Data, the base of Telecommunication  Generation of tremendous amount of Data  Knowledge based Expert-System  Use of Data Mining and its tools  Uncovering hidden information  Future Decisions
  • 4. What is Data Mining?  Extracting Knowledge hidden in large volumes of data  Identifying potentially useful and understandable data 
  • 5.  Technical approaches like  Clustering,  Data summarization  Classification  Analyzing Changes  Detecting anomalies
  • 6. Data Mining in Telecommunications  To detect frauds  To know customers  Retain Customers  What products and services yield highest amount of profit?  What are the factors that influence customers to call more at certain times?
  • 7. Customer Segmentation and Profiling  Customer Segmentation -To describe the process of dividing customers into homogeneous groups on the basis of shared or common attributes (habits, tastes, etc).  Difficulties : -Relevance and quality of data -Intuition -Continuous process -Over-segmentation
  • 8.  Customer Profiling -Describing customers by their attributes, such as age, gender, income and lifestyles  Parameters- -Geographic -Cultural and ethnic -Economic conditions -Age and Gender -Attitudes and beliefs -Lifestyle -Knowledge and Awareness
  • 9. Types of Telecommunication Data  Call-Detail Data  Network Data  Customer Data  Call-Detail Data -average call duration -average call originated/generated -call period -call to/from different area code
  • 10.
  • 11.  Network Data -Complex configuration of equipments- -Error Generation -To support Network Management functions
  • 12.  Customer Data -Database of information of Customers -Name -Age -Address -Telephone type -Subscription Type -Payment History
  • 13. Data Preparation and Clustering  Data preparation -To be prepared in the required format  Tasks: Discovering and Repairing inconsistent data format Deleting unwanted data fields Combining data Mapping of values Normalization of the variables
  • 14.  Clustering -Grouping of Similar things  Cluster Analysis -Organization of objects into groups, according to similarities among them.
  • 15. Applications  Marketing/Customer Profiling  Fraud Detection  Network Fault Isolation
  • 16. CONCLUSION  Early adopter of Data mining technology  To detect frauds  Helps to know the Customer  Serve them Better  Yield more profit  Reduced much of Human based analysis  Essential for Telecommunication companies
  • 17. Future Trends  Additional themes on data mining  New Methods for Complex types of Data  Invisible Data mining(mining as a built in function)  Reduction in Human work  Advanced methods in Data mining
  • 18. REFERENCES  Data mining in Telecommunication by Gray M. Weiss, Fordham University  Customer Segmentation and Customer Profiling for a Mobile Telecommunications Company Based on Usage Behaviour, S.M.H Jansen, July 17, 2007  IJSETT -Applications of Data Mining by Simmi Bagga and Dr. G.N.Singh  A new approach to classify and describe telecommunication services, A.Lehmann1,2, W.Fuhrmann3, U.Trick1, B.Ghita²  Sasisekharan, R., Seshadri, V., Weiss, S. Data mining and forecasting in large-scale telecommunication networks. IEEE Expert 1996; 11(1):37-43.
  • 19.
  • 20.  Liked the presentation? You can download it from my website: http://www.thetechworld21.com/2016/04/download- data-mining-in.html

Editor's Notes

  1. The knowledge was obtained by Human experts which was time consuming
  2. The actual data Mining task is automatic or semi-automatic analysis of large quantities of data
  3. Anomaly- Not to be proper sequence i.e. repetition of data
  4. Having these two components marketers can decide which marketing actions should we take for each segment To compete with the other providers of mobile telecommunications it is important to know enough about customer and to his know wants and needs
  5. Call-Detail Data describe the Calling Behaviour of each customer.
  6. Network Management functions such as FAULT ISOLATION
  7. Before the data can be used for the actual data mining process, it need to cleaned and prepared in a required format.
  8. In Marketing we analyse and profile Customer Behaviour and then accordingly, the profiles are used for marketing/forecasting purpose. Telecommunication companies maintain great deal of data about their Customers. MCI- Mobile Communication International NETWORK FAULT ISOLATION- Complex Configuration Contains many elements Elements may generate millions of status that lead to
  9. Data Mining softwares- Free source- RapidMiner, Carrot2 1.Oracle Data Mining 2. IBM SPSS Modeller 3. Microsoft Analysis services