Data Mining Techniques in Telecommunication Company

Authors

  • Nazak Ahmadzai Computer Science Department, Education Faculty, Paktia University Gardiz City, Paktia, AFGHANISTAN.
  • Hameedullah Mohammadi Paktia University Computer Science Department, Education Faculty, Gardiz City, Paktia AFGHANISTAN.
  • Naqibullah Mangal Paktia University Computer Science Department, Education Faculty, Gardiz City, Paktia AFGHANISTAN.

DOI:

https://doi.org/10.55544/jrasb.2.1.12

Keywords:

Customer Churn, Fraud, Machine Learning Algorithms

Abstract

Due to emerging of amalgam amount of data from variety sources, the data mining has become a hot trend in field of Computer Science. Data mining extracts useful pattern and information from huge amount of existing data with the help of machine learning algorithms that can be helpful in solving many sophisticated problems.

Telecommunication companies also generates big amount of data from providing services to their customers, besides that telecommunication companies suffers from many problems like fraud, Customer churn and …etc.

The generated amount of data from these companies can help them to address the solution for their problems such as Customer Churn. Customer churn indicates to the event when a customer stops using the service of a company and starts to use the service of another company.

Churning of a Customer plays a vital role in having a sustainable business development for a telecommunication company since attracting new customers do not profit a company without retaining the old ones.

Data mining can address the problem by predicting the occurrence of customer churn in Telecom Company, which helps the company to be proactive in this event and can have the chance to retain them before the churn occurs.

In this study, I have chosen two open Telecom Churn data sets and have applied Support Vector Machine, Logistic Regression and Decision Tree Machine Learning Algorithms on each data sets independently, which conclude my work to six experiments.

I have used k-fold cross validation as validation technique during my experiments and confusion matrix for calculating the accuracy of each algorithm, the result of experiments will provide the accuracy of each algorithm in churn prediction for each data set.

At the end we will have a general comparison table from all six experiments which will show the algorithms performance summary and will indicate which algorithm will outperform the others.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

Han, J., Altman, R. B., Kumar, V., Mannila, H., Pregibon, D. Emerging scientific applications in data mining. Communications of the ACM 2002; 36(7): 38-49.

Cortes, C.Pregibom, D. Signatue-based methods for data streams. Data Minning and Knowledge Discvory 2001; 7(4):145-148.

Ezawa, K., Norton, S. Knowledge discovery in telecommunication services data using Bayesian network models. Proceedings of the First International Conference on Knowledge Discovery and Data Mining; 1995 August 20-21. Montreal Canada. AAAI Press: Menlo Park, CA, 1995.

Fawcett, T, Provost, F. Activity monitoring: Noticing interesting changes in behavior. Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; 53-62. San Diego. ACM Press: New York, NY, 1999.

Downloads

Published

2023-02-09

How to Cite

Ahmadzai, N., Mohammadi, H., & Mangal, N. (2023). Data Mining Techniques in Telecommunication Company. Journal for Research in Applied Sciences and Biotechnology, 2(1), 96–98. https://doi.org/10.55544/jrasb.2.1.12