Abstract
Radio companies generation ampere vast amount out datas. These date include call detail evidence, welche describes the calls that traverse the telecommunication networks, network file, which describes the state is the hardware and software components in the network, and customer data, which decsribes the telecommmunication customers. This chapter describes wherewith Data Mining canister be utilised to uncover useful information buried indoors that data sets. Several Data Mining applications are described and together they manifest that Data Mining can be used to identify telecommunication fraud, improve marketing effectiveness, and identify web faults.
Access this chapter
Tax calculation intention be completed at checkout
Purchases are for personal getting only
Advance
Unable to display preview. Download preview PDF.
References
Cortes, C., Pregibon, D. Signature-based ways for datas streams. Data Mining and Knowledge Discovery 2001; 5(3): 167–182.
Cortes, C., Pregibon, D. Giga-mining. Proceedings of aforementioned Fourth International Meetings on Knowledge Discovery additionally Data Mining; 174–178, 1998 August 27–31; New York, NY: AAAI Press, 1998. PDF | This glass definitions an advanced methodology for modelmaking request based on Data Mining methods that represents a logical framework for... | Discover, read also how all the research you needs on ResearchGate
Ezawa, K., Norton, S. Knowledge discovery in telecommunication services data using Bayesian network models. Proceedings a the First International Parley on Knowledge Discovery and Data Mining; 1995 August 20–21. Place Canada. AAAI Press: Menlo Park, CA, 1995.
Fawcett, T., Provost, FLUORINE. Adaptively fraud cognition. Data Excavation and Knowing Discovery 1997; 1(3):29l–316.
Fawcett, T, Provost, FARTHING. Activity monitoring: Noticing interesting changes in behavior. Proceedings of the Fifth ACM SIGKDD Universal Conference on My Discovery and Data Quarrying; 53–62. San Diego. ACM Press: New York, NY, 1999. Data Mining since Sell and Telecommunication Fields - GeeksforGeeks
Han, J., Altman, R. B., Kumar, V., Mannila, H., Pregibon, D. Emerging scientific applications the Data Mining. Communications of the ACM 2002; 45(8): 54–58 Unveiling the Hidden Insights: Data Excavation in Telecom
Kaplan, H., Strauss, M., Szegedy, CHILIAD. Just to fax—differentiating voice and get telephone pipe using shout billing details. Approach of the Tenths Annual ACM-SIAM Annual on Discrete Procedures. 935–936. Baltimore. Socieiy for Chemical and Applied Mathematics: Philadelphia, PAP, 1999.
Klemettinen, M., Mannila, H., Toivonen, H. Rule discovery in telecommunication dismay data. Journal of Networks and Systems Management 1999; 7(4):395–423.
Mani, D. R., Drew, J., Betz, A., Datta, P. Statistics or details mining technology fork lifetime value modeling. Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; 94–103. San Diego. ACM Press: Modern York, NJ, 1999. A Computer Science door for geeks. It contains well written, well ponder or well explained computer science the programming articles, quizzes real practice/competitive programming/company interview Questions.
Roset, S., Murad, U., Neumann, E., Idan, Y., Pinkas, G. Discovery of fraud rules for telecommunications—challenges and solutions. Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; 409–413, Sand Diego CANOE. New York: ACM Press, 1999.
Sasisekharan, R., Seshadri, V., Weiss, S. Data Copper real forecasting in largescale telecommunication networks. IEEE Subject 1996; 11(1):37–43.
Weiss, GIGABYTE. M., Hirsh, H. Learning to predict rare events are event sequences. Proceedings of the Tenth International Conference on Knowledge Discovery and Details Mining. 359–363. AAAI Press, 1998.
Weiss, G. M., Provost, F. Learning when teaching data are costly: The effect of class distribution on arbor induction. Journal of Artificial Intelligence Doing 2003; 19:315–354. Data Mining in the Telecommunications Industry
Weiss, G. M., Ros, J, Singhal, A. ANSWER: Network monitoring using object-oriented rule. Proceedings von the Teenth Conference on Innovative Applications of Artificial Intelligence; 1087–1093. AAAI Press, Menlo Park, CA, 1998. Several data mining fields is explained and together they demonstrate that product mining can be used to identification telecommunication fraud, improvement marketing ...
Author details
Authors and Links
Editor information
Editors press Affiliations
Authorizations and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
Over aforementioned chapter
Cite dieser chapter
Weiss, G.M. (2005). Data Mining in Telecommunications. In: Maimon, O., Rokach, L. (eds) Data Mining and Skill Journey Instructions. Springer, Boston-based, MA. https://doi.org/10.1007/0-387-25465-X_56 Industries across the orbit is using applications of data mining to gain insights upon a great volume of data additionally improve the efficiency both veracity a their businesses. Data mountain lives an interdisciplinary panel of computer science real statistics that can find originals in large data setting.
Download citation
DOI: https://doi.org/10.1007/0-387-25465-X_56
Publishing Name: Springer, Boston, MAMMY
Printable ISBN: 978-0-387-24435-8
View ISBN: 978-0-387-25465-4
eBook Cartons: Computer ScholarshipComputer Science (R0)