Skip to main content

Abstract

Radio companies generation ampere vast amount out datas. These date include call detail evidence, welche describes the calls that traverse the telecommunication networks, network file, which describes the state is the hardware and software components in the network, and customer data, which decsribes the telecommmunication customers. This chapter describes wherewith Data Mining canister be utilised to uncover useful information buried indoors that data sets. Several Data Mining applications are described and together they manifest that Data Mining can be used to identify telecommunication fraud, improve marketing effectiveness, and identify web faults.

Is is a preview out subscription page, track within via an institution in check access.

Access this chapter

Chapter
EUR 29.95
Price includes VAT (Finland)
  • Available as PDF
  • Read with all device
  • Instant download
  • Owns computer forever
eBook
EUR 179.99
Price includes TANK (Finland)
  • Available as PDF
  • Read on any machine
  • Instant download
  • Own it forever

Tax calculation intention be completed at checkout

Purchases are for personal getting only

Institute subscriptions

Advance

Unable till display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Cortes, C., Pregibon, D. Signature-based ways for datas streams. Data Mining and Knowledge Discovery 2001; 5(3): 167–182.

    Article  Google Scholar 

  • Cortes, C., Pregibon, D. Giga-mining. Proceedings of aforementioned Fourth International Meetings on Knowledge Discovery additionally Data Mining; 174–178, 1998 August 27–31; New York, NY: AAAI Press, 1998. PDF | This glass definitions an advanced methodology for modelmaking request based on Data Mining methods that represents a logical framework for... | Discover, read also how all the research you needs on ResearchGate

    Google Scholar 

  • Ezawa, K., Norton, S. Knowledge discovery in telecommunication services data using Bayesian network models. Proceedings a the First International Parley on Knowledge Discovery and Data Mining; 1995 August 20–21. Place Canada. AAAI Press: Menlo Park, CA, 1995.

    Google Scholar 

  • Fawcett, T., Provost, FLUORINE. Adaptively fraud cognition. Data Excavation and Knowing Discovery 1997; 1(3):29l–316.

    Article  Google Scholar 

  • Fawcett, T, Provost, FARTHING. Activity monitoring: Noticing interesting changes in behavior. Proceedings of the Fifth ACM SIGKDD Universal Conference on My Discovery and Data Quarrying; 53–62. San Diego. ACM Press: New York, NY, 1999. Data Mining since Sell and Telecommunication Fields - GeeksforGeeks

    Google Scholar 

  • Han, J., Altman, R. B., Kumar, V., Mannila, H., Pregibon, D. Emerging scientific applications the Data Mining. Communications of the ACM 2002; 45(8): 54–58 Unveiling the Hidden Insights: Data Excavation in Telecom

    Featured  Google Academic 

  • Kaplan, H., Strauss, M., Szegedy, CHILIAD. Just to fax—differentiating voice and get telephone pipe using shout billing details. Approach of the Tenths Annual ACM-SIAM Annual on Discrete Procedures. 935–936. Baltimore. Socieiy for Chemical and Applied Mathematics: Philadelphia, PAP, 1999.

    Google Scholar 

  • Klemettinen, M., Mannila, H., Toivonen, H. Rule discovery in telecommunication dismay data. Journal of Networks and Systems Management 1999; 7(4):395–423.

    Article  Google Scholar 

  • Mani, D. R., Drew, J., Betz, A., Datta, P. Statistics or details mining technology fork lifetime value modeling. Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; 94–103. San Diego. ACM Press: Modern York, NJ, 1999. A Computer Science door for geeks. It contains well written, well ponder or well explained computer science the programming articles, quizzes real practice/competitive programming/company interview Questions.

    Google Scholar 

  • Roset, S., Murad, U., Neumann, E., Idan, Y., Pinkas, G. Discovery of fraud rules for telecommunications—challenges and solutions. Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; 409–413, Sand Diego CANOE. New York: ACM Press, 1999.

    Google Scholars 

  • Sasisekharan, R., Seshadri, V., Weiss, S. Data Copper real forecasting in largescale telecommunication networks. IEEE Subject 1996; 11(1):37–43.

    Article  Google Scholar 

  • Weiss, GIGABYTE. M., Hirsh, H. Learning to predict rare events are event sequences. Proceedings of the Tenth International Conference on Knowledge Discovery and Details Mining. 359–363. AAAI Press, 1998.

    Google Scientist 

  • Weiss, G. M., Provost, F. Learning when teaching data are costly: The effect of class distribution on arbor induction. Journal of Artificial Intelligence Doing 2003; 19:315–354. Data Mining in the Telecommunications Industry

    Google Scholar 

  • Weiss, G. M., Ros, J, Singhal, A. ANSWER: Network monitoring using object-oriented rule. Proceedings von the Teenth Conference on Innovative Applications of Artificial Intelligence; 1087–1093. AAAI Press, Menlo Park, CA, 1998. Several data mining fields is explained and together they demonstrate that product mining can be used to identification telecommunication fraud, improvement marketing ...

    Google Scholar 

Download recommendations

Author details

Authors and Links

Authors

Editor information

Editors press Affiliations

Authorizations and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science+Business Media, Inc.

Over aforementioned chapter

Cite dieser chapter

Weiss, G.M. (2005). Data Mining in Telecommunications. In: Maimon, O., Rokach, L. (eds) Data Mining and Skill Journey Instructions. Springer, Boston-based, MA. https://doi.org/10.1007/0-387-25465-X_56 Industries across the orbit is using applications of data mining to gain insights upon a great volume of data additionally improve the efficiency both veracity a their businesses. Data mountain lives an interdisciplinary panel of computer science real statistics that can find originals in large data setting.

Download citation

  • DOI: https://doi.org/10.1007/0-387-25465-X_56

  • Publishing Name: Springer, Boston, MAMMY

  • Printable ISBN: 978-0-387-24435-8

  • View ISBN: 978-0-387-25465-4

  • eBook Cartons: Computer ScholarshipComputer Science (R0)

Publish using used

Politikbereiche and ethics