User Modeling for Telecommunication Applications: Experiences and Practical Implications

Telecommunication applications based on user modeling focus on extracting customer behavior and preferences from the information implicitly included in Call Detail Record (CDR) datasets Even though there are many different application areas (fraud detection, viral and targeted marketing, churn prediction, etc.) they all share a common data source (CDRs) and a common set of features for modeling the user In this paper we present our experience with different applications areas in generating user models from massive real datasets of both mobile phone and landline subscriber activity We present the analysis of a dataset containing the traces of 50,000 mobile phone users and 50,000 landline users from the same geographical area for a period of six months and compare the different behaviors when using landlines and mobile phones and the implications that such differences have for each application Our results indicate that user models for a variety of applications can be generated efficiently and in a homogeneous way using an architecture based on distributed computing and that there are numerous differences between mobile phone and landline users that have relevant practical implications.

[1]  David J. Hand,et al.  Advances in Intelligent Data Analysis , 2000, Lecture Notes in Computer Science.

[2]  Sougata Mukherjea,et al.  On the structural properties of massive telecom call graphs: findings and implications , 2006, CIKM '06.

[3]  Sanjay Ghemawat,et al.  MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.

[4]  Luo Bin,et al.  Customer Churn Prediction Based on the Decision Tree in Personal Handyphone System Service , 2007, 2007 International Conference on Service Systems and Service Management.

[5]  Sougata Mukherjea,et al.  Social ties and their relevance to churn in mobile telecom networks , 2008, EDBT '08.

[6]  Jacob Goldenberg,et al.  Talk of the Network: A Complex Systems Look at the Underlying Process of Word-of-Mouth , 2001 .

[7]  C. S. Hilas User Profiling for Fraud Detection in Telecommunication Networks , 2005 .

[8]  Corinna Cortes,et al.  Communities of interest , 2001, Intell. Data Anal..

[9]  Xin Yao,et al.  A novel evolutionary data mining algorithm with applications to churn prediction , 2003, IEEE Trans. Evol. Comput..

[10]  Nuria Oliver,et al.  ARBUD : A Reusable Architecture for Building User Models from Massive Datasets , 2010 .

[11]  Georg Lausen,et al.  Spreading activation models for trust propagation , 2004, IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004.

[12]  Panos M. Pardalos,et al.  On maximum clique problems in very large graphs , 1999, External Memory Algorithms.

[13]  Mark A. Girolami,et al.  Employing Latent Dirichlet Allocation for fraud detection in telecommunications , 2007, Pattern Recognit. Lett..

[14]  Hui Zang,et al.  Mining call and mobility data to improve paging efficiency in cellular networks , 2007, MobiCom '07.

[15]  Claudio A. Perez,et al.  Subscription fraud prevention in telecommunications using fuzzy rules and neural networks , 2006, Expert Syst. Appl..

[16]  Matthew Richardson,et al.  Mining knowledge-sharing sites for viral marketing , 2002, KDD.

[17]  Chih-Ping Wei,et al.  Turning telecommunications call details to churn prediction: a data mining approach , 2002, Expert Syst. Appl..

[18]  Christos Faloutsos,et al.  Mobile call graphs: beyond power-law and lognormal distributions , 2008, KDD.

[19]  A. Khenchaf,et al.  An SVM based churn detector in prepaid mobile telephony , 2004, Proceedings. 2004 International Conference on Information and Communication Technologies: From Theory to Applications, 2004..

[20]  A-L Barabási,et al.  Structure and tie strengths in mobile communication networks , 2006, Proceedings of the National Academy of Sciences.

[21]  Marley M. B. R. Vellasco,et al.  Data Mining Techniques on the Evaluation of Wireless Churn , 2004, ESANN.