Results 61 to 70 of about 9,076 (200)
The Role of Peer Influence in Churn in Wireless Networks
Subscriber churn remains a top challenge for wireless carriers. These carriers need to understand the determinants of churn to confidently apply effective retention strategies to ensure their profitability and growth. In this paper, we look at the effect
Ferreira, Pedro, Han, Qiwei
core +1 more source
Case studies in applying data mining for churn analysis [PDF]
The advent of price and product comparison sites now makes it even more important to retain customers and identify those that might be at risk of leaving. The use of data mining methods has been widely advocated for predicting customer churn.
C.-F.Tsai +6 more
core +1 more source
Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi +2 more
wiley +1 more source
Process Framework for Subscriber Management and Retention in Nigerian Telecommunication Industry [PDF]
in the global telecommunication industry. Hence, a dominant approach for subscriber management and retention is churn control, since it is cheaper to retain an existing subscriber than acquiring a new one.
Daramola, Olawande, Oladipupo, O. O.
core
TG‐RRNet dynamically models supply chain evolution and detects hidden high‐risk nodes by integrating temporal graph learning, generative anomaly detection, and multimodal cross‐attention, achieving superior risk prediction and robust anomaly detection in complex, evolving supply chain networks.
Pinmeng Li
wiley +1 more source
Bagging and boosting classification trees to predict churn. [PDF]
In this paper, bagging and boosting techniques are proposed as performing tools for churn prediction. These methods consist of sequentially applying a classification algorithm to resampled or reweigthed versions of the data set. We apply these algorithms
Croux, Christophe, Lemmens, Aurélie
core +3 more sources
ABSTRACT This paper addresses persistent gaps in distrust scholarship by systematically reviewing studies published from 1998 to 2024. We refine distrust as a construct distinct from trust, mistrust, and suspicion, shaped by unique cognitive, emotional, and behavioral mechanisms.
Xiaolan Chen +2 more
wiley +1 more source
ABSTRACT For decades, anthropologists have fought against the intrusion of neoliberal policies and norms into the university. We have lost. Today, neoliberal policies are ubiquitous within the university, forming the contours of our professional practice and informing our relationships with colleagues, administrators, and students.
Michael Scroggins
wiley +1 more source
A Data Mining Process Framework for Churn Management in Mobile Telecommunication Industry [PDF]
Churning which is a sudden defection of a subscriber to competitors is a disturbing problem in the global telecommunication industry. However, the effectiveness of existing churn control strategies can be improved if an integrated approach that ...
Daramola, Olawande +2 more
core
The Impact of COVID‐19 on Open Source Development Activities: A Multi‐Method Study
ABSTRACT The social isolation measures resulting from the COVID‐19 outbreak changed work practices in various sectors, especially with the shift to working from home. However, the implications of the pandemic on the maintenance and evolution of open‐source software (OSS) still deserve further studies.
Márcio Vinicius Okimoto +3 more
wiley +1 more source

