Results 61 to 70 of about 9,076 (200)

The Role of Peer Influence in Churn in Wireless Networks

open access: yes, 2014
Subscriber churn remains a top challenge for wireless carriers. These carriers need to understand the determinants of churn to confidently apply effective retention strategies to ensure their profitability and growth. In this paper, we look at the effect
Ferreira, Pedro, Han, Qiwei
core   +1 more source

Case studies in applying data mining for churn analysis [PDF]

open access: yes, 2017
The advent of price and product comparison sites now makes it even more important to retain customers and identify those that might be at risk of leaving. The use of data mining methods has been widely advocated for predicting customer churn.
C.-F.Tsai   +6 more
core   +1 more source

Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi   +2 more
wiley   +1 more source

Process Framework for Subscriber Management and Retention in Nigerian Telecommunication Industry [PDF]

open access: yes, 2007
in the global telecommunication industry. Hence, a dominant approach for subscriber management and retention is churn control, since it is cheaper to retain an existing subscriber than acquiring a new one.
Daramola, Olawande, Oladipupo, O. O.
core  

TG‐RRNet: A Supply Chain Risk Perception Network Integrating Temporal Modeling and Generative Anomaly Detection

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
TG‐RRNet dynamically models supply chain evolution and detects hidden high‐risk nodes by integrating temporal graph learning, generative anomaly detection, and multimodal cross‐attention, achieving superior risk prediction and robust anomaly detection in complex, evolving supply chain networks.
Pinmeng Li
wiley   +1 more source

Bagging and boosting classification trees to predict churn. [PDF]

open access: yes
In this paper, bagging and boosting techniques are proposed as performing tools for churn prediction. These methods consist of sequentially applying a classification algorithm to resampled or reweigthed versions of the data set. We apply these algorithms
Croux, Christophe, Lemmens, Aurélie
core   +3 more sources

Advancing Theoretical Integration of Distrust: A Multilevel Examination of Its Theoretical Foundations, Dynamics, and Mechanisms

open access: yesPsychology &Marketing, Volume 43, Issue 1, Page 68-87, January 2026.
ABSTRACT This paper addresses persistent gaps in distrust scholarship by systematically reviewing studies published from 1998 to 2024. We refine distrust as a construct distinct from trust, mistrust, and suspicion, shaped by unique cognitive, emotional, and behavioral mechanisms.
Xiaolan Chen   +2 more
wiley   +1 more source

A Modest Proposal for University Reform: It's Time We Stop Half‐Assing Neoliberalism and Start Whole‐Assing It

open access: yesEconomic Anthropology, Volume 13, Issue 1, January 2026.
ABSTRACT For decades, anthropologists have fought against the intrusion of neoliberal policies and norms into the university. We have lost. Today, neoliberal policies are ubiquitous within the university, forming the contours of our professional practice and informing our relationships with colleagues, administrators, and students.
Michael Scroggins
wiley   +1 more source

A Data Mining Process Framework for Churn Management in Mobile Telecommunication Industry [PDF]

open access: yes, 2009
Churning which is a sudden defection of a subscriber to competitors is a disturbing problem in the global telecommunication industry. However, the effectiveness of existing churn control strategies can be improved if an integrated approach that ...
Daramola, Olawande   +2 more
core  

The Impact of COVID‐19 on Open Source Development Activities: A Multi‐Method Study

open access: yesJournal of Software: Evolution and Process, Volume 38, Issue 1, January 2026.
ABSTRACT The social isolation measures resulting from the COVID‐19 outbreak changed work practices in various sectors, especially with the shift to working from home. However, the implications of the pandemic on the maintenance and evolution of open‐source software (OSS) still deserve further studies.
Márcio Vinicius Okimoto   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy