Current Search: Nath, Shyam Varan. (x)
View All Items
- Title
- Data warehousing and mining: Customer churn analysis in the wireless industry.
- Creator
- Nath, Shyam Varan., Florida Atlantic University, Behara, Ravi
- Abstract/Description
-
This study looks at the database technique of data warehousing and data mining to analyze the business problems related to customer churn in the wireless industry. The customer churn due to new industry regulations has hit the wireless industry hard. The study uses data warehousing and data mining to model the customer database to predict churn rates and suggest timely recommendations to increase customer retention and thereby increase overall profitability. The Naive Bayes algorithm for...
Show moreThis study looks at the database technique of data warehousing and data mining to analyze the business problems related to customer churn in the wireless industry. The customer churn due to new industry regulations has hit the wireless industry hard. The study uses data warehousing and data mining to model the customer database to predict churn rates and suggest timely recommendations to increase customer retention and thereby increase overall profitability. The Naive Bayes algorithm for supervised learning was the prediction algorithm used for data modeling in the study. The data set used in the study consists of one hundred thousand real wireless customers. The study uses database tools such as Oracle database with data mining options and JDeveloper for implementing the models. The data model developed with the calibration data was used to predict the churn for the wireless customers along with the predictive accuracy and probabilities of the results.
Show less - Date Issued
- 2003
- PURL
- http://purl.flvc.org/fcla/dt/12992
- Subject Headings
- Data warehousing, Data mining, Telecommunication--Customer services
- Format
- Document (PDF)
- Title
- Intrusion detection in wireless networks: A data mining approach.
- Creator
- Nath, Shyam Varan., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The security of wireless networks has gained considerable importance due to the rapid proliferation of wireless communications. While computer network heuristics and rules are being used to control and monitor the security of Wireless Local Area Networks (WLANs), mining and learning behaviors of network users can provide a deeper level of security analysis. The objective and contribution of this thesis is three fold: exploring the security vulnerabilities of the IEEE 802.11 standard for...
Show moreThe security of wireless networks has gained considerable importance due to the rapid proliferation of wireless communications. While computer network heuristics and rules are being used to control and monitor the security of Wireless Local Area Networks (WLANs), mining and learning behaviors of network users can provide a deeper level of security analysis. The objective and contribution of this thesis is three fold: exploring the security vulnerabilities of the IEEE 802.11 standard for wireless networks; extracting features or metrics, from a security point of view, for modeling network traffic in a WLAN; and proposing a data mining-based approach to intrusion detection in WLANs. A clustering- and expert-based approach to intrusion detection in a wireless network is presented in this thesis. The case study data is obtained from a real-word WLAN and contains over one million records. Given the clusters of network traffic records, a distance-based heuristic measure is proposed for labeling clusters as either normal or intrusive. The empirical results demonstrate the promise of the proposed approach, laying the groundwork for a clustering-based framework for intrusion detection in computer networks.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13246
- Subject Headings
- Wireless communication systems, Data warehousing, Data mining, Telecommunication--Security measures, Computer networks--Security measures, Computer security
- Format
- Document (PDF)