Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (10)
  • Open Access

    ARTICLE

    CDR2IMG: A Bridge from Text to Image in Telecommunication Fraud Detection

    Zhen Zhen1, Jian Gao1,2,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 955-973, 2023, DOI:10.32604/csse.2023.039525

    Abstract Telecommunication fraud has run rampant recently worldwide. However, previous studies depend highly on expert knowledge-based feature engineering to extract behavior information, which cannot adapt to the fast-changing modes of fraudulent subscribers. Therefore, we propose a new taxonomy that needs no hand-designed features but directly takes raw Call Detail Records (CDR) data as input for the classifier. Concretely, we proposed a fraud detection method using a convolutional neural network (CNN) by taking CDR data as images and applying computer vision techniques like image augmentation. Comprehensive experiments on the real-world dataset from the 2020 Digital Sichuan Innovation Competition show that our proposed… More >

  • Open Access

    ARTICLE

    An Early Warning Model of Telecommunication Network Fraud Based on User Portrait

    Wen Deng1, Guangjun Liang1,2,3,*, Chenfei Yu1, Kefan Yao1, Chengrui Wang1, Xuan Zhang1

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1561-1576, 2023, DOI:10.32604/cmc.2023.035016

    Abstract With the frequent occurrence of telecommunications and network fraud crimes in recent years, new frauds have emerged one after another which has caused huge losses to the people. However, due to the lack of an effective preventive mechanism, the police are often in a passive position. Using technologies such as web crawlers, feature engineering, deep learning, and artificial intelligence, this paper proposes a user portrait fraud warning scheme based on Weibo public data. First, we perform preliminary screening and cleaning based on the keyword “defrauded” to obtain valid fraudulent user Identity Documents (IDs). The basic information and account information of… More >

  • Open Access

    ARTICLE

    Fuzzy Logic Based Handover Authentication in 5g Telecommunication Heterogeneous Networks

    J. Divakaran1,*, Arvind Chakrapani2, K. Srihari3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1141-1152, 2023, DOI:10.32604/csse.2023.028050

    Abstract Under various deployment circumstances, fifth-generation (5G) telecommunications delivers improved network compound management with fast communication channels. Due to the introduction of the Internet of Things (IoT) in data management, the majority of the ultra-dense network models in 5G networks frequently have decreased spectral efficiency, weak handover management, and vulnerabilities. The majority of traditional handover authentication models are seriously threatened, making them vulnerable to a variety of security attacks. The authentication of networked devices is the most important issue. Therefore, a model that incorporates the handover mechanism and authentication model must be created. This article uses a fuzzy logic model to… More >

  • Open Access

    ARTICLE

    Arithmetic Optimization with Deep Learning Enabled Churn Prediction Model for Telecommunication Industries

    Vani Haridasan*, Kavitha Muthukumaran, K. Hariharanath

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3531-3544, 2023, DOI:10.32604/iasc.2023.030628

    Abstract Customer retention is one of the challenging issues in different business sectors, and various firms utilize customer churn prediction (CCP) process to retain existing customers. Because of the direct impact on the company revenues, particularly in the telecommunication sector, firms are needed to design effective CCP models. The recent advances in machine learning (ML) and deep learning (DL) models enable researchers to introduce accurate CCP models in the telecommunication sector. CCP can be considered as a classification problem, which aims to classify the customer into churners and non-churners. With this motivation, this article focuses on designing an arithmetic optimization algorithm… More >

  • Open Access

    ARTICLE

    Deep Convolutional Neural Network Based Churn Prediction for Telecommunication Industry

    Nasebah Almufadi1, Ali Mustafa Qamar1,2,*

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1255-1270, 2022, DOI:10.32604/csse.2022.025029

    Abstract Currently, mobile communication is one of the widely used means of communication. Nevertheless, it is quite challenging for a telecommunication company to attract new customers. The recent concept of mobile number portability has also aggravated the problem of customer churn. Companies need to identify beforehand the customers, who could potentially churn out to the competitors. In the telecommunication industry, such identification could be done based on call detail records. This research presents an extensive experimental study based on various deep learning models, such as the 1D convolutional neural network (CNN) model along with the recurrent neural network (RNN) and deep… More >

  • Open Access

    ARTICLE

    Research and Practice of Telecommunication User Rating Method Based on Machine Learning

    Qian Tang, Hao Chen, Yifei Wei*

    Journal on Big Data, Vol.4, No.1, pp. 27-39, 2022, DOI:10.32604/jbd.2022.026850

    Abstract The machine learning model has advantages in multi-category credit rating classification. It can replace discriminant analysis based on statistical methods, greatly helping credit rating reduce human interference and improve rating efficiency. Therefore, we use a variety of machine learning algorithms to study the credit rating of telecom users. This paper conducts data understanding and preprocessing on Operator Telecom user data, and matches the user’s characteristics and tags based on the time sliding window method. In order to deal with the deviation caused by the imbalance of multi-category data, the SMOTE oversampling method is used to balance the data. Using the… More >

  • Open Access

    ARTICLE

    Analysis and Modeling of Propagation in Tunnel at 3.7 and 28 GHz

    Md Abdus Samad1,2, Dong-You Choi1,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3127-3143, 2022, DOI:10.32604/cmc.2022.023086

    Abstract In present-day society, train tunnels are extensively used as a means of transportation. Therefore, to ensure safety, streamlined train operations, and uninterrupted internet access inside train tunnels, reliable wave propagation modeling is required. We have experimented and measured wave propagation models in a 1674 m long straight train tunnel in South Korea. The measured path loss and the received signal strength were modeled with the Close-In (CI), Floating intercept (FI), CI model with a frequency-weighted path loss exponent (CIF), and alpha-beta-gamma (ABG) models, where the model parameters were determined using minimum mean square error (MMSE) methods. The measured and the… More >

  • Open Access

    ARTICLE

    Rule-Based Anomaly Detection Model with Stateful Correlation Enhancing Mobile Network Security

    Rafia Afzal, Raja Kumar Murugesan*

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1825-1841, 2022, DOI:10.32604/iasc.2022.020598

    Abstract The global Signalling System No. 7 (SS7) network protocol standard has been developed and regulated based only on trusted partner networks. The SS7 network protocol by design neither secures the communication channel nor verifies the entire network peers. The SS7 network protocol used in telecommunications has deficiencies that include verification of actual subscribers, precise location, subscriber’s belonging to a network, absence of illegitimate message filtering mechanism, and configuration deficiencies in home routing networks. Attackers can take advantage of these deficiencies and exploit them to impose threats such as subscriber or network data disclosure, intercept mobile traffic, perform account frauds, track… More >

  • Open Access

    ARTICLE

    Cross-Layer Design for EH Systems with Finite Buffer Constraints

    Mohammed Baljon, Shailendra Mishra*

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 129-144, 2021, DOI:10.32604/cmc.2021.017509

    Abstract Energy harvesting (EH) technology in wireless communication is a promising approach to extend the lifetime of future wireless networks. A cross-layer optimal adaptation policy for a point-to-point energy harvesting (EH) wireless communication system with finite buffer constraints over a Rayleigh fading channel based on a Semi-Markov Decision Process (SMDP) is investigated. Most adaptation strategies in the literature are based on channel-dependent adaptation. However, besides considering the channel, the state of the energy capacitor and the data buffer are also involved when proposing a dynamic modulation policy for EH wireless networks. Unlike the channel-dependent policy, which is a physical layer-based optimization,… More >

  • Open Access

    ARTICLE

    Stochastic Finite Element Analysis and Reliability Of Steel Telecommunication Towers

    M.M. Kamiński1, J. Szafran1

    CMES-Computer Modeling in Engineering & Sciences, Vol.83, No.2, pp. 143-168, 2012, DOI:10.32604/cmes.2012.083.143

    Abstract The main issue in this article is computational probabilistic analysis and reliability assessment of the steel telecommunication towers subjected to material and environmental uncertainty. Such a discussion is important since very wide, frequent and relatively modern application of these structures, which are subjected to various sources of uncertainty and having at this moment no rich and time-dependent failure evidence. Numerical analysis is based on the generalized stochastic perturbation technique implemented as the Stochastic Finite Elements using the Response Function Method applied with the use of computer algebra system. A simultaneous usage of the engineering FEM system and mathematical package enables… More >

Displaying 1-10 on page 1 of 10. Per Page