|Appears in Collections:||Computing Science and Mathematics Conference Papers and Proceedings|
|Title:||Data Analytics in Text Messages: A Mobile Network Operator Case Study|
|Citation:||Babaee M & Sarabadani H (2019) Data Analytics in Text Messages: A Mobile Network Operator Case Study. In: 9th International Symposium on Telecommunication, IST 2018. 2018 9th International Symposium on Telecommunications (IST), Tehran, Iran, 17.12.2018-19.12.2018. Piscataway, NJ: Institute of Electrical and Electronics Engineers Inc. pp. 330-336. https://doi.org/10.1109/ISTEL.2018.8660969|
|Conference Name:||2018 9th International Symposium on Telecommunications (IST)|
|Conference Dates:||2018-12-17 - 2018-12-19|
|Conference Location:||Tehran, Iran|
|Abstract:||This paper explores the application of different data mining and machine learning algorithms to propose an effective technique to filter out spam SMSs. Due to high competitive nature of MNO business; filtering spam SMSs will have a great impact on the protection of business and profit making. This is mostly because subscribers refuse to use the services of MNOs that are not vigilant about spam SMSs. Based on the CRISP-DM method which is an open standard process model for data analytics projects, machine learning algorithms and data preparation methods have been conducted on a MNO unstructured dataset to transform characters, delete stop words, extract word stems, roots, N-Grams, and classification. Next, numerical Vector Space Models were created utilizing all four types of word vector creation methods. After producing test and train models with machine learning algorithms; accuracy and error rate, recall, precision and the area under curve for each classification algorithm has been measured. Finally, the Bagging algorithm by implementing Binary Term Occurrence vector space creation method showed the highest efficiency rate which can have the highest application in the big data ecosystem of the industry for spam filtering.|
|Status:||VoR - Version of Record|
|Rights:||The publisher does not allow this work to be made publicly available in this Repository. Please use the Request a Copy feature at the foot of the Repository record to request a copy directly from the author. You can only request a copy if you wish to use this work for your own research or private study.|
|IEEE-08660969.pdf||Fulltext - Published Version||493.62 kB||Adobe PDF||Under Permanent Embargo Request a copy|
Note: If any of the files in this item are currently embargoed, you can request a copy directly from the author by clicking the padlock icon above. However, this facility is dependent on the depositor still being contactable at their original email address.
This item is protected by original copyright
Items in the Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
If you believe that any material held in STORRE infringes copyright, please contact email@example.com providing details and we will remove the Work from public display in STORRE and investigate your claim.