Telecom & Spend Analytics Arindam Guptaray

28
Telecom & Spend Analytics Arindam Guptaray

description

Telecom & Spend Analytics Arindam Guptaray. Few words about You!. . . . Name Background – Engineering, Arts, Commerce Work Experience Expectations from this Class WHY ARE SPENDING YOUR WEEKENDS HERE????. Few words about me . . . . B. TECH FROM IIT KHARAGPUR. - PowerPoint PPT Presentation

Transcript of Telecom & Spend Analytics Arindam Guptaray

Page 1: Telecom & Spend Analytics Arindam  Guptaray

Telecom & Spend AnalyticsArindam Guptaray

Page 6: Telecom & Spend Analytics Arindam  Guptaray

What is Analytics . . .

“Not everything that can be counted counts, and not everything that counts can be counted.”

- Albert Einstein

“Analytics is like the Game of Bridge. You can learn the rules of Bridge from a text book but when you

are actually playing, it’s a totally different ball game.”

- Arindam Guptaray

• Analytics can be Deterministic or Probabilistic.

• In real life you will never get clean data.

• An analyst should be able to tell you something about your data that you don’t know.

• A great analyst will be able to answer the follow up question:

“So what?”

Page 12: Telecom & Spend Analytics Arindam  Guptaray

Switch Call Data Record ( Switch CDR) . . .

• For every mobile transaction a record is generated in Switch. These are called

Switch Call Data Records or Switch Call Detail Records (CDR). The key fields of a

Switch CDR are:

• Called Number: The number receiving the Call.

• Calling Number: The number initiating the Call.

(A number is called MSIDN: Mobile Subscriber Integrated Services Digital

Network-Number)

• IMSI (International Mobile Subscriber Identity): The subscriber SIM card

number.

• IMEI (International Mobile Station Equipment Identity): The unique identifier for

your mobile phone.

• Cell ID: The unique ID of the cell tower transmitting the call.

• Call Status: Success, Failure, Missed.

• Call Time: The time of the call.

• Call Duration: Duration of the call.

Page 23: Telecom & Spend Analytics Arindam  Guptaray

TAP files (TAP IN, TAP OUT). . .

• The usage by a subscriber in a visited network is captured in a file called the TAP

(Transferred Account Procedure) for GSM This file is transferred to the home

network. A TAP file contains details of the calls made by the subscriber viz.

location, calling party, called party, time of call and duration, etc. The TAP files

are rated as per the tariffs charged by the visited operator. The home operator

then bills these calls to its subscribers and may charge a mark-up/tax applicable

locally. The key fields of a TAP file are:

• Called Number: The number receiving the Call.

• Calling Number: The number initiating the Call.

• Type of Service (PREPAID, POSTPAID)

• IMSI (International Mobile Subscriber Identity): The subscriber SIM card

number.

• Call Time: The time of the call.

• Call Duration: Duration of the call.

Page 24: Telecom & Spend Analytics Arindam  Guptaray

Detecting Subscriber Fraud . . .

• High number of calls to Black Listed numbers

• High Roaming charges

• High Internet Usages

• High number of VAS calls

• Frequent Change of Address

• Pre-Subscription Check:

• Verify address

• Verify home number

• Set Credit Limits

• Check PAN number, UID against Credit Violations

• Check IMEI against Black Listed IMEI

• Check for matching names with black listed customers.

• Check for matching PIN codes.

• Check for addresses from notorious localities.

• Match subscriber usage profile with black listed subscribers :

• Called numbers

• Matching tower locations

• Calling patterns (short calls, long calls)

Page 27: Telecom & Spend Analytics Arindam  Guptaray

Project: Detecting Fraudsters Cont..

• After every 5 days they undertake an audit to see whether these

Fraudsters have joined their network. They review the list of

subscribers who have made calls to the same people as these three

fraudsters and in the same time frame.

• Please use a statistical method (Naïve Bayesian Classifier or Decision

Tree) to identify if any of these subscribers is Sally, Vince or Virginia.

• Please provide the following:

• R, SAS or MATLAB code used to determine the subscriber.

• Name of the probable caller in an additional column in the

Audit CallLog excel file and the confidence in terms of

probability.

• Name of the fraudster, if any.

• Note that the company needs to be absolutely sure that the person is

a fraudster. Matching of calling patterns for 1 or 2 days is not proof

enough. You should also have a high percentage of confidence

(probability) when you identify this person.