{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T06:59:58Z","timestamp":1770274798682,"version":"3.49.0"},"reference-count":54,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2014,11,1]],"date-time":"2014-11-01T00:00:00Z","timestamp":1414800000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Soft Computing"],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1016\/j.asoc.2014.08.041","type":"journal-article","created":{"date-parts":[[2014,8,29]],"date-time":"2014-08-29T17:17:34Z","timestamp":1409332654000},"page":"994-1012","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":131,"special_numbering":"C","title":["Improved churn prediction in telecommunication industry using data mining techniques"],"prefix":"10.1016","volume":"24","author":[{"given":"A.","family":"Keramati","sequence":"first","affiliation":[]},{"given":"R.","family":"Jafari-Marandi","sequence":"additional","affiliation":[]},{"given":"M.","family":"Aliannejadi","sequence":"additional","affiliation":[]},{"given":"I.","family":"Ahmadian","sequence":"additional","affiliation":[]},{"given":"M.","family":"Mozaffari","sequence":"additional","affiliation":[]},{"given":"U.","family":"Abbasi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.asoc.2014.08.041_bib0005","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.knosys.2011.12.005","article-title":"Predicting customer churn through interpersonal influence","volume":"28","author":"Zhang","year":"2012","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.asoc.2014.08.041_bib0010","doi-asserted-by":"crossref","first-page":"192","DOI":"10.4156\/jcit.vol6.issue11.22","article-title":"Evaluating churn model in CRM: a case study in Telecom","volume":"6","author":"Lin","year":"2011","journal-title":"J. Converg. Inf. Technol."},{"key":"10.1016\/j.asoc.2014.08.041_bib0015","doi-asserted-by":"crossref","first-page":"1414","DOI":"10.1016\/j.eswa.2011.08.024","article-title":"Customer churn prediction in telecommunications","volume":"39","author":"Huang","year":"2012","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.asoc.2014.08.041_bib0020","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.ejor.2011.09.031","article-title":"New insights into churn prediction in the telecommunication sector: a profit driven data mining approach","volume":"218","author":"Verbeke","year":"2012","journal-title":"Eur. J. Oper. Res."},{"key":"10.1016\/j.asoc.2014.08.041_bib0025","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1002\/hfm.20274","article-title":"A novel viewpoint on information and interface design for auction web sites","volume":"22","author":"Kuo","year":"2012","journal-title":"Hum. Factors Ergon. Manuf. Serv. Ind."},{"key":"10.1016\/j.asoc.2014.08.041_bib0030","article-title":"Webpage clustering \u2013 taking the zero step: a case study of an Iranian website","volume":"13","author":"Keramati","year":"2014","journal-title":"J. Web Eng."},{"key":"10.1016\/j.asoc.2014.08.041_bib0035","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/s005000100099","article-title":"Computational intelligence in management of ATM networks","volume":"5","author":"Sekercio\u011flu","year":"2001","journal-title":"Soft Comput."},{"key":"10.1016\/j.asoc.2014.08.041_bib0040","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.knosys.2012.06.014","article-title":"Optimum estimation of missing values in randomized complete block design by genetic algorithm","volume":"37","author":"Azadeh","year":"2013","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.asoc.2014.08.041_bib0045","doi-asserted-by":"crossref","first-page":"2735","DOI":"10.1016\/j.asoc.2010.11.004","article-title":"Stability analysis and robustness design of nonlinear systems: an NN-based approach","volume":"11","author":"Chen","year":"2011","journal-title":"Appl. Soft Comput."},{"issue":"11","key":"10.1016\/j.asoc.2014.08.041_bib0050","doi-asserted-by":"crossref","first-page":"1651","DOI":"10.1177\/1077546309104185","article-title":"Application of fuzzy-model-based control to nonlinear structural systems with time delay: An LMI method","volume":"16","author":"Chen","year":"2010","journal-title":"J. Vibr. Control"},{"key":"10.1016\/j.asoc.2014.08.041_bib0055","doi-asserted-by":"crossref","first-page":"3603","DOI":"10.1016\/j.asoc.2012.06.012","article-title":"A meta-cognitive sequential learning algorithm for neuro-fuzzy inference system","volume":"12","author":"Subramanian","year":"2012","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.asoc.2014.08.041_bib0060","series-title":"IEEE World Congress on Computational Intelligence, The 1998 IEEE International Conference on Fuzzy Systems Proceedings","first-page":"1488","article-title":"Evolutionary-fuzzy prediction for strategic QoS routing in broadband networks","author":"Vasilakos","year":"1998"},{"key":"10.1016\/j.asoc.2014.08.041_bib0065","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/s11069-012-0236-z","article-title":"Potential hazard analysis and risk assessment of debris flow by fuzzy modeling","volume":"64","author":"Lin","year":"2012","journal-title":"Nat. Hazards"},{"key":"10.1016\/j.asoc.2014.08.041_bib0070","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1108\/02644401011008504","article-title":"Application of fuzzy models for the monitoring of ecologically sensitive ecosystems in a dynamic semi-arid landscape from satellite imagery","volume":"27","author":"Lin","year":"2010","journal-title":"Eng. Comput."},{"key":"10.1016\/j.asoc.2014.08.041_bib0075","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1007\/s00521-011-0540-7","article-title":"GA-based decoupled adaptive FSMC for nonlinear systems by a singular perturbation scheme","volume":"20","author":"Chen","year":"2011","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.asoc.2014.08.041_bib0080","series-title":"GA-based Adaptive Neural Network Controllers for Nonlinear Systems","author":"Chen","year":"2010"},{"key":"10.1016\/j.asoc.2014.08.041_bib0085","first-page":"909","article-title":"A new hybrid GA-PSO method for solving multi-period inventory routing problem with considering financial decisions","volume":"6","author":"Rabbani","year":"2013","journal-title":"J. Ind. Eng. Manage."},{"key":"10.1016\/j.asoc.2014.08.041_bib0090","series-title":"9th International Industrial Engineering Conference","article-title":"A novel multi-objective genetic algorithm for cell formation problems","author":"Tavakkoli-Moghaddam","year":"2013"},{"key":"10.1016\/j.asoc.2014.08.041_bib0095","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/s11069-012-0363-6","article-title":"A new viewpoint of hazard assessment and management for Taiwan's insurance issues","volume":"65","author":"Chen","year":"2013","journal-title":"Nat. Hazards"},{"key":"10.1016\/j.asoc.2014.08.041_bib0100","doi-asserted-by":"crossref","first-page":"1559","DOI":"10.1007\/s11069-012-0425-9","article-title":"A probabilistic approach for earthquake risk assessment based on an engineering insurance portfolio","volume":"65","author":"Hsu","year":"2013","journal-title":"Nat. Hazards"},{"key":"10.1016\/j.asoc.2014.08.041_bib0105","first-page":"93","article-title":"Combining scientific facts and significance criteria to predict the result of an environmental impact assessment review","volume":"19","author":"Liu","year":"2012","journal-title":"J. Environ. Inform."},{"key":"10.1016\/j.asoc.2014.08.041_bib0110","doi-asserted-by":"crossref","first-page":"470","DOI":"10.1016\/j.tourman.2009.05.008","article-title":"An earthquake disaster management mechanism based on risk assessment information for the tourism industry \u2013 a case study from the island of Taiwan","volume":"31","author":"Tsai","year":"2010","journal-title":"Tour. Manage."},{"key":"10.1016\/j.asoc.2014.08.041_bib0115","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2014.05.014","article-title":"Improved churn prediction in telecommunication industry by analyzing a large network","author":"Kim","year":"2014","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.asoc.2014.08.041_bib0120","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1016\/j.asoc.2013.09.017","article-title":"Social network analysis for customer churn prediction","volume":"14","author":"Verbeke","year":"2014","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.asoc.2014.08.041_bib0125","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1016\/j.eswa.2005.09.080","article-title":"Applying data mining to telecom churn management","volume":"31","author":"Hung","year":"2006","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.asoc.2014.08.041_bib0130","series-title":"Toward Autonomic Distributed Data Mining with Intelligent Web Services","first-page":"544","author":"Kantardzic","year":"2003"},{"key":"10.1016\/j.asoc.2014.08.041_bib0135","doi-asserted-by":"crossref","first-page":"2006","DOI":"10.1016\/j.eswa.2009.06.076","article-title":"Variable selection by association rules for customer churn prediction of multimedia on demand","volume":"37","author":"Tsai","year":"2010","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.asoc.2014.08.041_bib0140","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/j.dss.2011.07.005","article-title":"Mining churning behaviors and developing retention strategies based on a partial least squares (PLS) model","volume":"52","author":"Lee","year":"2011","journal-title":"Decis. Support Syst."},{"key":"10.1016\/j.asoc.2014.08.041_bib0145","doi-asserted-by":"crossref","first-page":"1659","DOI":"10.1109\/TII.2012.2224355","article-title":"A customer churn prediction model in telecom industry using boosting","volume":"10","author":"Ning","year":"2014","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.asoc.2014.08.041_bib0150","doi-asserted-by":"crossref","first-page":"12293","DOI":"10.1016\/j.eswa.2011.04.007","article-title":"An empirical evaluation of rotation-based ensemble classifiers for customer churn prediction","volume":"38","author":"De Bock","year":"2011","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.asoc.2014.08.041_bib0155","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1007\/s10489-013-0440-x","article-title":"Intelligent churn prediction in telecom: employing mRMR feature selection and RotBoost based ensemble classification","volume":"39","author":"Idris","year":"2013","journal-title":"Appl. Intell."},{"key":"10.1016\/j.asoc.2014.08.041_bib0160","doi-asserted-by":"crossref","first-page":"961","DOI":"10.1109\/TKDE.2012.50","article-title":"A novel profit maximizing metric for measuring classification performance of customer churn prediction models","volume":"25","author":"Verbraken","year":"2013","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.asoc.2014.08.041_bib0165","doi-asserted-by":"crossref","first-page":"6714","DOI":"10.1016\/j.eswa.2008.08.050","article-title":"Genetic algorithm based neural network approaches for predicting churn in cellular wireless network services","volume":"36","author":"Pendharkar","year":"2009","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.asoc.2014.08.041_bib0170","doi-asserted-by":"crossref","first-page":"751","DOI":"10.1016\/j.telpol.2004.05.013","article-title":"Determinants of subscriber churn and customer loyalty in the Korean mobile telephony market","volume":"28","author":"Kim","year":"2004","journal-title":"Telecommun. Policy"},{"key":"10.1016\/j.asoc.2014.08.041_bib0175","doi-asserted-by":"crossref","first-page":"4710","DOI":"10.1016\/j.eswa.2009.11.083","article-title":"Churn models for prepaid customers in the cellular telecommunication industry using large data marts","volume":"37","author":"Owczarczuk","year":"2010","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.asoc.2014.08.041_bib0180","doi-asserted-by":"crossref","first-page":"7151","DOI":"10.1016\/j.eswa.2010.12.045","article-title":"Applying Bayesian Belief Network approach to customer churn analysis: a case study on the telecom industry of Turkey","volume":"38","author":"Kisioglu","year":"2011","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.asoc.2014.08.041_bib0185","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1016\/j.im.2008.01.005","article-title":"Integrating the voice of customers through call center emails into a decision support system for churn prediction","volume":"45","author":"Coussement","year":"2008","journal-title":"Inf. Manage."},{"key":"10.1016\/j.asoc.2014.08.041_bib0190","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/j.telpol.2011.12.008","article-title":"Regulation and competition in the European mobile communications industry: an examination of the implementation of mobile number portability","volume":"36","author":"Usero S\u00e1nchez","year":"2012","journal-title":"Telecommun. Policy"},{"key":"10.1016\/j.asoc.2014.08.041_bib0195","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/j.jretconser.2007.04.001","article-title":"The effects of brand credibility on customer loyalty","volume":"15","author":"Sweeney","year":"2008","journal-title":"J. Retail. Consum. Serv."},{"key":"10.1016\/j.asoc.2014.08.041_bib0200","doi-asserted-by":"crossref","first-page":"5635","DOI":"10.1016\/j.eswa.2013.04.020","article-title":"An effective hybrid learning system for telecommunication churn prediction","volume":"40","author":"Huang","year":"2013","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.asoc.2014.08.041_bib0205","series-title":"Customer Churn Time Prediction in Mobile Telecommunication Industry Using Ordinal Regression","first-page":"884","author":"Gopal","year":"2008"},{"key":"10.1016\/j.asoc.2014.08.041_bib0210","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1016\/j.telpol.2006.09.006","article-title":"Customer churn analysis: churn determinants and mediation effects of partial defection in the Korean mobile telecommunications service industry","volume":"30","author":"Ahn","year":"2006","journal-title":"Telecommun. Policy"},{"key":"10.1016\/j.asoc.2014.08.041_bib0215","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1016\/j.asoc.2005.07.003","article-title":"The development of fuzzy decision trees in the framework of axiomatic fuzzy set logic","volume":"7","author":"Liu","year":"2007","journal-title":"Appl. Soft Comput. J."},{"key":"10.1016\/j.asoc.2014.08.041_bib0220","series-title":"Experiments in Induction","author":"Hunt","year":"1966"},{"key":"10.1016\/j.asoc.2014.08.041_bib0225","series-title":"Data Mining: Concepts, Models, and Techniques","author":"Gorunescu","year":"2011"},{"key":"10.1016\/j.asoc.2014.08.041_bib0230","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1016\/j.asoc.2009.08.008","article-title":"A soft computing-based approach for integrated training and rule extraction from artificial neural networks: DIFACONN-miner","volume":"10","author":"\u00d6zbakir","year":"2010","journal-title":"Appl. Soft Comput. J."},{"key":"10.1016\/j.asoc.2014.08.041_bib0235","doi-asserted-by":"crossref","first-page":"2611","DOI":"10.1016\/j.asoc.2010.09.010","article-title":"Prediction of the hERG potassium channel inhibition potential with use of artificial neural networks","volume":"11","author":"Polak","year":"2011","journal-title":"Appl. Soft Comput. J."},{"key":"10.1016\/j.asoc.2014.08.041_bib0240","series-title":"Pattern Classification","author":"Duda","year":"2012"},{"key":"10.1016\/j.asoc.2014.08.041_bib0245","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/BF00994018","article-title":"Support-vector networks","volume":"20","author":"Cortes","year":"1995","journal-title":"Mach. Learn."},{"key":"10.1016\/j.asoc.2014.08.041_bib0250","series-title":"An Application of Support Vector Machines for Customer Churn Analysis: Credit Card Case","first-page":"636","author":"Kim","year":"2005"},{"key":"10.1016\/j.asoc.2014.08.041_bib0255","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1023\/A:1009715923555","article-title":"A tutorial on support vector machines for pattern recognition","volume":"2","author":"Burges","year":"1998","journal-title":"Data Min. Knowl. Discov."},{"key":"10.1016\/j.asoc.2014.08.041_bib0260","doi-asserted-by":"crossref","first-page":"729","DOI":"10.1109\/TNN.2009.2015760","article-title":"Trace ratio problem revisited","volume":"20","author":"Jia","year":"2009","journal-title":"IEEE Trans. Neural Netw."},{"key":"10.1016\/j.asoc.2014.08.041_bib0265","doi-asserted-by":"crossref","first-page":"1738","DOI":"10.1109\/TNNLS.2012.2212721","article-title":"Discriminative least squares regression for multiclass classification and feature selection","volume":"23","author":"Xiang","year":"2012","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.asoc.2014.08.041_bib0270","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1016\/j.telpol.2011.02.009","article-title":"Churn analysis for an Iranian mobile operator","volume":"35","author":"Keramati","year":"2011","journal-title":"Telecommun. Policy"}],"container-title":["Applied Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494614004062?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494614004062?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,30]],"date-time":"2018-09-30T01:55:39Z","timestamp":1538272539000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1568494614004062"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":54,"alternative-id":["S1568494614004062"],"URL":"https:\/\/doi.org\/10.1016\/j.asoc.2014.08.041","relation":{},"ISSN":["1568-4946"],"issn-type":[{"value":"1568-4946","type":"print"}],"subject":[],"published":{"date-parts":[[2014,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Improved churn prediction in telecommunication industry using data mining techniques","name":"articletitle","label":"Article Title"},{"value":"Applied Soft Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.asoc.2014.08.041","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2014 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}