{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:53:07Z","timestamp":1729637587595,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/icit.2017.7915539","type":"proceedings-article","created":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T02:23:01Z","timestamp":1494642181000},"page":"1232-1237","source":"Crossref","is-referenced-by-count":2,"title":["Designing combo recharge plans for telecom subscribers using itemset mining technique"],"prefix":"10.1109","author":[{"given":"Giridhar","family":"Maji","sequence":"first","affiliation":[]},{"given":"Sharmistha","family":"Mandal","sequence":"additional","affiliation":[]},{"given":"Souvik","family":"Bhattacharya","sequence":"additional","affiliation":[]},{"given":"Soumya","family":"Sen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46131-1_8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07176-3_2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1057\/jors.2016.8"},{"key":"ref13","first-page":"183","article-title":"Review of Data Mining Techniques for Churn Prediction in Telecom","volume":"39","author":"mahajan","year":"2015","journal-title":"Journal of Information and Organizational Sciences"},{"key":"ref14","first-page":"165","article-title":"A survey on data mining techniques in customer churn analysis for telecom industry","volume":"45","author":"almana","year":"2014","journal-title":"International Journal of Engineering Research and Applications"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1016\/j.asoc.2013.09.017","article-title":"Social network analysis for customer churn prediction","volume":"14","author":"verbeke","year":"2014","journal-title":"Applied Soft Computing"},{"key":"ref16","article-title":"Choosing a wrong mobile communication price plan: An empirical analysis of predictors of the degree of tariff misfit among flat rate subscribers in Germany","author":"gerpott","year":"2016","journal-title":"Telematics and Informatics"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2011.09.031"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41154-0_19"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41398-8_31"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1995.380415"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170072"},{"key":"ref6","first-page":"54","article-title":"Mobie: Personalized automated recharge of prepaid mobile phones","author":"burgett","year":"2001","journal-title":"Proceedings of the 2nd International Workshop of Central and Eastern Europe on Multi-Agent Systems"},{"key":"ref5","article-title":"Retaining and Acquiring New Customers by Targeted Marketing: Analysis using DW on CDR Data","author":"maji","year":"2016","journal-title":"IEEE 5th International Conference on Reliability Infocom Technologies and Optimization (ICRITO 2016)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.11.083"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2005.09.080"},{"key":"ref2","first-page":"1075","article-title":"An Empirical Study on Customer Churn Behaviorof Indian Prepaid Mobile Services","volume":"21","author":"rajeswari","year":"2014","journal-title":"Middle-East Journal of Scientific Research"},{"journal-title":"TelecomRegulatory Authority of India","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"42","DOI":"10.5897\/AJMM2015.0445","article-title":"Customer base management in a prepaid mobile market: Usage risk and usage opportunity model","volume":"7","author":"dairo","year":"2015","journal-title":"African Journal of Marketing Management"},{"journal-title":"Data Mining Concepts and Techniques","year":"2011","author":"han","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICICICT.2014.6781357"},{"key":"ref21","first-page":"487","article-title":"Fast algorithms for mining association rules","volume":"1215","author":"agrawal","year":"1994","journal-title":"Proc 20th Int Conf on Very large Data Bases"}],"event":{"name":"2017 IEEE International Conference on Industrial Technology (ICIT)","start":{"date-parts":[[2017,3,22]]},"location":"Toronto, ON","end":{"date-parts":[[2017,3,25]]}},"container-title":["2017 IEEE International Conference on Industrial Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7907563\/7912587\/07915539.pdf?arnumber=7915539","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T15:54:10Z","timestamp":1569340450000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7915539\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icit.2017.7915539","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}