Machine-Learning Techniques for Customer Retention: A Comparative Study
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 2
Abstract
Nowadays, customers have become more interested in the quality of service (QoS) that organizations can provide them. Services provided by different vendors are not highly distinguished which increases competition between organizations to maintain and increase their QoS. Customer Relationship Management systems are used to enable organizations to acquire new customers, establish a continuous relationship with them and increase customer retention for more profitability. CRM systems use machine-learning models to analyze customers’ personal and behavioral data to give organization a competitive advantage by increasing customer retention rate. Those models can predict customers who are expected to churn and reasons of churn. Predictions are used to design targeted marketing plans and service offers. This paper tries to compare and analyze the performance of different machine-learning techniques that are used for churn prediction problem. Ten analytical techniques that belong to different categories of learning are chosen for this study. The chosen techniques include Discriminant Analysis, Decision Trees (CART), instance-based learning (k-nearest neighbors), Support Vector Machines, Logistic Regression, ensemble–based learning techniques (Random Forest, Ada Boosting trees and Stochastic Gradient Boosting), Naïve Bayesian, and Multi-layer perceptron. Models were applied on a dataset of telecommunication that contains 3333 records. Results show that both random forest and ADA boost outperform all other techniques with almost the same accuracy 96%. Both Multi-layer perceptron and Support vector machine can be recommended as well with 94% accuracy. Decision tree achieved 90%, naïve Bayesian 88% and finally logistic regression and Linear Discriminant Analysis (LDA) with accuracy 86.7%.
Authors and Affiliations
Sahar F. Sabbeh
A Modified Feistel Cipher Involving XOR Operation and Modular Arithmetic Inverse of a Key Matrix
In this paper, we have developed a block cipher by modifying the Feistel cipher. In this, the plaintext is taken in the form of a pair of matrices. In one of the relations of encryption the plaintext is multiplied...
An Approach for Energy Efficient Dynamic Virtual Machine Consolidation in Cloud Environment
Nowadays, as the use of cloud computing service becomes more extensive and the customers welcome this service, an increasing trend in energy consumption and operational costs of these centers may be seen. To reduce opera...
U Patch Antenna using Variable Substrates for Wireless Communication Systems
Due to their smaller size and light weighted structures patch antennas are frequently now used in GPS transmitters and receivers and throughout modern communication technology. In this paper a miniaturaized patch antenna...
Estimation of Water Quality Parameters Using the Regression Model with Fuzzy K-Means Clustering
The traditional methods in remote sensing used for monitoring and estimating pollutants are generally relied on the spectral response or scattering reflected from water. In this work, a new method has been proposed to fi...
Determining adaptive thresholds for image segmentation for a license plate recognition system
A vehicle license plate recognition (LPR) system is useful to many applications, such as entrance admission, security, parking control, airport and cargo, traffic and speed control. This paper describe an adaptive thresh...