Internet card user loss prediction method and system based on user portraits
A technology of user churn and prediction method, applied in neural learning methods, biological neural network models, instruments, etc., can solve problems such as poor accuracy, and achieve the effect of high prediction accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0070] Such as Figure 7 As shown, this implementation discloses a method for predicting the loss of Internet card users based on user portraits, including the following steps:
[0071] Analyzing the identity characteristics and behavior characteristics of Internet card users related to loss, and determining the key portrait data dimensions and key time-series behavior data dimensions of Internet card users; Degree of active entropy, the key time series behavior data dimension includes the number of days of abnormal behavior that characterizes the abnormal behavior of Internet card users;
[0072] Obtain key portrait data of different user dimensions and key time-series behavior data in different periods from historical data to construct a training data set, and mark the user loss category corresponding to the training data in the training data set; construct a deep learning model, and Using the marked training data in the training data set to train the deep learning model to...
Embodiment 2
[0077] Embodiment 2 Aiming at key issues such as current communication operators' existing user loss and maintenance, a method for predicting the loss of Internet card users based on user portraits is proposed. First, the user attributes, CDR (Call Detail Record), traffic Data and other data are cleaned, and the target user group required by the communication operator is extracted from the data set of each month, and each user is marked with a churn label according to the churn determination rule. Then, feature extraction is performed based on the data of each dimension of the user, which is mainly divided into four aspects, namely, the user's personal information, package and expenditure information, call detail records, and traffic usage behavior, especially for the latter two, according to the formula or algorithm extraction features to maximize the representation of the difference between normal users and churn users. The second step uses the user features and labels extra...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


