Almost there. On Mon, Mar 27, 2017 at 11:33 PM, Fares <emsai...@gmail.com> wrote:
> Hi, > > Have you published that work so that I could go through it! > > > On Monday, February 6, 2017 at 4:39:34 AM UTC+3, Kamal Murthy wrote: >> >> Hi, >> >> I Developed a graph model (with time series) from a relational model to >> store call detail records (CDR) in nodes, relationships and properties. >> Developed Cypher queries to identify calls that were answered, abandoned, >> sent to voice mail direct etc., and produced tabular data. Identified the >> telephone numbers that never answered the incoming calls along with other >> metrics. >> >> -Kamal >> >> >> On Tuesday, November 1, 2016 at 3:18:20 AM UTC-7, Michael Hunger wrote: >>> >>> Hey, >>> >>> we've done a large scale CDR project at a major Telco company. That one >>> was mostly around accounting and recommendations. >>> >>> Fraud detection would require a different model, but my colleague who >>> worked on that said if you're interested, feel free to contact us >>> officially <https://neo4j.com/contact-us/> for a discussion / >>> evaluation. >>> >>> In general i would take the entities you mentioned and the questions >>> you're asking and draw the whiteboard model that allows you easily to >>> answer the questions. >>> Then take a months worth of data and import it into the model. The >>> cypher queries should mostly look like "query by example" on your model >>> structure with some aggregation and ranking. >>> >>> Michael >>> >>> On Sun, Oct 30, 2016 at 3:11 PM, Craig Taverner <cr...@amanzi.com> >>> wrote: >>> >>>> In my previous work I did data modeling of telecoms networks, including >>>> modeling various event log data (including CDR data), and building >>>> statistics trees on the event logs for later querying. Take a look at the >>>> presentation I gave at graphconnect NY 2013 for some ideas of what we did: >>>> >>>> - Slides: http://www.slideshare.net/craigtaverner/modeling-in- >>>> telecoms-2013 (especially slides 27-29 & 32-33) >>>> - Video: https://vimeo.com/79390660 >>>> >>>> While you could just import a CDR log as a long chain of events, what >>>> you want to do is connect events into category trees, or time trees, or >>>> some other graph structure, at load time (the trees should be built while >>>> importing the data), leading to the possiblity to write Cypher queries that >>>> simply ask pattern questions (match the trees) to get the answers you want. >>>> Some obvious examples from the above: >>>> >>>> - Connect calls from specific phones to 'phone nodes' (do the same >>>> for both caller and callee, see slide 32). >>>> - If you have large volumes of data, consider intermediate nodes >>>> (for example if you always ask about specific phones within time ranges, >>>> then make intermediate nodes time-phone nodes, eg. a single node for >>>> each >>>> phone on each day/date). >>>> - A time tree for time range queries (eg. the very long call query >>>> above). >>>> >>>> I cannot comment on 'simbox' because I don't know what that means. >>>> Watch the video and see if you get ideas on how to model it yourself, >>>> otherwise ask again. >>>> >>>> >>>> >>>> On Sat, Oct 29, 2016 at 4:41 PM, Fares <emsa...@gmail.com> wrote: >>>> >>>>> Dear all, >>>>> >>>>> I am trying to use neo4j for anomaly detection in mobile network data >>>>> (CDRs). This means that I am trying to detect abnormal customers behavior. >>>>> The format of the records may change from company to company but the >>>>> most common attributes are: >>>>> • Caller and called Identification Number; >>>>> • Date and time; >>>>> • Type of Service (Voice Call, SMS, etc...) ; >>>>> • Duration; • Network access point identifiers; >>>>> • Others; >>>>> >>>>> I am trying to model such data using Neo4j and then use cypher queries >>>>> to detect abnormal customers behaviors >>>>> Have any one seen or worked with a similar example? >>>>> >>>>> examples of the scenarios that I am interested in are >>>>> 1- a call which is very long >>>>> 2- what are the access points which are used by more users compared to >>>>> the other access points? >>>>> 3- Detect Simbox or interconnect Bypass fraud. How to knows whether >>>>> the call is normal call or Simbox? >>>>> 4- a phone number (a) which call another phone number (b) more that >>>>> (x) times every day? >>>>> >>>>> Kind regards >>>>> >>>>> -- >>>>> You received this message because you are subscribed to the Google >>>>> Groups "Neo4j" group. >>>>> To unsubscribe from this group and stop receiving emails from it, send >>>>> an email to neo4j+un...@googlegroups.com. >>>>> For more options, visit https://groups.google.com/d/optout. >>>>> >>>> >>>> -- >>>> You received this message because you are subscribed to the Google >>>> Groups "Neo4j" group. >>>> To unsubscribe from this group and stop receiving emails from it, send >>>> an email to neo4j+un...@googlegroups.com. >>>> For more options, visit https://groups.google.com/d/optout. >>>> >>> >>> -- > You received this message because you are subscribed to the Google Groups > "Neo4j" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to neo4j+unsubscr...@googlegroups.com. > For more options, visit https://groups.google.com/d/optout. > -- You received this message because you are subscribed to the Google Groups "Neo4j" group. To unsubscribe from this group and stop receiving emails from it, send an email to neo4j+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.