Adnan Amin

Adnan Amin
Institute of Management Sciences, Pakistan, Peshawar · Department of Computer Sciences

MS CS (Gold Medalist) , Ph.D. Data mining & Machine learning

About

44
Publications
27,180
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
913
Citations
Citations since 2017
35 Research Items
897 Citations
2017201820192020202120222023050100150200
2017201820192020202120222023050100150200
2017201820192020202120222023050100150200
2017201820192020202120222023050100150200
Introduction
Research Interest: 1. Churn Prediction 2. Data Analytics & Visualization 3. Data mining and Machine Learning
Additional affiliations
December 2015 - present
Institute of Management Sciences, Peshawar, Pakistan.
Position
  • Lecturer
August 2015 - present
Shaheed Benazir Bhutto Women University
Position
  • Visiting Faculty
December 2012 - November 2015
Special Branch Police Khyber Pakhtunkhwa
Position
  • Administrator
Education
January 2016 - December 2019
Institute of Management Sciences, Peshawar, Pakistan
Field of study
  • Data mining, Data Science, Machine Learning
December 2011 - December 2013
Institute of Management Science, Peshawar
Field of study
  • Computer Science
November 2005 - November 2007
University of Peshawar
Field of study
  • Computer Science

Publications

Publications (44)
Article
Full-text available
This paper is about the performance of mapper, shuffle, and reduce operations on varying nature of data using different types of Hadoop’s clusters. Datasets, without duplicated and partially duplicated records were taken on single and two nodes Hadoop clusters. Experiments prove that mapper, shuffle, and reduce operations outperform on columns havi...
Conference Paper
Full-text available
This study contributes to formalize a three phase customer churn prediction technique. In the first phase, a supervised feature selection procedure is adopted to select the most relevant subset of features by laying-off the redundancy and increasing the relevance that leads to reduced and highly correlated features set. In the second phase, a knowl...
Chapter
Full-text available
Predicting the behavior of customer is at great importance for a project manager. Data driven industries such as telecommunication industries have advantage of various data mining techniques to extract meaningful information regarding customer’s future behavior. However, the prediction accuracy of these data mining techniques is significantly affec...
Article
Full-text available
The number of internet-connected devices is rising, resulting in a global network of connected devices, referred to as Internet of Things (IoT). The technologically advanced agriculture industry employs IoT to monitor their environment and automate required functionality. IoT devices generate enormous amount of confidential and critical data, hence...
Article
Link prediction is one of the most essential and crucial tasks in complex network research since it seeks to forecast missing links in a network based on current ones. This problem has applications in a variety of scientific disciplines, including social network research, recommendation systems, and biological networks. In previous work, link predi...
Chapter
Author profiling is part of information retrieval in which different perspectives of the author are observed by considering various characteristics like native language, gender, and age. Different techniques are used to extract the required information using text analysis, like author identification on social media and for Short Text Message Servic...
Article
Full-text available
Online discussion forums are repositories of valuable information where users interact and articulate their ideas, opinions, and share experiences about nu merous topics. They are internet-based online communities where users can ask for help and find the solution to a problem. On online discussion forums, a new user becomes exhausted from reading...
Article
Full-text available
Link prediction is a key problem in the field of undirected graph, and it can be used in a variety of contexts, including information retrieval and market analysis. By “undirected graphs”, we mean undirected complex networks in this study. The ability to predict new links in complex networks has a significant impact on society. Many complex systems...
Article
Full-text available
Link prediction in a complex network is a difficult and challenging issue to address. Link prediction tries to better predict relationships, interactions and friendships based on historical knowledge of the complex network graph. Many link prediction techniques exist, including the common neighbour, Adamic-Adar, Katz and Jaccard coefficient, which...
Article
Numerous techniques have been proposed by researchers to uncover the hidden patterns of real-world complex networks. Finding a hidden community is one of the crucial tasks for community detection in complex networks. Despite the presence of multiple methods for community detection, identification of the best performing method over different complex...
Chapter
Biological network proteins are key operational particles that substantially and operationally cooperate to bring out cellular progressions. Protein links with some other biological network proteins to accomplish their purposes. Physical collaborations are commonly referred to by the relationships of domain-level. The interaction among proteins and...
Chapter
Link prediction among the objects of data is one of the essential tasks in several application fields, such as spam mail detection, expert detection, information retrieval, influence detection, recommender system, surveillance of communication, and disease prediction. Link prediction aims to estimate the missing link based on the existing links in...
Article
Full-text available
Link mining is an important task in the field of data mining and has numerous applications in informal community. Suppose a real-world complex network, the responsibility of this function is to anticipate those links which are not occurred yet in the given real-world network. Holding the significance of LP, the link mining or expectation job has go...
Code
H. He, Y. Bai, E. A. Garcia, and S. Li, "ADASYN: Adaptive synthetic sampling approach for imbalanced learning." in Proc. IEEE Int. Joint Conf. Neural Networks (IJCNN'18), pp. 1322-1328, 2008
Code
N.V. Chawla, A.Lazarevic, L.O. Hall, K. Bowyer, "SMOTEBoost: Improving Prediction of Minority Class in Boosting, Journal of Knowledge Discovery in Databases: PKDD, 2003.
Cover Page
Full-text available
1st Workshop on Leveraging customer behavior using advanced data analytics and Machine learning techniques in 9th World Conference on Information Systems and Technologies, Terceira Island, Azores, Portugal, 30-31 March to 1-2 April 2021.
Research Proposal
Call for Papers: We invite researchers to contribute original research papers and review articles that will seek high- quality contributions regarding the recent advances in applying machine learning for solving cyberthreat for WSS challenges. Topics of interest include, but are not limited to ones listed below. * Deep learning techniques in sec...
Article
Full-text available
Due to the exponential growth in technologies and a greater number of competitors in the telecom sector, the companies are facing a rigorous problem of customer churns. The customer churn is a phenomenon that highlights the customer’s intention who may switch from a certain service or even the service provider company. Many customer churn predictio...
Article
Full-text available
The effective educational systems aimed at improving Cognitive Skills (CS) both in and out of institutions. Such system relies on timely prediction of CS during students’ activities in intuitions. Meanwhile, literature is saturated with the number of approaches which have used study schedules, biological and environmental factors to predict CS. How...
Article
Cross-Company Churn Prediction (CCCP) is a domain of research where one company (target) is lacking enough data and can use data from another company (source) to predict customer churn successfully. To support CCCP, the cross-company data is usually transformed to a set of similar normal distribution of target company data prior to building a CCCP...
Chapter
Full-text available
The high dimensional dataset results in more noise, will require more computations, has huge sparsity linked with high dimensional features and has thus introduced great challenges in data analysis. To efficiently manipulate and address the impact of the challenges faced by high dimensional dataset, researchers used several features reduction metho...
Article
Full-text available
Every year, a large volume of information about students' performance is processed in schools, colleges, and higher studies institutes. This information statistically associates students' performance with their study schedule and family-related characteristics. Recent methods have significantly contributed to student's cognitive skills (CSs) predic...
Article
In today’s digital age, the digital transformation is necessary for almost every competitive enterprise in terms of having access to the best resources and ensuring customer satisfaction. However, due to such rewards, these enterprises are facing key concerns around the risk of next-generation data security or cybercrime which is continually increa...
Article
To achieve excellent marks in job interviews and written examinations, a student must acquire impressive Cognitive Skills (CS) value. Nevertheless, the effects of frustration and CS Related Human Factors (CSRF) profoundly influence the student’s skills during the aforementioned cognitive tasks. The recent methods present significant student’s skill...
Article
Full-text available
To achieve excellent marks in job interviews and written examinations, a student must acquire impressive Cognitive Skills (CS) value. Nevertheless, the effects of frustration and CS Related Human Factors (CSRF) profoundly influence the student’s skills during the aforementioned cognitive tasks. The recent methods present significant student’s skill...
Article
Full-text available
To pass a job interview or written examination, students must have a specific set of Cognitive Skills (CS). The effects of frustration (aggression, giving up, loss of self-confidence, and depression) negatively affect these particular skills. Traditionally, a psychologist is invited for a job interview to determine these skills. Thus, there is no e...
Article
Full-text available
Compromised user credential (CUC) is an activity in which someone, such as a thief, cyber-criminal or attacker gains access to your login credentials for the purpose of theft, fraud, or business disruption. It has become an alarming issue for various organizations. It is not only crucial for information technology (IT) oriented institutions using d...
Article
Customer Churn Prediction (CCP) is a challenging activity for decision makers and machine learning community because most of the time, churn and non-churn customers have resembling features. From different experiments on customer churn and related data, it can be seen that a classifier shows different accuracy levels for different zones of a datase...
Data
Acknowledged sgi.com and https://www.kaggle.com/becksddf/churn-in-telecoms-dataset/data website for providing dataset for researcher as publicly available.
Conference Paper
Full-text available
This study exposes a serious and rapidly growing cyber threat of compromised legitimate user credentials which is very effective for cyber-criminals to gain trusted relationships with the account owners. Such a compromised user's credentials ultimately result in damage incurred by the attacker at large-scale. Moreover, the detection of compromised...
Article
Customer churn is a critical and challenging problem affecting business and industry, in particular, the rapidly growing, highly competitive telecommunication sector. It is of substantial interest to both academic researchers and industrial practitioners, interested in forecasting the behavior of customers in order to differentiate the churn from n...
Article
Full-text available
Customer retention is a major issue for various service-based organizations particularly telecom industry, wherein predictive models for observing the behavior of customers is one of the great instruments in customer retention process and inferring the future behavior of the customers. However, the performances of predictive models are greatly affe...
Conference Paper
Full-text available
The rapidly rising usage of telecommunication and information networks which inter-connect modern society through computers, smart phones and other electronic devices has led to security threats and cyber-crimes (CC) activities. These cybercrime activities has ultimately resulted in CC attack classification as a serious problem in network security...
Article
Full-text available
Suitable site selection for a specific purpose is a crucial activity, and of the greatest importance to a project manager. Several methods have been proposed by the research community for effective site selection, but all proposed methods incur high costs. This study explores the combination of a rough set theory approach (RSTA) with Technique for...
Conference Paper
Full-text available
The Customer churn is a crucial activity in rapidly growing and mature competitive telecommunication sector and is one of the greatest importance for a project manager. Due to the high cost of acquiring new customers, customer churn prediction has emerged as an indispensable part of telecom sectors’ strategic decision making and planning process. I...
Conference Paper
Full-text available
This study contributes to formalize customer churn prediction where rough set theory is used as one-class classifier and multi-class classifier to investigate the trade-off in the selection of an effective classification model for customer churn prediction. Experiments were performed to explore the performance of four different rule generation algo...

Network

Cited By