Fig. 2From: Detecting telecommunication fraud by understanding the contents of a callExample of extraction features processingBack to article page