首页> 外文会议>Knowledge Acquisition and Modeling Workshop,KAM,2008 IEEE International Symposium on >Network Topology Constraint Based Transaction Separation and Mining Algorithm of Telecom Alarm
【24h】

Network Topology Constraint Based Transaction Separation and Mining Algorithm of Telecom Alarm

机译:基于网络拓扑约束的电信报警事务分离与挖掘算法

获取原文

摘要

The efficiency of alarm mining in large scale network is a hot topic in research area of fault location. Many projects have been utilized to improve it and some advance has been achieved, but it is still not very satisfied. Large scale telecom system daily generates large numbers of original alarm records and many of them are redundant information, actually useful information for fault location is only a small part. So in order to increase efficiency of alarm mining, we propose a solution called network topology constraint based transaction separation in this paper and we also compare it with the method of adding topology constraint into mining algorithms. The experiments show that separating transaction with network topology constraint deletes a huge number of redundant alarm information and incorrect transaction sets before executing mining algorithms, therefore, it is can be more efficient and precise than topology constraint based mining algorithm, which filters erroneous frequent sub-patterns during algorithm execution.
机译:大规模网络中的警报挖掘效率是故障定位研究领域的热门话题。已经利用许多项目对其进行了改进,并且已经取得了一些进步,但是仍然不是很满意。大型电信系统每天都会生成大量原始警报记录,其中许多是冗余信息,实际上对故障定位有用的信息只是一小部分。因此,为了提高警报挖掘的效率,本文提出了一种基于网络拓扑约束的事务分离解决方案,并将其与在挖掘算法中添加拓扑约束的方法进行了比较。实验表明,在执行挖掘算法之前,将具有网络拓扑约束的事务分离会删除大量冗余警报信息和不正确的事务集,因此,与基于拓扑约束的挖掘算法(过滤错误的频繁子对象)相比,它效率更高,更精确。算法执行过程中的模式。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号