Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Alarm association rule mining method and device

A rule and weighted correlation technology, applied in the field of communication, can solve the problems of low efficiency, complex network structure, high cost of obtaining effective alarm correlation rules, and achieve the effect of improving accurate determination and avoiding I/O overhead.

Active Publication Date: 2016-07-20
BOCO INTER TELECOM
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method of manually obtaining effective association rules on the live network is inherently inefficient and relies on specific expert experience, making the acquisition of effective alarm association rules expensive and difficult to adapt to emerging new business scenarios
Since the new business network is based on a variety of new technologies, and the network structure is more complex, and there is a trend that the network structure changes more and more frequently, the original method of relying on expert experience is becoming more and more difficult to work, and the acquisition of new effective rules becomes more and more difficult. more and more difficult
Different types of network elements, different levels of alarms, or other factors may lead to differences in the distribution of the number of alarms. This difference makes the results of alarm rule mining not fully meet expectations.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Alarm association rule mining method and device
  • Alarm association rule mining method and device
  • Alarm association rule mining method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0084] In order to set forth the present invention better, provide embodiment two of the present invention below, as figure 2 Shown:

[0085] Step S201: Denoise the alarm on the live network according to the set field information, and obtain the weight parameter of the denoised alarm according to the characteristic attribute of the alarm.

[0086] Alarm denoising refers to the cleaning and filtering of alarm data. Some alarms in the original alarm data are noise data or unnecessary for alarm mining and analysis, and these data need to be eliminated.

[0087] According to the set field information, delete alarms with incomplete field data, remove engineering alarms, remove non-communication equipment alarms, remove associated alarms, remove minor alarms, and remove duplicate alarms. The specific processing content is as follows:

[0088] a) For the full amount of alarm data, filter out the necessary field content according to the needs of mining. As shown in Table 1:

[00...

Embodiment 3

[0153] In order to better illustrate the steps of the present invention to construct a weighted frequent pattern tree, the third embodiment of the present invention is given below, as image 3 Shown:

[0154] In order to better explain the construction method of the weighted frequent pattern tree, some terms need to be explained:

[0155] Support: Assuming that X is an item set and D is a transactional database, the ratio of the number of transactions containing X in D to the total number of transactions in D is the support of X in D. The support of X is recorded as sup(X), and the association rules The support degree of is recorded as sup(X∪Y).

[0156] sup ( X ) = | { t ∈ D | X ⊆ t } | | ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an alarm association rule mining method. The method comprises the following steps: de-noising the current network alarm according to set field information and obtaining a weight parameter of the de-noised alarm according to an alarm characteristic attribute; carrying out window splitting on the de-noised alarm; constructing a transaction database, and constructing a weighted frequent mode tree by taking the de-noised alarm as a project, taking an alarm window as a transaction and combining the weight parameter of the de-noised alarm; obtaining a weighted frequent mode set according to the weighted frequent mode tree; and obtaining a weighted association rule for alarms in the weighted frequent mode set according to a relationship between the weighted frequent mode set and all the sub-sets thereof. According to the method disclosed in the invention, the efficient and correct mining of the alarm association rule can be realized. The invention furthermore discloses an alarm association rule mining device.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to alarm association rule mining technology. Background technique [0002] After years of network management system construction and continuous improvement, telecom operators have established a relatively mature monitoring management model and alarm data analysis and processing process in terms of alarm management. The alarm monitoring and management module of the telecom network management system plays an important role in daily operation and maintenance, and has become an essential tool for operators' alarm monitoring, management and business analysis. [0003] In recent years, data mining technology has achieved remarkable application results in various industries, and the same is true in the communication industry, especially in the field of business support. There have been many application cases. In terms of alarm applications, operators have accumulated a larg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/30G06Q30/02
Inventor 刘旭东刘红跃
Owner BOCO INTER TELECOM
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More