Abstract
A telecommunication system produces daily a large amount of alarm data which contains hidden valuable information about the system behavior. The knowledge discovered from alarm data can be used in finding problems in networks and possibly in predicting severe faults. In this paper, we devise a solution procedure for mining sequential alarm patterns from the alarm data of a GSM system. First, by observing the features of the alarm data, we develop operations for data cleaning. Then, we transform the alarm data into a set of alarm sequences. Note that the consecutive alarm events exist in the alarm sequences, and it is complicated to count the occurrence counts of events and extract patterns. Hence, we devise a new procedure to determine the occurrence count of the sequential alarm patterns in accordance with the nature of alarms. By utilizing time constraints to restrict the time difference between two alarm events, we devise a mining algorithm to discover useful sequential alarm patterns. The proposed mining algorithm is implemented and applied to test against a set of real alarm data provided by a cellular phone company. The quality of knowledge discovered is evaluated. The experimental results show that the proposed operations of data cleaning are able to improve the execution of our mining algorithm significantly and the knowledge obtained from the alarm data is very useful from the perspective of network operators for alarm prediction and alarm control.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
R. Agrawal, T. Imielinski, and A. Swami: Mining Associations between Sets of Items in Massive Databases. In Proceedings of ACM SIGMOD (May 1993) 207–216.
R. Agrawal and R. Srikant. Mining Sequential Patterns. Proceedings of the Eleventh IEEE Inter-national Conference on Data Engineering (1995) 3–14.
B. Bruegge and B. Bennington. Applications of Mobile Computing and Communication. IEEE Personal Communication (February 1996) 64–71.
M-S. Chen, J. Han, and P. S. Yu.: Data Mining: An Overview from Database Perspective. IEEE Transactions on Knowledge and Data Engineering (December 1996) (6):866–883.
N. Davies, G. S. Blair, K. Cheverst, and A. Friday: Supporting Collaborative Application in a Het-erogeneous Mobile Environment. Computer Communication Specical Issues on Mobile Computing (1996).
M. H. Dunham: Mobile Computing and Databases. Tutorial of International Conference on Data Engineering (February 1998).
A. Elmagarmid, J. Jain, and T. Furukawa: Wireless Client/Server Computing for Personal Information Services and Applications. ACM SIGMOD RECORD (December 1995) 24(4):16–21.
Minos N. Garofalakis, Rajeev Rastogi, and Kyuseok Shim: SPIRIT: Sequential Pattern Mining with Regular Expression Constraints. In Proceedings of VLDB (September 1999) 223–234.
J. Han, G. Dong, and Y. Yin: Efficient Mining of Partial Periodic Patterns in Time Series Database. In Proceedings of the 15th International Conference on Data Engineering (March 1999).
J. Han, M. Kamber: Data Mining: Concepts and Techniques. Academic Press (2001).
K. Hätönen, M. Klemettinen, H. Mannila, P. Ronkainen, and H. Toivonen: Knowledge discovery from telecommunication network alarm databases. In Proceedings of the Twelfth International Conference on Data Engineering, New Orleans, Louisiana (1996) 115–122.
N. Krishnakumar and R. Jain: Escrow Techniques for Mobile Sales and Inventory Applications. ACM Journal of Wireless Network (July 1997) 3(3):235–246.
D. L. Lee: Data Management in a Wireless Environment. Tutorial of International Conference on Database System for Advance Applications (April 1999).
H. Mannila, H. Toivonen, and A. I. Verkamo: Discovery of Frequent Episodes in Event Sequences. Data Mining and Knowledge Discovery (1996) 1(3):259–289.
M. Satyanarayanan: Mobile Information Access. IEEE Personal Communication (February 1996) 26–33.
Marek Wojciechowski: Interactive Constraint-Based Sequential Pattern Mining, Proc. of the 5th East European Conference on Advances in Databases and Information Systems (ADBIS'01), Vilnius, Lithuania (2001), to appear.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wu, PH., Peng, WC., Chen, MS. (1999). Mining Sequential Alarm Patterns in a Telecommunication Database. In: Jonker, W. (eds) Databases in Telecommunications II. DBTel 2001. Lecture Notes in Computer Science, vol 2209. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45432-2_4
Download citation
DOI: https://doi.org/10.1007/3-540-45432-2_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42623-3
Online ISBN: 978-3-540-45432-8
eBook Packages: Springer Book Archive