Skip to main content

Mining Sequential Alarm Patterns in a Telecommunication Database

  • Conference paper
  • First Online:
Databases in Telecommunications II (DBTel 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2209))

Included in the following conference series:

Abstract

A telecommunication system produces daily a large amount of alarm data which contains hidden valuable information about the system behavior. The knowledge discovered from alarm data can be used in finding problems in networks and possibly in predicting severe faults. In this paper, we devise a solution procedure for mining sequential alarm patterns from the alarm data of a GSM system. First, by observing the features of the alarm data, we develop operations for data cleaning. Then, we transform the alarm data into a set of alarm sequences. Note that the consecutive alarm events exist in the alarm sequences, and it is complicated to count the occurrence counts of events and extract patterns. Hence, we devise a new procedure to determine the occurrence count of the sequential alarm patterns in accordance with the nature of alarms. By utilizing time constraints to restrict the time difference between two alarm events, we devise a mining algorithm to discover useful sequential alarm patterns. The proposed mining algorithm is implemented and applied to test against a set of real alarm data provided by a cellular phone company. The quality of knowledge discovered is evaluated. The experimental results show that the proposed operations of data cleaning are able to improve the execution of our mining algorithm significantly and the knowledge obtained from the alarm data is very useful from the perspective of network operators for alarm prediction and alarm control.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Agrawal, T. Imielinski, and A. Swami: Mining Associations between Sets of Items in Massive Databases. In Proceedings of ACM SIGMOD (May 1993) 207–216.

    Google Scholar 

  2. R. Agrawal and R. Srikant. Mining Sequential Patterns. Proceedings of the Eleventh IEEE Inter-national Conference on Data Engineering (1995) 3–14.

    Google Scholar 

  3. B. Bruegge and B. Bennington. Applications of Mobile Computing and Communication. IEEE Personal Communication (February 1996) 64–71.

    Google Scholar 

  4. M-S. Chen, J. Han, and P. S. Yu.: Data Mining: An Overview from Database Perspective. IEEE Transactions on Knowledge and Data Engineering (December 1996) (6):866–883.

    Article  Google Scholar 

  5. N. Davies, G. S. Blair, K. Cheverst, and A. Friday: Supporting Collaborative Application in a Het-erogeneous Mobile Environment. Computer Communication Specical Issues on Mobile Computing (1996).

    Google Scholar 

  6. M. H. Dunham: Mobile Computing and Databases. Tutorial of International Conference on Data Engineering (February 1998).

    Google Scholar 

  7. A. Elmagarmid, J. Jain, and T. Furukawa: Wireless Client/Server Computing for Personal Information Services and Applications. ACM SIGMOD RECORD (December 1995) 24(4):16–21.

    Article  Google Scholar 

  8. Minos N. Garofalakis, Rajeev Rastogi, and Kyuseok Shim: SPIRIT: Sequential Pattern Mining with Regular Expression Constraints. In Proceedings of VLDB (September 1999) 223–234.

    Google Scholar 

  9. J. Han, G. Dong, and Y. Yin: Efficient Mining of Partial Periodic Patterns in Time Series Database. In Proceedings of the 15th International Conference on Data Engineering (March 1999).

    Google Scholar 

  10. J. Han, M. Kamber: Data Mining: Concepts and Techniques. Academic Press (2001).

    Google Scholar 

  11. K. Hätönen, M. Klemettinen, H. Mannila, P. Ronkainen, and H. Toivonen: Knowledge discovery from telecommunication network alarm databases. In Proceedings of the Twelfth International Conference on Data Engineering, New Orleans, Louisiana (1996) 115–122.

    Google Scholar 

  12. N. Krishnakumar and R. Jain: Escrow Techniques for Mobile Sales and Inventory Applications. ACM Journal of Wireless Network (July 1997) 3(3):235–246.

    Article  Google Scholar 

  13. D. L. Lee: Data Management in a Wireless Environment. Tutorial of International Conference on Database System for Advance Applications (April 1999).

    Google Scholar 

  14. H. Mannila, H. Toivonen, and A. I. Verkamo: Discovery of Frequent Episodes in Event Sequences. Data Mining and Knowledge Discovery (1996) 1(3):259–289.

    Article  Google Scholar 

  15. M. Satyanarayanan: Mobile Information Access. IEEE Personal Communication (February 1996) 26–33.

    Google Scholar 

  16. Marek Wojciechowski: Interactive Constraint-Based Sequential Pattern Mining, Proc. of the 5th East European Conference on Advances in Databases and Information Systems (ADBIS'01), Vilnius, Lithuania (2001), to appear.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wu, PH., Peng, WC., Chen, MS. (1999). Mining Sequential Alarm Patterns in a Telecommunication Database. In: Jonker, W. (eds) Databases in Telecommunications II. DBTel 2001. Lecture Notes in Computer Science, vol 2209. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45432-2_4

Download citation

  • DOI: https://doi.org/10.1007/3-540-45432-2_4

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42623-3

  • Online ISBN: 978-3-540-45432-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics