Search results for "Mining"

showing 10 items of 1730 documents

An efficient cluster-based outdoor user positioning using LTE and WLAN signal strengths

2015

In this paper we propose a novel cluster-based RF fingerprinting method for outdoor user-equipment (UE) positioning using both LTE and WLAN signals. It uses a simple cost effective agglomerative hierarchical clustering with Davies-Bouldin criterion to select the optimal cluster number. The positioning method does not require training signature formation prior to UE position estimation phase. It is capable of reducing the search space for clustering operation by using LTE cell-ID searching criteria. This enables the method to estimate UE positioning in short time with less computational expense. To validate the cluster-based positioning real-time field measurements were collected using readi…

ta113SIMPLE (military communications protocol)business.industryComputer scienceReal-time computingLTE cell-IDFingerprint recognitionGridminimization of drive testsDetermining the number of clusters in a data setEmbedded systemgrid-based RF fingerprintingRadio frequencybusinessCluster analysishierarchical clustering
researchProduct

Online anomaly detection using dimensionality reduction techniques for HTTP log analysis

2015

Modern web services face an increasing number of new threats. Logs are collected from almost all web servers, and for this reason analyzing them is beneficial when trying to prevent intrusions. Intrusive behavior often differs from the normal web traffic. This paper proposes a framework to find abnormal behavior from these logs. We compare random projection, principal component analysis and diffusion map for anomaly detection. In addition, the framework has online capabilities. The first two methods have intuitive extensions while diffusion map uses the Nyström extension. This fast out-of-sample extension enables real-time analysis of web server traffic. The framework is demonstrated using …

ta113Web serverComputer Networks and Communicationsbusiness.industryComputer scienceRandom projectionDimensionality reductionRandom projectionPrincipal component analysisIntrusion detection systemAnomaly detectionMachine learningcomputer.software_genreCyber securityWeb trafficPrincipal component analysisDiffusion mapAnomaly detectionIntrusion detectionArtificial intelligenceData miningWeb servicebusinesskyberturvallisuuscomputer
researchProduct

Listwise Collaborative Filtering

2015

Recently, ranking-oriented collaborative filtering (CF) algorithms have achieved great success in recommender systems. They obtained state-of-the-art performances by estimating a preference ranking of items for each user rather than estimating the absolute ratings on unrated items (as conventional rating-oriented CF algorithms do). In this paper, we propose a new ranking-oriented CF algorithm, called ListCF. Following the memory-based CF framework, ListCF directly predicts a total order of items for each user based on similar users' probability distributions over permutations of the items, and thus differs from previous ranking-oriented memory-based CF algorithms that focus on predicting th…

ta113business.industryComputer scienceRecommender systemMachine learningcomputer.software_genreRankingcollaborative filteringBenchmark (computing)Collaborative filteringProbability distributionPairwise comparisonData miningArtificial intelligencerecommender systemsbusinessFocus (optics)computerranking-oriented collaborative filtering
researchProduct

An Approach for Network Outage Detection from Drive-Testing Databases

2012

A data-mining framework for analyzing a cellular network drive testing database is described in this paper. The presented method is designed to detect sleeping base stations, network outage, and change of the dominance areas in a cognitive and self-organizing manner. The essence of the method is to find similarities between periodical network measurements and previously known outage data. For this purpose, diffusion maps dimensionality reduction and nearest neighbor data classification methods are utilized. The method is cognitive because it requires training data for the outage detection. In addition, the method is autonomous because it uses minimization of drive testing (MDT) functionalit…

ta113cellular network drive testing databaseDowntimeArticle SubjectDatabaseComputer Networks and CommunicationsComputer scienceDimensionality reductionData classificationDiffusion mapcomputer.software_genrelcsh:QA75.5-76.95Base stationHandoverCellular networklcsh:Electronic computers. Computer scienceData miningtiedonlouhintacomputerInformation SystemsTest dataJournal of Computer Networks and Communications
researchProduct

Cognitive self-healing system for future mobile networks

2015

This paper introduces a framework and implementation of a cognitive self-healing system for fault detection and compensation in future mobile networks. Performance monitoring for failure identification is based on anomaly analysis, which is a combination of the nearest neighbor anomaly scoring and statistical profiling. Case-based reasoning algorithm is used for cognitive self-healing of the detected faulty cells. Validation environment is Long Term Evolution (LTE) mobile system simulated with Network Simulator 3 (ns-3) [1, 2]. Results demonstrate that cognitive approach is efficient for compensation of cell outages and is capable to improve network coverage. Anomaly analysis can be used fo…

ta113cognitionta213Performance managementComputer sciencebusiness.industryDistributed computingCognitiondata miningcomputer.software_genreAutomationanomaly detectionFault detection and isolation5G networksNetwork simulationcompensationcell outageRobustness (computer science)self-healingAnomaly detectionData miningbusinesscomputer5G2015 International Wireless Communications and Mobile Computing Conference (IWCMC)
researchProduct

Biased graph walks for RDF graph embeddings

2017

Knowledge Graphs have been recognized as a valuable source for background information in many data mining, information retrieval, natural language processing, and knowledge extraction tasks. However, obtaining a suitable feature vector representation from RDF graphs is a challenging task. In this paper, we extend the RDF2Vec approach, which leverages language modeling techniques for unsupervised feature extraction from sequences of entities. We generate sequences by exploiting local information from graph substructures, harvested by graph walks, and learn latent numerical representations of entities in RDF graphs. We extend the way we compute feature vector representations by comparing twel…

ta113graph embeddingsGraph kernelComputer scienceVoltage graphComparability graphdata mining02 engineering and technologycomputer.software_genre020204 information systemsyhdistetty avoin tietolinked open data0202 electrical engineering electronic engineering information engineeringTopological graph theoryGraph (abstract data type)020201 artificial intelligence & image processingData miningtiedonlouhintaGraph propertyNull graphLattice graphavoin tietocomputerProceedings of the 7th International Conference on Web Intelligence, Mining and Semantics
researchProduct

Revealing Fake Profiles in Social Networks by Longitudinal Data Analysis

2017

ta113longitudinal dataidentiteettiväärennöksetsocial network analysisComputer scienceLongitudinal dataverkkoprofiilitsosiaalinen mediaData scienceanomaly detectiongraph miningväärennöksetidentiteettisuspicious behaviour
researchProduct

Modelling Recurrent Events for Improving Online Change Detection

2016

The task of online change point detection in sensor data streams is often complicated due to presence of noise that can be mistaken for real changes and therefore affecting performance of change detectors. Most of the existing change detection methods assume that changes are independent from each other and occur at random in time. In this paper we study how performance of detectors can be improved in case of recurrent changes. We analytically demonstrate under which conditions and for how long recurrence information is useful for improving the detection accuracy. We propose a simple computationally efficient message passing procedure for calculating a predictive probability distribution of …

ta113noiseComputer scienceData stream miningMessage passingDetectordata streamsonline change detection02 engineering and technologycomputer.software_genreTask (computing)recurrent eventschange points020204 information systems0202 electrical engineering electronic engineering information engineeringProbability distribution020201 artificial intelligence & image processingNoise (video)Data miningBaseline (configuration management)computerChange detectionProceedings of the 2016 SIAM International Conference on Data Mining
researchProduct

An Efficient Network Log Anomaly Detection System Using Random Projection Dimensionality Reduction

2014

Network traffic is increasing all the time and network services are becoming more complex and vulnerable. To protect these networks, intrusion detection systems are used. Signature-based intrusion detection cannot find previously unknown attacks, which is why anomaly detection is needed. However, many new systems are slow and complicated. We propose a log anomaly detection framework which aims to facilitate quick anomaly detection and also provide visualizations of the network traffic structure. The system preprocesses network logs into a numerical data matrix, reduces the dimensionality of this matrix using random projection and uses Mahalanobis distance to find outliers and calculate an a…

ta113random projectionMahalanobis distanceComputer sciencebusiness.industryAnomaly-based intrusion detection systemintrusion detectionDimensionality reductionRandom projectionPattern recognitionIntrusion detection systemcomputer.software_genrekoneoppiminenAnomaly detectionData miningArtificial intelligencetiedonlouhintaAnomaly (physics)mahalanobis distancebusinesscomputerCurse of dimensionality2014 6th International Conference on New Technologies, Mobility and Security (NTMS)
researchProduct

Data mining framework for random access failure detection in LTE networks

2014

Sleeping cell problem is a particular type of cell degradation. There are various software and hardware reasons that might cause such kind of cell outage. In this study a cell becomes sleeping because of Random Access Channel (RACH) failure. This kind of network problem can appear due to misconfiguration, excessive load or software/firmware problem at the Base Station (BS). In practice such failure might cause network performance degradation, which is hardly traceable by an operator. In this paper we present a data mining based framework for the detection of problematic cells. In its core is the analysis of event sequences reported by a User Equipment (UE) to a serving BS. The choice of N i…

ta113sleeping cell problembusiness.industryComputer scienceFirmwareHeuristic (computer science)Event (computing)Reliability (computer networking)data miningLTE networkscomputer.software_genreBase stationRandom-access channelUser equipmentData miningbusinessrandom access channelcomputerRandom accessComputer network2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC)
researchProduct