Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
A METHOD, AN APPARATUS AND A SYSTEM FOR DETECTING ALARM DATA
Document Type and Number:
WIPO Patent Application WO/2018/228672
Kind Code:
A1
Abstract:
A method, comprising receiving, by a generator unit (202), real alarm data (201) comprising alarm events and network parameters, from a network element; generating, by the generator unit (202), modified alarm data (203) by selecting and modifying at least one network parameter of the real alarm data (201); training the generator unit (202) by iterating through the following steps: evaluating, by a discriminator unit (204), the modified alarm data (203) against the real alarm data (201); based on the evaluation results, generating, by the discriminator unit (204), feedback to be provided to the generator unit (202); and generating, by the generator unit (202) based on the feedback new modified alarm data; repeating the iterative steps using the new modified alarm data as modified alarm data (203), wherein the modified alarm data (203) approaches the real alarm data (201) at the discriminator.

Inventors:
WANG HONGBIN (DE)
THIYAGARAJAH JANAKIRAMAN (DE)
LV PENG (DE)
MATTEIS LUCA (DE)
AGAPITOS ALEXANDROS (DE)
Application Number:
PCT/EP2017/064390
Publication Date:
December 20, 2018
Filing Date:
June 13, 2017
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
HUAWEI TECH CO LTD (CN)
WANG HONGBIN (DE)
International Classes:
G06N3/02; H04L12/24
Foreign References:
US20170118092A12017-04-27
Other References:
SAEED SALAH ET AL: "A model-based survey of alert correlation techniques", COMPUTER NETWORKS, vol. 57, no. 5, 1 April 2013 (2013-04-01), pages 1289 - 1317, XP055110638, ISSN: 1389-1286, DOI: 10.1016/j.comnet.2012.10.022
HSIN-CHIEH CHAO ET AL: "Modified adaptive resonance theory for alarm correlation based on distance hierarchy in mobile networks", NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2011 13TH ASIA-PACIFIC, IEEE, 21 September 2011 (2011-09-21), pages 1 - 4, XP032021468, ISBN: 978-1-4577-1668-3, DOI: 10.1109/APNOMS.2011.6076958
Attorney, Agent or Firm:
KREUZ, Georg (DE)
Download PDF:
Claims:
CLAIMS

1. A method, comprising:

receiving, by a generator unit (202), real alarm data (201) comprising alarm events and network parameters, from a network element;

generating, by the generator unit (202), modified alarm data (203) by selecting and modifying at least one network parameter of the real alarm data (201);

training the generator unit (202) by iterating through the following steps:

evaluating, by a discriminator unit (204), the modified alarm data (203) against the real alarm data (201);

based on the evaluation results, generating, by the discriminator unit (204), feedback to be provided to the generator unit (202); and

generating, by the generator unit (202) based on the feedback new modified alarm data; repeating the iterative steps using the new modified alarm data as modified alarm data (203), wherein the modified alarm data (203) approaches the real alarm data (201) at the

discriminator unit (204).

2. The method according to claim 1, characterized in that generating modified and/or new

modified alarm data (203) comprises a step of selecting and modifying at least one network parameter based on the feedback received from the discriminator unit (204),

wherein the feedback is weighted by a policy unit (205) according to a policy metrics based on the information if the previously generated modified alarm data (203) is evaluated as true or false alarm data; or according to an alarm event score metrics based on a sequence of alarm events; wherein

the modified and/or new modified alarm data (203) is generated using a first recurrent neural network in the generator unit (202).

3. The method according to claim 1 or 2, characterized in that the step of evaluating the

modified alarm data (203) is performed in the discriminator unit (204) comprising a second recurrent neural network.

4. The method according to any of the claims 1 to 3, characterized by further comprising the steps of:

assigning by an attention unit (206) a score metrics to alarm events of the real alarm data (201) according to a ranking order of alarm data, and

providing the score metrics to the generator unit (202), wherein the score metrics are generated using a third neural network in the attention unit (206).

5. The method according to claim 4, characterized by further comprising the steps of:

receiving by the generator unit (202) a sequence of N real alarm data (201)

predicting by the generator unit (202) the next, N+l, real alarm data (201); and

providing by the attention unit (206) the score metrics for the past N alarm data.

6. A system, comprising:

a generator unit (202), configured to receive real alarm data (201) comprising alarm events and network parameters from a network element; to generate modified alarm data (203) by selecting and modifying at least one network parameter of the real alarm data (201), wherein the generator unit (202) comprises a first recurrent neural network configured to generate the modified alarm data (203); and

a discriminator unit (204), configured to evaluate the modified alarm data (203) against the real alarm data (201), and to provide feedback on the difference between the real alarm data (201) and the modified alarm data (203) to the generator unit (202), wherein the discriminator unit (204) comprises a second recurrent neural network configured to perform the evaluation of the modified alarm data (203) against the real alarm data (201). 7. The system of claim 6, further comprising:

a policy unit (205), configured to transfer the feedback from the discriminator unit (204) to the generator unit (202), wherein the feedback is weighted by the policy unit (205) according to a policy metrics based on the information if the previously generated modified alarm data (203) is evaluated as true or false alarm data.

8. The system of one of claims 6 or 7, further comprising: an attention unit (206), configured to generate using a third neural network a score metrics and to assign the score metrics to alarm events of the real alarm data (201) according to a ranking order of alarm data, and

to provide the score metrics to the generator unit, wherein the policy unit is configured to weight the feedback according to the score metrics associated with the alarm events.

The system according to claim 8,

wherein the attention unit (206) is further configured to provide to the generator unit (202) the score metrics for the past N alarm data; and

the generator unit (202) is further configured to receive a sequence of N real alarm data (201); and to predict the next, N+l, real alarm data (201).

The system according to any of the claims 6 to 9, characterized in that the system is configured to provide an alarm pattern and an alarm score in response to receiving an alarm event.

A computer program product comprising instructions, which when the program is executed by a computer, cause the computer to carry out the steps of the method of claims 1 to 5.

Description:
A METHOD, AN APPARATUS AND A SYSTEM FOR DETECTING ALARM DATA

BACKGROUND

A telecommunication network may comprise different nodes or network elements, such as mobile phones, base stations or transmission links. The telecommunication network may comprise millions of linked components in an environment that is constantly changing. The nodes generate tests and monitor parameters to maintain the connection to the network. An alarm data may be generated when the node, network element or a terminal connected to the network does not function within predetermined parameters. As an example, a base station antenna may malfunction, causing communication errors to the terminals connected to the base station. The terminals and the base station may send alarm data to the telecommunication network management system.

A large network generates large volumes of alarm data. The alarm data does not always directly indicate the faulty component that may be a root cause for the problem, instead the alarm data may be generated in other components linked to the faulty component. Alarm data generation may sometimes comprise massive bursts. The telecommunication network management system should isolate the most relevant alarm data from the large volume generated daily by all kinds of network elements or components and, if possible, indicate the root cause behind the alarm data. The network administrator should address the problem as soon as possible to mitigate the problem or to prevent the problem from escalating any further.

SUMMARY

This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description.

The telecommunication network management system may receive alarm data having several attributes simultaneously from various sources, thereby giving hints of the actual fault. As one case example, a wireless network may receive multiple error messages from the handsets connected to the network. That may result from a base station failure, wherein the base station is the root cause. The received batch of alarm data comprises a pattern in the time domain and in the dimensions defined by the network parameters. The network parameters in the alarm data may be different according to the component, node, element or terminal sending the alarm data. The first aspect discloses a method that comprises receiving, by a generator unit, real alarm data comprising alarm events and network parameters, from a network element; generating, by the generator unit, modified alarm data by selecting and modifying at least one network parameter of the real alarm data. Further, the generator unit is trained by iterating through the following steps: evaluating, by a discriminator unit, the modified alarm data against the real alarm data; based on the evaluation results, generating, by the discriminator unit, feedback to be provided to the generator unit; and generating, by the generator unit based on the feedback new modified alarm data. These iterative steps are repeated using the new modified alarm data as modified alarm data, wherein the modified alarm data approaches the real alarm data at the discriminator unit. In particular, the iterative method steps are repeated until the discriminator unit cannot distinguish between the modified alarm data and the real alarm data, that is, when the difference between the modified alarm data and the real alarm data falls below a given threshold.

The network is a telecommunication network. The network element may be any component, node or a terminal connected to the telecommunication network. The real alarm data may be a single data event or a batch of alarm events. The method also comprises generating modified alarm data by modifying at least one network parameter of the real alarm data; forming a first data group from the real alarm data and a second data group from the modified alarm data; and detecting an alarm pattern from the first data group by performing steps in a recurrent neural network. A recurrent neural network (RNN) is a class of artificial neural network where connections between units form a directed cycle.

The real alarm data comprises alarm events and network parameters from a network element. The alarm data may comprise different parameters according to the source device. Therefore, the real alarm data may contain parameters that are interrelated between multiple network elements or parameters that relate only to a single element. The recurrent neural network is taught by adding the modified alarm data around the real alarm data, thereby populating a parameter landscape. The recurrent neural network learns to detect real alarm data events and more complex patterns having a batch of real alarm data. In other words, the recurrent neural network may iterate itself to the real- world situation. Real alarm events may be monitored continuously. The data may be output to a telecommunication network management system, flagging serious situations being developed and enabling it to fix the fault situation before it escalates. In an implementation of the first aspect, generating modified and/or new modified alarm data comprises a step of selecting and modifying at least one network parameter based on the feedback received from the discriminator unit, wherein the feedback is weighted by a policy unit according to a policy metrics based on the information if the previously generated modified alarm data is evaluated as true or false alarm data; or according to an alarm event score metrics based on a sequence of alarm events; wherein the modified and/or new modified alarm data is generated in a first recurrent neural network of the generator unit.

In a further implementation of the first aspect, the step of evaluating the modified alarm data is performed in a second recurrent neural network of the generator unit.

In a further implementation of the first aspect, the method further comprises the steps of: assigning by an attention unit a score metrics to alarm events of the real alarm data according to a ranking order of alarm data, and providing the score metrics to the generator unit, wherein the score metrics are generated in a third neural network within the attention unit.

In a further implementation of the first aspect, the method further comprises the steps of: receiving by the generator unit a sequence of N real alarm data; predicting by the generator unit the next, N+l, real alarm data; and providing by the attention unit the score metrics for the past N alarm data.

Given a sequence of N real alarm data (i.e., historical alarm data) the generator unit is able to learn supported by the attention unit a generative model, which is then used to generate new alarm data and indicate root alarms for further alarm events. The prediction accuracy of the generator unit is thus improved.

The second aspect discloses a system, comprising a generator unit, configured to receive real alarm data; to generate modified alarm data by selecting and modifying at least one network parameter of the real alarm data, wherein the generator unit is configured to generate modified alarm in a first recurrent neural network; and a discriminator unit configured to evaluate the modified alarm data against the real alarm data, and to provide feedback on the difference between the real alarm data and the modified alarm data to the generator unit, wherein the discriminator unit is configured to perform the evaluation in a second recurrent neural network.

The system may be a network management system configured to detect various failure patterns in the network. The system is configured to utilize a recurrent neural network. The system may be implemented as a telecommunication network monitoring system, network management system or network operating system. The system may be configured to provide root cause information to help network operators manage the alarm events. As one case example, alarm data received from mobile terminals from the same geographical area may be caused by a faulty base station. The system may detect the pattern and indicate the faulty base station, even if the base station itself does not produce any alarm data.

The system comprises multiple recurrent neural networks, wherein the system may detect a pattern in the sequence of alarm events. The system may comprise a distributed architecture, wherein at least one component of the system may reside in a cloud computing environment.

The recurrent neural network identifies patterns that may be used with root cause analysis on the received alarm data. The alarm data may be compressed significantly, as the root cause may be identified faster and with improved accuracy. A generative recurrent neural network model enables prioritizing alarms, alarm data batches or alarm data patterns, providing attention to particular events. The recurrent neural network may predict faults or problems before they fully escalate. For example, an increased wireless signal attenuation in a particular geographical area may indicate a problem in the wireless network even before the network element fails completely. The disclosed solution may be applied to perform root cause analysis (RCA) for any telecommunication network including a fixed network, a mobile network or a cloud computing environment having multiple interconnected computers. The solution may also be applied to sequential discrete data, such as sequential text data. In an implementation of the second aspect, the system comprises a policy unit, configured to transfer the feedback from the discriminator unit to the generator unit, wherein the feedback is weighted by the policy unit according to a policy metrics based on the information if the previously generated modified alarm data is evaluated as true or false alarm data.

In a further implementation of the second aspect, the system comprises an attention unit, configured to generate using a third neural network a score metrics and to assign the score metrics to alarm events of the real alarm data according to a ranking order of alarm data, and to provide the score metrics to the generator unit, wherein the policy unit is configured to weight the feedback according to the score metrics associated with the alarm events.

In a further implementation of the second aspect, the attention unit is further configured to provide to the generator unit the score metrics for the past N alarm data; and the generator unit is further configured to receive a sequence of N real alarm data; and to predict the next, N+l, real alarm data.

In a further implementation of the second aspect, the system is configured to provide an alarm pattern and an alarm score in response to receiving an alarm event.

The third aspect discloses a computer program product comprising instructions, which when the program is executed by a computer, cause the computer to carry out the steps of the method according to the first aspect.

Many of the attendant features will be more readily appreciated as they become better understood by reference to the following detailed description considered in connection with the accompanying drawings. The embodiments described below are not limited to implementations which solve any or all the disadvantages of known radio frequency identification tags or transponders.

BRIEF DESCRIPTION OF THE DRAWINGS

The present description will be better understood from the following detailed description read in light of the accompanying drawings, wherein

FIG. 1 illustrates schematically an environment for practicing embodiments of the present invention;

FIG. 2 illustrates schematically an architecture of one embodiment; FIG. 3 shows a simplified model of a multi-layer recurrent neural network; FIG. 4 shows a simplified diagram of the functionality of a generator unit;

FIG. 5 shows a simplified diagram of the functionality of a discriminator; FIG. 6 shows a simplified diagram of the functionality of a policy unit; and FIG. 7 shows a simplified diagram of the functionality of an attention unit.

Like reference numerals are used to designate like parts in the accompanying drawings.

DETAILED DESCRIPTION The detailed description provided below in connection with the appended drawings is intended as a description of the present examples and is not intended to represent the only forms in which the present example may be constructed or utilized. However, the same or equivalent functions and sequences may be accomplished by different examples.

Although the present examples are described and illustrated herein as being implemented in a mobile telecommunication network, the apparatus described is provided as an example and not a limitation. As those skilled in the art will appreciate, the present examples are suitable for application in a variety of different types of communication networks having the capability to transmit and receive alarm data between nodes, components, terminals or network elements. FIG. 1 illustrates schematically one example of a telecommunication network. In this example, wireless terminals 131, 132, 133 are wirelessly connected to a base station 120. A telecommunication network 100 is represented by a cloud - the telecommunication network 100 may be implemented in various ways. An apparatus 110 is connected to the

telecommunication network 100. The apparatus 110 comprises at least one processor 111 and a memory 112 for storing instructions that, when the instructions are executed, cause the apparatus 110 to perform the functionality described hereinafter. The apparatus 110 is, in one example, configured to monitor, operate or manage the telecommunication network 100, manage the alarm data and provide further actions to minimize the damage caused by the faulty devices. In one embodiment, the apparatus 100 comprises a user interface for the network management. In one embodiment, the apparatus 100 is a distributed system residing at least partially in a cloud computing environment, wherein the user interface is within reach of the network management personnel.

The telecommunication network 100 comprising a large number of components and elements generates a vast amount of high-speed alarm data. The operator must monitor all incoming alarm events and make decisions to resolve the situation. A Root Cause Analysis (RCA) system described hereinafter may be used to detect situations from the alarm data. The alarm events are not always independent, some alarms may indicate directly the problem, thereby being root cause alarms - some alarms may be regarded as derived alarms. Following the example of wireless terminals 131, 132, 133 and the base station 120, faults in the base station 120 may generate alarm data from the wireless terminals 131, 132, 133. When the root alarm, for example, the faulty base station 120, is identified and resolved, related derived alarms will be automatically cleared. With the learning ability of the recurrent neural network, handcrafted rules or statistical analysis methods for the RCA are not required.

The RCA enables detecting from the historical alarm data the actual alarm data generation process. Further, the RCA enables finding out the relations between alarms or patterns within alarms. These rules or patterns can be used to detect and isolate root alarms and compress the derived alarms. The given historical sequential discrete event data (a sequence of length N) is used to learn the sequential data generation process and detect the relations between events or patterns within events. That is, the trained Generator unit will predict next coming event, N+l, from a sequence of N discrete event data. The Attention unit will output the scores for past N events to indicate which one is most likely to be the influential event.

FIG. 2 illustrates schematically an architecture of one embodiment of the system with its functional units comprising at least one neural network. The architecture enables machine learning a generative model from discrete sequential data. The learning process starts by entering historical sequential data, the real alarm data 201 to the system. The real alarm data

201 is, in one example, a first data group having a sequential form of network parameters in time domain. The real alarm data comprises network parameters from the network element, the network elements may vary and the real alarm data 201 relates to the function of the network element sending the real alarm data. The architecture may adapt to different parameter sets and to different situations. The training process may comprise two training paths.

According to a first training path, the system learns by adversarial training. The generator unit

202 is configured to generate modified alarm data 203 from the real alarm data. The generator unit comprises a recurrent neural network to generate sequential modified alarm data 203. The real alarm data 201 comprises parameters in a given dimension, wherein the generator unit

202 may provide random variation to at least one parameter, thus forming the modified alarm data 203. In an embodiment, the modified alarm data 203 is generated by selecting and modifying at least one network parameter of the real alarm data 201. The discriminator unit

204 is configured to receive the modified sequential alarm data 203 and the real sequential alarm data 201.

The discriminator unit 204 is configured to discriminate whether the modified alarm data 203 is true or false data. The discriminator unit 204 comprises a recurrent neural network to discriminate the data. The discriminator unit 204 sends the result to the generator unit 202 as a feedback through a policy unit 205 for adjusting the recurrent neural network. The policy unit

205 comprises a recurrent neural network (RNN) to connect the generator unit 202 and the discriminator unit 204. The recurrent neural network of the generator unit 202 is weighted according to a policy metrics based on the information if the previously generated modified alarm data 203 is discriminated as true or false alarm data. The system continues the iteration until the discriminator unit 204 cannot tell the difference between the modified alarm data 203 and the real alarm data 201. An attention unit 206 comprises a fully connected neural network to pay attention to important past events. According to a second training path, the system learns by self-supervised training. The generator unit 202 is configured to learn local statistical patterns in sequential data through manipulating historical data to create supervised data artificially. The step of selecting and modifying in the generator unit 202 the at least one network parameter is weighted according to an alarm event score metrics provided by the attention unit 206, based on a sequence of alarm events. In one embodiment, the trained generator unit 202 may be used to predict a next coming event while monitoring live incoming streaming alarm data. The attention unit 206 is configured to output the scores for past N events to indicate which one is most likely to be the influential event. The N represents number of the events in sequential order.

In the following, the functionality of each unit and component is explained in detail. The generator unit 202 may be regarded as a core component of the system. It is configured to learn a generative model for producing sequential data. A generative model is a data generation machine being able to generate the modified alarm data 203 having the appearance of the real alarm data 201. For example, the parameter space of the real alarm data 201 defines the dimensions in which the generator unit 202 may operate. The real parameter value may be altered for the modified alarm data 203. One real alarm data event 201 may be used to generate multiple modified alarm data events 203. The modified alarm data 203 is, in one example, a data group having a sequential form of network parameters in time domain. FIG. 3 shows a simplified model of the multi-layer recurrent neural network (RNN) with long short-term memory (LSTM) or with gated recurrent unit (GRU). The generator unit 202 is configured to operate according to the model of FIG. 3, wherein the recurrent neural network of the generator unit 202 is a first recurrent neural network. An LSTM network is an artificial neural network that contains LSTM units instead of, or in addition to, other network units. An

LSTM unit is a recurrent network unit that may remember values for either long or short durations of time. It uses no activation function within its recurrent components. Thus, the stored value is not iteratively squashed over time, and the gradient or blame term does not tend to vanish when backpropagation through time is applied to train it. A GRU network comprises fewer parameters than LSTM, as the units lack an output gate. FIG. 4 shows a simplified diagram of the functionality of the generator unit 202. The inputs to the generator unit 202 are: historical sequential data, alarm data batches, attention unit 206 weights and policy unit 205 weights. The outputs of the generator unit 202 are: generated sequential modified alarm data and feedback to the attention unit 206. The discriminator unit 204 is configured to evaluate the modified alarm data 203 against the real alarm data 201 - for example, the similarity of the modified alarm data 203 and the real alarms data 201. The discriminator unit 204 is also configured to operate according to the model of FIG. 3, represented as a multi-layer recurrent neural network with LSTM or GRU, wherein the recurrent neural network of the discriminator unit 204 is a second recurrent neural network. The discriminator unit 204 applies different parameters than the generator unit 202. FIG. 5 shows a simplified diagram of the functionality of the discriminator unit 204. The discriminator unit 204 is trained with inputs of modified alarm data 203 and real alarm data 201 in sequential form. The output of the discriminator unit 204 is whether the input sequential modified alarm data 203 is true or not. The policy unit 205 is also configured to operate according to the model of FIG. 3, represented as a multi-layer recurrent neural network with LSTM or GRU, wherein the recurrent neural network of the policy unit 205 is a fourth recurrent neural network. FIG. 6 shows a simplified diagram of the functionality of the policy unit 205. The policy unit 205 is configured to transfer the feedback as policy metrics from the discriminator unit 204 to the generator unit 202, allowing the generator unit 202 to adjust its parameters accordingly.

The attention unit 206 is a fully connected neural network, in one example, a third neural network. The attention unit is configured to pay attention to an important event occurring in the past, thereby detecting a root alarm. The attention unit 206 is trained with the input received from the generator unit 202 and the real alarm data 201, the historical sequential data in a self-supervised manner. FIG. 7 shows a simplified diagram of the functionality of the attention unit 206. The inputs from the generator unit 202 and the real alarm data 201 are sequential events. The attention unit 206 is configured to output a score metrics for each event according to its importance detected by the neural network. An important event, such as the root alarm from the base station 120, provides a high score and an ordinary event, such as a derived alarm from the wireless terminals 131, 132, 133, results in a low score.

The system is trained with the generator unit 202, the discriminator unit 204, the policy unit 205 and the attention unit 206. The two training paths, adversarial training and self-supervised training, improve the learning capability and robustness of the system.

The adversarial training may be regarded as a two-party game, wherein one party acts as the generator unit 202 and another party acts as the discriminator unit 204. The generator unit 202 is configured to generate false data by modifying the parameters of the real alarm data 201, trying to fool the discriminator unit 204. The discriminator unit 204 is configured to indicate the difference between the true data and false data. The output information from the discriminator unit 204 is fed back to the generator unit 202 through the policy unit 205. The generator unit 202 is configured to update its parameters as a response to the feedback information. The detailed algorithm of the adversarial training may be presented as minibatch stochastic gradient descent training of a policy guide adversarial recurrent neural network. In the following example, D represents the discriminator unit 204; P is the policy unit 205; k is the number of steps to update D; an episode is a segment of L time-continuous events such as the batch of sequential alarm data: For number of training iterations do

For k steps do

Sample minibatch of m generated episodes {g_l, g_2, ... , g_m} from Generator unit G. Sample minibatch of m episodes {x_l, x_2, ... , x_m} from historical dataset comprising real alarm data.

Update Discriminator D by minimizing the cost function: L = Sum(log(d(x)) + log(l-(D(g)) End Update Policy P using output scores from the discriminator D.

Use Policy P to sample minibatch of m generated episodes {g_l, g_2, ... , g_m} from

Generator unit G

Update Generator unit G by maximizing log(D(g))

End

The second training path, the self-supervised training may be presented as stochastic gradient descent training of an attentional recurrent neural network, wherein G is the generator unit 202, A is the attention unit 206 and L is the size of a time window. For number of training iterations do

Choose a time stamp t, collect an episode data {x_t-L, ..., x_t-l } as input, x_t as target Update Generator unit G and Attention A by optimizing the cross entropy loss between predicted output y_predict and target_t.

End until no improvement on lost function.

After the model has been trained with the historical alarm data 201, the generator unit 202 has been trained with the attention unit 206. In this example, the discriminator unit 204 and the policy unit 205 are not used. With incoming alarm events having real alarm data 201, the trained generator unit 202 may be able to predict and generate the next following alarm events. The modified alarm data 203 from the training phase represents the prediction after completing the training phase. The attention unit 206 is configured to indicate which alarm data in the past is mostly likely to be the root cause.

In one embodiment, receiving a real alarm event causes the generator unit 202 and the attention unit 206 to provide an alarm pattern and an alarm score. For example, when the generator unit 202 receives an error message, real alarm data from a base station 120, it predicts that terminals 131, 132, 133 being in the serving cell of the base station 120 will send further alarm data. In an embodiment, multiple real alarm events comprise a sequence having a pattern in time domain, wherein the generator unit 202 and the attention unit 206 detect the pattern. At the system level, both training paths may be used to teach the generative model. In one embodiment, the system applies variational autoencoders (VAE) to learn underlying data distribution.

In one embodiment, the generator unit 202, the discriminator unit 204 and the policy unit 205 are represented as a multi-layer recurrent neural network (RNN) with neurons such as LSTM or GRU, but a third neuron type may be applied to the architecture. The attention unit 206 represents a fully connected network. The attention unit 206 may be implemented with other learning models such as a weighted regression model.

A first aspect discloses a method, comprising: receiving real alarm data comprising network parameters from a network element; generating modified alarm data by modifying at least one network parameter of the real alarm data; forming a first data group from the real alarm data and a second data group from the modified alarm data; and detecting an alarm pattern from the data group by performing steps in a recurrent neural network. In a first implementation, the method comprises generating modified alarm data by performing a step of selecting and modifying at least one network parameter, wherein the step is weighted according to a policy metrics based on the information if the previously generated modified alarm data is discriminated as true or false alarm data; and the step of selecting and modifying at least one network parameter is weighted according to an alarm event score metrics based on a sequence of alarm events; and generating the modified alarm data by performing steps in a first recurrent neural network. In a second implementation, the method comprises discriminating the modified alarm data as true or false by receiving the modified alarm data and the real alarm data; and performing the steps in a second recurrent neural network. In a third implementation, the method comprises providing a score metrics to an alarm event based on a sequence of alarm events by receiving the modified alarm data and the real alarm data; and performing the steps in a third neural network. In a fourth implementation, the method comprises providing a policy metrics according to the information if the previously generated modified alarm data is discriminated as true or false alarm data; and performing the steps in a fourth recurrent neural network. In a fifth implementation, the method comprises providing an alarm pattern and an alarm score in response to receiving an alarm event. Alternatively, or in addition, a second aspect is disclosed as an apparatus comprising at least one processor and a memory storing instructions that, when the instructions are executed, cause the apparatus to: receive real alarm data comprising network parameters from a network element by a receiver interface; generate modified alarm data by modifying at least one network parameter of the real alarm data; form a first data group from the real alarm data and a second data group from the modified alarm data; and detect an alarm pattern from the data group by performing steps in a recurrent neural network. In a sixth implementation, the apparatus comprises at least one processor and a memory storing instructions that, when the instructions are executed, cause the apparatus to: generate the modified alarm data by performing steps in a first recurrent neural network, wherein: the step of selecting and modifying at least one network parameter is weighted according to a policy metrics based on the information if the previously generated modified alarm data is discriminated as true or false alarm data; and the step of selecting and modifying at least one network parameter is weighted according to an alarm event score metrics based on a sequence of alarm events. In a seventh implementation, the apparatus comprises at least one processor and a memory storing instructions that, when the instructions are executed, cause the apparatus to: receive the modified alarm data and the real alarm data; discriminate the modified alarm data as true or false; and perform the steps in a second recurrent neural network. In an eighth

implementation, the apparatus comprises at least one processor and a memory storing instructions that, when the instructions are executed, cause the apparatus to: receive the modified alarm data and the real alarm data; provide a score metrics to an alarm event based on a sequence of alarm events; and perform the steps in a third neural network. In a ninth implementation, the apparatus comprises at least one processor and a memory storing instructions that, when the instructions are executed, cause the apparatus to: provide a policy metrics according to the information if the previously generated modified alarm data is discriminated as true or false alarm data; and perform the steps in a fourth recurrent neural network. In a tenth implementation, the apparatus comprises at least one processor and a memory storing instructions that, when the instructions are executed, cause the apparatus to provide an alarm pattern and an alarm score in response to receiving an alarm event.

Alternatively, or in addition, a third aspect is disclosed as a system comprising at least one apparatus having at least one processor and a memory storing instructions that, when the instructions are executed, cause the apparatus to: receive real alarm data comprising a sequence of alarm events and network parameters from a network element by a receiver interface; detect an alarm pattern from the real alarm data by performing steps for analysing the sequence of alarm events in multiple recurrent neural networks; and provide a score metrics to an alarm event based on the sequence of alarm events. In an eleventh implementation, the system comprises at least one apparatus having at least one processor and a memory storing instructions that, when the instructions are executed, cause the apparatus to: generate modified alarm data by modifying at least one network parameter of the real alarm data; form a first data group from the real alarm data and a second data group from the modified alarm data; and detect an alarm pattern from the data group by performing steps in a recurrent neural network. In a twelfth implementation, the system comprises at least one apparatus having at least one processor and a memory storing instructions that, when the instructions are executed, cause the apparatus to: generate the modified alarm data by performing steps in a first recurrent neural network, wherein: the step of selecting and modifying at least one network parameter is weighted according to a policy metrics based on the information if the previously generated modified alarm data is discriminated as true or false alarm data; and the step of selecting and modifying at least one network parameter is weighted according to the alarm event score metrics based on the sequence of alarm events. In a thirteenth implementation, the system comprises at least one apparatus having at least one processor and a memory storing instructions that, when the instructions are executed, cause the apparatus to: receive the modified alarm data and the real alarm data; discriminate the modified alarm data as true or false; and perform the steps in a second recurrent neural network. In a fourteenth implementation, the system comprises at least one apparatus having at least one processor and a memory storing instructions that, when the instructions are executed, cause the apparatus to: receive the modified alarm data and the real alarm data; provide a score metrics to an alarm event based on a sequence of alarm events; and perform the steps in a third neural network. In a fifteenth implementation, the system comprises at least one apparatus having at least one processor and a memory storing instructions that, when the instructions are executed, cause the apparatus to: provide a policy metrics according to the information if the previously generated modified alarm data is discriminated as true or false alarm data; and perform the steps in a fourth recurrent neural network.

Alternatively, or in addition, the apparatus or the system having an apparatus comprises means for performing the steps of the method described hereinbefore. Examples of such means are the processor and the memory with the hardware described in the following paragraphs. Alternatively, or in addition, the functionality described herein can be performed, at least in part, by one or more hardware components or hardware logic components. An example of the control system described hereinbefore is a computing-based device comprising one or more processors which may be microprocessors, controllers or any other suitable type of processors for processing computer-executable instructions to control the operation of the device in order to control one or more alarm data, receive alarm data, batch of alarm data and use the alarm data. The computer-executable instructions may be provided using any computer-readable media that is accessible by a computing-based device. Computer-readable media may include, for example, computer storage media, such as memory and communications media. Computer storage media, such as memory, includes volatile and non- volatile, removable and nonremovable media implemented in any method or technology for storage of information, such as computer-readable instructions, data structures, program modules, program units or other data. Computer storage media includes, but is not limited to, RAM, ROM, EPROM,

EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information for access by a computing device. In contrast, communication media may embody computer-readable instructions, data structures, program modules, program units, or other data in a modulated data signal, such as a carrier wave, or other transport mechanism. As defined herein, computer storage media does not include communication media.

Therefore, a computer storage medium should not be interpreted to be a propagating signal per se. Propagated signals may be present in a computer storage media, but propagated signals per se are not examples of computer storage media. Although the computer storage media is shown within the computing-based device, it will be appreciated that the storage may be distributed or located remotely and accessed via a network or other communication link, for example, by using a communication interface.

The methods described herein may be performed by software in machine-readable form on a tangible storage medium, e.g. in the form of a computer program comprising computer program code means adapted to perform all the steps of any of the methods described herein when the program is run on a computer and where the computer program may be embodied on a computer-readable medium. Examples of tangible storage media include computer storage devices comprising computer-readable media, such as disks, thumb drives, memory etc., and do not only include propagated signals. Propagated signals may be present in a tangible storage media, but propagated signals per se are not examples of tangible storage media. The software can be suitable for execution on a parallel processor or a serial processor such that the method steps may be carried out in any suitable order, or simultaneously. Although at least a portion of the subject matter has been described in language specific to structural features and/or acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as examples of implementing the claims and other equivalent features and acts are intended to be within the scope of the claims.

The invention has been described in conjunction with various embodiments herein. However, other variations to the disclosed embodiments can be understood and effected by those skilled in the art in practicing the claimed invention, from a study of the drawings, the disclosure, and the appended claims. In the claims, the word "comprising" does not exclude other elements or steps, and the indefinite article "a" or "an" does not exclude a plurality. A single processor or other unit may fulfil the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage. A computer program may be stored/distributed on a suitable medium, such as an optical storage medium or a solid-state medium supplied together with or as part of other hardware, but may also be distributed in other forms, such as via the Internet or other wired or wireless telecommunication systems.