Filters








7,246 Hits in 5.2 sec

Problem Identification by Mining Trouble Tickets

Vikrant Shimpi, Maitreya Natu, Vaishali P. Sadaphal, Vaishali Kulkarni
2014 International Conference on Management of Data  
IT systems of today's enterprises are continuously monitored and managed by a team of resolvers. Any problem in the system is reported in the form of trouble-tickets.  ...  A ticket contains various details of the observed problem. However, the knowledge of the actual problem is hidden in the ticket description along with other information.  ...  CONCLUSION In this paper, we address the problem to mine textual descriptions in tickets to extract issues.  ... 
dblp:conf/comad/ShimpiNSK14 fatcat:b56slvpiofdrffjzcvmdp5cfom

Statistical analysis and prioritisation of alarms in mobile networks

Stefan Wallin, Viktor Leijon, Leif Landen
2009 International Journal of Business Intelligence and Data Mining  
Using this knowledge of alarm flow properties and trouble ticketing information, we suggest a neural network-based approach for alarm classification.  ...  Using data from the trouble ticketing system as a reference, we examine the relationship between mechanical classification of alarms and the human perception of them.  ...  Data mining process Data set selection We used historical databases of alarms and trouble tickets as input.  ... 
doi:10.1504/ijbidm.2009.025408 fatcat:lsjoexeuhfcz5euk6bbaxh64l4

A process for predicting manhole events in Manhattan

Cynthia Rudin, Rebecca J. Passonneau, Axinia Radeva, Haimonti Dutta, Steve Ierome, Delfina Isaac
2010 Machine Learning  
We present a knowledge discovery and data mining process developed as part of the Columbia/Con Edison project on manhole event prediction.  ...  This process can assist with real-world prioritization problems that involve raw data in the form of noisy documents requiring significant amounts of pre-processing.  ...  Acknowledgements This work was sponsored by a grant from Con Edison.  ... 
doi:10.1007/s10994-009-5166-y fatcat:fyvpz7v5j5esddcqm2bzwsj6iq

Workflow extraction for service operation using multiple unstructured trouble tickets

Akio Watanabe, Keisuke Ishibashi, Tsuyoshi Toyono, Tatsuaki Kimura, Keishiro Watanabe, Yoichi Matsuo, Kohei Shiomoto
2016 NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium  
Our method extracts an operator's actions from free-format texts and aligns relative sentences between multiple trouble tickets.  ...  We propose a method of automatically extracting a workflow, a graph indicating a troubleshooting process, using multiple trouble tickets.  ...  These undefined rules make automatic information mining from the amount of trouble tickets challenging.  ... 
doi:10.1109/noms.2016.7502872 dblp:conf/noms/WatanabeITKWMS16 fatcat:cinbmrimvjevzezibns67cc7ha

Workflow Extraction for Service Operation Using Multiple Unstructured Trouble Tickets

Akio WATANABE, Keisuke ISHIBASHI, Tsuyoshi TOYONO, Keishiro WATANABE, Tatsuaki KIMURA, Yoichi MATSUO, Kohei SHIOMOTO, Ryoichi KAWAHARA
2018 IEICE transactions on information and systems  
Our method extracts an operator's actions from free-format texts and aligns relative sentences between multiple trouble tickets.  ...  We propose a method of automatically extracting a workflow, a graph indicating a troubleshooting process, using multiple trouble tickets.  ...  These undefined rules make automatic information mining from the amount of trouble tickets challenging.  ... 
doi:10.1587/transinf.2017dap0014 fatcat:wnylwpbm45eqlj6qizciarru5m

An Intelligent Alarm Management System for Large-Scale Telecommunication Companies [chapter]

Raúl Costa, Nuno Cachulo, Paulo Cortez
2009 Lecture Notes in Computer Science  
The correlation engine achieved promising results, measured by a compression rate of 70% and assessed in real-time by experienced network administrator staff.  ...  The proposed architecture includes a rules management module that is based in data mining (to generate the rules) and reinforcement learning (to improve rule selection) algorithms.  ...  priorities in trouble ticket reports.  ... 
doi:10.1007/978-3-642-04686-5_32 fatcat:yvk5v23uynduzajtixdbttefsy

Text Categorization for Deriving the Application Quality in Enterprises Using Ticketing Systems [chapter]

Thomas Zinner, Florian Lemmerich, Susanna Schwarzmann, Matthias Hirth, Peter Karg, Andreas Hotho
2015 Lecture Notes in Computer Science  
problems.  ...  In this paper, we analyze in a case study the applicability of supervised learning algorithms for the automatic identification of relevant tickets, i.e., tickets indicating problematic applications.  ...  Acknowledgement This work is supported by the Deutsche Forschungsgemeinschaft (DFG) under Grants HO TR 257/41-1. The authors alone are responsible for the content.  ... 
doi:10.1007/978-3-319-22729-0_25 fatcat:vatab5jlkbbr3aea37pwetrgfe

Rethinking network management: Models, data-mining and self-learning

S. Wallin, C. Ahlund, J. Nordlander
2012 2012 IEEE Network Operations and Management Symposium  
The data-mining and self-learning solutions show that we can learn from available decisions made by experts and automatically assign alarm priorities.  ...  This thesis proposes solutions in these areas based on domain-specific languages, data-mining and selflearning. Most of the solutions have been validated based on data from a large service provider.  ...  ACKNOWLEDGEMENTS This paper partly describes work undertaken in the Context of the Magneto-Celtic Telecommunication Solutions Project, which is partially funded by the Commission of the European Union.  ... 
doi:10.1109/noms.2012.6212003 dblp:conf/noms/WallinAN12 fatcat:bsd7jfo6frgwnp4duogm5ifzky

Page 25 of AMC Journal Vol. 26, Issue 3 [page]

1940 AMC Journal  
Certain types of mine scales incorporate design features which adequately protect the bearings from wear and insure continued sensi- MARCH, 1940 By G. C.  ...  The printing device is attached to the dial and is so arranged that it will print the weight indicated on the chart on a ticket or a continu- ous roll tape.  ... 

Panning requirement nuggets in stream of software maintenance tickets

Senthil Mani, Karthik Sankaranarayanan, Vibha Singhal Sinha, Premkumar Devanbu
2014 Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering - FSE 2014  
Currently, repeat problems are found by manual analysis; effective solutions depend on the collective experience of the team solving them.  ...  In this paper, we propose an approach to automatically analyze problem tickets to discover groups of problems being reported in them and provide meaningful, descriptive labels to help interpret these groups  ...  This need to mine common problem patterns to identify feature requests has also been seen in open source projects.  ... 
doi:10.1145/2635868.2635897 dblp:conf/sigsoft/ManiSSD14 fatcat:7wnl5tplfnfl3lgqzx4u73snai

Ticket Collection with Destination Prediction in Bus Services in Urban Areas using Time Based Predictive Algorithm

2019 International Journal of Engineering and Advanced Technology  
still be operated by man.  ...  Initially the bank details of the passenger must be linked to the app.Machine learning predictive parsing algorithm in combination with data mining features enable the prediction of the passengers to and  ...  Mining thehistory of journeys of various users, collected by preprogrammed ticketing units, unlocks the possibilities to address this crater.  ... 
doi:10.35940/ijeat.a1025.1091s19 fatcat:kx4xhtj2jfah5mgncc47o3ggba

A Symptom Extraction and Classification Method for Self-Management

Marcelo Perazolo
2005 Latin American Network Operations and Management Symposium  
Novel industry initiatives, like the Autonomic Computing paradigm provide concepts such as Events and Symptoms to facilitate automatic processing and consequently identification and treatment of problems  ...  The purpose of this study is to determine whether the essence of IT problem determination and prediction can be captured by a limited number of generic symptom types.  ...  The second step was to adopt a common methodology and extract specific symptoms by using data mining tools and manual analysis.  ... 
dblp:conf/lanoms/Perazolo05 fatcat:ke47s6devje2hkbfusmjsz3dzy

The Design of Self-purchasing System for Train Tickets Based on Block Chain Identity Authentication Technology

Kun Yang, Chen Yang, Feng Yang
2018 International Journal of Sciences  
Self-service ticket collection machine finishes printing tickets. The system uses block chain and secret key matching to achieve the identity authentication of the ticket collector.  ...  The ticket digital encryption database encrypts the identity and ticket information and sends it to the communication terminal.  ...  This brings great trouble to the passengers who temporarily lose their ID cards and those who can't print tickets without their ID card.  ... 
doi:10.18483/ijsci.1700 fatcat:7xnl6bhslnewdin7fctefxf22q

What happened in my network

Tongqing Qiu, Zihui Ge, Dan Pei, Jia Wang, Jun Xu
2010 Proceedings of the 10th annual conference on Internet measurement - IMC '10  
techniques tailored to our problem domain.  ...  Router syslogs are messages that a router logs to describe a wide range of events observed by it.  ...  We say there is match between a trouble ticket and an event digest if (i) the duration of the event digest covers the creation time of the trouble ticket and (ii) the event location of specified in the  ... 
doi:10.1145/1879141.1879202 dblp:conf/imc/QiuGPWX10 fatcat:hrhzmpyivjhizivfi7xy4rucwq

A Recapitalization on Crypto jacking and end to end Analysis of Ransomware Attacks

2019 International Journal of Engineering and Advanced Technology  
This block chain is managed by peer to peer network, based upon this blockchain network crypto jacking takes place, and hence cryptojacking is mining of one's digital currencies without their knowledge  ...  Tracking and finding the cause of theft becomes very hard in this method because mining kits can be purchased at a very cheap cost.  ...  , extraction of static indicators, that allow the identification of non-active mining scripts Phase 1: Under this first phase we will consider different websites to create a mining pool, with host mining  ... 
doi:10.35940/ijeat.f1291.0986s319 fatcat:rl23aqazive7nipwptrzokbtgy
« Previous Showing results 1 — 15 out of 7,246 results