Embodiments described herein relate to methods and apparatuses for determining whether an anomalous fault event occurring at first entity within a system has occurred locally at the first entity, wherein the system comprises a plurality of entities comprising the first entity. In some examples, the method may be specifically used to determine whether dynamic interference occurring at a cell in a network is due to a passive intermodulation (PIM) noise event.
Generally, all terms used herein are to be interpreted according to their ordinary meaning in the relevant technical field, unless a different meaning is clearly given and/or is implied from the context in which it is used. All references to a/an/the element, apparatus, component, means, step, etc. are to be interpreted openly as referring to at least one instance of the element, apparatus, component, means, step, etc., unless explicitly stated otherwise. The steps of any methods disclosed herein do not have to be performed in the exact order disclosed, unless a step is explicitly described as following or preceding another step and/or where it is implicit that a step must follow or precede another step. Any feature of any of the embodiments disclosed herein may be applied to any other embodiment, wherever appropriate. Likewise, any advantage of any of the embodiments may apply to any other embodiments, and vice versa. Other objectives, features and advantages of the enclosed embodiments will be apparent from the following description.
Uplink reception quality may be dependent upon the signal-to-interference-plus-noise ratio (SINR) or the signal-to-noise ratio (SNR), which is also dependent upon uplink noise. Uplink noise may vary by time and by cell. Time-variant and bursty uplink noise sources typically vary with network load. These noise sources may comprise UEs served by neighboring cells and PIM (passive intermodulation) noise, which is a product of downlink transmitters. These noise sources may then mix to yield uplink interference.
The dynamic interference sources many be addressed by dynamic link adaptation mechanisms which configure scheduling grants, MCS (modulation coding schemes) and other radio parameters per transmission time interval (TTI), every millisecond. These dynamic interference sources may also comprise active components in the radio path comprising: external interferers, distributed antenna systems and repeaters or coverage enhancers.
It may be desirable to be able to identify time intervals during which a cell is experiencing bursty uplink noise sources. In particular it may be desirable to be able to identify when a cell is experiencing a PIM noise event. Current solutions focus on automatic identification of time intervals with static interference.
PIM is a major concern for operators, as its effects are pronounced with:
Existing solutions for PIM detection and mitigation comprise: (a) the use of additional Digital Signal Processor (DSP) hardware at the baseband that can detect and cancel problem frequency combinations during a maintenance window, (b) the use of advanced antennas that refocus the beam to minimize interference, and (c) root cause analysis modules that predict PIM noise events based on aggregated Key Performance Indicators (KPIs). However, the a) and b) solutions require additional hardware or replacement and are therefore expensive. The c) solution is relatively ineffective since PIM is a transient artifact that can cycle between good and bad many times within aggregate KPI reporting intervals.
Simulated environments often fail to capture many real-life network and environmental variables. For these reasons, data-driven Artificial Intelligence or Machine Learning approaches, using real-network data, will often outperform simulations. Furthermore, aggregating data over dissimilar cells or over time may lead to approximations that may not be representative. These variables are especially confounding for transient PIM since noise, time, amplitude and frequency may all be influenced by location-specific variables. Hardware-based solutions, including the DSP approach mentioned above, are comprehensive but costly from an equipment and management perspective.
According to some embodiments there is provided a method for determining whether an anomalous event occurring at first entity within a system has occurred locally at the first entity, wherein the system comprises a plurality of entities comprising the first entity. The method comprises receiving data from the plurality of entities indicative of whether or not an anomalous event is occurring at each of the plurality of entities over a first time period; characterizing the system, based on the received data and a system characterization model, as one of: a system in which only the first entity is experiencing an anomalous event at any one time; a system in which two or more of the plurality of entities are experiencing anomalous events occurring at any one time; and a system for which during at least one second time period within the first time period data is missing for one or more of the plurality of entities; and utilizing one or more of a plurality of anomaly detection models to compare the data received from the first entity to the data received from other entities in the plurality of entities; and responsive to an output of any of the one or more of the plurality of anomaly detection models indicating that the anomalous event has occurred locally at the first entity: determining that a local anomalous event has occurred at the first entity; and assigning a confidence level to the determination that the local anomalous event has occurred at the first entity, wherein the confidence level is based on the characterization of the system.
According to some embodiments there is provided a method for detecting a passive intermodulation, PIM, noise event in a first cell in a network. The method comprises obtaining an indication of uplink noise in the first cell over a first time period; obtaining an indication of uplink noise in one or more neighboring cells to the first cell over the first time period; comparing the uplink noise in the first cell to the uplink noise in the one or more neighboring cells; and responsive to the comparison indicating that: the uplink noise experienced by the first cell during a second time period within the first time period is greater than the uplink noise being experienced by the one or more neighbor cells during the second time period; and the uplink noise experienced by the first cell during a majority proportion of the first time period is considered similar to the uplink noise experienced by the one or more neighbor cells during the majority proportion of the first time period, determining that a PIM noise event has occurred at the first cell during the second time period.
According to some embodiments there is provided an apparatus for determining whether an anomalous event occurring at first entity within a system has occurred locally at the first entity, wherein the system comprises a plurality of entities comprising the first entity. The apparatus comprises processing circuitry configured to: receive data from the plurality of entities indicative of whether or not an anomalous event is occurring at each of the plurality of entities over a first time period; characterize the system, based on the received data and a system characterization model, as one of: a system in which only the first entity is experiencing an anomalous event at any one time; a system in which two or more of the plurality of entities are experiencing anomalous events occurring at any one time; and a system for which during at least one second time period within the first time period data is missing for one or more of the plurality of entities; utilize one or more of a plurality of anomaly detection models to compare the data received from the first entity to the data received from other entities in the plurality of entities; and responsive to an output of any of the one or more of the plurality of anomaly detection models indicating that the anomalous event has occurred locally at the first entity: determine that a local anomalous event has occurred at the first entity; and assign a confidence level to the determination that the local anomalous event has occurred at the first entity, wherein the confidence level is based on the characterization of the system.
According to some embodiments there is provided an apparatus for detecting a passive intermodulation, PIM, noise event in a first cell in a network. The apparatus comprises processing circuitry configured to cause the apparatus to: obtain an indication of uplink noise in the first cell over a first time period; obtain an indication of uplink noise in one or more neighboring cells to the first cell over the first time period; compare the uplink noise in the first cell to the uplink noise in the one or more neighboring cells; and responsive to the comparison indicating that: the uplink noise experienced by the first cell during a second time period within the first time period is greater than the uplink noise being experienced by the one or more neighbor cells during the second time period; and the uplink noise experienced by the first cell during a majority proportion of the first time period is considered similar to the uplink noise experienced by the one or more neighbor cells during the majority proportion of the first time period, determine that a PIM noise event has occurred at the first cell during the second time period.
For a better understanding of the embodiments of the present disclosure, and to show how it may be put into effect, reference will now be made, by way of example only, to the accompanying drawings, in which:
The following sets forth specific details, such as particular embodiments or examples for purposes of explanation and not limitation. It will be appreciated by one skilled in the art that other examples may be employed apart from these specific details. In some instances, detailed descriptions of well-known methods, nodes, interfaces, circuits, and devices are omitted so as not obscure the description with unnecessary detail. Those skilled in the art will appreciate that the functions described may be implemented in one or more nodes using hardware circuitry (e.g., analog and/or discrete logic gates interconnected to perform a specialized function, ASICs, PLAS, etc.) and/or using software programs and data in conjunction with one or more digital microprocessors or general purpose computers. Nodes that communicate using the air interface also have suitable radio communications circuitry. Moreover, where appropriate the technology can additionally be considered to be embodied entirely within any form of computer-readable memory, such as solid-state memory, magnetic disk, or optical disk containing an appropriate set of computer instructions that would cause a processor to carry out the techniques described herein.
Hardware implementation may include or encompass, without limitation, digital signal processor (DSP) hardware, a reduced instruction set processor, hardware (e.g., digital or analogue) circuitry including but not limited to application specific integrated circuit(s) (ASIC) and/or field programmable gate array(s) (FPGA(s)), and (where appropriate) state machines capable of performing such functions.
Embodiments described herein provide a method and apparatus for detecting a passive intermodulation, PIM, noise event in a first cell in a network. For example, embodiments described herein may automatically identify PIM effects from the changes is uplink noise in the first cell and one or more neighbor cells. In RAN, KPIs have causal inter-relationships. For example, SINR degradation can occur due to a rise in interference in the local cell, and/or from a UE served by a neighbor cell. Some embodiments further allow for the detection of the PIM noise events in the presence of other noise and even missing data.
However, the problem statement of detecting whether an anomalous event (for example a fault event such as a PIM noise event) has occurred locally at an entity is not necessarily limited to RAN, but can also be applied to many other domains for example, a Core network and a Basic Service Set (BSS).
The determination of whether an anomalous event has occurred locally at an entity may, for example, be especially useful for virtualized environments where multiple virtual network functions share common compute resources. For example, consider a computer platform running 5 different virtual network functions before a crash or other severe degradation event. In this case, it may be important to automatically detect and classify the time series usage of the virtual network functions that may or may not have contributed to the crash. In this example, therefore the entities comprise the virtual network functions, the anomalous event is the crash, and the aim is to determine whether the anomalous even has occurred locally at one of the virtual network functions, or if the error was experienced globally by all (or most) of the virtual network functions.
Some embodiments described herein therefore provide a method and apparatus for determining whether an anomalous event occurring at a first entity within a system has occurred locally at the first entity. It will be appreciated that embodiments described herein may also be applicable to alarm correlation use cases, to detect the causal patterns leading to alarms.
Bursty uplink noise in cells may result from:
As described above, embodiments described herein identify cells that are experiencing passive intermodulation (PIM) noise by analyzing the interference pattern of the cell and one or more its neighbors cells. Static interference may be inferred when the binned values of interference (i.e. pmRadioRecInterferencePwrPucch) is restricted to one energy band, and the noise is consistent for a few days.
Cells with time-varying noise/interference characteristics, and cells with stable noise/interference characteristics may be classified and assigned into separate groups using a machine learning model. Following this initial classification, embodiments described herein may further differentiate and classify the noise originating from traffic and the noise originating from PIM.
If the noise is from traffic, the neighboring cells would also be experiencing a similar rise in uplink noise. But, for PIM, the noise rise would be local to that particular cell only, with minimal environmental impact.
In step 101 the method comprises obtaining an indication of uplink noise in the first cell over a first time period.
In step 102 the method comprises obtaining an indication of uplink noise in one or more neighboring cells to the first cell over the first time period.
The indications of uplink noise obtained in steps 102 and 103 may be obtained based on Key Parameter Indicator (KPI) data which may be collected in 15-minute aggregated intervals. It will be appreciated that in some examples, KPI data may be aggregated at finer or courser time intervals as well.
In step 103, the method comprises comparing the uplink noise in the first cell to the uplink noise in the one or more neighboring cells.
In step 104, responsive to the comparison indicating that: the uplink noise experienced by the first cell during a second time period within the first time period is greater than the uplink noise being experienced by the one or more neighbor cells during the second time period; and the uplink noise experienced by the first cell during a majority proportion of the first time period is considered similar to the uplink noise experienced by the one or more neighbor cells during the majority proportion of the first time period, the method comprises determining that a PIM noise event has occurred at the first cell during the second time period.
In some examples, step 104 may be performed further responsive to the comparison indicating that any reductions in a signal to noise ratio (e.g. SNR or SINR) experienced by the first cell during the first time period do not correspond in time with any rises in uplink noise levels at the one or more neighbor cells.
It will be appreciated that the uplink noise experienced by the first cell during a time period may be considered similar to the uplink noise experienced by another cell during the time period if there is a statistical similarity between the uplink noise. It will be appreciated that there may be many ways of evaluating the statistical similarity between two time series signals, and it will be further appreciated, that the degree of similarity between the two signals required for the signals to be “considered similar” may be a design choice.
In some examples, the method of
In
So, the method of
Step 103 of
For example, step 103 of
The plurality of anomaly detection models may comprise one or more of:
Examples of these types of anomaly detection models will be described later.
Some of these anomaly detection models may be better at determining whether the cell is experiencing more PIM than others, depending on the scenario.
For example,
However, for scenarios in which the noise is high as illustrated in
Other practical challenges include missing data, as illustrated in
For these (and other) challenges, the embodiments described herein may make use of an ensemble of the plurality of anomaly detection modes. This concept may be applied to scenarios other than PIM artifacts in a cell, as will now be described with reference to
In step 601 the method comprises receiving data from the plurality of entities indicative of whether or not an anomalous event is occurring at each of the plurality of entities over a first time period. For example, step 601 may comprise receiving the uplink interference signals (e.g as illustrated in
In step 602, the method comprises characterizing the system based on the received data and a system characterization model. Step 602 may comprises characterizing the system as one of: a system in which only the first entity is experiencing an anomalous event at any one time; a system in which two or more of the plurality of entities are experiencing anomalous events occurring at any one time; and a system for which during at least one second time period within the first time period data is missing for one or more of the plurality of entities. The system characterization model may comprise a machine learning model such as a neural network.
In step 603 the method comprises utilizing one or more of a plurality of anomaly detection models to compare the data received from the first entity to the data received from other entities in the plurality of entities. In some examples, only one of the plurality of anomaly detection models may be selected based on the output of system characterization models. However, in some examples, a plurality of anomaly detection models are used in parallel to compare the data received from the first entity to the data received from other entities in the plurality of entities.
In step 604, the method comprises, responsive to an output of any of the one or more of the plurality of anomaly detection models indicating that the anomalous event has occurred locally at the first device, determining that a local anomalous event has occurred at the first entity.
In step 605 the method comprises assigning a confidence level to the determination that the local anomalous event has occurred at the first entity, wherein the confidence level is based on the characterization of the system. For example, some anomaly detection models may be known to perform badly when the system is characterised in a certain way. For example, a time series distance based model may not perform well if the system is characterised as a system for which during at least one second time period within the first time period data is missing for one or more of the plurality of entities. Therefore, in this scenario, if a time series distance based model provides an output that indicates that an anomalous event has occurred locally at the first device, the method may assign a low confidence level to this output.
In contrast, if the a time series distance based model provides an output that indicates that an anomalous event has occurred locally at the first device when the system has been characterized as a system in which only the first entity is experiencing an anomalous event at any one time, the method may assign a higher confidence level to the output.
An example of how confidence levels can be assigned to different model types in different scenarios may be described in more detail with reference to
In some examples, the confidence level is determined using a confidence level model. The confidence level model may comprise a machine learning model such as a neural network.
In some examples, one or both of the confidence level model and the system characterization model may be adjusted based on some feedback relating to whether the determination that a local anomalous event has occurred at the first entity was correct. For example, the feedback may be used to adjust the weights of confidence level model and the system characterization model.
An example implementation of the method of
In some examples of the method of
As previously mentioned, the method of
It will be appreciated that, in any Core Network setting where it would be useful to isolate a local versus a global problem, the method of
In some examples, the plurality of entities comprise any plurality of entities providing time-series signals. The data received from the plurality of entities, comprises the time-series signals. In this example, an anomalous event may comprise any anomalous event in the time-series signals that could trigger an alarm in the system. In particular, the method of
In some examples, the plurality of entities may comprise sensors in a driverless vehicle. The data received sensors may comprise sensor data. In this example an anomalous event may comprise an anomalous reading occurring at a sensor. In such driverless vehicles there may be multiple sensors responsible for the vehicle. At any given time an unexpected reading in one of the sensors may be from local causes or from a global external cause such as a car crash. The method of
It will also be appreciated that in some examples an anomalous event may comprise fault event (e.g. a PIM noise event) or positive event (for example an increase in received power at a particular user in a network).
As can be seen from
In order to capture such temporal similarity/dissimilarity patterns, a time series distance based model e.g. Dynamic time warping (DTW) may be used.
A DTW algorithm measures the similarity between two temporal sequences of varying lengths. The optimal match between two sequences is based on a dynamic programming approach, along with an additional locality constraint.
The normalized (Euclidean) distance across all combinations of cells can be used as metric (denoted by D1,D2,D3, . . . DK). This metric may be input into an anomaly estimator which turn forms an output representative of the exact cell and temporal region affected by the PIM event (e.g. represented by H1,H2,H3, . . . ,HK).
Each box is then either shown as black or white. Those boxes with that are black indicate that the Euclidean distance between the signals is small. The boxes that are white indicate that the Euclidean distance between the signals is large. Therefore, the white in the boxes during the days 0 to 2 indicate that the first cell is experiencing more interference than the neighbor cell. It will be appreciated that if the first cell experiences may interference than all of the neighbor cells during days 0, 1 and 2 then it is likely that the first cell is experiencing a PIM event during the days 0, 1 and 2.
In this case therefore, the DTW model was able to correctly show increased distance on the first three days.
It will be appreciated that other time series distance-based approaches, for example Elastic matching, may also be used.
In general, stationary signals don't change their mean or variance over the time. They may contain multiple frequencies, but these frequencies should be distributed equally throughout the time-period. A Fourier Transform may be used to transform a stationary signal from the time domain to the frequency domain.
Frequency domain analysis may then be used to understand which frequencies are present in the signal and how prominent each frequency is. A Machine Learning (ML) classifier can be set on top of the features that can be extracted from the frequency domain (for example, the peaks of the amplitude of frequencies, the location of the peaks etc.). Thus, the underlining time series signal can be distinguished.
Unfortunately, real time signals are not stationary. That is, multiple frequencies may be present in different parts of the signal. To understand such signals, the transformation may be required to provide information about what are the frequencies present, and also, the time at which the frequencies are present.
In the example of PIM noise events, the time series signals that are obtained from different cells, are typical examples of real-time non-stationary signals. Hence, short time analysis of the signals is considered so as to be able to study both the temporal and frequency characteristics. Some techniques which consider frequency domain characterizations are filter-bank techniques such as STFT and wavelet transforms.
The basic equation of a Wavelet Transform Xa,b is,
where x(t) is the input signal, φa,b is the mother wavelet, a is the scaling factor and & is the shifting factor. The scaling factor is the parameter which determines how much the wavelet needs to stretch or shrink in time. The scale factor is inversely proportional to frequency and the equivalent frequency may be calculated using following equation.
where Cf is called the central frequency of a wavelet and δt is the sampling interval. Whenever the scaling factor is increased by 2, the frequency reduced by an octave.
The shifting factor deals with delaying or advancing the wavelet along the length of the signal.
The Wavelet Transform may therefore be rewritten as follows,
There are two types of Wavelet Transforms, a) Continuous WT (CWT) and a Discrete WT (DWT). The type of WTs may be selected based on the application.
In this example, where the application comprises time frequency analysis of the PIM affected signal, CWT may be selected.
The selection of a mother wavelet may be performed based on the application/input signal. In this example, as PIM noise events causes overshoots which present as peaks, one reasonable selection for a mother wavelet is a Morlet wavelet. A Morlet wavelet is suitable for CWT. The equation of a Morlet wavelet is:
It will be appreciated that different mother wavelets may be selected for different applications.
For the PIM noise event application, it is known that the noise which is added to the signal during the dynamic interference mostly causes high frequencies. Thus, the scaling factor of the Wavelet Transform may be adjusted to examine only the higher frequencies present. Again, it will be appreciated that the scaling factor may be adjusted differently for different applications.
For the PIM noise event application, the hypothesis may be that cells under normal working conditions would have less or no high frequency components, whilst cells confronting dynamic interference would be exhibiting high frequencies. On analyzing higher frequencies and locating them in time using the Wavelet Transform, the model may differentiate the underlining time series signals, and thus detect the noisy signals.
In some examples, other transforms of a signal into the time-frequency plane such as Short time Fourier transform coefficients may be used instead of wavelet transform coefficients. It will be appreciated that any uniform/non-uniform filter-bank techniques may be used to capture the frequency and temporal aspects of the signals.
In
In
In
In
Therefore, all cells experience the noise event at frame 50, the cells producing signals 1002 and 1004 experience the noise event at around 270, but one the cell producing the signal 1001 experiences the noise event at around frame 350. The noise event 1010b may therefore be likely to be a PIM event.
In
In
In
In
Therefore, all cells experience the noise event at sample 50, the cells producing signals 1102 and 1104 experience the noise event at around sample 250, but one the cell producing the signal 1101 experiences the noise event at around sample 370. The noise event 1110b may therefore be likely to be a PIM event. From
An anomaly estimator model may then receive the Wavelet Transform coefficients (denoted by X1,X2,X3 . . . XK) as input features. The anomaly estimator model may then use the Wavelet Transform coefficients to output estimates of which cell, and which time period of the cell, is affected by PIM (represented by F1,F2,F3, . . . FK).
The states of a signal may be considered to be latent. The sequence of the states may therefore be inferred in order to detect the presence of PIM-type of noise.
With a Hidden Markov Model (HMM), the latent state has the Markov property (which means that the evolution of the Markov process in the future depends only on the present state and does not depend on past history), and the observed variables are dependent on the latent state.
In this approach, the noisy signal, x1,x2,x3, . . . ,xK forms the observations of the HMM and the latent states of the model (s1,s2,s3, . . . sN) are indicative of the noisy signal regions of the observations.
The state decoding of a signal from a first cell (illustrated in
In other words,
A HMM is defined by the triplet Θ=(π, A, B) where πm represents initial probabilities of states sm being the first state of a state sequence, A represents the state transition probability matrix with elements amn=P(St=sn|St−1=sm), m ε (1,M), and B denotes the emission probability matrix with elements bij=P(xt=vt|St=sj), i ε (1,l). Given an HMM model, θ, the Viterbi algorithm obtains the path corresponding to that which maximizes the likelihood of the observation i.e.,
In this example, M (the number of possible states) and I (the channel memory or, in other words, the depth of the tree as the transitions take place) are both set to 3. The state 0 of the decoding is indicative of signal interference during busy hours, state 1 is indicative of the dips in the signal and is mostly observed during night slots while state 2 is indicative of interferences that can occur at any time.
At times when the HMM states are 2, these times are where the cell is possibly experiencing a PIM noise event.
In this example, the states of the signal modelled by an HMM is decoded using Viterbi decoding technique. It is to be noted that such a formulation doesn't require any explicit labelling. It is possible to use other generic time series models from which latent state can be inferred, for example, Bayesian networks and conditional random fields.
Consider a set of entities be denoted by s1,s2,s3 . . . sN.
Firstly, the data from each entity is received at a classification module 1301. As described with reference to step 601 of
The classification module 1301 classifies the entities as either experiencing static data or dynamic data. Responsive to classifying the data received from an entity as dynamic data, the classification module 1301 may determine that the entity is experiencing an anomalous event during periods in which the data is dynamic.
In some examples, the classification module may be implemented by a Random Forest based classifier that has been trained to identify entities that are providing dynamic data patterns.
The window for training and testing such a Random Forest based classifier may be varied from anywhere between 2-5 days. On unseen test cells, an experimental version of the classifier provided 94% accuracy on 1000 cells.
In this example, the entities identified as experiencing dynamic data are denoted by x1,x2,x3, . . . ,xK.
It will be appreciated that other classification techniques may be used, but L1-norm based classification helps to isolate the static regions of interference well, as it is constant in time and energy levels.
The data received from the entities experiencing dynamic data is then passed to the characterisation model 1302.
As described with reference to step 602 of
The characterisation model 1302 may be implemented as a machine learning model, for example a neural network. The characterisation model may be configured to check if the noise contributed by a particular entity at a particular time is more than the noise contributed by the other entities at the particular time.
As described with reference to step 603 of
Each of the plurality of anomaly detection models may be of a different type. For example, the anomaly detection model 1303 comprises a time series distance based model (in this example DTW), the anomaly detection model 1304 comprises a frequency based model (in this example a wavelet transform model) and the anomaly detection model 1305 comprises a sequence based model (in this example a HMM).
In some examples, based on the characterization of the system, one or more of the plurality of anomaly detection models may be selected. For example, this approach may be chosen if the characterization of the system is known (e.g. not estimated). In this example, the computational complexity may be less as not all of the plurality of anomaly detection models will be employed in all scenarios.
For example, as will be illustrated below with reference to
Responsive to the system being characterized as a system in which only the first entity is experiencing an anomalous event at any one time the apparatus may select to utilize any (or all) of the anomaly detection models, as (as will be described later with reference to
Responsive to the system being characterized as a system in which two or more of the plurality of entities are experiencing anomalous events occurring at any one time the apparatus may select to utilize all of the anomaly detection models as, in this scenario, none of the models are reliably able to detect whether the anomaly is localized (as illustrated in
However, if characterization of the system is unknown (e.g. estimated), then the characterisation model may be trained continually. Based on this, the apparatus may select to employ all of the plurality of anomaly detection models 1303, 1304 and 1305 regardless of the characterisation of the system.
The anomaly detection models 1303, 1304 and 1305 may be configured to output estimates of which entity is experiencing a local anomalous event, and when the entity is experiencing the local anomalous event. It will be appreciated that the anomaly detection model 1303 may be configured to operate as described above with reference to a DTW model, the anomaly detection model 1304 may be configured to operate as described above with reference to a wavelet transform model, and anomaly detection model 1305 may be configured to operate as described above with reference to a HMM. It will also be appreciated that other types of model may be used.
It will be appreciated that, (as described with reference to step 604 of
The outputs of each of the anomaly detection models 1303, 1304 and 1305 are received by a confidence module. The confidence module 1306 may also be configured to receive an indication of the characterization of the system
The confidence model 1306 may be configured to assign a confidence level to the determination that the local anomalous event has occurred at the first entity, wherein the confidence level is based on the characterization of the system.
For example, responsive to the system being characterized as a system in which only the first entity is experiencing an anomalous event at any one time, the confidence module 1306 may assign a high confidence level to the output of any of the anomaly detection models. In other words, in this type of system, all of the types of anomaly detection models are reliable.
In another example, responsive to the system being characterized as a system for which during at least one second time period within the first time period data is missing for one or more of the plurality of entities, the confidence module 1306 May assign a higher confidence level to the output of the frequency based model 1304 than the other anomaly detection models 1303 and 1305. In other words, (as will be illustrated below), as the frequency based model 1304 performs better than the other types of model in scenarios in which data is missing for one or more of the plurality of entities, the output of the frequency based model 1304 may be assigned a higher confidence level in these scenarios.
It will be appreciated that the confidence model 1306 may also be implemented as a machine learning model, for example a neural network.
The confidence model 1306 may output the confidence level along with the indication that the local anomalous event has occurred, to an external entity.
The apparatus 1300 may then obtain an indication of whether the determination that the local anomalous event occurred at the first entity was correct. For example, a human operator may validate the results received from the apparatus 1300.
The characterization model 1302 may be adjusted based on the indication of whether the determination that the local anomalous event occurred at the first entity was correct. In other words the apparatus may adjust how the step of assigning a confidence level is performed responsive to the indication of whether the determination that the local anomalous event occurred at the first entity was correct
For example, if the determination was incorrect, it may be assumed that the characterization model 1302 could have output the wrong characterization of the system. Therefore, weights in the neural network of the characterization model 1302 may be updated in response to this assumption.
Similarly, the confidence model 1306 may be adjusted based on the indication of whether the determination that the local anomalous event occurred at the first entity was correct. For example, if the determination was incorrect, the weights in the neural network of the confidence model 1306 may be adjusted such that the confidence level assigned to that anomaly detection model in that system characterization is lower than previously output.
In this way, both the confidence model 1306 and the characterisation model 1302 may be learnt incrementally from each other, at the expense of higher complexity where all the three approaches are considered. Both characterisation mode 1302 as well as confidence model 1306 provide checks and balances at the two ends of the apparatus 1300. The training and testing time may vary from 10 days to a few months.
It will also be appreciated that each of the anomaly detection models 1303, 1304 and 1305 may also be updated and or retrained based on the obtained indication of whether the determination that the local anomalous event occurred at the first entity was correct.
In the example illustrated, the time series distance based model 1303 is able to correctly indicate the days in which the first cell is experiencing the PIM noise event 1501 (as illustrated in
The apparatus 1800 may be for detecting a PIM noise event. Briefly, the processing circuitry 1801 of the apparatus 1800 is configured to cause the apparatus 1800 to: obtain an indication of uplink noise in the first cell over a first time period; obtain an indication of uplink noise in one or more neighboring cells to the first cell over the first time period; compare the uplink noise in the first cell to the uplink noise in the one or more neighboring cells; and responsive to the comparison indicating that: the uplink noise experienced by the first cell during a second time period within the first time period is greater than the uplink noise being experienced by the one or more neighbor cells during the second time period; and the uplink noise experienced by the first cell during a majority proportion of the first time period is considered similar to the uplink noise experienced by the one or more neighbor cells during the majority proportion of the first time period, determine that a PIM noise event has occurred at the first cell during the second time period.
In some embodiments, the apparatus 1800 may optionally comprise a communications interface 1802. The communications interface 1802 of the apparatus 1800 can be for use in communicating with other nodes, such as other virtual nodes. For example, the communications interface 1802 of the apparatus 1800 can be configured to transmit to and/or receive from other nodes requests, resources, information, data, signals, or similar. The processing circuitry 1801 of apparatus 1800 may be configured to control the communications interface 1802 of the apparatus 1800 to transmit to and/or receive from other nodes requests, resources, information, data, signals, or similar.
Optionally, the apparatus 1800 may comprise a memory 1803. In some embodiments, the memory 1803 of the apparatus 1800 can be configured to store program code that can be executed by the processing circuitry 1801 of the apparatus 1800 to perform the method described herein in relation to the apparatus 1800. Alternatively or in addition, the memory 1803 of the apparatus 1800, can be configured to store any requests, resources, information, data, signals, or similar that are described herein. The processing circuitry 1801 of the apparatus 1800 may be configured to control the memory 1803 of the apparatus 1800 to store any requests, resources, information, data, signals, or similar that are described herein.
The apparatus 1900 may be for determining whether an anomalous event occurring at first entity within a system has occurred locally at the first entity, wherein the system comprises a plurality of entities comprising the first entity. Briefly, the processing circuitry 1901 of the apparatus 1900 is configured to configured to cause the apparatus 1900 to: receive data from the plurality of entities indicative of whether or not an anomalous event is occurring at each of the plurality of entities over a first time period; characterize the system, based on the received data and a system characterization model, as one of: a system in which only the first entity is experiencing an anomalous event at any one time; a system in which two or more of the plurality of entities are experiencing anomalous events occurring at any one time; and a system for which during at least one second time period within the first time period data is missing for one or more of the plurality of entities; utilize one or more of a plurality of anomaly detection models to compare the data received from the first entity to the data received from other entities in the plurality of entities; and responsive to an output of any of the one or more of the plurality of anomaly detection models indicating that the anomalous event has occurred locally at the first entity: determine that a local anomalous event has occurred at the first entity; and assign a confidence level to the determination that the local anomalous event has occurred at the first entity, wherein the confidence level is based on the characterization of the system.
In some embodiments, the apparatus 1900 may optionally comprise a communications interface 1902. The communications interface 1902 of the apparatus 1900 can be for use in communicating with other nodes, such as other virtual nodes. For example, the communications interface 1902 of the apparatus 1900 can be configured to transmit to and/or receive from other nodes requests, resources, information, data, signals, or similar. The processing circuitry 1901 of apparatus 1900 may be configured to control the communications interface 1902 of the apparatus 1900 to transmit to and/or receive from other nodes requests, resources, information, data, signals, or similar.
Optionally, the apparatus 1900 may comprise a memory 1903. In some embodiments, the memory 1903 of the apparatus 1900 can be configured to store program code that can be executed by the processing circuitry 1901 of the apparatus 1900 to perform the method described herein in relation to the apparatus 1900. Alternatively or in addition, the memory 1903 of the apparatus 1900, can be configured to store any requests, resources, information, data, signals, or similar that are described herein. The processing circuitry 1901 of the apparatus 1900 may be configured to control the memory 1903 of the apparatus 1900 to store any requests, resources, information, data, signals, or similar that are described herein.
There is also provided a computer program comprising instructions which, when executed by processing circuitry (such as the processing circuitry 1801 of the apparatus 1800 or the processing circuitry 1901 of the apparatus 1900 described earlier), cause the processing circuitry to perform at least part of the method described herein. There is provided a computer program product, embodied on a non-transitory machine-readable medium, comprising instructions which are executable by processing circuitry to cause the processing circuitry to perform at least part of the method described herein. There is provided a computer program product comprising a carrier containing instructions for causing processing circuitry to perform at least part of the method described herein. In some embodiments, the carrier can be any one of an electronic signal, an optical signal, an electromagnetic signal, an electrical signal, a radio signal, a microwave signal, or a computer-readable storage medium.
Embodiments described herein may automatically detects time stamps from KPIs where data is missing; and may automatically detects interval time stamps where the cell is experiencing high interference from PIM.
Some embodiments described herein are robust to noise and jitter in the data as well as missing data.
The embodiments described herein may alert the operator to check for potential causes of PIM from observed KPI data
In some embodiments described herein, by utilizing an ensemble of anomaly detection models, the embodiments are able to identify causal intervals of missing data, and time-intervals where the cell is experiencing PIM noise. Such embodiments may adapt to recent history including traffic and other environmental changes.
Furthermore, in embodiments described herein, by automatically notifying operators of potential PIM noise events, the operator could reduce costs by avoiding problem frequencies that may lead to PIM noise events, and this can in turn lower costs.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design many alternative embodiments without departing from the scope of the appended claims. The word “comprising” does not exclude the presence of elements or steps other than those listed in a claim, “a” or “an” does not exclude a plurality, and a single processor or other unit may fulfil the functions of several units recited in the claims. Any reference signs in the claims shall not be construed so as to limit their scope.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/SE2021/050768 | 8/3/2021 | WO |