The goal of this work was to develop a new solution for dimensioning Nokia's network management system by utilizing performance data to achieve more accurate predictions for capacity usage. An algorithm for generating predictive models for different system resources and application performance attributes was implemented. Multiple linear regression with an exhaustive branch-and-bound search through the space of possible predictor variables was utilized to predict the usage of different resources. Solutions for the internal and external validation, outlier detection, and the visualization of the models were also specified. The algorithm was evaluated with a sample of data from real network management system environment and the results were pr...
The timely prediction of loan default plays an important role in lending decisions and monitoring lo...
Benchmarking is a common method in evaluating and choosing a NoSQL database. There are already lots ...
This thesis presents a novel application of machine learning technology to automate network security...
The Multiple Interacting Pathways (MIPS) model is a physically based approach for simulating groundw...
In the past few years, there has been a keen interest in mining frequent itemsets in large data repo...
The explosion of high throughput genomic data in recent years has already altered our view of the ex...
The interest for data mining techniques has increased tremendously during the past decades, and nume...
In telecom cloud infrastructures, a wide variety of network elements can be monitored to retrieve fo...
The explosion of high throughput genomic data in recent years has already altered our view of the ex...
What is the best set of facility location decisions for the establishment of a logistics network whe...
Cognitive architectures such as ACT-R provide a system for simulating the mind and human behavior. O...
What is the best set of facility location decisions for the establishment of a logistics network whe...
Benchmarking is a common method in evaluating and choosing a NoSQL database. There are already lots ...
The rapidly changing nature of information and use of information systems within organisations has s...
This guide introduces Data Envelopment Analysis (DEA), a performance measurement technique, in such ...
The timely prediction of loan default plays an important role in lending decisions and monitoring lo...
Benchmarking is a common method in evaluating and choosing a NoSQL database. There are already lots ...
This thesis presents a novel application of machine learning technology to automate network security...
The Multiple Interacting Pathways (MIPS) model is a physically based approach for simulating groundw...
In the past few years, there has been a keen interest in mining frequent itemsets in large data repo...
The explosion of high throughput genomic data in recent years has already altered our view of the ex...
The interest for data mining techniques has increased tremendously during the past decades, and nume...
In telecom cloud infrastructures, a wide variety of network elements can be monitored to retrieve fo...
The explosion of high throughput genomic data in recent years has already altered our view of the ex...
What is the best set of facility location decisions for the establishment of a logistics network whe...
Cognitive architectures such as ACT-R provide a system for simulating the mind and human behavior. O...
What is the best set of facility location decisions for the establishment of a logistics network whe...
Benchmarking is a common method in evaluating and choosing a NoSQL database. There are already lots ...
The rapidly changing nature of information and use of information systems within organisations has s...
This guide introduces Data Envelopment Analysis (DEA), a performance measurement technique, in such ...
The timely prediction of loan default plays an important role in lending decisions and monitoring lo...
Benchmarking is a common method in evaluating and choosing a NoSQL database. There are already lots ...
This thesis presents a novel application of machine learning technology to automate network security...