1 code implementation • 3 Apr 2024 • Daisuke Kikuta, Hiroki Ikeuchi, Kengo Tajiri, Yuta Toyama, Masaki Nakamura, Yuusuke Nakano
To accomplish the mission, it is essential to maintain the power of the telecom base stations.
1 code implementation • 6 Mar 2024 • Daisuke Kikuta, Hiroki Ikeuchi, Kengo Tajiri, Yuusuke Nakano
While the explainability for VRP is significant for improving the reliability and interactivity in practical VRP applications, it remains unexplored.
no code implementations • 24 Mar 2020 • Kengo Tajiri, Yasuhiro Ikeda, Yuusuke Nakano, Keishiro Watanabe
We present the results from experiments involving benchmark data and real log data, which indicate that our method using divided models does not decrease anomaly detection accuracy and a model for anomaly detection can be divided to continue monitoring a network state even if some the log data change.
no code implementations • 18 Dec 2018 • Yasuhiro Ikeda, Keisuke Ishibashi, Yuusuke Nakano, Keishiro Watanabe, Ryoichi Kawahara
Automated anomaly detection is essential for managing information and communications technology (ICT) systems to maintain reliable services with minimum burden on operators.
no code implementations • 12 Nov 2018 • Yasuhiro Ikeda, Kengo Tajiri, Yuusuke Nakano, Keishiro Watanabe, Keisuke Ishibashi
Our algorithm is based on an approximative probabilistic model that considers the existence of anomalies in the data, and by maximizing the log-likelihood, we estimate which dimensions contribute to determining data as an anomaly.