{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:17:53Z","timestamp":1761621473008,"version":"3.37.3"},"reference-count":136,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/P028764\/1"],"award-info":[{"award-number":["EP\/P028764\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2938410","type":"journal-article","created":{"date-parts":[[2019,8,29]],"date-time":"2019-08-29T20:07:40Z","timestamp":1567109260000},"page":"124514-124539","source":"Crossref","is-referenced-by-count":42,"title":["Cell Fault Management Using Machine Learning Techniques"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0368-575X","authenticated-orcid":false,"given":"David","family":"Mulvey","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5716-1396","authenticated-orcid":false,"given":"Chuan Heng","family":"Foh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7097-9969","authenticated-orcid":false,"given":"Muhammad Ali","family":"Imran","sequence":"additional","affiliation":[]},{"given":"Rahim","family":"Tafazolli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2016","journal-title":"3rd Generation Partnership Project Technical Specification Group Radio Access Network Universal Terrestrial Radio Access (UTRA) and Evolved Universal Terrestrial Radio Access (E-UTRA) Radio Measurement Collection for Minimization of Drive Tests (MDT) Overall Description Stage 2 (Release 13)","key":"ref39"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/MCOM.2012.6353680"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/TVT.2015.2431371"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/TVT.2016.2586143"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1186\/s13638-016-0733-y"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/LCOMM.2015.2426187"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/MCOM.2012.6211483"},{"year":"2017","journal-title":"3rd Generation Partnership Project Technical Specification Group Services and System Aspects Telecommunication Management Subscriber and Equipment Trace Trace Data Definition and Management (Release 14)","key":"ref36"},{"year":"2017","journal-title":"3rd Generation Partnership Project Technical Specification Group Services and System Aspects Telecommunication Management Subscriber and Equipment Trace Trace Control and Configuration Management (Release 15)","key":"ref35"},{"year":"2017","journal-title":"3rd Generation Partnership Project Technical Specification Group Services and System Aspects Telecommunication Management Subscriber and Equipment Trace Trace Concepts and Requirements (Release 14)","key":"ref34"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/ICC.2012.6364384"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/TNSM.2012.031912.110155"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/GLOCOMW.2014.7063443"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/COMST.2019.2924243"},{"year":"2018","author":"klaine","journal-title":"The Role and Applications of Machine Learning in Future Self-Organizing Cellular Networks","key":"ref22"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/SURV.2012.021312.00116"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/MCOM.2012.6384463"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/COMST.2018.2825786"},{"doi-asserted-by":"publisher","key":"ref101","DOI":"10.1109\/MCOM.2011.5936160"},{"year":"2017","journal-title":"3rd Generation Partnership Project Technical Specification Group Services and System Aspects Telecommunication Management Key Performance Indicators (KPI) for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) Definitions (Release 14)","key":"ref26"},{"doi-asserted-by":"publisher","key":"ref100","DOI":"10.1016\/j.comnet.2010.03.005"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/MNET.2014.6963801"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1109\/CC.2014.7022524"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1109\/WCNC.2014.6952531"},{"doi-asserted-by":"publisher","key":"ref59","DOI":"10.1109\/VTCSpring.2016.7504129"},{"key":"ref58","first-page":"1","article-title":"Cell outage detection based on improved BP neural network in LTE system","author":"feng","year":"2015","journal-title":"Proc 11th Int Conf Wireless Commun Netw Mobile Comput (WiCOM)"},{"doi-asserted-by":"publisher","key":"ref57","DOI":"10.1109\/ACCESS.2017.2720164"},{"doi-asserted-by":"publisher","key":"ref56","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"ref55","volume":"1","author":"sutton","year":"1998","journal-title":"Reinforcement Learning An Introduction"},{"year":"2011","author":"hastie","journal-title":"The Elements of Statistical Learning Data Mining Inference and Prediction","key":"ref54"},{"year":"2012","author":"murphy","journal-title":"Machine Learning A Probabilistic Perspective","key":"ref53"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1057\/jors.1985.106"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/MSP.2014.2332611"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/MCOM.2012.6353681"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/COMST.2015.2451514"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/COMST.2016.2548658"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/JSAC.2014.2328098"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/MIM.2015.7108393"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1109\/APMC.2009.5384420"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/MCOM.2014.6957145"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/MNET.2015.7064897"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/MASCOT.1997.567613"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1109\/65.244794"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1109\/8.774136"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1109\/TNET.2012.2188837"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1007\/978-3-540-92157-8_19"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1145\/2641798.2641815"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1109\/65.17975"},{"year":"2014","author":"pearl","journal-title":"Probabilistic Reasoning in Intelligent Systems Networks of Plausible Inference","key":"ref43"},{"doi-asserted-by":"publisher","key":"ref127","DOI":"10.1109\/HSI.2018.8430788"},{"doi-asserted-by":"publisher","key":"ref126","DOI":"10.1016\/j.dsp.2017.10.011"},{"key":"ref125","article-title":"Explainable Artificial Intelligence: Understanding, visualizing and interpreting deep learning models","author":"samek","year":"2017","journal-title":"arXiv 1708 08296"},{"key":"ref124","first-page":"5","article-title":"Interpretable convolutional neural networks","volume":"2","author":"zhang","year":"2017","journal-title":"arXiv 1710 00935"},{"doi-asserted-by":"publisher","key":"ref73","DOI":"10.1109\/TWC.2014.2360865"},{"doi-asserted-by":"publisher","key":"ref72","DOI":"10.1016\/j.comnet.2013.07.028"},{"doi-asserted-by":"publisher","key":"ref129","DOI":"10.1214\/15-AOAS848"},{"doi-asserted-by":"publisher","key":"ref71","DOI":"10.1109\/VETECS.2011.5956417"},{"key":"ref128","first-page":"818","article-title":"Visualizing and understanding convolutional networks","author":"zeiler","year":"2014","journal-title":"Proc Eur Conf Comput Vis"},{"doi-asserted-by":"publisher","key":"ref70","DOI":"10.1016\/j.comnet.2015.02.031"},{"doi-asserted-by":"publisher","key":"ref76","DOI":"10.1109\/WCNC.2014.6952896"},{"doi-asserted-by":"publisher","key":"ref130","DOI":"10.1126\/science.aab3050"},{"doi-asserted-by":"publisher","key":"ref77","DOI":"10.1155\/2014\/624858"},{"doi-asserted-by":"publisher","key":"ref74","DOI":"10.1109\/MVT.2015.2479657"},{"doi-asserted-by":"publisher","key":"ref75","DOI":"10.1109\/CC.2018.8357700"},{"key":"ref133","article-title":"Explainable AI: Beware of inmates running the asylum or: How I learnt to stop worrying and love the social and behavioural sciences","author":"miller","year":"2017","journal-title":"arXiv 1712 00547"},{"doi-asserted-by":"publisher","key":"ref134","DOI":"10.1109\/ACCESS.2018.2870052"},{"doi-asserted-by":"publisher","key":"ref131","DOI":"10.1145\/2939672.2939778"},{"doi-asserted-by":"publisher","key":"ref78","DOI":"10.1007\/s11276-015-1087-9"},{"year":"2016","author":"gunning","journal-title":"Explainable artificial intelligence (xai)","key":"ref132"},{"doi-asserted-by":"publisher","key":"ref79","DOI":"10.1109\/IWCMC.2015.7289156"},{"doi-asserted-by":"publisher","key":"ref136","DOI":"10.1109\/MSP.2012.2211477"},{"doi-asserted-by":"publisher","key":"ref135","DOI":"10.1109\/TPAMI.2013.50"},{"doi-asserted-by":"publisher","key":"ref60","DOI":"10.1109\/TVT.2015.2431742"},{"doi-asserted-by":"publisher","key":"ref62","DOI":"10.1109\/WCNC.2012.6214281"},{"doi-asserted-by":"publisher","key":"ref61","DOI":"10.1109\/JIOT.2016.2624761"},{"key":"ref63","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1038\/nature14236","article-title":"Human-level control through deep reinforcement learning","volume":"518","author":"mnih","year":"2015","journal-title":"Nature"},{"key":"ref64","first-page":"234","article-title":"An improved anomaly detection and diagnosis framework for mobile network operators","author":"nov\u00e1czki","year":"2013","journal-title":"Proc 9th Int Conf Design Reliable Commun Netw (DRCN)"},{"doi-asserted-by":"publisher","key":"ref65","DOI":"10.1109\/DRCN.2015.7149014"},{"doi-asserted-by":"publisher","key":"ref66","DOI":"10.1155\/2012\/163184"},{"key":"ref67","first-page":"82","article-title":"Hidden anomaly detection in telecommunication networks","author":"bouillard","year":"2012","journal-title":"Proc 8th Int Conf Netw Service Manage"},{"doi-asserted-by":"publisher","key":"ref68","DOI":"10.1109\/CNSM.2013.6727831"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/MCOM.2013.6461192"},{"doi-asserted-by":"publisher","key":"ref69","DOI":"10.1109\/ICCChina.2014.7008366"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/GLOCOMW.2012.6477646"},{"doi-asserted-by":"publisher","key":"ref109","DOI":"10.1109\/TSP.2014.2337840"},{"doi-asserted-by":"publisher","key":"ref95","DOI":"10.1109\/ACSSC.2018.8645083"},{"doi-asserted-by":"publisher","key":"ref108","DOI":"10.1109\/MWC.2014.6812288"},{"doi-asserted-by":"publisher","key":"ref94","DOI":"10.1109\/JIOT.2018.2871020"},{"doi-asserted-by":"publisher","key":"ref107","DOI":"10.1109\/MCOM.2014.6736750"},{"doi-asserted-by":"publisher","key":"ref93","DOI":"10.1109\/TVT.2017.2760281"},{"doi-asserted-by":"publisher","key":"ref106","DOI":"10.1109\/MVT.2013.2269187"},{"doi-asserted-by":"publisher","key":"ref92","DOI":"10.1109\/CCNC.2011.5766560"},{"doi-asserted-by":"publisher","key":"ref105","DOI":"10.1109\/MCOM.2014.6736746"},{"doi-asserted-by":"publisher","key":"ref91","DOI":"10.1109\/VTCFall.2014.6965842"},{"doi-asserted-by":"publisher","key":"ref104","DOI":"10.1109\/MNET.2016.7513863"},{"doi-asserted-by":"publisher","key":"ref90","DOI":"10.1155\/2012\/878595"},{"doi-asserted-by":"publisher","key":"ref103","DOI":"10.1109\/COMST.2015.2440103"},{"doi-asserted-by":"publisher","key":"ref102","DOI":"10.1109\/COMST.2014.2355255"},{"doi-asserted-by":"publisher","key":"ref111","DOI":"10.1109\/JSAC.2016.2525418"},{"key":"ref112","article-title":"Deep learning and its applications to machine health monitoring: A survey","author":"zhao","year":"2016","journal-title":"arXiv 1612 07640"},{"doi-asserted-by":"publisher","key":"ref110","DOI":"10.1109\/ISWCS.2014.6933333"},{"doi-asserted-by":"publisher","key":"ref98","DOI":"10.1109\/TNSM.2017.2778096"},{"doi-asserted-by":"publisher","key":"ref99","DOI":"10.1109\/COMST.2007.4444749"},{"doi-asserted-by":"publisher","key":"ref96","DOI":"10.1109\/PCCC.2016.7820614"},{"key":"ref97","article-title":"Survey on models and techniques for root-cause analysis","author":"sol\u00e9","year":"2017","journal-title":"arXiv 1701 08546"},{"key":"ref10","first-page":"1","article-title":"Self-organisation in wireless networks: Use cases and their interrelations","volume":"22","author":"schmelz","year":"2009","journal-title":"Proc 5th Meeting Wireless World Research Forum"},{"year":"2016","journal-title":"3rd Generation Partnership Project Technical Specification Group Services and System Aspects Telecommunication Management Self-Organizing Networks (SON) Concepts and Requirements (Release 13)","key":"ref11"},{"year":"2016","journal-title":"3rd Generation Partnership Project Technical Specification Group Services and System Aspects Telecommunication Management Self-Configuration of Network Elements Concepts and Requirements (Release 13)","key":"ref12"},{"year":"2016","journal-title":"3rd Generation Partnership Project Technical Specification Group Services and System Aspects Telecommunication Management Self-Organizing Networks (SON) Self-Healing Concepts and Requirements (Release 13)","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/COMST.2014.2320099"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/SURV.2012.100412.00017"},{"key":"ref118","doi-asserted-by":"crossref","first-page":"273","DOI":"10.3390\/s17020273","article-title":"Learning to monitor machine health with convolutional Bi-directional LSTM networks","volume":"17","author":"zhao","year":"2017","journal-title":"SENSORS"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ACCESS.2015.2467174"},{"key":"ref82","first-page":"163","article-title":"Anomaly detection and diagnosis for automatic radio network verification","author":"ciocarlie","year":"2014","journal-title":"Proc Int Conf Mobile Netw Manage"},{"doi-asserted-by":"publisher","key":"ref117","DOI":"10.3390\/s17020414"},{"key":"ref17","first-page":"16","article-title":"Intelligent wireless communications enabled by cognitive radio and machine learning","volume":"15","author":"zhou","year":"2018","journal-title":"China Commun"},{"key":"ref81","first-page":"2266","article-title":"A dynamic affinity propagation clustering algorithm for cell outage detection in self-healing networks","author":"ma","year":"2013","journal-title":"Proc IEEE Wireless Commun Netw Conf (WCNC)"},{"key":"ref18","article-title":"Artificial neural networks-based machine learning for wireless networks: A tutorial","author":"chen","year":"2017","journal-title":"arXiv 1710 02913"},{"doi-asserted-by":"publisher","key":"ref84","DOI":"10.1002\/ett.1060"},{"doi-asserted-by":"publisher","key":"ref119","DOI":"10.1007\/s10922-006-9044-7"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/COMST.2019.2904897"},{"doi-asserted-by":"publisher","key":"ref83","DOI":"10.1109\/TVT.2007.912610"},{"doi-asserted-by":"publisher","key":"ref114","DOI":"10.1016\/j.eswa.2013.12.026"},{"doi-asserted-by":"publisher","key":"ref113","DOI":"10.1016\/j.ymssp.2015.10.025"},{"doi-asserted-by":"publisher","key":"ref116","DOI":"10.1109\/TII.2017.2672988"},{"doi-asserted-by":"publisher","key":"ref80","DOI":"10.1155\/2018\/6201386"},{"doi-asserted-by":"publisher","key":"ref115","DOI":"10.1016\/j.ymssp.2017.03.034"},{"doi-asserted-by":"publisher","key":"ref120","DOI":"10.1109\/TKDE.2009.191"},{"doi-asserted-by":"publisher","key":"ref89","DOI":"10.1109\/WCNC.2012.6214334"},{"key":"ref121","first-page":"14","article-title":"A framework for explanation of machine learning decisions","author":"brinton","year":"2017","journal-title":"Proc Workshop Explainable AI (XAI) IJCAI"},{"doi-asserted-by":"publisher","key":"ref122","DOI":"10.1145\/2393347.2396386"},{"doi-asserted-by":"publisher","key":"ref123","DOI":"10.1109\/CVPR.2015.7298872"},{"doi-asserted-by":"publisher","key":"ref85","DOI":"10.1109\/TMC.2008.23"},{"doi-asserted-by":"publisher","key":"ref86","DOI":"10.1007\/s11276-008-0128-z"},{"doi-asserted-by":"publisher","key":"ref87","DOI":"10.1109\/MWC.2016.7498071"},{"doi-asserted-by":"publisher","key":"ref88","DOI":"10.1145\/3097983.3098157"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08819935.pdf?arnumber=8819935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:31:36Z","timestamp":1641987096000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8819935\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":136,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2938410","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2019]]}}}