Mobile phone with system failure prediction using long short-term memory neural networks

ABSTRACT

Mobile phones and methods for mobile phone failure prediction include receiving respective log files from one or more mobile phone components, including at least one user application. The log files have heterogeneous formats. A likelihood of failure of one or more mobile phone components is determined based on the received log files by clustering the plurality of log files according to structural log patterns and determining feature representations of the log files based on the log clusters. A user is alerted to a potential failure if the likelihood of component failure exceeds a first threshold. An automatic system control action is performed if the likelihood of component failure exceeds a second threshold.

RELATED APPLICATION INFORMATION

This application claims priority to 62/318,867 filed on Apr. 6, 2016,incorporated herein by reference in its entirety. This application isrelated to an application entitled, “SYSTEM FAILURE PREDICTION USINGLONG SHORT-TERM MEMORY NEURAL NETWORKS,” which is incorporated byreference herein in its entirety.

BACKGROUND Technical Field

The present invention relates to information technology management and,more particularly, to the prediction of system failures using neuralnetworks.

Description of the Related Art

Heterogeneous IT operational logs serve as inexpensive “sensors,”recording and indicating the health status of enterprise computersystems. Traditional system monitoring relies on manually backtrackingthose logs, which is both labor-intensive as well as a post hocapproach, i.e., identifying what went wrong after the fact. Servicefailure prediction becomes increasingly critical in preventingunexpected system downtime and improving the quality of service for endusers.

Traditionally, the automation of this process has used text mining toextract relevant text features and patterns for failure prediction. Oneof the widely used features is the term frequency—inverse documentfrequency (TF-IDF) feature. However, most text mining techniques basedon TF-IDF lead to a high-dimensional feature space and, even moreimportantly, do not easily generalize to multiple log formats.

SUMMARY

A method for mobile phone failure prediction includes receivingrespective log files from one or more mobile phone components, includingat least one user application. The log files have heterogeneous formats.A likelihood of failure of one or more mobile phone components isdetermined based on the received log files by clustering the pluralityof log files according to structural log patterns and determiningfeature representations of the log files based on the log clusters. Auser is alerted to a potential failure if the likelihood of componentfailure exceeds a first threshold. An automatic system control action isperformed if the likelihood of component failure exceeds a secondthreshold.

A method for mobile phone failure prediction includes clustering aplurality of log files from respective mobile phone components,including at least one user application, having heterogeneous logformats according to structural log patterns using unsupervised,hierarchical clustering. Feature representations of the log files aredetermined based on the log clusters. The feature representationsconsist of pattern distribution among clustered logs and termfrequency—inverse document frequency. A likelihood of a failure of oneor more of the mobile phone components is determined based on thefeature representations using a long short-term memory neural network abinomial distribution based on an output of the long short-term memoryneural network and a binary target vector with two complementaryclasses. A user is alerted to a potential failure if the likelihood ofcomponent failure exceeds a first threshold. An automatic system controlaction is performed if the likelihood of component failure exceeds asecond threshold.

A mobile phone includes a processor and a memory. A pattern learningmodule is configured to use the processor to cluster a plurality of logfiles stored in the memory from respective mobile phone components,including at least one user application, according to structural logpatterns. A feature extraction module is configured to determine featurerepresentations of the log files based on the log clusters. A failureprediction module is configured to determine a likelihood of a failureof one or more of the mobile phone components based on the featurerepresentations using a neural network. A system control module isconfigured to perform an automatic system control action if thelikelihood of component failure exceeds a threshold.

A mobile phone includes a processor and a memory configured to storerespective log files from one or more mobile phone components, includingat least one user application. The log files have heterogeneous formats.A pattern learning module is configured to use the processor to clusterthe log files according to structural log patterns. A feature extractionmodule is configured to determine feature representations of the logfiles based on the log clusters. A failure prediction module isconfigured to determine a likelihood of a failure of one or more of themobile phone components based on the feature representations using aneural network. An alert module is configured to alert a user to apotential failure if the likelihood of component failure exceeds a firstthreshold. A system control module is configured to perform an automaticsystem control action if the likelihood of component failure exceeds asecond threshold.

These and other features and advantages will become apparent from thefollowing detailed description of illustrative embodiments thereof,which is to be read in connection with the accompanying drawings.

BRIEF DESCRIPTION OF DRAWINGS

The disclosure will provide details in the following description ofpreferred embodiments with reference to the following figures wherein:

FIG. 1 is a block/flow diagram of a failure prediction system inaccordance with an embodiment of the present invention;

FIG. 2 is a block/flow diagram of log pattern learning in accordancewith an embodiment of the present invention;

FIG. 3 is a block/flow diagram of a feature representation module inaccordance with an embodiment of the present invention;

FIG. 4 is a block/flow diagram of failure prediction in accordance withan embodiment of the present invention;

FIG. 5 is a diagram of a neural network in accordance with an embodimentof the present invention;

FIG. 6 is a diagram of a neural network in accordance with an embodimentof the present invention;

FIG. 7 is a diagram of a long short-term memory cell in accordance withan embodiment of the present invention;

FIG. 8 is a block/flow diagram of a method of system failure predictionand automated system control in accordance with an embodiment of thepresent invention;

FIG. 9 is a block diagram of a system failure prediction and controlsystem in accordance with an embodiment of the present invention;

FIG. 10 is a block diagram of a processing system in accordance with anembodiment of the present invention; and

FIG. 11 is a block diagram of a mobile phone device having a failureprediction and control system in accordance with an embodiment of thepresent invention.

DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

In accordance with the present principles, systems and methods areprovided automatically provide early warnings for potential systemfailure prediction by applying deep learning on heterogeneousoperational logs. The present embodiments extract generic (e.g.,non-textual) features from console logs that pass through a deep longshort-term memory (LSTM) recurrent neural network. The LSTM recurrentneural network operates without gradient vanishing during learning.

Features are obtained based on patterns learned from unsupervisedlearning and are observed among similar logs, both in terms of formatand content. Once clusters have been identified, the distribution of thepatterns over the clusters form the features. The features are passed tothe deep LSTM recurrent neural network to perform failure prediction,capturing the underlying dynamics of the system. The present embodimentsthereby provide a predictive system that achieves higher accuracy with asmaller feature set than conventional predictive systems.

Referring now to FIG. 1, a block/flow diagram of a failure predictionsystem 100 is shown. Given an input log file 102, log pattern learning104 clusters the logs having similar formats together and extracts logpatterns, which are stored in the global pattern set 103. It should benoted that the input log file 102 is “heterogeneous,” which is usedherein to denote that the logs may be generated by systems that may havebeen written in different programming languages and with differentlogging styles, producing logs that have different structures andsemantics. The log pattern learning component 104 uses unsupervisedlearning to automatically produce a pattern set without human input. Theglobal pattern set 103 is periodically updated to capture the latest logpatterns.

Log patterns generated by the log pattern learning component 104 arepassed to a feature representation module 106. The featurerepresentation module 106 obtains at least two types of features,including a pattern distribution among similar logs and content patternsbased on term frequency—inverse document frequency (TF-IDF). Thesefeatures represent the underling dynamics and characteristics of thesystem being analyzed.

Failure prediction 108 takes the feature outputs from the featurerepresentation module 106 and performs training for an LSTM neuralnetwork, upon which failure prediction 108 bases its predictions offuture service failures. An LSTM recurrent neural network is able toachieve high accuracy with a small feature set as contrasted toconventional systems which may use, e.g., hundreds of features.

Referring now to FIG. 2, additional detail is provided regarding logpattern learning 104. As noted above, the present embodiments determinelog format patterns based on unsupervised learning. Once the log formatpatterns are extracted, the input heterogeneous logs 102 are parsedusing the global pattern set 103 to produce matched logs. The matchedlog output is provided to the feature module 106.

Application logs are generally generated from templates that are definedin the source code of the application and, thus, have a pre-definedformat. Logs that come from a single source may have the same format andstructure. In addition, log records can appear redundantly. This is dueto the fact that some log records are sued for housekeeping purposes,with the same log record being repeated many times. The existence ofsuch regulated layouts and redundancy makes log data clustering easierthan clustering in other forms of textual data. A regular layout canrepresent a cluster of similar logs and help reduce redundancy andsummarize the meanings of log data.

Whereas conventional systems attempt to backtrack the source code toidentify the layout of logged data, this is only possible when thesource code is available and is therefore not generalizable to a mixtureof heterogeneous logs coming from various applications, written indifferent programming language, with different logging styles. Thepresent embodiments use pattern learning to capture the log structureand semantics of each field. These patterns serve as a high-levelsummarization of similar logs that indicate similar behaviors in thesystem.

Automated log clustering is performed in block 202 and uses logtokenization and unsupervised clustering. The logs are tokenized suchthat lower-level information from the words or phrases of each logrecord can be identified and retrieved. However, heterogeneous logs fromdifferent applications and systems have different formats and, thus,different tokenizers and delimiters. Without specific domain knowledgeor human inspection, there is no guarantee that particular pre-definedtokenizers will accurately tokenize the entire set of heterogeneous logdata. As a result, the most general delimiter or set of delimitersshould be used. The use of such a delimiter avoids interfering withpotential, unknown delimiters from the log data. In one embodiment,empty space (e.g., spaces or newlines) may be used as such a generaldelimiter. All of the words and special symbols in a log will generallybe separated by empty space.

Once the logs are tokenized into individual strings, unsupervisedclustering is applied. Without domain knowledge with respect to the logformats, usage, sources, etc., a first step toward understanding andanalyzing heterogeneous logs is to understand the geometric structure ofthe log data. Clustering serves as a way to categorize data purely basedon its intrinsic properties and relations. Therefore clustering isapplied on the heterogeneous logs to present the initial depiction ofthe data. In specific, hierarchical clustering is used to generate ahierarchical structure of the heterogeneous logs. Dense regions aresearched by expanding from a certain data point toward its neighboringdata points. The resulting hierarchical structure represents the datarelations among its data points.

Hierarchical clustering is used not only because it can provide acoarse-to-fine view of the data, but also because the following dataindexing and search is built up on a hierarchical tree structure forefficiency purposes. The results of automated log clustering in block202 is written into log clusters 204. Logs having similar syntacticstructures will be clustered together, such that logs with similarformats will align along the same pattern.

After clustering the log data, an overall structure of all theheterogeneous logs is generated. However, patterns within each clusterare still needed to semantically understand the logs in-depth. Block 206performs log pattern recognition to identify which field of a logrecord, after tokenization, is about which specific information. Sincethe log records have very similar formats within each cluster due,pattern recognition is performed within a cluster using sequencealignment. All the log records within a cluster are aligned together soas to identify the motifs (the most conserved and frequent commonportion), and thus the common patterns, from the logs. Pairwisealignment is performed using, e.g., a Smith-Waterman process and then anUnweighted Pair Group Method with Arithmetic Mean (UPGMA) strategy isused to perform multiple alignments. The results of log patternrecognition 206 may be stored in a regular expression format and may begrouped into a log patterns file 208. The output is used to update theglobal pattern set 103 and serve as the final model of the inputheterogeneous logs 102.

Block 210 performs log pattern matching based on the log patterns 208.The input heterogeneous logs 102 are parsed against the log patterns 208using, e.g., a general log parsing engine. Given a regular expressionformat, such a tool parses the input log. Any input log will either bematched to one of the extracted log patterns 208 or will not be matchedat all. If a log record is not matched, it is considered an outlier. Ifa log record is matched, the parsing engine automatically extracts itscontents, including the contents of individual fields such astimestamps, etc. The output of the log pattern matching 210 is providedas input to feature module 106.

Referring now to FIG. 3, additional details on the feature module 106are shown. The feature module 106 takes the output from log patternlearning 104 and generates predictive features that can characterize theunderlying dynamics of a system. Once the input logs 102 are parsed withthe extracted patterns 208, each log (except for outliers) is mappedinto one pattern. Thus, instead of having a collection of text logs froma time period [t, t+Δt], a collection of patterns is extracted and thefrequency p_(i) of each pattern i is counted. The present embodimentsemploy two types of features: a pattern distribution, where each elementX_(t,j) in the feature vector X_(t) is the fraction of a pattern i inthe collection; and an adapted TF-IDF feature, where each pattern is ananalogy to a word and the time period [t, t+Δt] is regarded as adocument.

Block 302 performs log time stamp extraction for each parsed log.Because console logs come from many different sources and may includedifferent time stamp formats, the present embodiments standardize thetime stamp formats. One exemplary format that may be used is: YYYY/MM/DDHH:MM:SS, where YYYY represents the year, MM represents the month, DDrepresents the day, HH represents the hour, MM represents the minute,and SS represents the second. The log time stamp extraction 302 extractstime stamps directly from the output of log pattern learning 104. Ifthere are multiple timestamps within a given input log 102, the maximumtimestamp (e.g., the latest in time) will be used to represent the log.

Block 304 generates log time series. Based on each log's representedtime stamp, the present embodiments generate time series correspondingto each pattern. The logs are discretized by a specific bin size, wherethe sparsity (e.g., the percentage of bins having no logs) may be keptat less than about 1%. The time granularity should be kept small to makefine-grained predictions. In one example, the time-series of patterndistributions with a ten minute resolution may have a sparsity of about0.82%. Each time series includes histograms of each pattern over time.The higher the time series value is at a particular time stamp, the morelogs correspond to the pattern at that time. Therefore the log timeseries captures all the dynamics of the system.

Block 306 extracts pattern distribution features as the relativedistribution of each pattern in the overall logs for each time period[t, t+Δt]. Because each log pattern originated from different places inapplications' source codes, the patterns provide userful informationregarding the dynamics of the system for failure prediction. The patterndistribution feature may be generated in a multi-dimensional vectorformat. The number of dimensions equals the number of distinct patterns.Each element of the vector may be normalized so that the sum is equal to1.

Block 308 performs a second type of feature extraction as TF-IDF. Eachpattern is treated as a word and all logs occurring in each time periodare treated as a single document. TF-IDF feature extraction 308computes, for each pattern i, TF-IDF=P_(i) IDF_(i), where P_(i) is thefrequency of pattern i in the overall logs and IDF_(i) is the inversedocument frequency for the pattern i, defined as the log of the totalnumber of time periods divided by the number of time periods with thepattern i in it. The TF-IDF feature vector will have the samedimensionality as the pattern distribution feature vector produced byblock 306, such that the two vectors can be combined into one andprovided as an input to failure prediction 108.

Referring now to FIG. 4, additional details on failure prediction 108are shown. Failure prediction 108 takes the output from the featuremodule 106 and generates results that predict the failure status of asystem. An LSTM recurrent neural network 402 is a neural networkdesigned to be better at storing and accessing historical informationthan classical recurrent neural networks.

The architecture of the LSTM recurrent neural network 402 will bedescribed in greater detail below. The same architecture is used in theneural network 402 for dynamic system learning and prediction. In thelearning stage, internal parameters of the neural network 402 arelearned based on, e.g., back propagation through time. The inputincludes log features from training data and user labels on failure timeperiods. In the prediction stage, the neural network 402 takes logfeatures from operational data as input and uses the output of thebinary classifier 404 for failure prediction.

The present embodiments provide the probability of a system failurebased on the input sequence of historical feature vectors extracted fromthe logs 102. If such a probability exceeds a pre-defined threshold, anearly warning is reported to signal the potential system failure. Anearly warning signal may be very weak and thus difficult to capture bynaïve models. The binary classification 404 makes use of a binary targetvector d with two complementary classes. The output of the neuralnetwork 402 (expressed herein as y_(t)) is essentially a binary vectorserving as a representation of the system status, which can be used toestimate the binomial distribution Pr(d_(t)|y_(t)). This distributioncan be characterized by a softmax function at the outer layer:

${\Pr\left( {d_{t} = {k❘y_{t}}} \right)} = {{\hat{y}}_{t}^{k} = \frac{\exp\left( y_{t}^{k} \right)}{\sum\limits_{k^{\prime} = 1}^{K}{\exp\left( y_{t}^{k^{\prime}} \right)}}}$where k=2 is the number of classes. For the objective function, thebinary cross-entropy cost function is used based on the output at a timestep t for one training example:

$C = {- {\sum\limits_{k = 1}^{K}\left\lbrack {{d_{t}^{k}{\log\left( {\hat{y}}_{t}^{k} \right)}} + {\left( {1 - d_{t}^{k}} \right){\log\left( {\hat{y}}_{t}^{k} \right)}}} \right\rbrack}}$where the target d_(t) ^(k) is either one or zero.

For the size of the neural network 402, the input size depends on theinput feature dimension and output size is just 2 as a result of being abinary classification task. The layer and the number of hidden unitsdetermine the width and depth of the network. The more layers and thelarger the number of hidden units, the more complex the network becomesto train.

Referring now to FIG. 5, a generalized diagram of a neural network isshown. ANNs demonstrate an ability to derive meaning from complicated orimprecise data and can be used to extract patterns and detect trendsthat are too complex to be detected by humans or other computer-basedsystems. The structure of a neural network is known generally to haveinput neurons 502 that provide information to one or more “hidden”neurons 504. Connections 508 between the input neurons 502 and hiddenneurons 504 are weighted and these weighted inputs are then processed bythe hidden neurons 504 according to some function in the hidden neurons504, with weighted connections 508 between the layers. There may be anynumber of layers of hidden neurons 504, and as well as neurons thatperform different functions. There exist different neural networkstructures as well, such as convolutional neural network, maxoutnetwork, etc. Finally, a set of output neurons 506 accepts and processesweighted input from the last set of hidden neurons 504.

This represents a “feed-forward” computation, where informationpropagates from input neurons 502 to the output neurons 506. Uponcompletion of a feed-forward computation, the output is compared to adesired output available from training data. The error relative to thetraining data is then processed in “feed-back” computation, where thehidden neurons 504 and input neurons 502 receive information regardingthe error propagating backward from the output neurons 506. Once thebackward error propagation has been completed, weight updates areperformed, with the weighted connections 508 being updated to accountfor the received error. This represents just one variety of ANN.

Referring now to FIG. 6, an artificial neural network (ANN) architecture600 is shown. It should be understood that the present architecture ispurely exemplary and that other architectures or types of neural networkmay be used instead. During feed-forward operation, a set of inputneurons 602 each provide an input voltage in parallel to a respectiverow of weights 604. The weights 604 each have a settable resistancevalue, such that a current output flows from the weight 604 to arespective hidden neuron 606 to represent the weighted input. Thecurrent output by a given weight is determined as I=v/r, where V is theinput voltage from the input neuron 602 and r is the set resistance ofthe weight 604. The current from each weight adds column-wise and flowsto a hidden neuron 606. A set of reference weights 607 have a fixedresistance and combine their outputs into a reference current that isprovided to each of the hidden neurons 606. Because conductance valuescan only be positive numbers, some reference conductance is needed toencode both positive and negative values in the matrix. The currentsproduced by the weights 604 are continuously valued and positive, andtherefore the reference weights 607 are used to provide a referencecurrent, above which currents are considered to have positive values andbelow which currents are considered to have negative values.

As an alternative to using the reference weights 607, another embodimentmay use separate arrays of weights 604 to capture negative values. Eachapproach has advantages and disadvantages. Using the reference weights607 is more efficient in chip area, but reference values need to bematched closely to one another. In contrast, the use of a separate arrayfor negative values does not involve close matching as each value has apair of weights to compare against. However, the negative weight matrixapproach uses roughly twice the chip area as compared to the singlereference weight column. In addition, the reference weight columngenerates a current that needs to be copied to each neuron forcomparison, whereas a negative matrix array provides a reference valuedirectly for each neuron. In the negative array embodiment, the weights604 of both positive and negative arrays are updated, but this alsoincreases signal-to-noise ratio as each weight value is a difference oftwo conductance values. The two embodiments provide identicalfunctionality in encoding a negative value and those having ordinaryskill in the art will be able to choose a suitable embodiment for theapplication at hand.

The hidden neurons 606 use the currents from the array of weights 604and the reference weights 607 to perform some calculation. The hiddenneurons 606 then output a voltage of their own to another array ofweights 607. This array performs in the same way, with a column ofweights 604 receiving a voltage from their respective hidden neuron 606to produce a weighted current output that adds row-wise and is providedto the output neuron 608.

It should be understood that any number of these stages may beimplemented, by interposing additional layers of arrays and hiddenneurons 606. It should also be noted that some neurons may be constantneurons 609, which provide a constant voltage to the array. The constantneurons 609 can be present among the input neurons 602 and/or hiddenneurons 606 and are only used during feed-forward operation.

During back propagation, the output neurons 608 provide a voltage backacross the array of weights 604. The output layer compares the generatednetwork response to training data and computes an error. The error isapplied to the array as a voltage pulse, where the height and/orduration of the pulse is modulated proportional to the error value. Inthis example, a row of weights 604 receives a voltage from a respectiveoutput neuron 608 in parallel and converts that voltage into a currentwhich adds column-wise to provide an input to hidden neurons 606. Thehidden neurons 606 provide combine the weighted feedback signal with aderivative of its feed-forward calculation and stores an error valuebefore outputting a feedback signal voltage to its respective column ofweights 604. This back propagation travels through the entire network600 until all hidden neurons 606 and the input neurons 602 have storedan error value.

During weight updates, the input neurons 602 and hidden neurons 606apply a first weight update voltage forward and the output neurons 608and hidden neurons 606 apply a second weight update voltage backwardthrough the network 600. The combinations of these voltages create astate change within each weight 604, causing the weight 604 to take on anew resistance value. In this manner the weights 604 can be trained toadapt the neural network 600 to errors in its processing. It should benoted that the three modes of operation, feed forward, back propagation,and weight update, do not overlap with one another.

Referring now to FIG. 7, an alternative view of an LSTM memory cell 700is shown. The memory cell 700 takes as input a vector x which representsthe input feature vector sequence x=(x_(t-L+1), . . . , x_(t)) with asequence length of L². The input vector x is passed to a stack ofmultiple recurrently connected hidden layers through weightedconnections to compute hidden vector sequences h=(h_(t-L+1), . . . ,h_(t)) and, finally, an output vector sequence y=(y_(t-L+1), . . . ,y_(t)). The output vector y_(t) can be used to parameterize theprobability distribution Pr (d_(t)|y_(t)) of the target d_(t).

In particular, the memory cell includes an input gate 702, a hidden gate704, an output gate 708, and a forget gate 710, each of which isassociated with a different function over the weights 604 of the neuralnetwork 600. Each gate accepts the input vector x and performs arespective calculation on said input as defined below, with the inputgate 702 calculating i_(t), the hidden gate 704 calculating z_(t), theoutput gate 708 calculating o_(t), and the forget gate calculatingf_(t). A cell 706 performs a further calculation to generate c_(t). Anarctan function 712 operates on the output of the cell 706. Thesecalculations are set forth below as:

$\quad\left\{ \begin{matrix}{i_{t} = {\sigma\left( {{W_{xi}x_{t}} + {W_{hi}h_{t - 1}} + {W_{ci}c_{t - 1}} + b_{i}} \right)}} \\{o_{t} = {\sigma\left( {{W_{xo}x_{t}} + {W_{ho}h_{t - 1}} + {W_{co}c_{t - 1}} + b_{o}} \right)}} \\{f_{t} = {\sigma\left( {{W_{xf}x_{t}} + {W_{hf}h_{t - 1}} + {W_{cf}c_{t - 1}} + b_{f}} \right)}} \\{z_{t} = {{W_{xc}x_{t}} + {W_{cf}h_{t - 1}} + b_{c}}} \\{c_{t} = {{f_{t}c_{t - 1}} + {i_{t}{\tanh\left( z_{t} \right)}}}} \\{h_{t} = {o_{t}{\tanh\left( c_{t} \right)}}}\end{matrix} \right.$where σ is the logistic sigmoid function, b* are the bias terms, and i,f, o, and c are the input gate, forget gate, output gate, and cellvectors respectively, all of which have the same size as the hiddenstate vector h. The weight matrix W indicates the connections betweengates, the cell, input and hidden states. For instance, W_(hi) is thehidden-input gate matrix, while W_(xf) is the input-forget gate matrix.The weight matrices from the cell to gate vectors (e.g., W_(ci)) arediagonal, so the m^(th) element in each gate vector only receives inputfrom the m^(th) of the cell vector.

Referring now to FIG. 8, a method of system failure prediction is shown.Block 802 gathers the heterogeneous system logs 102 from any number ofdifferent system applications and services. As noted above, the systemlogs 102 may be in any format and may, therefore, be very different fromone another in how they store relevant system information. Toaccommodate these different log formats, block 804 learns log patterns.As described above, it is specifically contemplated that block 804 mayemploy hierarchical clustering to group the log records into clusters ofsimilar structure.

Once the logs are clustered, block 806 determines featurerepresentations of the logs. Block 806 recognizes patterns within thelogs and generates, e.g., two distinct features to represent the loginformation: TF-IDF features and a pattern distribution. Based on thesefeatures, the LSTM recurrent neural network 402 and binary classifier404 are used to predict system failures in block 808.

Block 810 performs automatic system control actions based on thepredicted system failures. These automatic controls can include any of avariety of actions, ranging from issuing an alert to a human systemoperator to adjusting the operation of hardware and software systems toprevent or mitigate the system failure.

Embodiments described herein may be entirely hardware, entirely softwareor including both hardware and software elements. In a preferredembodiment, the present invention is implemented in software, whichincludes but is not limited to firmware, resident software, microcode,etc.

Embodiments may include a computer program product accessible from acomputer-usable or computer-readable medium providing program code foruse by or in connection with a computer or any instruction executionsystem. A computer-usable or computer readable medium may include anyapparatus that stores, communicates, propagates, or transports theprogram for use by or in connection with the instruction executionsystem, apparatus, or device. The medium can be magnetic, optical,electronic, electromagnetic, infrared, or semiconductor system (orapparatus or device) or a propagation medium. The medium may include acomputer-readable storage medium such as a semiconductor or solid statememory, magnetic tape, a removable computer diskette, a random accessmemory (RAM), a read-only memory (ROM), a rigid magnetic disk and anoptical disk, etc.

Each computer program may be tangibly stored in a machine-readablestorage media or device (e.g., program memory or magnetic disk) readableby a general or special purpose programmable computer, for configuringand controlling operation of a computer when the storage media or deviceis read by the computer to perform the procedures described herein. Theinventive system may also be considered to be embodied in acomputer-readable storage medium, configured with a computer program,where the storage medium so configured causes a computer to operate in aspecific and predefined manner to perform the functions describedherein.

A data processing system suitable for storing and/or executing programcode may include at least one processor coupled directly or indirectlyto memory elements through a system bus. The memory elements can includelocal memory employed during actual execution of the program code, bulkstorage, and cache memories which provide temporary storage of at leastsome program code to reduce the number of times code is retrieved frombulk storage during execution. Input/output or I/O devices (includingbut not limited to keyboards, displays, pointing devices, etc.) may becoupled to the system either directly or through intervening I/Ocontrollers.

Network adapters may also be coupled to the system to enable the dataprocessing system to become coupled to other data processing systems orremote printers or storage devices through intervening private or publicnetworks. Modems, cable modem and Ethernet cards are just a few of thecurrently available types of network adapters.

Referring now to FIG. 9, a system failure prediction and control system900 is shown. The system 900 includes a hardware processor and memory904. The system 900 further includes an LSTM neural network 906 that maybe implemented in software or that may, alternatively, be implementedusing hardware devices that implement the neurons and weights. Systemlogs 908 are stored in the memory 904 and may be collected from anyappropriate source application or system. In addition, the system 900includes one or more functional modules. In some embodiments, thefunctional modules may be implemented as software that is stored inmemory 904 and that is executed by processor 902. In other embodiments,the functional modules may be implemented as one or more discretehardware components using, e.g., application-specific integrated chipsor field programmable gate arrays.

For example, a pattern learning module uses clustering to group theheterogeneous system logs 908 into clusters having similar structures. Afeature extraction module 912 uses the clustered log information toextract a limited number of features that failure prediction module 914uses to determine whether a system failure may occur in one or moreapplications or systems. The failure prediction module 914 employs theLSTM neural network to determine whether the information provided by thesystem logs, characterized by the extracted features, provides anindication of a system failure.

A system control module 916 performs actions based on the predictiongenerated by failure prediction module. If a failure is predicted, thesystem control module 916 may, for example, issue an alert to a systemoperator or may directly perform an action to mitigate or prevent thesystem failure. Such automatic actions may include, for example, systemload balancing, cooling/environmental control, network control actions(e.g., rerouting traffic or blocking a particular connection or datastream), and system shut down.

Referring now to FIG. 10, an exemplary processing system 1000 is shownwhich may represent the system failure prediction and control system900. The processing system 1000 includes at least one processor (CPU)1004 operatively coupled to other components via a system bus 1002. Acache 1006, a Read Only Memory (ROM) 1008, a Random Access Memory (RAM)1010, an input/output (I/O) adapter 1020, a sound adapter 1030, anetwork adapter 1040, a user interface adapter 1050, and a displayadapter 1060, are operatively coupled to the system bus 1002.

A first storage device 1022 and a second storage device 1024 areoperatively coupled to system bus 1002 by the I/O adapter 1020. Thestorage devices 1022 and 1024 can be any of a disk storage device (e.g.,a magnetic or optical disk storage device), a solid state magneticdevice, and so forth. The storage devices 1022 and 1024 can be the sametype of storage device or different types of storage devices.

A speaker 1032 is operatively coupled to system bus 1002 by the soundadapter 1030. A transceiver 1042 is operatively coupled to system bus1002 by network adapter 1040. A display device 1062 is operativelycoupled to system bus 1002 by display adapter 1060.

A first user input device 1052, a second user input device 1054, and athird user input device 1056 are operatively coupled to system bus 1002by user interface adapter 1050. The user input devices 1052, 1054, and1056 can be any of a keyboard, a mouse, a keypad, an image capturedevice, a motion sensing device, a microphone, a device incorporatingthe functionality of at least two of the preceding devices, and soforth. Of course, other types of input devices can also be used, whilemaintaining the spirit of the present principles. The user input devices1052, 1054, and 1056 can be the same type of user input device ordifferent types of user input devices. The user input devices 1052,1054, and 1056 are used to input and output information to and fromsystem 1000.

Of course, the processing system 1000 may also include other elements(not shown), as readily contemplated by one of skill in the art, as wellas omit certain elements. For example, various other input devicesand/or output devices can be included in processing system 1000,depending upon the particular implementation of the same, as readilyunderstood by one of ordinary skill in the art. For example, varioustypes of wireless and/or wired input and/or output devices can be used.Moreover, additional processors, controllers, memories, and so forth, invarious configurations can also be utilized as readily appreciated byone of ordinary skill in the art. These and other variations of theprocessing system 1000 are readily contemplated by one of ordinary skillin the art given the teachings of the present principles providedherein.

Referring now to FIG. 11, a mobile phone device 1100 is shown. It shouldbe understood that the present embodiments may be implemented in anyappropriate end-user product—the mobile phone device 1100 is used solelyto illustrate one application and should not be construed as limiting.

The mobile phone device 1100 includes a processor 1102 and a memory1104. A radio interface 1106 provides communications with a mobiletelephony network and may operate on any appropriate wirelesscommunications standard. A distinct network interface adapter 1108provides communications with a user's home network by any appropriatewireless communications standard such as, e.g., WIFI.

An operating system 1110 runs on the mobile phone device 1100 andprovides a functional interface between the processor 1102, memory 1104,and one or more user applications 1112. A user interface 1114 provides agraphical and/or textual display that provides a user with informationand that accepts inputs from the user. In particular, an alert module1116 interfaces with the user interface 1114 to provide information to auser or service provider regarding the status of the components. Thealert module 1116 may provide a visual indicator, for example by an iconor light source, a textual indicator, for example a notification oremail, or an auditory indicator, for example a chime or other sound.

All of these different components may have respective detectors thatgather data regarding their respective components and store the data aslogs. As noted in detail above, the logs may have different formats, butthe failure prediction and control system finds patterns within thelogs, derives a set of representative features, and predicts failuresfor components within the mobile device 1100. Any user-installedapplication 1112 may contribute such logs, and the failure predictionand control system 900 can thereby provide adaptive system monitoringfor comprehensive failure prediction by determining a likelihood offailure for each component.

The failure prediction and control system 900 can furthermore takeactions to ameliorate or prevent such predicted failures. These actionsmay include, for example, turning off one or more components, decreasingprocessor performance to lower temperature or extend battery life, andmanaging app permissions if a user application 1112 is consuming toomany system resources. The failure prediction and control system 900 maytake action if the likelihood of failure exceeds an automatic controlthreshold.

The alert module 1116 can provide information to a user or serviceprovider regarding the prediction. In one example, if the failureprediction and control system 900 predicts the failure of one or morecomponents, the alert module 1116 can provide information to the userabout the potential failure. In another embodiment, the alert module1116 can provide information to a service provider or manager, forexample in the case where the mobile phone device 1100 is deployed toemployees. In this case, the manager can then proactively repair orreplace the mobile phone device 1100. The alert module 1116 may generatean alert if the likelihood of a failure exceeds an alert threshold. Thisthreshold may be set at a lower likelihood than a threshold used toautomatically control the system.

The foregoing is to be understood as being in every respect illustrativeand exemplary, but not restrictive, and the scope of the inventiondisclosed herein is not to be determined from the Detailed Description,but rather from the claims as interpreted according to the full breadthpermitted by the patent laws. It is to be understood that theembodiments shown and described herein are only illustrative of theprinciples of the present invention and that those skilled in the artmay implement various modifications without departing from the scope andspirit of the invention. Those skilled in the art could implementvarious other feature combinations without departing from the scope andspirit of the invention. Having thus described aspects of the invention,with the details and particularity required by the patent laws, what isclaimed and desired protected by Letters Patent is set forth in theappended claims.

What is claimed is:
 1. A method for mobile phone failure prediction,comprising: receiving respective log files from one or more mobile phonecomponents, including at least one user application, wherein the logfiles have heterogeneous formats; training a long short-term memoryrecurrent neural network from training data and user labels on failuretime periods; determining a likelihood of a failure of one or moremobile phone components based on the received log files by clusteringthe log files according to structural log patterns to form log clustersand determining feature representations of the log files based on thelog clusters by processing the feature representations using the longshort-term memory recurrent neural network; alerting a user to apotential failure if the likelihood of the failure exceeds a firstthreshold; and performing an automatic system control action if thelikelihood of the failure exceeds a second threshold.
 2. The method ofclaim 1, wherein determining the feature representations comprisesdetermining two, and only two, feature representations.
 3. The method ofclaim 2, wherein the two feature representations consist of patterndistribution among clustered logs and term frequency inverse documentfrequency.
 4. The method of claim 1, wherein clustering the plurality oflog files comprises performing unsupervised, hierarchical clustering. 5.The method of claim 1, wherein determining the likelihood of the failureof one or more of the mobile phone components comprises determining abinomial distribution based on an output of the neural network and abinary target vector with two complementary classes.
 6. The method ofclaim 1, wherein the heterogeneous log formats comprise differentdelimiter formats.
 7. A method for mobile phone failure prediction,comprising: clustering a plurality of log files from respective mobilephone components, including at least one user application, havingheterogeneous log formats according to structural log patterns usingunsupervised, hierarchical clustering to form log clusters; determiningfeature representations of the log files based on the log clusters,wherein the feature representations consist of pattern distributionamong clustered logs and term frequency—inverse document frequency;training a long short-term memory recurrent neural network from trainingdata and user labels on failure time periods; determining a likelihoodof a failure of one or more of the mobile phone components based on thefeature representations using the long short-term memory neural network,a binomial distribution based on an output of the long short-term memoryneural network, and a binary target vector with two complementaryclasses by processing the feature representations using the longshort-term memory recurrent neural network; alerting a user to apotential failure if the likelihood of the failure exceeds a firstthreshold; and performing an automatic system control action if thelikelihood of the failure exceeds a second threshold.
 8. A mobile phone,comprising: a processor; a memory configured to store respective logfiles from one or more mobile phone components, including at least oneuser application, wherein the log files have heterogeneous formats; along-short term memory recurrent neural network that is trained fromtraining data and user labels on failure time periods; a patternlearning module configured to use the processor to cluster the log filesaccording to structural log patterns to form log clusters; a featureextraction module configured to determine feature representations of thelog files based on the log clusters; a failure prediction moduleconfigured to determine a likelihood of a failure of one or more of themobile phone components based on the feature representations byprocessing the feature representations using the long short-term memoryrecurrent neural network; an alert module configured to alert a user toa potential failure if the likelihood of the failure exceeds a firstthreshold; and a system control module configured to perform anautomatic system control action if the likelihood of the failure exceedsa second threshold.
 9. The system of claim 8, wherein the featureextraction module is further configured to determine two, and only two,feature representations.
 10. The system of claim 9, wherein the twofeature representations consist of pattern distribution among clusteredlogs and term frequency inverse document frequency.
 11. The system ofclaim 8, wherein the pattern learning module is further configured toperform unsupervised, hierarchical clustering.
 12. The system of claim8, wherein the failure prediction module is further configured todetermine a binomial distribution based on an output of the neuralnetwork and a binary target vector with two complementary classes. 13.The system of claim 8, wherein the log files comprise a plurality ofdifferent log formats.
 14. The system of claim 13, wherein theheterogeneous log formats comprise different delimiter formats.