Page 48 - First special issue on The impact of Artificial Intelligence on communication networks and services
P. 48

,78 -2851$/  ,&7 'LVFRYHULHV  9RO        0DUFK




           2.2. Securing buoys and casing                       7KHUHIRUH  WKH VHQVRU QHWZRUN DUFKLWHFWXUHV QHHG WR
                                                                EH VFDODEOH  +RPRJHQRXV VHQVRU QHWZRUNV FRQVLVW RI
           6HQVRU  QRGHV  QHHG  IORDWLQJ  EXR\V  WR  KROG  WKH   VHQVRU  QRGHV  RI  WKH  VDPH  SURFHVVLQJ  SRZHU   UDGLR
           HOHFWURQLFV  LQ  D  VHFXUH  FDVLQJ   SURWHFWLRQ  IURP   UDQJH   GDWD  VWRUDJH  FDSDFLW\   DQG  QHWZRUNLQJ
           VXUURXQGLQJ HQYLURQPHQWV WR DYRLG ZDWHU  KXPLGLW\    DELOLWLHV  7KHVH DWWULEXWHV RI D KRPRJHQRXV QHWZRUN
           EXLOG XS RU FRQGHQVDWLRQ  ([SHULHQFH IURP SUHYLRXV   OLPLW WKH WRSRORJ\ RI WKH VHQVRU QHWZRUN WR EH IODW
           GHSOR\PHQWV KDYH LQGLFDWHG HTXLSPHQW ZLOO IRXO DQG   L H    LW  LV  QRW  VFDODEOH  LQ  WKH  HYHQW  RI  G\QDPLF
           FRUURGH >  @  7KHUHIRUH  XWPRVW FDUH PXVW EH WDNHQ   UHURXWLQJ RU UHFRQILJXUDWLRQ RI QHWZRUN QRGHV  2Q
           ZKHQ   GHSOR\LQJ   VHQVRU   QRGHV  LQ   PDULQH       WKH  RWKHU  KDQG   KHWHURJHQHRXV  QHWZRUN  LQFOXGHV
           HQYLURQPHQWV  JLYHQ WKHUH LV D KLJK FKDQFH RI FRQWDFW   VHQVRU   QRGHV   KDYLQJ   YDULHG   SURFHVVLQJ
           ZLWK VHD ZDWHU  7KH IORDWLQJ EXR\V DUH WKH SUHIHUUHG   FRPPXQLFDWLRQ   DQG  VWRUDJH  DELOLWLHV   7KHVH
           SURWHFWLYH  FDVLQJV  IRU  PDULQH  HQYLURQPHQWV       DWWUDFWLYH  IHDWXUHV  RI  KHWHURJHQHRXV  VHQVRU  QRGHV
           +RZHYHU   WKH  EXR\V  LQWURGXFH  VHYHUDO  FKDOOHQJHV    SURYLGH  VFDODEOH  QHWZRUNLQJ  VROXWLRQV  WKURXJK
           )LUVW   WKH  EXR\V  FRQVLVWLQJ  RI  VHQVRU  QRGHV  QHHG   KLHUDUFKLFDO  DUFKLWHFWXUHV   7HQHW  >  @   7VDU  >  @
           PRRULQJV IL[HG XVXDOO\ WR WKH VHD IORRU XVLQJ FDEOHV    6HQV(\H >  @  $VDS >  @  DQG &LWULF >  @ DUH VRPH RI
           6HFRQG  GHSHQGLQJ RQ WKH W\SH RI VHQVLQJ HOHPHQW     WKH H[DPSOHV RI KHWHURJHQHRXV QHWZRUNV
           ZH PD\ DOVR KDYH WR UXQ D ORQJ FDEOH ZLWK D VHQVLQJ
           HOHPHQW   FDXVLQJ  GHWHULRUDWLRQ  RI  WKH  PHDVXUHG   2.5. Detecting interesting events using AI
           VLJQDO  IURP  WKH  VHQVLQJ  HOHPHQW   7KLUG   WKH  EXR\V
           GULIW GXH WR RFHDQ FXUUHQWV DQG WLGHV  FDXVLQJ UDGLDO   7KH  QHWZRUN  WRSRORJ\  RI  ,R7 :61  FDQ  EH  D  VWDU
            YHUWLFDO  DQG WDQJHQWLDO  KRUL]RQWDO  GLVSODFHPHQWV   PHVK  WUHH RU D FRPELQDWLRQ RI DOO >  @  7KH ZD\ WKDW
           RI VHQVRUV QRGHV  7KHUHIRUH  WKHVH GLVSODFHPHQWV DUH   GDWD PRYHV DFURVV WKH QHWZRUN IURP RQH ORFDWLRQ WR
           OLNHO\ WR FDXVH LVVXHV ZLWK ZLUHOHVV GDWD WUDQVPLVVLRQ   DQRWKHU  GHSHQGV  RQ  WKH  WRSRORJ\   7KXV   HYHQW
           DV WKH QRGHV PRYH LQ D PDQQHU WKDW WKH\ DUH XQDEOH   GHWHFWLRQ  FDQ  EH  ORFDO  RU  JOREDO  UHODWLYH  WR  WKH
           WR EH LQ WKH FRPPXQLFDWLRQ UDQJH RI WKH GHSOR\HG     QHWZRUN   /RFDO  HYHQWV  DUH  VSHFLILF  WR  WKH  VHQVRU
           VHQVRU QHWZRUN                                       QRGHV  ZKHUHDV JOREDO HYHQWV UHTXLUH WKH VHQVRU GDWD
                                                                WR EH JDWKHUHG DW D FHQWUDOL]HG ORFDWLRQ  /RFDO HYHQW
           2.3. Communication and scheduling constraints        GHWHFWLRQ  UHTXLUHV  SURFHVVLQJ  SRZHU  DW  WKH  VHQVRU
                                                                QRGHV  2IWHQ  WKH FRPSXWDWLRQDO SRZHU  PHPRU\ DQG
           &RPPXQLFDWLRQ  LQ  D  VHQVRU  QHWZRUN  FDQ  EH       UHVRXUFHV DUH OLPLWHG LQ LQGLYLGXDO QRGHV  7KHUHIRUH
           FDWHJRUL]HG LQWR WZR NLQGV  ORFDO FRRUGLQDWLRQ DQG   VLPSOH HYHQW GHWHFWLRQV ORFDOO\ DUH RIWHQ UHODWLYHO\
           VHQVRU EDVH FRPPXQLFDWLRQ >  @  /RFDO FRRUGLQDWLRQ   HDV\ DQG ZLOO EH EDVHG RQ RQH GLPHQVLRQDO VHQVRU
           LQYROYHV DJJUHJDWLQJ GDWD DPRQJ D JURXS RI QRGHV     GDWD  )RU H[DPSOH  GHWHFWLQJ FKDQJHV LQ WHPSHUDWXUH
           7KH VHQVRU EDVH FRPPXQLFDWLRQ LV FRQFHUQHG ZLWK      OHYHO DERYH D FHUWDLQ WKUHVKROG LV DQ H[DPSOH RI D
           FRPPXQLFDWLQJ WKH DJJUHJDWHG GDWD WR D EDVH VWDWLRQ    ORFDO HYHQW  2Q WKH RWKHU KDQG  JOREDO HYHQW GHWHFWLRQ
           %RWK  WKHVH  W\SHV  RI  GDWD  DJJUHJDWLRQ  FRXOG  XWLOL]H   LQYROYHV  KLJK  FRPSXWDWLRQDO  SRZHU   PHPRU\
           VLQJOH KRS  RU  PXOWL KRS  FRPPXQLFDWLRQ  >  @   7KH   VRSKLVWLFDWHG $, DOJRULWKPV DQG QHWZRUN UHVRXUFHV
           GDWD FRXOG EH ORJJHG WR D GDWD ORJJHU  RU FROOHFWHG   *OREDO HYHQWV DOVR FRQVLGHU PXOWLGLPHQVLRQDO VHQVRU
           PDQXDOO\  XVLQJ  UHJXODU  VLWH  YLVLWV   RU  XVLQJ  D   GDWD IURP PXOWLSOH VHQVRUV  )RU H[DPSOH  GHWHFWLQJ
           PLFURZDYH FRPPXQLFDWLRQ OLQN  VXFK DV  WKH VHWXS DW   DQ LVODQG ZLGH WHPSHUDWXUH FKDQJH LV DQ H[DPSOH RI
           'DYLHV 5HHI  >  @  5DGLRFRPPXQLFDWLRQ GUDZV PRVW     D JOREDO HYHQW  $, DOJRULWKPV IDFH FKDOOHQJHV GXH WR
           RI WKH EDWWHU\ SRZHU  +HQFH  VFKHGXOLQJ RI VOHHS DQG   HUURU LQ GDWD  GDWD ORVV  QRQ JHQHUDWLYH GDWD PRGHOV
           ZDNH XS F\FOHV WR VHQVH HQYLURQPHQW  VWRUH GDWD  DQG   WHPSRUDOO\  DQG  VSDWLDOO\  LQFRPSOHWH  UHFRUGV  RI
           WUDQVPLW GDWD DUH FULWLFDO WR SURORQJ WKH RSHUDWLRQDO   SK\VLFDO  SKHQRPHQRQ  DQG  FHUWDLQ  PDULQH  DUWHIDFWV
           WLPH RI WKH QHWZRUN                                  DIIHFWLQJ WKH VHQVRU GDWD  7KH FKDOOHQJH LQ ,R7 :61
                                                                WR GHWHFW HYHQWV LV WR LGHQWLI\ DQRPDORXV HYHQWV LQ D
           2.4. Scalable networking architecture                UHVRXUFH FRQVWUDLQHG VHWXS

           0DULQH  HQYLURQPHQWV  QHHG  VHQVRU  QHWZRUNV  WKDW
           KDYH  IOH[LEOH  DUFKLWHFWXUH  WR  FRYHU  VSDWLDOO\  VPDOO
            IHZ PHWHUV  DV ZHOO DV ODUJH  IHZ NLORPHWHU  DUHDV











                                           ‹ ,QWHUQDWLRQDO 7HOHFRPPXQLFDWLRQ 8QLRQ
   43   44   45   46   47   48   49   50   51   52   53