Page 48 - First special issue on The impact of Artificial Intelligence on communication networks and services
P. 48
,78 -2851$/ ,&7 'LVFRYHULHV 9RO 0DUFK
2.2. Securing buoys and casing 7KHUHIRUH WKH VHQVRU QHWZRUN DUFKLWHFWXUHV QHHG WR
EH VFDODEOH +RPRJHQRXV VHQVRU QHWZRUNV FRQVLVW RI
6HQVRU QRGHV QHHG IORDWLQJ EXR\V WR KROG WKH VHQVRU QRGHV RI WKH VDPH SURFHVVLQJ SRZHU UDGLR
HOHFWURQLFV LQ D VHFXUH FDVLQJ SURWHFWLRQ IURP UDQJH GDWD VWRUDJH FDSDFLW\ DQG QHWZRUNLQJ
VXUURXQGLQJ HQYLURQPHQWV WR DYRLG ZDWHU KXPLGLW\ DELOLWLHV 7KHVH DWWULEXWHV RI D KRPRJHQRXV QHWZRUN
EXLOG XS RU FRQGHQVDWLRQ ([SHULHQFH IURP SUHYLRXV OLPLW WKH WRSRORJ\ RI WKH VHQVRU QHWZRUN WR EH IODW
GHSOR\PHQWV KDYH LQGLFDWHG HTXLSPHQW ZLOO IRXO DQG L H LW LV QRW VFDODEOH LQ WKH HYHQW RI G\QDPLF
FRUURGH > @ 7KHUHIRUH XWPRVW FDUH PXVW EH WDNHQ UHURXWLQJ RU UHFRQILJXUDWLRQ RI QHWZRUN QRGHV 2Q
ZKHQ GHSOR\LQJ VHQVRU QRGHV LQ PDULQH WKH RWKHU KDQG KHWHURJHQHRXV QHWZRUN LQFOXGHV
HQYLURQPHQWV JLYHQ WKHUH LV D KLJK FKDQFH RI FRQWDFW VHQVRU QRGHV KDYLQJ YDULHG SURFHVVLQJ
ZLWK VHD ZDWHU 7KH IORDWLQJ EXR\V DUH WKH SUHIHUUHG FRPPXQLFDWLRQ DQG VWRUDJH DELOLWLHV 7KHVH
SURWHFWLYH FDVLQJV IRU PDULQH HQYLURQPHQWV DWWUDFWLYH IHDWXUHV RI KHWHURJHQHRXV VHQVRU QRGHV
+RZHYHU WKH EXR\V LQWURGXFH VHYHUDO FKDOOHQJHV SURYLGH VFDODEOH QHWZRUNLQJ VROXWLRQV WKURXJK
)LUVW WKH EXR\V FRQVLVWLQJ RI VHQVRU QRGHV QHHG KLHUDUFKLFDO DUFKLWHFWXUHV 7HQHW > @ 7VDU > @
PRRULQJV IL[HG XVXDOO\ WR WKH VHD IORRU XVLQJ FDEOHV 6HQV(\H > @ $VDS > @ DQG &LWULF > @ DUH VRPH RI
6HFRQG GHSHQGLQJ RQ WKH W\SH RI VHQVLQJ HOHPHQW WKH H[DPSOHV RI KHWHURJHQHRXV QHWZRUNV
ZH PD\ DOVR KDYH WR UXQ D ORQJ FDEOH ZLWK D VHQVLQJ
HOHPHQW FDXVLQJ GHWHULRUDWLRQ RI WKH PHDVXUHG 2.5. Detecting interesting events using AI
VLJQDO IURP WKH VHQVLQJ HOHPHQW 7KLUG WKH EXR\V
GULIW GXH WR RFHDQ FXUUHQWV DQG WLGHV FDXVLQJ UDGLDO 7KH QHWZRUN WRSRORJ\ RI ,R7 :61 FDQ EH D VWDU
YHUWLFDO DQG WDQJHQWLDO KRUL]RQWDO GLVSODFHPHQWV PHVK WUHH RU D FRPELQDWLRQ RI DOO > @ 7KH ZD\ WKDW
RI VHQVRUV QRGHV 7KHUHIRUH WKHVH GLVSODFHPHQWV DUH GDWD PRYHV DFURVV WKH QHWZRUN IURP RQH ORFDWLRQ WR
OLNHO\ WR FDXVH LVVXHV ZLWK ZLUHOHVV GDWD WUDQVPLVVLRQ DQRWKHU GHSHQGV RQ WKH WRSRORJ\ 7KXV HYHQW
DV WKH QRGHV PRYH LQ D PDQQHU WKDW WKH\ DUH XQDEOH GHWHFWLRQ FDQ EH ORFDO RU JOREDO UHODWLYH WR WKH
WR EH LQ WKH FRPPXQLFDWLRQ UDQJH RI WKH GHSOR\HG QHWZRUN /RFDO HYHQWV DUH VSHFLILF WR WKH VHQVRU
VHQVRU QHWZRUN QRGHV ZKHUHDV JOREDO HYHQWV UHTXLUH WKH VHQVRU GDWD
WR EH JDWKHUHG DW D FHQWUDOL]HG ORFDWLRQ /RFDO HYHQW
2.3. Communication and scheduling constraints GHWHFWLRQ UHTXLUHV SURFHVVLQJ SRZHU DW WKH VHQVRU
QRGHV 2IWHQ WKH FRPSXWDWLRQDO SRZHU PHPRU\ DQG
&RPPXQLFDWLRQ LQ D VHQVRU QHWZRUN FDQ EH UHVRXUFHV DUH OLPLWHG LQ LQGLYLGXDO QRGHV 7KHUHIRUH
FDWHJRUL]HG LQWR WZR NLQGV ORFDO FRRUGLQDWLRQ DQG VLPSOH HYHQW GHWHFWLRQV ORFDOO\ DUH RIWHQ UHODWLYHO\
VHQVRU EDVH FRPPXQLFDWLRQ > @ /RFDO FRRUGLQDWLRQ HDV\ DQG ZLOO EH EDVHG RQ RQH GLPHQVLRQDO VHQVRU
LQYROYHV DJJUHJDWLQJ GDWD DPRQJ D JURXS RI QRGHV GDWD )RU H[DPSOH GHWHFWLQJ FKDQJHV LQ WHPSHUDWXUH
7KH VHQVRU EDVH FRPPXQLFDWLRQ LV FRQFHUQHG ZLWK OHYHO DERYH D FHUWDLQ WKUHVKROG LV DQ H[DPSOH RI D
FRPPXQLFDWLQJ WKH DJJUHJDWHG GDWD WR D EDVH VWDWLRQ ORFDO HYHQW 2Q WKH RWKHU KDQG JOREDO HYHQW GHWHFWLRQ
%RWK WKHVH W\SHV RI GDWD DJJUHJDWLRQ FRXOG XWLOL]H LQYROYHV KLJK FRPSXWDWLRQDO SRZHU PHPRU\
VLQJOH KRS RU PXOWL KRS FRPPXQLFDWLRQ > @ 7KH VRSKLVWLFDWHG $, DOJRULWKPV DQG QHWZRUN UHVRXUFHV
GDWD FRXOG EH ORJJHG WR D GDWD ORJJHU RU FROOHFWHG *OREDO HYHQWV DOVR FRQVLGHU PXOWLGLPHQVLRQDO VHQVRU
PDQXDOO\ XVLQJ UHJXODU VLWH YLVLWV RU XVLQJ D GDWD IURP PXOWLSOH VHQVRUV )RU H[DPSOH GHWHFWLQJ
PLFURZDYH FRPPXQLFDWLRQ OLQN VXFK DV WKH VHWXS DW DQ LVODQG ZLGH WHPSHUDWXUH FKDQJH LV DQ H[DPSOH RI
'DYLHV 5HHI > @ 5DGLRFRPPXQLFDWLRQ GUDZV PRVW D JOREDO HYHQW $, DOJRULWKPV IDFH FKDOOHQJHV GXH WR
RI WKH EDWWHU\ SRZHU +HQFH VFKHGXOLQJ RI VOHHS DQG HUURU LQ GDWD GDWD ORVV QRQ JHQHUDWLYH GDWD PRGHOV
ZDNH XS F\FOHV WR VHQVH HQYLURQPHQW VWRUH GDWD DQG WHPSRUDOO\ DQG VSDWLDOO\ LQFRPSOHWH UHFRUGV RI
WUDQVPLW GDWD DUH FULWLFDO WR SURORQJ WKH RSHUDWLRQDO SK\VLFDO SKHQRPHQRQ DQG FHUWDLQ PDULQH DUWHIDFWV
WLPH RI WKH QHWZRUN DIIHFWLQJ WKH VHQVRU GDWD 7KH FKDOOHQJH LQ ,R7 :61
WR GHWHFW HYHQWV LV WR LGHQWLI\ DQRPDORXV HYHQWV LQ D
2.4. Scalable networking architecture UHVRXUFH FRQVWUDLQHG VHWXS
0DULQH HQYLURQPHQWV QHHG VHQVRU QHWZRUNV WKDW
KDYH IOH[LEOH DUFKLWHFWXUH WR FRYHU VSDWLDOO\ VPDOO
IHZ PHWHUV DV ZHOO DV ODUJH IHZ NLORPHWHU DUHDV
,QWHUQDWLRQDO 7HOHFRPPXQLFDWLRQ 8QLRQ