Page 51 - First special issue on The impact of Artificial Intelligence on communication networks and services
P. 51
,78 -2851$/ ,&7 'LVFRYHULHV 9RO 0DUFK
$, DOJRULWKPV DUH XVHG WR SURYLGH DSSOLFDWLRQ
VSHFLILF DQDO\WLFV WR HQG XVHUV 7KHVH DUH JHQHUDOO\
SURYLGHG DV D VHUYLFH WR HQG XVHUV 7KH 6R6 FRQFHSW
JRHV EH\RQG WUDGLWLRQDO DQDO\WLFV WR SURYLGH D
FRPSOHWH XQGHUVWDQGLQJ RI WKH LVVXHV WR
JRYHUQPHQWV SROLF\PDNHUV DQG GHFLVLRQ PDQDJHUV
,Q WKLV UHVSHFW V\VWHPV DUH WR EH LQWHJUDWHG LQ D
VHDPOHVV PDQQHU DQG VROYH WHFKQRORJLFDO LVVXHV
ZLWKLQ DQG RXWVLGH WKH UHDOP RI VSHFLILF VROXWLRQV
4.4. Open research challenges
x $Q HVWLPDWHG ELOOLRQ ,R7 GHYLFHV DUH XVHG LQ
IRU QXPHURXV DSSOLFDWLRQV > @ 7KH
FKDOOHQJH OLHV LQ 6R6 LQWHJUDWLRQ ZLWK $, WR
SURFHVV DQDO\]H DQG JHQHUDWH DFWLRQDEOH
NQRZOHGJH )RU GDWD RULJLQDWLQJ IURP ELOOLRQV RI )LJ 7KH LOOXVWUDWLRQ GHSLFWV WKH LGHD RI DFKLHYLQJ
GHYLFHV LW ZLOO EH QHDUO\ LPSRVVLEOH WR DQDO\]H D FRPPRQ RSHUDWLQJ SLFWXUH &23 XVLQJ V\VWHP RI
PDQXDOO\ 7KLV FKDOOHQJH LV DWWULEXWHG WR WKH big V\VWHPV DSSURDFK 7KH H0DULQH ,QIRUPDWLRQ
data FKDOOHQJH 7KH DQDO\VLV VKRXOG LQFOXGH WKH ,QIUDVWUXFWXUH H0,, SURYLGHV D VLQJOH LQWHJUDWLYH
JURZWK RI PXOWLGLPHQVLRQDO GDWD DWWULEXWHV L H IUDPHZRUN IRU GDWD DQG LQIRUPDWLRQ PDQDJHPHQW
YROXPH YHORFLW\ YDULHW\ YHUDFLW\ YDULDELOLW\ WKDW ZLOO DOORZ GLVFRYHU\ DQG DFFHVV RI WKH GDWD E\
DQG YDOXH WR SURGXFH DFWLRQDEOH NQRZOHGJH VFLHQWLVWV PDQDJHUV DQG WKH SXEOLF 7KH GDWD IURP
XVLQJ $, DOJRULWKPV UHDO ZRUOG DUH WKHQ IHG WR $, EDVHG FORXG FHQWULF
DQDO\WLFV 7KH RXWSXW IURP WKH DQDO\WLFV LV XVHG WR
PDNH GHFLVLRQV DV ZHOO DV WR SURYLGH IHHGEDFN WR
WKH H[LVWLQJ V\VWHPV
x &OXVWHULQJ RI GDWD IURP VHQVRUV DQG ,R7 GHYLFHV
LV DQ XQVXSHUYLVHG WDVN WR H[WUDFW KLGGHQ
SDWWHUQV ZLWKRXW D SULRUL LQIRUPDWLRQ +RZHYHU
ZLWK WKH ELJ GDWD FKDOOHQJHV SRLQWHG DERYH
WKH FOXVWHULQJ DOJRULWKPV QHHG WR EH scalable
DOJRULWKPV FRXOG EH XVHG RQ ODUJH YROXPHV RI
GDWD self-tuning WKH $, DOJRULWKPV VKRXOG
ZRUN ZLWKRXW DQ\ LQSXW SDUDPHWHUV IURP HQG
XVHUV immune to outliers HOLPLQDWH RXWOLHUV
PLVVLQJ GDWD SRLQWV DQG HUURU SRLQWV IURP WKH
)LJ :61 ,R7 V\VWHP DUFKLWHFWXUH XVHG WR VHQVHG GDWD DQG adaptive WKH $, PRGHOV PXVW
PRQLWRU +HURQ ,VODQG 7KH GDWD LV FROOHFWHG XVLQJ D DGDSW WKH PRGHOV WR QHZO\ DUULYHG GDWD SRLQWV
WZR WLHUHG WUHH KLHUDUFKLFDO QHWZRUN DUFKLWHFWXUH ZLWKRXW UHWUDLQLQJ XVLQJ DOO GDWD SRLQWV
7KH GDWD LV WKHQ WUDQVPLWWHG WR D FHQWUDO EDVH x 7KH $, DOJRULWKPV PXVW SURYLGH D KROLVWLF
VWDWLRQ ZKLFK WKHQ WUDQVPLWV LW WR D PDLQODQG NQRZOHGJH RI 6R6 LQ real-time 7KLV UHTXLUHV
VHUYHU 7KH FORXG VHUYHU FRQVLVWV RI $, DQDO\WLFV $, DOJRULWKPV WR EH DZDUH RI QRW RQO\ WKH
WKDW FDQ PRQLWRU VWUHDPLQJ UHDO WLPH GDWD DQG GHWHFW FXUUHQW V\VWHP ZKHUH WKH DOJRULWKP UHVLGHV EXW
HYHQWV DOVR DERXW GHSHQGHQW DQG LQWHUFRQQHFWHG
V\VWHPV &XUUHQWO\ PRVW RI WKH $, DOJRULWKPV
DUH GHVLJQHG WR EH SHUIRUPHG IRU D VSHFLILF
V\VWHP LJQRULQJ WKH LPSOLFDWLRQV RI GDWD IORZ
DQG FRQQHFWHGQHVV RI GHSHQGHQW V\VWHPV
x 2QH RI WKH LPSRUWDQW FKDOOHQJHV LQ WRGD\¶V
,R7 :61 SDUDGLJP LV WKH data security LVVXH
7KH DOJRULWKPV VHUYLFHV DQG LQIUDVWUXFWXUH IDFH
WUHPHQGRXV FKDOOHQJH LQ PDLQWDLQLQJ VHFXULW\
,QWHUQDWLRQDO 7HOHFRPPXQLFDWLRQ 8QLRQ