Abdulrahman Yarali - Intelligent Connectivity

Здесь есть возможность читать онлайн «Abdulrahman Yarali - Intelligent Connectivity» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Intelligent Connectivity: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Intelligent Connectivity»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

This book focuses on the fusion between the core technologies of the future – Artificial Intelligence (AI), 5G, and the Internet of Things (IoT), exploring how they can be mutually supportive. AI, IoT, and 5G are the pillars that lead digital transformation, and the combination of super-fast 5th generation networks with AI and IoT will usher in a new age of intelligent connectivity, particularly beneficial to transportation, logistics, education, healthcare, entertainment, public safety/security and industrial and manufacturing operations. The book will offer technical and economic insights about intelligent connectivity as a key part of transformation in the 4th industrial revolution. The reader (technical and non-technical) will benefit from a comprehensive discussion of Artificial Intelligence, 5G, IoT and machine-learning and how they are vital in the period of open-source programming and moderate cloud computing.

Intelligent Connectivity — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Intelligent Connectivity», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Conversely, the AI routines bring forth the recognition of a large quantity of data for them to operate in a desirable way. This is especially related to the entire case of self‐improvement, which has also been noted as an essential potential of deep learning ANN systems (Siau and Wang 2018). The 5G technology would supposedly put all concerns to rest by processing data without any possibility of delays or other limitations. Experts predict that this will ensure that the current projected increase in connectivity speed of 15–20% would almost double if AI is specifically brought and implemented through this approach (Chen and Zhao 2014). Moreover, it must not be denied what it would mean for the future of both these technologies. There should be a potential for creating even more capable and powerful systems if definite results are derived from such an arrangement.

However, there are also risk considerations. It must not be forgotten that the large amounts of data that need to be produced for the AI to work properly will require a great availability of sources (Palattella et al. 2016). Therefore, it can be assumed that there could be a critically threatening scenario for all those involved in the industry when there could be a great and constant demand for more data (Duan and Wang 2015). In the past, many software companies illegally sold the private data of users to many unscrupulous entities who remain active throughout the internet. Thus, cybersecurity is an issue that must be considered to a critical extent.

2.2 Cybersecurity Concerns in the 5G World

By the time 5G networks and systems arrive in full force, there will be a great deal of consideration with regards to numerous security aspects. The criticality of addressing cybersecurity concerns has been growing over the years, as the impact of such instances eventually became quite widespread. Moreover, there is little awareness of all the risks evident at present, and the likeliness of cyberattacks affecting individuals greatly increases (French and Shim 2016). The 5G technology holds immense potential for realizing many IoT devices and making sure that their processes are as effective as possible (Akyildiz, Wang, and Lin 2015). This will inevitably lead to an explosion in the number of IoT devices connected to the internet, directly or indirectly. Moreover, there would be a significant increase in interconnectivity across the board. This specifically means that a single attack can cause maximum harm in terms of coverage, which is possible since these devices will be connected to multiple sub‐networks to provide agility and flexibility in operations.

Additionally, security concerning dissemination will also become a definite challenge. When considering IoT technologies, it is necessary to highlight a bit of revelation about the exact nature of the change. IoT is everyday “things” that people usually use in their daily lives. However, they are then optimized to function with the inserted capabilities of doing the functions they were meant to do, and more (Al‐Falahy and Alani 2017). Turning ordinary objects into specific IoT devices is challenging across every instance. It is also no wonder that these concerns that are being raised will extend to the provisioning of actual security allocations for these particular and different devices (Li, Da Xu, and Zhao 2018). Security solutions also follow monitoring protocols in real‐time and are often limited by the network's bandwidth capability (Arel, Rose, and Karnowski 2010). However, there is a constant look‐out for user performance upon the specified bandwidth through these specifications. The advent of 5G may make all these legacy strains of security solutions completely obsolete.

Moreover, another cybersecurity concern that realistically exists relates to the specific issues that reflect on the situation from another perspective altogether. In terms of realizing IoT, it is quite apparent that people would depend upon technology even more than the situation now. Therefore, the higher area of attack could find very subtle and non‐noticeable ways in which to significantly disrupt users' daily lives in a critical and very damaging fashion (Siau and Wang 2018). As a consequence, it becomes clear that the entire scenario reflects a situation that needs to address security across multiple dimensions at large.

IoT devices are the ultimate manifestations of what automation is supposed to be. However, this is not specifically focused upon 5G networks squarely, as it will also require the same treatment. The rise in security allocations that are automated across widespread systems has been quite prescient for some time. However, because of the existing challenges in the proper form of integration that many architectures and interfaces have encountered (Arel, Rose, and Karnowski 2010), the requirements state that security must synchronize with the data at every possible level, irrespective of the physical property or software. This fact is more problematic, especially when the software divide has become extremely complex. This is all in addition to the prescient need in case AI becomes an indelible part of 5G technology at large (Yazıcı, Kozat, and Sunay 2014). It will inimitably mean that there should be a significant increase in the stakes since the convergence of both will raise the requirement of data required for the AI systems to work correctly (Hassabis et al. 2017). All of this places a great deal of risk for the entire prospect of 5G technology and the networks.

2.2.1 5G's Potential in Making Security a Priority

A notable case to highlight is that there is still time for 5G to be released to the world. Although some technology instances have started to appear across some countries, they are not fully realized, and nor do they provide full‐fledged coverage in these places. One may assume that this specific technological advancement is still in its testing phase. However, what needs to be discussed is all about addressing concerns that must emanate from its highest stage, which involves setting goals and all the necessary policies to realize this specific aim at large (Akyildiz, Wang, and Lin 2015). Therefore, the International Telecommunication Union must update the goals that it has already set for realizing 5G technology to its fullest extent. This should result in the full realization of 5G technology for the public to be postponed for quite some time. That would also compel everyone associated with the predicament to work towards the goal in a way that is most critically and effectively imaginable (Ghahramani 2015). Moreover, the necessities that predict the success of the 5G technology will depend upon how well it can shift the technology landscape. It has happened repeatedly that a significant development in the communication aspects led to the total transformation of everything that was at hand about the technological aspects (Arel, Rose, and Karnowski 2010). It is also essential to highlight the fact that factors pervading throughout the field need to tackle the very complex problem. Additionally, the innovation should also look towards upgrading the security solutions with the help of what the AI routines encounter at large. Although this is a significantly challenging scenario, there is no doubt that there are numerous focal points available for addressing the need for capitalization.

2.2.2 Key Features

The entire field of the 5G network is significantly affected due to a wide variety of factors. However, it is extremely important to address the necessary features that pervade all across the board. These are the most important points of focus that will have a significant consequence across the circumstances that possess the innate potential to create the necessary changes as and when they are required.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Intelligent Connectivity»

Представляем Вашему вниманию похожие книги на «Intelligent Connectivity» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Intelligent Connectivity»

Обсуждение, отзывы о книге «Intelligent Connectivity» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x