banner

From tradition to innovation: The telecommunications metamorphosis with AI and advanced technologies

Khadija Slimani, Samira Khoulji, Aslane Mortreau, Mohamed Larbi Kerkeb

Abstract


Businesses in the telecommunications industry provide global communication using a variety of channels, including but not limited to mobile phones, landlines, satellites, the Internet, and other electronic media. These businesses built the networks that enable the global transfer of text, audio, speech, and video. Companies in the telecommunications industry include those that provide landline and cellular telephone service, as well as those that provide cable television, satellite television, and online access. Once upon a time, the telecommunications industry was dominated by a small group of extremely large multinational and regional conglomerates. The industry has been caught up in a wave of liberalization and innovation since the early 2000s. Government monopolies have been privatized in several nations, exposing them to an explosion of new rivals. As mobile services continue to grow at a faster rate than fixed-line ones, and as Internet traffic begins to surpass voice traffic as the dominant form of commerce, established marketplaces have been turned on their heads. The undertaken paper endeavors to highlight the vulnerabilities that the telecommunication networking sector could be facing in the present as well as the future in light of the usage of artificial intelligence as assistive and advanced tech.


Keywords


telecommunication; network; industry; cloud; AI; NGN

Full Text:

PDF

References


1. Jiang Y, Gu J. Technological transformation. In: Technology and Industrial Transformation of China. Springer; 2022. pp. 1–19.

2. Hoolihan DD. A review of developments in wireless and electrical engineering. IEEE Electromagnetic Compatibility Magazine 2022; 12(1): 29–30. doi: 10.1109/MEMC.2023.10135175

3. Khan N, Ray RL, Zhang S, et al. Influence of mobile phone and internet technology on income of rural farmers: Evidence from khyber Pakhtunkhwa province, Pakistan. Technology in Society 2022; 68: 101866. doi: 10.1016/j.techsoc.2022.101866

4. Maryam, Husniati AM, Fahira L, Suwiji Y. Implementation of policies for devoleping aceh’s micro, small and medium enterprises. In: Proceedings of International Conference on Social Science, Political Science, and Humanities (ICoSPOLHUM); 22 December 2022; Aceh Utara, Indonesia. p. 00013.

5. Bourekkadi S, El Imrani O, Kandili M, et al. Intelligent solution based on information technologies—The correct value of the business in economic organization is intangible asset. In: Proceedings of the 33rd International Business Information Management Association Conference, IBIMA; 10–11 April 2019; Granada, Spain. pp. 6310–6317.

6. Antioco M, Coussement K, Fletcher-Chen CCY, Prange C. What’s in a word? Adopting a linguistic-style analysis of western MNCs’ global press releases. Journal of World Business 2023; 58(2): 101414. doi: 10.1016/j.jwb.2022.101414

7. Teece DJ. A wider-aperture lens for global strategic management: The multinational enterprise in a bifurcated global economy. Global Strategy Journal 2022; 12(3): 488–519. doi: 10.1002/gsj.1462

8. Slimani K, Bourekkadi S, Messoussi R, et al. Sharing emotions in the distance education experience: Attitudes and motivation of university students. In: Proceedings of the 2020 International Conference on Intelligent Systems and Computer Vision (ISCV); 9–11 June 2020; Fez, Morocco. pp. 1–10.

9. Slimani K, Ruichek Y, Messoussi R. Compound facial emotional expression recognition using CNN deep features. Engineering Letters 2022; 30(4): 1402–1416.

10. Goel AK. Looking back, looking ahead: Symbolic versus connectionist AI. AI Magazine 2022; 42(4): 83–85. doi: 10.1609/aaai.12026

11. Huang Z. Introducing neuro-symbolic artificial intelligence to humanities and social sciences: Why is it possible and what can be done? TEM Journal 2022; 11(4): 1863–1870. doi: 10.18421/TEM114-54

12. McCulloch WS, Pitts W. A logical calculus of the ideas immanent in nervous activity. Bulletin of Mathematical Biology 1943; 5: 115–133. doi: 10.1007/BF02478259

13. Jensen JR, Qiu F, Ji M. Predictive modelling of coniferous forest age using statistical and artificial neural network approaches applied to remote sensor data. International Journal of Remote Sensing 1999; 20(14): 2805–2822. doi: 10.1080/014311699211804

14. Sun P, Halak B, Kazmierski T. Towards hardware trojan resilient design of convolutional neural networks. In: Proceedings of the 2022 IEEE 35th International System-on-Chip Conference (SOCC); 5–8 September 2022; Belfast, United Kingdom. pp. 1–6.

15. Biggio B, Roli F. Wild patterns: Ten years after the rise of adversarial machine learning. arXiv 2018; arXiv:1712.03141. doi: 10.1016/j.patcog.2018.07.023

16. Rudin C. Stop explaining black box machine learning models for high stakes decisions and use interpretable models instead. Nature Machine Intelligence 2019; 1(5): 206–215. doi: 10.1038/s42256-019-0048-x

17. Xuan S, Liu G, Li Z, et al. Random forest for credit card fraud detection. In: Proceedings of the 2018 IEEE 15th international conference on networking, sensing and control (ICNSC); 27–29 March 2018; Zhuhai, China. pp. 1–6.

18. Sun Q, Zhang H, Zhang J, Zhang X. Why can’t we accurately predict others’ decisions? Prediction discrepancy in risky decision-making. Frontiers in Psychology 2018; 9: 2190. doi: 10.3389/fpsyg.2018.02190

19. Jakubovitz D, Giryes R, Rodrigues MRD. Generalization error in deep learning. In: Boche H, Caire G, Calderbank R (editors). Compressed Sensing and its Applications. Springer; 2019. pp. 153–193.

20. Ssengonzi C, Kogeda OP, Olwal TO. A survey of deep reinforcement learning application in 5G and beyond network slicing and virtualization. Array 2022; 14: 100142. doi: 10.1016/j.array.2022.100142

21. Parulekar DD. Decoding ‘sovereign strategic networks’ in the indo-pacific: Contesting china’s ‘ascendant-rise’. In: Singh S, Marwah R (editors). China and the Indo-Pacific: Maneuvers and Manifestations. Springer; 2023. pp. 21–40.

22. Nagaty KA. Iot commercial and industrial applications and AI-powered IoT. In: Iranmanesh A (editor). Frontiers of Quality Electronic Design (QED) AI, IoT and Hardware Security. Springer; 2023. pp. 465–500.

23. Baabdullah AM, Alalwan AA, Algharabat RS, et al. Virtual agents and flow experience: An empirical examination of AI-powered chatbots. Technological Forecasting and Social Change 2022; 181: 121772. doi: 10.1016/j.techfore.2022.121772

24. Dixit S. Artifical intelligence and crm: A case of telecom industry. In: Adoption and Implementation of AI in Customer Relationship Management. IGI Global; 2022. pp. 92–114.

25. Wang X. Reflection on prevention and control of telecommunication network fraud in big data era. Journal of Networking and Telecommunications 2020; 2(2): 43. doi: 10.18282/jnt.v2i2.1103

26. Alzahrani RA, Aljabri M. AI-based techniques for Ad click fraud detection and prevention: Review and research directions. Journal of Sensor and Actuator Networks 2022; 12(1): 4. doi: 10.3390/jsan12010004

27. Beerbaum DO. Artificial intelligence ethics taxonomy—Robotic process automation (RPA) as business case. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3834361 (accessed on 12 September 2023).

28. Du Y. On the transparency of artificial intelligence system. Journal of Autonomous Intelligence 2022; 5(1): 13–22.

29. Yatskiv N, Yatskiv S, Vasylyk A. Method of robotic process automation in software testing using artificial intelligence. In: Proceedings of the 2020 10th International Conference on Advanced Computer Information Technologies (ACIT); 16–18 September 2020; Deggendorf, Germany. pp. 501–504.

30. Ng YL, Lin Z. Exploring conversation topics in conversational artificial intelligence-based social mediated communities of practice. Computers in Human Behavior 2022; 134: 107326. doi: 10.1016/j.chb.2022.107326

31. Slimani K, Khoulji S, Kerkeb ML. Advancements and challenges in energy-efficient 6G mobile communication network. E3S Web of Conferences, EDP Sciences 2023; 412: 01036. doi: 10.1051/e3sconf/202341201036

32. Morawiec P, Sołtysik-Piorunkiewicz A. Cloud computing, big data, and blockchain technology adoption in ERP implementation methodology. Sustainability 2022; 14(7): 3714. doi: 10.3390/su14073714

33. Belgaum MR, Alansari Z, Musa S, et al. Role of artificial intelligence in cloud computing, IoT and SDN: Reliability and scalability issues. International Journal of Electrical and Computer Engineering 2021; 11(5): 4458. doi: 10.11591/ijece.v11i5.pp4458-4470

34. Solyman AAA, Yahya K. Evolution of wireless communication networks: From 1G to 6G and future perspective. International Journal of Electrical and Computer Engineering 2022; 12(4): 3943. doi: 10.11591/ijece.v12i4.pp3943-3950

35. Guo R, Zheng Q, Wang L, et al. Porous N-doped Ni@ SiO2/graphene network: Three-dimensional hierarchical architecture for strong and broad electromagnetic wave absorption. Journal of Materials Science & Technology 2022; 106: 108–117. doi: 10.1016/j.jmst.2021.07.046

36. Husain S, Kunz A, Song J. 3GPP 5G Core network: An overview and future directions. Journal of Information and Communication Convergence Engineering 2022; 20(1): 8–15.

37. Wang Z, Sun Y, Yuan S. Intelligent radio access networks: Architectures, key techniques, and experimental platforms. Frontiers of Information Technology & Electronic Engineering 2022; 23(1): 5–18. doi: 10.1631/FITEE.2100305

38. Hicham GT, Chaker EA. Cloud computing CPU allocation and scheduling algorithms using cloudsim simulator. International Journal of Electrical & Computer Engineering 2016; 6(4): 1866–1879. doi: 10.11591/ijece.v6i4.pp1866-1879

39. Oztoprak K, Tuncel YK, Butun I. Technological transformation of telco operators towards seamless IoT edge-cloud continuum. Sensors 2023; 23(2): 1004. doi: 10.3390/s23021004

40. Huang MF, Han S, Narisetty C, et al. AI-driven applications over telecom networks by distributed fiber optic sensing technologies. In: Proceedings of the Next-Generation Optical Communication: Components, Sub-Systems, and Systems XI; 2022. San Francisco, California, US. pp. 116–121.

41. Lundberg L, Grahn H. Research trends, enabling technologies and application areas for big data. Algorithms 2022; 15(8): 280. doi: 10.3390/a15080280

42. Kalra V, Rahi S, Pawar N, et al. A tour towards the security issues of mobile cloud computing: A survey. In: Singh PK, Kolekar MH, Tanwar S (editors). Emerging Technologies for Computing, Communication and Smart Cities. Springer; 2022. pp. 577–589.

43. Al-Jumaili A, Muniyandi R, Hasan MK, et al. Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment. Journal of Autonomous Intelligence 2023; 6(1): 640. doi: 10.32629/jai.v6i1.640

44. Godfrey DM, Price LL, Lusch RF. Repair, consumption, and sustainability: Fixing fragile objects and maintaining consumer practices. Journal of Consumer Research 2022; 49(2): 229–251.

45. Gharbaoui M, Contoli C, Davoli G, et al. Demonstration of latency-aware and self-adaptive service chaining in 5G/SDN/NFV infrastructures. In: Proceedings of the 2018 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN); 27–29 November 2018; Verona, Italy. pp. 1–2.

46. Albalawi AM, Almaiah MA. Assessing and reviewing of cyber-security threats, attacks, mitigation techniques in IoT environment. Journal of Theoretical and Applied Information Technology 2022; 100(9): 2988–3011.

47. Gilbert M. The role of artificial intelligence for network automation and security. In: Artificial Intelligence for Autonomous Networks. Chapman and Hall/CRC; 2018. pp. 1–23.

48. Choudhary D. Security challenges and countermeasures for the heterogeneity of IoT applications. Journal of Autonomous Intelligence 2019; 1(2): 16–22. doi: 10.32629/jai.v1i2.25

49. Verdecchia R, Malavolta I, Lago P, Ozkaya I. Empirical evaluation of an architectural technical debt index in the context of the Apache and ONAP ecosystems. PeerJ Computer Science 2022; 8: e833.

50. Sauvanaud C, Lazri K, Kaˆaniche M, Kanoun K. Anomaly detection and root cause localization in virtual network functions. In: Proceedings of the 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE); 2016. pp. 196–206.




DOI: https://doi.org/10.32629/jai.v7i1.1099

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Khadija Slimani, Samira Khoulji, Aslane Mortreau, Mohamed Larbi Kerkeb

License URL: https://creativecommons.org/licenses/by-nc/4.0/