Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/16233
Title: NETWORK RESOURCE ALLOCATION FOR EMERGENCY MANAGEMENT BASED ON CLOSED-LOOP ANALYSIS
Authors: Guda Blessed, Ibrahim Aliyu
James, Agajo
hiago Lima Sarmento, Lucas Novoa3, Rebecca Aben-Athar3, Mariano Moura3, Lucas Matni3, Aldebaro Klautau3, Deena Mukundan4, Divyani R Achari4, Mehmet Karaca5, Doruk Tayli6, Özge Simay Demirci5, V. Udaya Sankar7, Sai Jnaneswar Juvvisetty7, V.M.V.S. Aditya7, Abhishek Dandekar8, Shabnam Sultana, Jinsul Kim, Vishnu Ram OV Cleverson Veloso Nahum
Keywords: AI/ML, closed-loop, emergency
, network resource allocation, PoC, RAN
Issue Date: 2022
Publisher: ITU Journal on Future and Evolving Technologies
Abstract: The telecommunication system being a critical pillar of emergency management, intelligent deployment and management of slices in an affected area will help emergency responders. Techniques such as automated management of Machine Learning (ML) pipelines across the edge and emergency responder devices, usage of hierarchical closed-loops, and offloading inference tasks closer to the edge can minimize latencies for first responders in case of emergencies. This study describes the major results from building a Proof of Concept (PoC) for network resource allocation for emergency management using a hierarchical autonomous Artificial Intelligence (AI)/ML-based closed-loops in the mobile network, organized by the Internal Telecommunication Union Focus Group on Autonomous Networks (ITU FG-AN). The background scenario for this PoC included the interaction between a higher closed-loop in the Operations Support System (OSS) and a lower closed-loop in Radio Access Network (RAN) to intelligently share RAN resources between the public and the emergency responder slice. Representation of closed-loop “controllers” in a declarative fashion (intent), triggering “imperative actions” in the “underlay” based on the intent, setup of a data pipeline between various components, and methods of “influencing” lower layer loops using specific logic/models, were some of the essential aspects investigated by various teams. The main conclusions are summarised in this paper, including the significant observations and limitations from the PoC as well as future directions.
URI: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/16233
Appears in Collections:Computer Engineering

Files in This Item:
File Description SizeFormat 
ITU JOURNAL.pdf4.88 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.