Kozhobekov Kudaiberdi Gaparalievich

Kozhobekov Kudaiberdi Gaparalievich

مطالب
ترتیب بر اساس: جدیدترینپربازدیدترین

فیلترهای جستجو: فیلتری انتخاب نشده است.
نمایش ۱ تا ۲ مورد از کل ۲ مورد.
۱.

Leveraging AI for Predictive Maintenance with Minimizing Downtime in Telecommunications Networks(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Predictive maintenance artificial intelligence (AI) Machine Learning Telecom Networks Downtime Reduction Network Reliability deep learning Failure Prediction Operational Efficiency Network Optimization

حوزه‌های تخصصی:
تعداد بازدید : ۲ تعداد دانلود : ۱
Background: Telecommunications networks are exposed to numerous issues concerning equipment and that causes network outage, which proves very expensive. Basic maintenance methodologies like reactive or even scheduled preventive maintenance cannot cope up with the increasing trends in the facilities of telecom companies. Objective: The article examines how AI is applied to support predictive maintenance so that telecommunication networks can perform as intended with reduced downtime. Methods: The review of existing AI algorithms is presented, focusing on the ML models and deep learning methods. Network operations and maintenance logs are analyzed for data to assess the capabilities of the AI models in terms of prediction. It identifies and analyses such quantifiable parameters as the failure rate prediction accuracy and the response time cut. Results: Computerisation of the forecast maintenance revealed a corresponding decrease in equipment failure incidences and generally reduced time lost due to unscheduled stops. Through the improved network performance, the response to potential threats was quicker than before and services became more reliable and inexpensive to offer. Conclusion: To reduce network outages, reduce network vulnerability, and maximize the efficiency of telecommunications operations, the use of AI-based predictive maintenance can be viewed as a prospect. As technology advances, newer versions of AI algorithms will provide improved predictive strength and incorporation into the telecommunications system.
۲.

Quantum Key Distribution Protocols for Enhancing Cryptographic Resilience in Next-Generation 5G Network Infrastructures(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Quantum cryptography QKD PQC Hybrid Cryptography Quantum Computing Post-Quantum Security Scalability Quantum Threats Cryptographic Vulnerabilities Resource Optimization

حوزه‌های تخصصی:
تعداد بازدید : ۲ تعداد دانلود : ۱
  Background: Quantum computing has posed a profound threat to the classical cryptographic systems as it is advancing at an exponential rate with the help of quantum algorithms like Shor’s and Grover’s which can easily decipher the Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) algorithms. Huge requirements for cryptographic frameworks that can withstand quantum hacking have inspired Quantum Key Distribution (QKD), Post-Quantum Cryptography (PQC), and systems that use both. Objective: The aim of this article is to review the performance, scalability and integration of quantum-secure cryptographic services, with a practical lens on how they can be used in real-time environments like self-driving cars, industrial IoT, and intelligent health systems. It also aims at establishing the drawback of the current model and directions for further enhancement. Methods: The study employs simulative experimentation to understand lest exposures to quantum algorithms and rates cryptographic systems on standards such as latency, Quantum Bit Error Rate (QBER), computational overhead, scalability, and cost. Comparative assessment furniture integrated analysis of QKD, PQC, and hybrid system by identifying the advantages and disadvantage of each system. Results: As a result, adopting hybrid systems provided the best or comparable median results with lowest latency in real-time applications of ~45 ms or lower compared to alternative Multi-Access Edge Computing (MEC) architectures and types of security elements at high scalability. Thus, QKD, while being exceptional in security, has the problem of scalability, while PQC had average results on the given parameters. Conclusion : Quantum threats are adequately dealt with by hybrid cryptographic systems as this study has also pointed out. It is seen that initiation to future work may someday distribute resources effectively, expedite PQC standardization, and embrace artificially intelligent network frameworks for flexibility and expansiveness across different networks.

پالایش نتایج جستجو

تعداد نتایج در یک صفحه:

درجه علمی

مجله

سال

حوزه تخصصی

زبان