ArticlePDF Available

Integration of computer networks and artificial neural networks for an AI-based network operator

Authors:

Abstract and Figures

This paper proposes an integrated approach combining computer networks and artificial neural networks to construct an intelligent network operator, functioning as an AI model. State information from computer networks is transformed into embedded vectors, enabling the operator to efficiently recognize different pieces of information and accurately output appropriate operations for the computer network at each step. The operator has undergone comprehensive testing, achieving a 100% accuracy rate, thus eliminating operational risks. Additionally, a simple computer network simulator is created and encapsulated into training and testing environment components, enabling automation of the data collection, training, and testing processes. This abstract outline the core contributions of the paper while highlighting the innovative methodology employed in the development and validation of the AI-based network operator.
Content may be subject to copyright.
Integration of computer networks and artificial neural
networks for an AI-based network operator
Binbin Wu1,*,Jingyu Xu2,Yifan Zhang3, Bo Liu4,Yulu Gong5,Jiaxin Huang 6
1Heating Ventilation and Air Conditioning Engineering, Tsinghua University, Beijing
China
2Computer Information Technology, Northern Arizona University,1900 S Knoles Dr,
Flagstaff, AZ, USA
3Executive Master of Business Administration, Amazon Connect Technology Services
(Beijing), Co., Ltd. Xi’an, Shaanxi, China
4Software Engineering, Zhejiang University, HangZhou China
5Computer & Information Technology, Northern Arizona University, Flagstaff, AZ,
USA
6Information Studies, Trine University, Phoenix USA
*Corresponding author: wubinbin.1@gmail.com
Abstract. This paper proposes an integrated approach combining computer networks and
artificial neural networks to construct an intelligent network operator, functioning as an AI model.
State information from computer networks is transformed into embedded vectors, enabling the
operator to efficiently recognize different pieces of information and accurately output
appropriate operations for the computer network at each step. The operator has undergone
comprehensive testing, achieving a 100% accuracy rate, thus eliminating operational risks.
Additionally, a simple computer network simulator is created and encapsulated into training and
testing environment components, enabling automation of the data collection, training, and testing
processes. This abstract outline the core contributions of the paper while highlighting the
innovative methodology employed in the development and validation of the AI-based network
operator.
Keywords: AI-based Network Operator, Integration of Computer Networks and Artificial
Neural Networks, Embedded Vector Representation, Automated Training and Testing
Environment.
1. Introduction
The current enterprise network architecture faces numerous challenges during the process of digital
transformation. As a critical and complex component of IT infrastructure, computer network systems
are undergoing a paradigm shift in architecture and design principles from traditional hardware-centric
network operations to business and application-oriented network operations. Challenges such as
insufficient agility in network architecture, inadequate automation and intelligence in network
operations, and difficulties in network fault localization are among the primary obstacles. These
challenges further result in issues such as failure to meet [1]Service Level Agreement (SLA)
Proceedings of the 6th International Conference on Computing and Data Science
DOI: 10.54254/2755-2721/64/20241370
© 2024 The Authors. This is an open access article distributed under the terms of the Creative Commons Attribution License 4.0
(https://creativecommons.org/licenses/by/4.0/).
122
requirements for business continuity and high network operation costs. To address these challenges, this
paper introduces the design of an intelligent operator capable of analyzing network information,
identifying network faults, and providing appropriate actions to resolve them. This intelligent operator
represents a novel approach towards enhancing network resilience, automating network operations, and
meeting the evolving demands of digital transformation in enterprise networks.
2. Related work
2.1. System architecture
In the example of a minicomputer network in this article, we will show how to make an intelligent
operator. This computer network is created randomly through simulators, and in doing so increases the
diversity that allows our intelligent operators to make appropriate decisions and reactions in a variety of
situations. Our intelligent operators will manage and maintain this network by monitoring network
traffic, analyzing packets, detecting network anomalies, and more. It will perform various tasks
according to pre-set policies and algorithms, such as: 1) Network monitoring and fault detection:
Intelligent operators will regularly scan network traffic, monitor equipment operating status, and detect
any abnormal conditions; 2) Traffic management: It can dynamically adjust the network according to
the traffic load and optimize the data transmission path to ensure the efficient operation of the network;
3) Security protection: Intelligent operators will monitor network security vulnerabilities and attacks in
real time and take necessary measures to protect network security; 4) Automated tasks: It can perform
a variety of automated tasks to reduce the workload of administrators.; 5) Performance optimization:
Intelligent operators will provide optimization suggestions and adjustment plans based on network usage
and performance indicators to improve the overall performance and stability of the network[2].
2.2. Intelligent operator
To achieve the goal of automating data collection and operator training, we need to integrate computer
networks and neural networks together[4]. To achieve this, we can take the following steps to integrate
computer networks and neural networks: First, we need to deploy data collectors in the network to
capture network traffic data; Next, we design a neural network model suitable for network traffic
management tasks. This model can be a deep reinforcement learning model, such as [5-7]Deep Q
networks (DQN) or policy gradient methods, for learning optimal policies for network traffic
management; Then, reinforcement learning algorithms, such as the experiential playback mechanism of
deep Q networks, are then used to train neural network models from data collected in real time. During
the training process, the neural network will constantly interact with the network, learn and adjust
according to the actual network state and feedback signals, in order to improve its network traffic
management ability; After the training is completed, the trained neural network model is deployed to
the actual network environment. The intelligent operator will monitor network traffic in real time and
make operational decisions based on the output of the neural network model. At the same time, on-the-
ground data can be continuously collected for further optimization and adaptation of the neural network
model to the changing network environment and needs[8]. Through this integrated approach, we achieve
a close combination of computer networks and neural networks, enabling intelligent operators to collect
and train data from the network in real time, thereby continuously improving their network management
and optimization capabilities.
3. Methodology
This paper employs four key modules to implement the designed architecture: a computer network
simulator, a computer network environment component, a trainer, and a tester. The simulator creates a
simulation environment, diversifying data by randomly generating computer networks for training
intelligent operators. The environment component acts as a bridge, collecting real-time data for
processing by the operator. [9-10] The trainer module utilizes collected data and a pre-designed neural
network model to train the operator via reinforcement learning algorithms, continuously refining its
Proceedings of the 6th International Conference on Computing and Data Science
DOI: 10.54254/2755-2721/64/20241370
123
strategy. Lastly, the tester module evaluates the operator's performance in real or simulated network
environments, assessing its efficacy across various scenarios. Together, these modules form a
comprehensive system for intelligent network management and optimization, crucial for building
efficient network systems.
3.1. Computer network simulator
The simulator has the ability to randomly generate simple computer networks, which allows users to
easily create networks with different topologies, thus increasing the flexibility and diversity of the
system (Figure 1). In addition, the simulator also provides several other functions, such as real-time
monitoring of network performance, simulating network failures and attacks, and evaluating network
security. Through these functions, users can fully understand and evaluate the operation of the simulated
network, so as to better understand the working principle and characteristics of the computer network.
Figure 1. Computer network diagram
The computer network generated by the emulator shown in Figure 1 has the following characteristics:
a. The number of devices ranges from 4 to 10; b. Devices are connected through the tree topology;
c. IP Subnet Select a subnet from a pool containing 32 subnets. For brevity, the subnets are named IP-
Subnet-1 through IP-Subnet-32. The mask of a subnet is a 24-bit 255.255.255.0; d. Select an IP address
from a pool of 63 IP addresses corresponding to each subnet. For brevity, IP addresses are named from
ip-address -1 to ip-address -63. The full name of an IP Address is "ip-address -x in IP- subnet-y" (x and
y are numbers). In this article, only "ip-address -x" is used to indicate the name of the IP Address, which
is more concise and still valid because the IP Subnet to which the IP address belongs is fixed and
immutable; e. Routing Protocol Select RIP version 2, EIGRP (AS 1), and OSPF (Process ID 1). The
automatic summary function of RIP and EIGRP is disabled. The area of all OSPF subnets is 0; f. In this
example network, the following six types of faults are randomly inserted:
Table 1. Device Status and Possible Reasons
Status
Possible Reasons
Port Closed
1. Port misconfiguration or not properly enabled.
2. Port not specified in device configuration.
3. Hardware fault or connectivity issues.
Incorrect IP Address
1. Static IP address misconfigured.
2. Dynamic IP address allocation failure or misconfiguration.
3. Subnet mask misconfigured.
Incorrect IP Subnet
1. Subnet mask misconfigured.
2. IP address not matching the network of the device.
3. Subnet mask not matching the network of the device.
Missing IP Subnet
1. Device not configured with an IP address.
2. Device not joined to any network.
3. Non-existent network or connectivity issues.
Automatic Summary Routing
1. Automatic summary function misconfigured.
2. Router not enabled with automatic summary function.
3. Erroneous summary routes in the static routing table.
Routing Protocol Version
1. Routing protocol misconfiguration.
2. Protocol version mismatch between router and neighboring devices.
3. Router not enabled with any routing protocol.
Proceedings of the 6th International Conference on Computing and Data Science
DOI: 10.54254/2755-2721/64/20241370
124
The above features are very important for any type of computer network, and more functions can be
added in future work, such as: security functions, quality of service functions, traffic engineering
functions, etc.
3.2. Computer network environment components
The environment component inherits all the functionality of the simulator and adds two additional
features: an encoder that converts the observation information text into numbers (the observation
information encoder) and an encoder that converts the observation information into embedded vectors
(the observation information embedder). The observation information embedder embeds numeric
information into an embedded vector consisting of floating-point numbers (vectors). This article uses
numbers between 0 and 1 because the relationships between network information used in the
environment components are relatively simple. The principle is to bring the embedding vectors to which
the same kind of numeric information belongs close to each other and distance them from the embedding
vectors of other classes, so that adjacent numbers will have some common feature or meaning. For
example, IP addresses are classified as category 1, and during training, operators will be able to learn
this feature. At each step, the environment component uses a portion of the computer network
information (the corresponding information obtained from the initial network information dictionary
and the current network information dictionary) as observation information, such as link state
information for a port, or IP address information for a port. It loops through all network information
until all problems are fixed or the maximum number of allowed steps is reached. The environment
component also breaks down the task of generating complex instructions into substeps. For example, in
order to configure the correct IP address, there are 3 sub-steps:
a. The operator calculates the observation information and outputs an instruction indicating that there
is a problem with the port.
b. The operator calculates the observation information and outputs a command indicating the correct
command.
c. The operator calculates the observation information and outputs an instruction, representing the
parameters of the instruction.
The environment component then combines these three subinstructions into a complete network
device instruction for further processing.
3.3. Practical application
In practice, the simulator randomly generates a simple computer network by first determining the
number of devices (between 4 and 10) and assigning each device a name (e.g., Device-a). Then, it selects
a root device and connects other devices to it one by one until all devices are connected. A routing
protocol (RIP, EIGRP, or OSPF) is randomly chosen, and IP addresses and subnets are assigned to each
device. Initial network information is generated, and faults are randomly injected into the network to
create a dictionary of current network information. Additionally, the simulator includes a simplified
network estimator component, which assigns rewards based on the correctness of the operator's actions:
1 for correct actions and -1 for incorrect ones.
4. Critical Loss Algorithm
4.1. Model training
The intelligent operator (neural network model) is randomly initialized at the beginning, at which point
it can only randomly generate instructions. During training, the operator gradually learns the
characteristics of the input data (observation information) and begins to generate more and more correct
instructions. The process is described in detail as:
a. The environment component reads a portion of the initial network information dictionary and the
current network information dictionary as text observations, encodes and emphases the observations
Proceedings of the 6th International Conference on Computing and Data Science
DOI: 10.54254/2755-2721/64/20241370
125
into an embedding vector (current observations), and then feeds it to the operator for analysis; b. The
operator calculates the embedded vector and outputs an instruction (current instruction); c. The
environment component decodes the instructions into network device instructions, applies them to the
computer network, then evaluates new network information and issues rewards (current rewards. Correct
instructions use the number 1, wrong instructions use the number -1). At the same time, the environment
component generates the next embedding vector (the next observation information).; d. The data set
collects and stores the current observation information, the current instruction, the current reward, and
the next observation information as a sample in its buffer.; e. Repeat the above steps to collect a large
number of samples into the data set. Some samples are positive (instructions are correct), others are
negative (instructions are wrong); f. Use algorithms and datasets to train operators; g. The above steps
can be performed multiple times until the operator is able to generate 100% correct instructions.
4.2. Critical loss function
The critical loss algorithm proposed in this paper is improved on the basis of QRDQN algorithm. The
accuracy of the original QRDQN algorithm is around 80%, which means that about 20% of the output
instructions are wrong. This is due to the following two characteristics of the neural network itself:
1) The neural network will output calculated data in the statistical sense, whose value represents the
correct probability of a certain result. The higher the value, the greater the probability that the result is
correct; 2) In the optimization process of the neural network, its calculation parameters will be fine-
tuned, which brings the volatility of the output value and affects its accuracy.
4.3. Solution
In this project, we set two target values to distinguish correct and wrong instructions. These values range
between 0 and 1, with a gap between them to effectively differentiate. Avoiding the boundaries of 0 and
1 is crucial due to precision issues. We assign 0.7 as the target value for correct instructions and 0.3 for
incorrect ones. The difference between the neural network's output and these targets is termed loss.
Critical losses, which affect instruction optimization significantly, are given greater weight during total
loss calculation and network optimization, improving overall accuracy.
Figure 2. Ratio before and after critical loss
In the process of algorithm optimization, a neural network is configured to output 7 numerical values
ranging between 0 and 1, representing the evaluation scores of instructions. The average of these scores
determines the quality of an instruction, with higher averages indicating better instructions. Following
the application of optimal instructions to the computer network, their effectiveness is evaluated.
Instructions are categorized as correct or incorrect based on their outcomes. To calculate critical losses,
four values are considered:
1) The target evaluation score for correct instructions is set at 0.7. Scores equal to or greater than 0.7
are associated with non-critical losses; 2) The safety threshold for the average evaluation score of correct
instructions is 0.56. An average score equal to or greater than this value is also associated with non-
critical losses; 3) The target evaluation score for incorrect instructions is set at 0.3. Scores equal to or
Proceedings of the 6th International Conference on Computing and Data Science
DOI: 10.54254/2755-2721/64/20241370
126
less than 0.3 are associated with non-critical losses; 4) The safety threshold for the average evaluation
score of incorrect instructions is 0.44. An average score less than or equal to this value is associated with
non-critical losses; 4) All other losses are classified as material losses. The Adam optimization algorithm
is employed to optimize the neural network based on critical loss analysis. This optimization leads to a
significant reduction in average loss, from 2.62E-03 to 1.17E-04, representing a 95.5% decrease. Further
fine-tuning results in a 100% accuracy rate for output instructions (figure 2).
5. Conclusion
The intelligent operator, implemented as a neural network model, exhibits remarkable accuracy,
achieving 100% accuracy across 28 issues and 237 operations per network, totaling over 2.8 million
operations without error. Detailed output from these tests is available in the project documentation on
GitHub. With processing times ranging from 1 to 5 seconds per network inspection and repair, the
intelligent operator offers efficient solutions to a diverse range of computer network issues. It is
noteworthy that initial loading of the operator takes approximately 10 seconds, and printing detailed
information for all steps requires an additional 10 seconds[11-12]. In conclusion, this paper has
successfully realized an AI-powered network operator, demonstrating its efficacy in efficiently
addressing a variety of computer network issues. The integration of intelligent operators with computer
networks and neural networks presents a promising and challenging avenue for future research and
application in network management and optimization.
References
[1] Garrahan, James J., et al. "Intelligent network overview." IEEE Communications Magazine 31.3
(1993): 30-36.
[2] Robrock, Richard B. "The intelligent network-Changing the face of telecommunications."
Proceedings of the IEEE 79.1 (1991): 7-20.
[3] Gong, Y., Huang, J., Liu, B., Xu, J., Wu, B., & Zhang, Y. (2024). Dynamic Resource Allocation
for Virtual Machine Migration Optimization using Machine Learning. arXiv preprint
arXiv:2403.13619.
[4] Zhang, Y., Liu, B., Gong, Y., Huang, J., Xu, J., & Wan, W. (2024). Application of Machine
Learning Optimization in Cloud Computing Resource Scheduling and Management. arXiv
preprint arXiv:2402.17216.Wang, Yong, et al. "Construction and application of artificial
intelligence crowdsourcing map based on multi-track GPS data." arXiv preprint
arXiv:2402.15796 (2024).
[5] Hosny, Manar I., and Christine L. Mumford. "The single vehicle pickup and delivery problem
with time windows: intelligent operators for heuristic and metaheuristic algorithms." Journal
of Heuristics 16 (2010): 417-439
[6] Xu, Z., Gong, Y., Zhou, Y., Bao, Q., & Qian, W. (2024). Enhancing Kubernetes Automated
Scheduling with Deep Learning and Reinforcement Techniques for Large-Scale Cloud
Computing Optimization. arXiv preprint arXiv:2403.07905.
[7] Xu, X., Xu, Z., Ling, Z., Jin, Z., & Du, S. (2024). Comprehensive Implementation of TextCNN
for Enhanced Collaboration between Natural Language Processing and System
Recommendation. arXiv preprint arXiv:2403.09718.
[8] Song, B., Xu, Y., & Wu, Y. (2024). ViTCN: Vision Transformer Contrastive Network For
Reasoning. arXiv preprint arXiv:2403.09962.
[9] Zhou, Y., Tan, K., Shen, X., & He, Z. (2024). A Protein Structure Prediction Approach
Leveraging Transformer and CNN Integration. arXiv preprint arXiv:2402.19095.
[10] Zhang, Chenwei, et al. "Enhanced User Interaction in Operating Systems through Machine
Learning Language Models." arXiv preprint arXiv:2403.00806 (2024)
[11] Ni, Chunhe, et al. "Enhancing Cloud-Based Large Language Model Processing with Elasticsearch
and Transformer Models." arXiv preprint arXiv:2403.00807 (2024).
Proceedings of the 6th International Conference on Computing and Data Science
DOI: 10.54254/2755-2721/64/20241370
127
... Flows are collections of packets over a certain time period being transmitted between source and destination. Various flow analysis techniques primarily focus on generating descriptive statistics and identifying patterns and asymmetries in the flow of payloads [1], [6]. In some cases, classification or identification is necessary. ...
Article
This paper introduces a literature review and experimental scenario for network construction; the paper analyzes the network traffic analysis status with artificial intelligence algorithms such as machine learning (ML), ensemble learning, and deep learning for study about analysis in traffic, cybersecurity, balanced loading of network and prediction the traffic moving. The technical aspects of AI are used to analyze and detect attacks or conjunctions for large amounts of network data, thereby detecting anomalies or malicious activities that affect networks. Also, when training deep learning such as convolution neural networks (CNN) or recurrent neural networks (RNN) for datasets (historical data), learn benign network behavior as well as anomalies that may result from malicious activities. The paper introduces how AI technology is used to detect security threats and analyze networks on an outstanding basis.
Article
Full-text available
This study investigates the prediction of online purchasing behavior on the palm life APP through comprehensive analysis of customer operation logs, attribute sets, and purchase labels. Utilizing advanced feature engineering techniques, including time-based metrics, frequency analyses, and category-specific operations, we constructed a robust feature system comprising 61 associated features. The predictive models, leveraging Logistic Regression and LightGBM algorithms, were evaluated using cross-validation and AUC scores, demonstrating strong generalization capabilities and effectiveness in predicting customer behavior. Findings highlight the significance of personalized recommendations and targeted marketing strategies in enhancing customer engagement and optimizing operational efficiencies for e-commerce platforms. This research contributes to both theoretical advancements in consumer behavior prediction and practical implications for enhancing customer experience and service personalization in fintech applications.
Article
This paper discusses the application and advantages of artificial intelligence technology in digital media interactive product design. Firstly, the development background of artificial intelligence technology and its promoting effect on design innovation is introduced, and the application of new technologies, such as generative adversarial networks in art creation and design personalization, is definitely analyzed. It then explores in detail the ability of AI to break traditional constraints in interactive design, innovate design, and optimize user experience, especially in digital media. Finally, the case study of Microsoft Cortana shows the method of classifying and processing user queries by machine learning system and its experimental results. The research of this paper provides the theoretical basis and empirical support for the application of artificial intelligence technology in the future interactive design of digital media and has important academic and practical significance.
Article
Full-text available
SCRM is an important facet of the present day SCM environment that requires the application of sophisticated analytical tools to help boost the ability of the organization to cope with hostile events. This article examines the use of custom prompt tuning in the context of natural language processing of decision-making within SCRM frameworks. This paper develops a way of analyzing, evaluating, and managing risk ensuing from supply chain disruption through the application of generative models fine-tuned to the contexts of supply chains. The study uses a case study approach to support the knowledge translation of custom prompt tuning and show managers of SC how they can improve on risk assessment accuracy and strategic planning given tuned prompt systems. Thus, the research establishes that organizations that implement unique tp methods enjoy increased identification and response time to risks bringing better supply chain adaptability.
Article
Full-text available
AI has become one of the most disruptive technologies, which has influenced different industries in a way; however, the subject area that has experienced the most change is supply chain management. The automation of decision-making of supply chains through the use of AI prompts is also discussed in this paper. It explores the approaches used in implementing AI in supply chain activities, analyses effects resulting from the use of AI in decision making and reveals advantages and disadvantages observed among organizations. In view of the literature review presented in this study, this paper notes areas that require research and proposes possible opportunities for future research. The study points out that the use of AI can increase organizational effectiveness, decrease organizational costs, and increase the pace of decision making, making them more competitive. Based upon the analysis of the findings of the paper, the authors discuss the prospects for the 'fourth party' and AI in supply chain management acknowledging further research and development is essential.
Article
Full-text available
More specifically, the topic selected for this research is prompt engineering for improving the logistics and transportation activities in supply chain by embracing the artificial intelligence (AI) and natural language processing (NLP) innovations. Due to globalization and other factors that leads to an increase in customer expectations more supply chains are now becoming more complex, thus solutions like prompt engineering that incorporate artificial intelligence technologies help in improving efficiency, reducing costs and making better decisions. This paper examines how logistics operations can be enhanced through the use of engineering whereby logistics information flow is processed in real-time and timely transportation recommendations are instantly issued. Based on the literature review and case studies, this paper investigates how the AI prompts enhance logistics and transportation management and explores potential advantages and disadvantages and potential development trends.
Article
Full-text available
Competitive business existence in the globalised economy, hence, relies on supply chain operations that support business sustainability. But at the same time, these operations are faced with major sustainability issues such as waste and emissions control and energy usage. The competent use of Artificial Intelligence (AI) and prompt engineering can increase the possibility of sustainable success by lowering the impact of decisions required for function and subsequently providing efficient tools to function sustainably. This paper aims at discussing the application of AI prompt systems in supply chain management with specific emphasis on the integration of AI solutions in the supply chain that can cover issues on the sustainability of resources, issues to do with logistics and also energy issues. In this paper, the mechanism through which AI supports the transition toward more sustainable practices in supply chain management is demonstrated by a brief reflection on current practices, an exploratory analysis of the way AI is involved in the decision-making process, and a case study on how AI prompts may trigger improvement in logistics. The study shows that there are many positive effects of AI prompt systems but at the same time there could be negative side effects if the system was implemented inappropriately within the environment.
Article
In today's environment of the high dynamics of supply chain functioning, information processing and finding meaningful insights out of mountains of information is critical. Natural Language Processing (NLP) is recognized as an effective approach to analysing large volumes of unstructured information and finding ways to use it effectively. This article focused on the use of NLP in supply chain data and its agility in analysing texts, automating processes and improving decision makings. Here, we provide a scholarly synthesis of relevant texts to discuss the development of NLP technologies and the incorporation of these technologies into the SCM. This paper would describe the techniques used in the assessment of the effects of NLP on supply chain performance in the methodology section. Based assess the impact of NLP it is resilient that NLP enhances the forecasting, inventory and supplier relation management. Future supply chain strategies are also under consideration as the discussion of these insights draws to a close. Finally, we present a discussion on how NLP is set to transform supply chain management mandate and suggest further research topics.
Article
Procurement management or Supply chain management SCM has in the past several decades undergone a dramatic shift in its function especially with the emergence of artificial intelligence AI. Supply chain complexity that is characterized by globalization, customer volatility, and supply disruptions including the COVID-19 pandemic justify this kind of supply chain model. AI provides a revolutionary advantage in managing big data, demand forecasting, supply chain management and operating decision-making. This article explores how optimization via AI is redesigning SCM, especially through the use of AI in supply chains including machine learning(ML), deep learning (DL) and natural language processing (NLP). It also overviews the advantages and disadvantages of applying AI to supply chain as well as the further evolution of this sector.
Article
Full-text available
In today's dynamic international economy, the supply chain exercises a strategic importance in organizational performance. Another example is the evolution and adoption of real-time data analytics based on AI technologies which made supply chain management from reactive kind of discipline to proactive one. This research article focuses on an integration of Al Driven Data Analytics in the supply chain, with particular emphasis on the real-time function. Describing the case studies and comparing them with the existing literature, the article explains the methodology of using AI prompts, the difficulties occurring in this process, and the advantages of implementing the approach in supply chain analytics. This paper shows that the use of AI optimizes decision-making, streamlines operations, and supports decision-makers within the supply chain environment. Lastly, it finds that a real time analytical processing using AI is critical for building supply chain competitiveness.
Article
Full-text available
This article delves into the importance of applying machine learning and deep reinforcement learning techniques in cloud resource management and virtual machine migration optimization, highlighting the role of these advanced technologies in dealing with the dynamic changes and complexities of cloud computing environments. Through environment modeling, policy learning, and adaptive enhancement, machine learning methods, especially deep reinforcement learning, provide effective solutions for dynamic resource allocation and virtual intelligence migration. These technologies can help cloud service providers improve resource utilization, reduce energy consumption, and improve service reliability and performance. Effective strategies include simplifying state space and action space, reward shaping, model lightweight and acceleration, and accelerating the learning process through transfer learning and meta-learning techniques. With the continuous progress of machine learning and deep reinforcement learning technologies, combined with the rapid development of cloud computing technology, it is expected that the application of these technologies in cloud resource management and virtual machine migration optimization will be more extensive and in-depth. Researchers will continue to explore more efficient algorithms and models to further improve the accuracy and efficiency of decision making. In addition, with the integration of edge computing, Internet of Things and other technologies, cloud computing resource management will face more new challenges and opportunities, and the application scope and depth of machine learning and deep reinforcement learning technology will also expand, opening new possibilities for building a more intelligent, efficient and reliable cloud computing service system.
Article
Full-text available
The single vehicle pickup and delivery problem with time windows is an important practical problem, yet only a few researchers have tackled it. In this research, we compare three different approaches to the problem: a genetic algorithm, a simulated annealing approach, and a hill climbing algorithm. In all cases, we adopt a solution representation that depends on a duplicate code for both the pickup request and its delivery. We also present an intelligent neighborhood move, that is guided by the time window, aiming to overcome the difficult problem constraints efficiently. Results presented herein improve upon those that have been previously published.
Article
The International Consultative Committee for Telephone and Telegraph (CCITT) program of work that addresses global international intelligent network (IN) standards and a framework for the standardized evolution of IN are described. Bell Communication Research's (Bellcore's) IN work, referred to as the Advanced Intelligent Network (AIN), is also discussed in relation to the CCITT IN Recommendations. In addition, IN activities of the European Telecommunications Standards Institute (ETSI) and the Telecommunications Technology Committee (TTC) of Japan are described.< >
Article
The realization of the intelligent network concept is traced, first in the former Bell System in the early 1980s, and subsequently in the Regional Operating Companies, post divestiture. The history of common channel signaling and the introduction of 800 Service, Calling Card Service, and Private Virtual Network Service are described. The network nodes and operations systems that are the major components of the intelligent network are introduced, and their potential application for a wealth of voice, data, and video services is suggested. The next generation of the intelligent network, called the advanced intelligent network, which through its service-creation capabilities holds promise for rapid service development and a cornucopia of customized services, is described
Construction and application of artificial intelligence crowdsourcing map based on multi-track GPS data
  • Y Zhang
  • B Liu
  • Y Gong
  • J Huang
  • J Xu
  • W Wan
  • Yong Wang
Zhang, Y., Liu, B., Gong, Y., Huang, J., Xu, J., & Wan, W. (2024). Application of Machine Learning Optimization in Cloud Computing Resource Scheduling and Management. arXiv preprint arXiv:2402.17216.Wang, Yong, et al. "Construction and application of artificial intelligence crowdsourcing map based on multi-track GPS data." arXiv preprint arXiv:2402.15796 (2024).
  • X Xu
  • Z Xu
  • Z Ling
  • Z Jin
  • S Du
Xu, X., Xu, Z., Ling, Z., Jin, Z., & Du, S. (2024). Comprehensive Implementation of TextCNN for Enhanced Collaboration between Natural Language Processing and System Recommendation. arXiv preprint arXiv:2403.09718.
  • B Song
  • Y Xu
  • Y Wu
Song, B., Xu, Y., & Wu, Y. (2024). ViTCN: Vision Transformer Contrastive Network For Reasoning. arXiv preprint arXiv:2403.09962.