IDEAS home Printed from https://ideas.repec.org/a/rdc/journl/v15y2024i4p16-35.html
   My bibliography  Save this article

From Spread Spectrum Communications to Artificial Intelligence – A Continuous Way Where Information and Communication Technology Supports the World Progress in the Fight Against Interference and Cyber Attacks

Author

Listed:
  • GREU, Victor

Abstract

The paper analyses the increasing role of communications and AI in the context of World unprecedented challenges and crises, especially for fighting against interference and cyber attacks (as a result of cumulating/interfering factors, including some of them unknown, unexpected or undefined- like social media underground influence on person behaviour). This worrying complex context is the reason why we considered useful (and actual!) to recall some historical evolutions of ICT and communications, including even relative recent ones from our paper [6], just to emphasise the amazing speed of World colliding crises and then the necessity to learn from history and use all the resources for surviving. The analysis is first focused on features and evolution of spread spectrum systems (SSS), from 1932 patents and Claude Shannon theory to Irwin M. Jacobs (QUALCOMM founder) fascinating contributions to CDMA and cellular standards, including also some aspects about our research on SSS impact in Romania (from 1979). Technical details on interference mitigation, spectrum monitoring, software/AI advances and elusive interferences, are approached, based on [8]. The AI role could increase, in our full of uncertainties World, as today we have to be prepared for any kind of „interference†. We also analysed some advances in the complicated area of cyber security, as approached by [10], where deep learning and neural networks have amazing performances. Here the optimization solution is much complicate and difficult to certainly find and interpret which is the attack cause/author and often we want to know which packets lead to the attack, where they come from, or which are malicious. The search of unexpected threats between billions of bits/sources/persons is a kind of nightmare. One of the explainable AI techniques that have been directed to cyber security problems with domain-specific knowledge is TRUSTEE and similar results are given by SHAP. Our main conclusion is that, using all power of AI, the human intelligence (HI) must remain the main reference for such mission critical applications and AI development, advance or use [16][22]. We can see how complicate is the fight with elusive interference or cyber attacks and how “long and winding road†must be done, even with the fast AI advances which are, of course, the expected solutions where the complexity and Big Data are more present, but it is worth to notice the HI which “supports†both sides of the competition. SSS opened a specific way for AI approach of signals structure and processing [2][5][6], with impact beyond this area. Some ingredients of such approaches could be still seen from the technical features of SSS/CDMA example. Even from 2013, we observed the relevance of ICT/SSS advances for the emerging World challenges [6]: “CDMA is also a model... The essential observation could be extracted just from the Irwin Jacobs’s initial idea: we can optimize a process by reusing the pauses, i.e., the time†. We could notice, after 10 years of World “progress†, not only the right direction, but also the painful actuality, opportunity and even the necessary holistic approach of all useful resources to mitigate the aggressive World challenges: >

Suggested Citation

  • GREU, Victor, 2024. "From Spread Spectrum Communications to Artificial Intelligence – A Continuous Way Where Information and Communication Technology Supports the World Progress in the Fight Against Interference and Cyb," Romanian Distribution Committee Magazine, Romanian Distribution Committee, vol. 15(4), pages 16-35, December.
  • Handle: RePEc:rdc:journl:v:15:y:2024:i:4:p:16-35
    as

    Download full text from publisher

    File URL: http://crd-aida.ro/RePEc/rdc/v15i4/2.pdf
    Download Restriction: no
    ---><---

    More about this item

    Keywords

    spread spectrum systems; interference; cyber attacks; artificial intelligence; deep learning; neural networks; decision trees; network intrusion detection system; frequency hopping; knowledge-based society;
    All these keywords.

    JEL classification:

    • L63 - Industrial Organization - - Industry Studies: Manufacturing - - - Microelectronics; Computers; Communications Equipment
    • L86 - Industrial Organization - - Industry Studies: Services - - - Information and Internet Services; Computer Software
    • M15 - Business Administration and Business Economics; Marketing; Accounting; Personnel Economics - - Business Administration - - - IT Management
    • O31 - Economic Development, Innovation, Technological Change, and Growth - - Innovation; Research and Development; Technological Change; Intellectual Property Rights - - - Innovation and Invention: Processes and Incentives
    • O33 - Economic Development, Innovation, Technological Change, and Growth - - Innovation; Research and Development; Technological Change; Intellectual Property Rights - - - Technological Change: Choices and Consequences; Diffusion Processes

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:rdc:journl:v:15:y:2024:i:4:p:16-35. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Theodor Valentin Purcarea (email available below). General contact details of provider: http://www.distribution-magazine.eu .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.