首页 > 最新文献

Computer Science Review最新文献

英文 中文
Deep learning for intelligent demand response and smart grids: A comprehensive survey 用于智能需求响应和智能电网的深度学习:全面调查
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-01 DOI: 10.1016/j.cosrev.2024.100617
Prabadevi Boopathy , Madhusanka Liyanage , Natarajan Deepa , Mounik Velavali , Shivani Reddy , Praveen Kumar Reddy Maddikunta , Neelu Khare , Thippa Reddy Gadekallu , Won-Joo Hwang , Quoc-Viet Pham

Electricity is one of the mandatory commodities for mankind today. To address challenges and issues in the transmission of electricity through the traditional grid, the concepts of smart grids and demand response have been developed. In such systems, a large amount of data is generated daily from various sources such as power generation (e.g., wind turbines), transmission and distribution (microgrids and fault detectors), load management (smart meters and smart electric appliances). Thanks to recent advancements in big data and computing technologies, Deep Learning (DL) can be leveraged to learn the patterns from the generated data and predict the demand for electricity and peak hours. Motivated by the advantages of deep learning in smart grids, this paper sets to provide a comprehensive survey on the application of DL for intelligent smart grids and demand response. Firstly, we present the fundamental of DL, smart grids, demand response, and the motivation behind the use of DL. Secondly, we review the state-of-the-art applications of DL in smart grids and demand response, including electric load forecasting, state estimation, energy theft detection, energy sharing and trading. Furthermore, we illustrate the practicality of DL via various use cases and projects. Finally, we highlight the challenges presented in existing research works and highlight important issues and potential directions in the use of DL for smart grids and demand response.

电力是当今人类的必需品之一。为了应对传统电网在电力传输方面的挑战和问题,人们提出了智能电网和需求响应的概念。在这些系统中,每天都会从发电(如风力涡轮机)、输配电(微电网和故障探测器)、负荷管理(智能电表和智能电器)等不同来源产生大量数据。得益于大数据和计算技术的最新进展,深度学习(DL)可用于从生成的数据中学习模式,并预测电力需求和高峰时段。基于深度学习在智能电网中的优势,本文将对深度学习在智能智能电网和需求响应中的应用进行全面研究。首先,我们介绍了深度学习、智能电网、需求响应的基本原理,以及使用深度学习的动机。其次,我们回顾了 DL 在智能电网和需求响应中的最新应用,包括电力负荷预测、状态估计、能源盗窃检测、能源共享和交易。此外,我们还通过各种用例和项目说明了数字线路的实用性。最后,我们强调了现有研究工作所面临的挑战,并着重指出了在智能电网和需求响应中使用 DL 的重要问题和潜在方向。
{"title":"Deep learning for intelligent demand response and smart grids: A comprehensive survey","authors":"Prabadevi Boopathy ,&nbsp;Madhusanka Liyanage ,&nbsp;Natarajan Deepa ,&nbsp;Mounik Velavali ,&nbsp;Shivani Reddy ,&nbsp;Praveen Kumar Reddy Maddikunta ,&nbsp;Neelu Khare ,&nbsp;Thippa Reddy Gadekallu ,&nbsp;Won-Joo Hwang ,&nbsp;Quoc-Viet Pham","doi":"10.1016/j.cosrev.2024.100617","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100617","url":null,"abstract":"<div><p>Electricity is one of the mandatory commodities for mankind today. To address challenges and issues in the transmission of electricity through the traditional grid, the concepts of smart grids and demand response have been developed. In such systems, a large amount of data is generated daily from various sources such as power generation (e.g., wind turbines), transmission and distribution (microgrids and fault detectors), load management (smart meters and smart electric appliances). Thanks to recent advancements in big data and computing technologies, Deep Learning (DL) can be leveraged to learn the patterns from the generated data and predict the demand for electricity and peak hours. Motivated by the advantages of deep learning in smart grids, this paper sets to provide a comprehensive survey on the application of DL for intelligent smart grids and demand response. Firstly, we present the fundamental of DL, smart grids, demand response, and the motivation behind the use of DL. Secondly, we review the state-of-the-art applications of DL in smart grids and demand response, including electric load forecasting, state estimation, energy theft detection, energy sharing and trading. Furthermore, we illustrate the practicality of DL via various use cases and projects. Finally, we highlight the challenges presented in existing research works and highlight important issues and potential directions in the use of DL for smart grids and demand response.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"51 ","pages":"Article 100617"},"PeriodicalIF":12.9,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574013724000017/pdfft?md5=37a2ff44234d359888c071095b8d9b65&pid=1-s2.0-S1574013724000017-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139738725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Content-driven music recommendation: Evolution, state of the art, and challenges 内容驱动的音乐推荐:演变、技术现状与挑战
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-01 DOI: 10.1016/j.cosrev.2024.100618
Yashar Deldjoo , Markus Schedl , Peter Knees

The music domain is among the most important ones for adopting recommender systems technology. In contrast to most other recommendation domains, which predominantly rely on collaborative filtering (CF) techniques, music recommenders have traditionally embraced content-based (CB) approaches. In the past years, music recommendation models that leverage collaborative and content data – which we refer to as content-driven models – have been replacing pure CF or CB models. In this survey, we review 55 articles on content-driven music recommendation. Based on a thorough literature analysis, we first propose an onion model comprising five layers, each of which corresponds to a category of music content we identified: signal, embedded metadata, expert-generated content, user-generated content, and derivative content. We provide a detailed characterization of each category along several dimensions. Second, we identify six overarching challenges, according to which we organize our main discussion: increasing recommendation diversity and novelty, providing transparency and explanations, accomplishing context-awareness, recommending sequences of music, improving scalability and efficiency, and alleviating cold start. Each article addresses one or more of these challenges and is categorized according to the content layers of our onion model, the article’s goal(s), and main methodological choices. Furthermore, articles are discussed in temporal order to shed light on the evolution of content-driven music recommendation strategies. Finally, we provide our personal selection of the persisting grand challenges which are still waiting to be solved in future research endeavors.

音乐领域是采用推荐系统技术最重要的领域之一。与主要依赖协同过滤(CF)技术的大多数其他推荐领域不同,音乐推荐器传统上采用基于内容(CB)的方法。在过去几年中,利用协作数据和内容数据的音乐推荐模型(我们称之为内容驱动模型)正在取代纯粹的 CF 或 CB 模型。在本调查中,我们回顾了 55 篇关于内容驱动型音乐推荐的文章。基于全面的文献分析,我们首先提出了一个由五层组成的洋葱模型,每一层都对应于我们确定的音乐内容类别:信号、嵌入式元数据、专家生成的内容、用户生成的内容和衍生内容。我们从多个维度对每个类别进行了详细描述。其次,我们确定了六大挑战,并据此组织我们的主要讨论:增加推荐的多样性和新颖性、提供透明度和解释、实现上下文感知、推荐音乐序列、提高可扩展性和效率,以及缓解冷启动。每篇文章都涉及其中的一个或多个挑战,并根据洋葱模型的内容层、文章的目标和主要方法选择进行分类。此外,我们还按照时间顺序对文章进行了讨论,以揭示内容驱动型音乐推荐策略的演变过程。最后,我们提供了个人选择的仍有待在未来研究工作中解决的重大挑战。
{"title":"Content-driven music recommendation: Evolution, state of the art, and challenges","authors":"Yashar Deldjoo ,&nbsp;Markus Schedl ,&nbsp;Peter Knees","doi":"10.1016/j.cosrev.2024.100618","DOIUrl":"10.1016/j.cosrev.2024.100618","url":null,"abstract":"<div><p>The music domain is among the most important ones for adopting recommender systems technology. In contrast to most other recommendation domains, which predominantly rely on collaborative filtering (CF) techniques, music recommenders have traditionally embraced content-based (CB) approaches. In the past years, music recommendation models that leverage collaborative and content data – which we refer to as content-driven models – have been replacing pure CF or CB models. In this survey, we review 55 articles on content-driven music recommendation. Based on a thorough literature analysis, we first propose an onion model comprising five layers, each of which corresponds to a category of music content we identified: signal, embedded metadata, expert-generated content, user-generated content, and derivative content. We provide a detailed characterization of each category along several dimensions. Second, we identify six overarching challenges, according to which we organize our main discussion: increasing recommendation diversity and novelty, providing transparency and explanations, accomplishing context-awareness, recommending sequences of music, improving scalability and efficiency, and alleviating cold start. Each article addresses one or more of these challenges and is categorized according to the content layers of our onion model, the article’s goal(s), and main methodological choices. Furthermore, articles are discussed in temporal order to shed light on the evolution of content-driven music recommendation strategies. Finally, we provide our personal selection of the persisting grand challenges which are still waiting to be solved in future research endeavors.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"51 ","pages":"Article 100618"},"PeriodicalIF":12.9,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574013724000029/pdfft?md5=26989268f58d86868e6b0424feb8917a&pid=1-s2.0-S1574013724000029-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139577454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systematic literature review: Quantum machine learning and its applications 系统文献综述:量子机器学习及其应用
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-01 DOI: 10.1016/j.cosrev.2024.100619
David Peral-García , Juan Cruz-Benito , Francisco José García-Peñalvo

Quantum physics has changed the way we understand our environment, and one of its branches, quantum mechanics, has demonstrated accurate and consistent theoretical results. Quantum computing is the process of performing calculations using quantum mechanics. This field studies the quantum behavior of certain subatomic particles (photons, electrons, etc.) for subsequent use in performing calculations, as well as for large-scale information processing. These advantages are achieved through the use of quantum features, such as entanglement or superposition. These capabilities can give quantum computers an advantage in terms of computational time and cost over classical computers. Nowadays, scientific challenges are impossible to perform by classical computation due to computational complexity (more bytes than atoms in the observable universe) or the time it would take (thousands of years), and quantum computation is the only known answer. However, current quantum devices do not have yet the necessary qubits and are not fault-tolerant enough to achieve these goals. Nonetheless, there are other fields like machine learning, finance, or chemistry where quantum computation could be useful with current quantum devices. This manuscript aims to present a review of the literature published between 2017 and 2023 to identify, analyze, and classify the different types of algorithms used in quantum machine learning and their applications. The methodology follows the guidelines related to Systematic Literature Review methods, such as the one proposed by Kitchenham and other authors in the software engineering field. Consequently, this study identified 94 articles that used quantum machine learning techniques and algorithms and shows their implementation using computational quantum circuits or ansatzs. The main types of found algorithms are quantum implementations of classical machine learning algorithms, such as support vector machines or the k-nearest neighbor model, and classical deep learning algorithms, like quantum neural networks. One of the most relevant applications in the machine learning field is image classification. Many articles, especially within the classification, try to solve problems currently answered by classical machine learning but using quantum devices and algorithms. Even though results are promising, quantum machine learning is far from achieving its full potential. An improvement in quantum hardware is required for this potential to be achieved since the existing quantum computers lack enough quality, speed, and scale to allow quantum computing to achieve its full potential.

量子物理学改变了我们认识环境的方式,其分支之一量子力学已经证明了精确一致的理论结果。量子计算是利用量子力学进行计算的过程。该领域研究某些亚原子粒子(光子、电子等)的量子行为,以便随后用于执行计算以及大规模信息处理。这些优势是通过使用纠缠或叠加等量子特性实现的。这些功能可以使量子计算机在计算时间和成本方面比经典计算机更具优势。如今,由于计算复杂性(比可观测宇宙中的原子还要多的字节)或所需时间(数千年),经典计算不可能完成的科学挑战,量子计算是唯一已知的答案。然而,目前的量子设备还不具备实现这些目标所需的量子比特和容错能力。尽管如此,在机器学习、金融或化学等其他领域,量子计算在当前的量子设备上仍有用武之地。本手稿旨在对 2017 年至 2023 年间发表的文献进行综述,对量子机器学习中使用的不同类型算法及其应用进行识别、分析和分类。研究方法遵循系统文献综述方法的相关准则,例如 Kitchenham 和其他作者在软件工程领域提出的方法。因此,本研究确定了 94 篇使用量子机器学习技术和算法的文章,并展示了它们使用计算量子电路或反演的实现情况。所发现算法的主要类型是经典机器学习算法(如支持向量机或 k 近邻模型)和经典深度学习算法(如量子神经网络)的量子实现。机器学习领域最相关的应用之一是图像分类。许多文章,尤其是分类方面的文章,都试图利用量子设备和算法来解决目前由经典机器学习解决的问题。尽管取得了令人鼓舞的成果,但量子机器学习还远未充分发挥其潜力。由于现有的量子计算机在质量、速度和规模上都不足以让量子计算充分发挥潜力,因此需要改进量子硬件才能实现这一潜力。
{"title":"Systematic literature review: Quantum machine learning and its applications","authors":"David Peral-García ,&nbsp;Juan Cruz-Benito ,&nbsp;Francisco José García-Peñalvo","doi":"10.1016/j.cosrev.2024.100619","DOIUrl":"10.1016/j.cosrev.2024.100619","url":null,"abstract":"<div><p>Quantum physics has changed the way we understand our environment, and one of its branches, quantum mechanics, has demonstrated accurate and consistent theoretical results. Quantum computing is the process of performing calculations using quantum mechanics. This field studies the quantum behavior of certain subatomic particles (photons, electrons, etc.) for subsequent use in performing calculations, as well as for large-scale information processing. These advantages are achieved through the use of quantum features, such as entanglement or superposition. These capabilities can give quantum computers an advantage in terms of computational time and cost over classical computers. Nowadays, scientific challenges are impossible to perform by classical computation due to computational complexity (more bytes than atoms in the observable universe) or the time it would take (thousands of years), and quantum computation is the only known answer. However, current quantum devices do not have yet the necessary qubits and are not fault-tolerant enough to achieve these goals. Nonetheless, there are other fields like machine learning, finance, or chemistry where quantum computation could be useful with current quantum devices. This manuscript aims to present a review of the literature published between 2017 and 2023 to identify, analyze, and classify the different types of algorithms used in quantum machine learning and their applications. The methodology follows the guidelines related to Systematic Literature Review methods, such as the one proposed by Kitchenham and other authors in the software engineering field. Consequently, this study identified 94 articles that used quantum machine learning techniques and algorithms and shows their implementation using computational quantum circuits or <em>ansatzs</em>. The main types of found algorithms are quantum implementations of classical machine learning algorithms, such as support vector machines or the k-nearest neighbor model, and classical deep learning algorithms, like quantum neural networks. One of the most relevant applications in the machine learning field is image classification. Many articles, especially within the classification, try to solve problems currently answered by classical machine learning but using quantum devices and algorithms. Even though results are promising, quantum machine learning is far from achieving its full potential. An improvement in quantum hardware is required for this potential to be achieved since the existing quantum computers lack enough quality, speed, and scale to allow quantum computing to achieve its full potential.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"51 ","pages":"Article 100619"},"PeriodicalIF":12.9,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574013724000030/pdfft?md5=44d55da038269bf79fd19532c50aed5d&pid=1-s2.0-S1574013724000030-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139550991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Server placement in mobile cloud computing: A comprehensive survey for edge computing, fog computing and cloudlet 移动云计算中的服务器布局:针对边缘计算、雾计算和小云的全面调查
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-03 DOI: 10.1016/j.cosrev.2023.100616
Ali Asghari , Mohammad Karim Sohrabi

The growing technology of the fifth generation (5G) of mobile telecommunications has led to the special attention of cloud service providers (CSPs) to mobile cloud computing (MCC). Due to the limitations in processing power, storage space and energy capacity of mobile devices, cloud resources can be moved to the edge of the network to improve the quality of service (QoS). Server placement is a crucial emerging problem in both typical and edge types of MCC, different proposed methods of which are reviewed and evaluated in this paper. Proper placement of servers leads to more efficient utilization of these servers, reduces their response time and optimizes their energy consumption. A variety of techniques and approaches, including machine learning-based techniques, evolutionary models, optimization algorithms, heuristics and meta-heuristics have been employed by different server placement methods of the literature to find the optimal deployment map of servers. This paper provides a comprehensive analysis of these server placement methods in edge computing, fog computing and cloudlet, investigates their various aspects, dimensions and objectives, and evaluates their strengths and weaknesses. Furthermore, open challenges for server placement in MCC are provided, and future research directions are also explained and discussed.

随着第五代(5G)移动通信技术的不断发展,云服务提供商(CSP)对移动云计算(MCC)给予了特别关注。由于移动设备的处理能力、存储空间和能源容量有限,云资源可以转移到网络边缘,以提高服务质量(QoS)。在典型和边缘类型的 MCC 中,服务器放置都是一个新出现的关键问题,本文对其中的不同建议方法进行了回顾和评估。服务器的合理布局能更有效地利用这些服务器,缩短其响应时间并优化其能耗。文献中不同的服务器放置方法采用了多种技术和方法,包括基于机器学习的技术、进化模型、优化算法、启发式算法和元启发式算法,以找到最佳的服务器部署图。本文全面分析了边缘计算、雾计算和小云中的这些服务器部署方法,研究了它们的各个方面、维度和目标,并评估了它们的优缺点。此外,本文还提出了 MCC 中服务器部署面临的挑战,并解释和讨论了未来的研究方向。
{"title":"Server placement in mobile cloud computing: A comprehensive survey for edge computing, fog computing and cloudlet","authors":"Ali Asghari ,&nbsp;Mohammad Karim Sohrabi","doi":"10.1016/j.cosrev.2023.100616","DOIUrl":"10.1016/j.cosrev.2023.100616","url":null,"abstract":"<div><p>The growing technology of the fifth generation (5G) of mobile telecommunications has led to the special attention of cloud service providers (CSPs) to mobile cloud computing (MCC). Due to the limitations in processing power, storage space and energy capacity of mobile devices, cloud resources can be moved to the edge of the network to improve the quality of service (QoS). Server placement is a crucial emerging problem in both typical and edge types of MCC, different proposed methods of which are reviewed and evaluated in this paper. Proper placement of servers leads to more efficient utilization of these servers, reduces their response time and optimizes their energy consumption. A variety of techniques and approaches, including machine learning-based techniques, evolutionary models, optimization algorithms, heuristics and meta-heuristics have been employed by different server placement methods of the literature to find the optimal deployment map of servers. This paper provides a comprehensive analysis of these server placement methods in edge computing, fog computing and cloudlet, investigates their various aspects, dimensions and objectives, and evaluates their strengths and weaknesses. Furthermore, open challenges for server placement in MCC are provided, and future research directions are also explained and discussed.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"51 ","pages":"Article 100616"},"PeriodicalIF":12.9,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574013723000837/pdfft?md5=4da580211e5e50a716f9f8bd0b27abec&pid=1-s2.0-S1574013723000837-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139081998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep learning for unmanned aerial vehicles detection: A review 用于无人驾驶飞行器探测的深度学习:综述
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-03 DOI: 10.1016/j.cosrev.2023.100614
Nader Al-lQubaydhi , Abdulrahman Alenezi , Turki Alanazi , Abdulrahman Senyor , Naif Alanezi , Bandar Alotaibi , Munif Alotaibi , Abdul Razaque , Salim Hariri

As a new type of aerial robotics, drones are easy to use and inexpensive, which has facilitated their acquisition by individuals and organizations. This unequivocal and widespread presence of amateur drones may cause many dangers, such as privacy breaches by reaching sensitive locations of authorities and individuals. In this paper, we summarize the performance-affecting factors and major obstacles to drone use and provide a brief background of deep learning. Then, we summarize the types of UAVs and the related unethical behaviors, safety, privacy, and cybersecurity concerns. Then, we present a comprehensive literature review of current drone detection methods based on deep learning. This area of research has arisen in the last two decades because of the rapid advancement of commercial and recreational drones and their combined risk to the safety of airspace. Various deep learning algorithms and their frameworks with respect to the techniques used to detect drones and their areas of applications are also discussed. Drone detection techniques are classified into four categories: visual, radar, acoustics, and radio frequency-based approaches. The findings of this study prove that deep learning-based detection and classification of drones looks promising despite several challenges. Finally, we provide some recommendations to meet future expectations.

作为一种新型空中机器人,无人机易于使用且价格低廉,这为个人和组织获取无人机提供了便利。业余无人机的明确和广泛存在可能会造成许多危险,例如通过到达当局和个人的敏感位置来侵犯隐私。在本文中,我们总结了影响无人机使用性能的因素和主要障碍,并简要介绍了深度学习的背景。然后,我们总结了无人机的类型以及相关的不道德行为、安全、隐私和网络安全问题。然后,我们对当前基于深度学习的无人机检测方法进行了全面的文献综述。由于商用和娱乐无人机的快速发展及其对空域安全的综合风险,这一研究领域在过去二十年中应运而生。本文还讨论了用于探测无人机的各种深度学习算法及其框架和应用领域。无人机检测技术分为四类:基于视觉、雷达、声学和无线电频率的方法。本研究的结果证明,基于深度学习的无人机检测和分类尽管面临一些挑战,但前景看好。最后,我们提出了一些建议,以满足未来的期望。
{"title":"Deep learning for unmanned aerial vehicles detection: A review","authors":"Nader Al-lQubaydhi ,&nbsp;Abdulrahman Alenezi ,&nbsp;Turki Alanazi ,&nbsp;Abdulrahman Senyor ,&nbsp;Naif Alanezi ,&nbsp;Bandar Alotaibi ,&nbsp;Munif Alotaibi ,&nbsp;Abdul Razaque ,&nbsp;Salim Hariri","doi":"10.1016/j.cosrev.2023.100614","DOIUrl":"10.1016/j.cosrev.2023.100614","url":null,"abstract":"<div><p>As a new type of aerial robotics, drones are easy to use and inexpensive, which has facilitated their acquisition by individuals and organizations. This unequivocal and widespread presence of amateur drones may cause many dangers, such as privacy breaches by reaching sensitive locations of authorities and individuals. In this paper, we summarize the performance-affecting factors and major obstacles to drone use and provide a brief background of deep learning. Then, we summarize the types of UAVs and the related unethical behaviors, safety, privacy, and cybersecurity concerns. Then, we present a comprehensive literature review of current drone detection methods based on deep learning. This area of research has arisen in the last two decades because of the rapid advancement of commercial and recreational drones and their combined risk to the safety of airspace. Various deep learning algorithms and their frameworks with respect to the techniques used to detect drones and their areas of applications are also discussed. Drone detection techniques are classified into four categories: visual, radar, acoustics, and radio frequency-based approaches. The findings of this study prove that deep learning-based detection and classification of drones looks promising despite several challenges. Finally, we provide some recommendations to meet future expectations.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"51 ","pages":"Article 100614"},"PeriodicalIF":12.9,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574013723000813/pdfft?md5=e384a0694b41d423f4b974632d20c5e2&pid=1-s2.0-S1574013723000813-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139091506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on algorithms for Nash equilibria in finite normal-form games 有限正则表达式博弈中纳什均衡的算法概览
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-28 DOI: 10.1016/j.cosrev.2023.100613
Hanyu Li , Wenhan Huang , Zhijian Duan , David Henry Mguni , Kun Shao , Jun Wang , Xiaotie Deng

Nash equilibrium is one of the most influential solution concepts in game theory. With the development of computer science and artificial intelligence, there is an increasing demand on Nash equilibrium computation, especially for Internet economics and multi-agent learning. This paper reviews various algorithms computing the Nash equilibrium and its approximation solutions in finite normal-form games from both theoretical and empirical perspectives. For the theoretical part, we classify algorithms in the literature and present basic ideas on algorithm design and analysis. For the empirical part, we present a comprehensive comparison on the algorithms in the literature over different kinds of games. Based on these results, we provide practical suggestions on implementations and uses of these algorithms. Finally, we present a series of open problems from both theoretical and practical considerations.

纳什均衡是博弈论中最具影响力的求解概念之一。随着计算机科学和人工智能的发展,人们对纳什均衡计算的需求越来越大,尤其是在互联网经济和多代理学习方面。本文从理论和实证两个角度综述了计算有限正则博弈中纳什均衡及其近似解的各种算法。在理论部分,我们对文献中的算法进行了分类,并介绍了算法设计和分析的基本思想。在经验部分,我们对文献中不同类型博弈的算法进行了综合比较。基于这些结果,我们就这些算法的实现和使用提出了实用建议。最后,我们从理论和实践两方面提出了一系列有待解决的问题。
{"title":"A survey on algorithms for Nash equilibria in finite normal-form games","authors":"Hanyu Li ,&nbsp;Wenhan Huang ,&nbsp;Zhijian Duan ,&nbsp;David Henry Mguni ,&nbsp;Kun Shao ,&nbsp;Jun Wang ,&nbsp;Xiaotie Deng","doi":"10.1016/j.cosrev.2023.100613","DOIUrl":"10.1016/j.cosrev.2023.100613","url":null,"abstract":"<div><p>Nash equilibrium is one of the most influential solution concepts in game theory. With the development of computer science and artificial intelligence, there is an increasing demand on Nash equilibrium computation, especially for Internet economics and multi-agent learning. This paper reviews various algorithms computing the Nash equilibrium and its approximation solutions in finite normal-form games from both theoretical and empirical perspectives. For the theoretical part, we classify algorithms in the literature and present basic ideas on algorithm design and analysis. For the empirical part, we present a comprehensive comparison on the algorithms in the literature over different kinds of games. Based on these results, we provide practical suggestions on implementations and uses of these algorithms. Finally, we present a series of open problems from both theoretical and practical considerations.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"51 ","pages":"Article 100613"},"PeriodicalIF":12.9,"publicationDate":"2023-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574013723000801/pdfft?md5=aa8121d098ea9fef617d5bc6a2fcc71a&pid=1-s2.0-S1574013723000801-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139059891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systematic review on weapon detection in surveillance footage through deep learning 通过深度学习在监控录像中检测武器的系统性综述
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-26 DOI: 10.1016/j.cosrev.2023.100612
Tomás Santos , Hélder Oliveira , António Cunha

In recent years, the number of crimes with weapons has grown on a large scale worldwide, mainly in locations where enforcement is lacking or possessing weapons is legal. It is necessary to combat this type of criminal activity to identify criminal behavior early and allow police and law enforcement agencies immediate action. Despite the human visual structure being highly evolved and able to process images quickly and accurately if an individual watches something very similar for a long time, there is a possibility of slowness and lack of attention. In addition, large surveillance systems with numerous equipment require a surveillance team, which increases the cost of operation. There are several solutions for automatic weapon detection based on computer vision; however, these have limited performance in challenging contexts. A systematic review of the current literature on deep learning-based weapon detection was conducted to identify the methods used, the main characteristics of the existing datasets, and the main problems in the area of automatic weapon detection. The most used models were the Faster R-CNN and the YOLO architecture. The use of realistic images and synthetic data showed improved performance. Several challenges were identified in weapon detection, such as poor lighting conditions and the difficulty of small weapon detection, the last being the most prominent. Finally, some future directions are outlined with a special focus on small weapon detection.

近年来,使用武器犯罪的数量在全球范围内大规模增长,主要发生在执法不力或拥有武器合法的地区。为了打击这类犯罪活动,有必要及早识别犯罪行为,以便警方和执法机构立即采取行动。尽管人类的视觉结构已经高度进化,能够快速准确地处理图像,但如果一个人长时间观看非常相似的东西,就有可能出现迟钝和注意力不集中的情况。此外,设备众多的大型监控系统需要一个监控小组,这也增加了运行成本。目前有几种基于计算机视觉的武器自动检测解决方案,但这些方案在具有挑战性的环境中性能有限。我们对当前基于深度学习的武器检测文献进行了系统回顾,以确定所使用的方法、现有数据集的主要特征以及自动武器检测领域的主要问题。使用最多的模型是 Faster R-CNN 和 YOLO 架构。使用真实图像和合成数据可提高性能。在武器检测方面发现了一些挑战,如光线条件差和小型武器检测困难,其中最后一个挑战最为突出。最后,概述了未来的一些发展方向,并特别关注小型武器的检测。
{"title":"Systematic review on weapon detection in surveillance footage through deep learning","authors":"Tomás Santos ,&nbsp;Hélder Oliveira ,&nbsp;António Cunha","doi":"10.1016/j.cosrev.2023.100612","DOIUrl":"10.1016/j.cosrev.2023.100612","url":null,"abstract":"<div><p>In recent years, the number of crimes with weapons has grown on a large scale worldwide, mainly in locations where enforcement is lacking or possessing weapons is legal. It is necessary to combat this type of criminal activity to identify criminal behavior early and allow police and law enforcement agencies immediate action. Despite the human visual structure being highly evolved and able to process images quickly and accurately if an individual watches something very similar for a long time, there is a possibility of slowness and lack of attention. In addition, large surveillance systems with numerous equipment require a surveillance team, which increases the cost of operation. There are several solutions for automatic weapon detection based on computer vision; however, these have limited performance in challenging contexts. A systematic review of the current literature on deep learning-based weapon detection was conducted to identify the methods used, the main characteristics of the existing datasets, and the main problems in the area of automatic weapon detection. The most used models were the Faster R-CNN and the YOLO architecture. The use of realistic images and synthetic data showed improved performance. Several challenges were identified in weapon detection, such as poor lighting conditions and the difficulty of small weapon detection, the last being the most prominent. Finally, some future directions are outlined with a special focus on small weapon detection.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"51 ","pages":"Article 100612"},"PeriodicalIF":12.9,"publicationDate":"2023-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574013723000795/pdfft?md5=9b25290b030b7f7c456bdfc8276eb28a&pid=1-s2.0-S1574013723000795-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139041513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent computational techniques for physical object properties discovery, detection, and prediction: A comprehensive survey 发现、检测和预测物理对象属性的智能计算技术:全面调查
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-13 DOI: 10.1016/j.cosrev.2023.100609
Shaili Mishra, Anuja Arora

The exploding usage of physical object properties has greatly facilitated real-time applications such as robotics to perceive exactly as it appears in existence. Changes in the nature and properties of diverse real-time systems are associated with physical properties modification due to environmental factors. These physics-based object properties features attract the researchers’ attention while developing solutions to real-life problems. But, the detection and prediction of physical properties change are very diverse, covering many physics laws and object properties (material, shape, gravitational force, color, state change) which append complexity to these tasks. Instead of well-understood physics laws, elucidating physics laws requires substantial manual modeling with the help of standardized equations and associated factors. To adopt these physical laws to get instinctive and effective outcomes, researchers started applying computational models to learn changing property behavior as a substitute for using handcrafted and equipment-generated variable states. If physical properties detection challenges are not anticipated and required measures are not precluded, the upcoming computational model-driven physical object changing will not be able to serve appropriately. Therefore, this survey paper is drafted to demonstrate comprehensive theoretical and empirical studies of physical object properties detection and prediction. Furthermore, a generic paradigm is proposed to work in this direction along with characterization parameters of numerous physical object properties. A brief summarization of applicable machine learning, deep learning, and metaheuristic approaches is presented. An extensive list of released and openly available datasets for varying objects and parameters rendered for researchers. Additionally, performance measures regarding computational techniques for physical properties discovery and detection for quantitative evaluation of outcomes are also entailed. Finally, a few open research issues that need to be explored in the future are specified.

物理对象属性的爆炸性应用极大地促进了实时应用,如机器人技术,使其能够准确地感知物体的存在。各种实时系统性质和属性的变化与环境因素导致的物理属性改变有关。这些基于物理的物体属性特征吸引了研究人员的关注,同时也为现实生活中的问题提供了解决方案。但是,物理性质变化的检测和预测非常多样化,涉及许多物理定律和物体属性(材料、形状、引力、颜色、状态变化),这些都增加了这些任务的复杂性。要阐明物理定律,需要借助标准化方程和相关因素进行大量手动建模,而不是理解物理定律。为了采用这些物理定律来获得直观有效的结果,研究人员开始应用计算模型来学习不断变化的属性行为,以替代使用手工制作和设备生成的变量状态。如果没有预见到物理性质检测方面的挑战,不预先采取必要的措施,即将推出的计算模型驱动的物理对象变化将无法发挥应有的作用。因此,本调查报告旨在全面展示物理对象属性检测和预测的理论和实证研究。此外,本文还提出了一个通用范式,以及众多物理对象属性的表征参数。文中简要总结了适用的机器学习、深度学习和元启发式方法。此外,还为研究人员提供了一份广泛的已发布和公开的数据集清单,其中包含不同的物体和参数。此外,还介绍了物理性质发现和检测计算技术的性能指标,以便对结果进行定量评估。最后,还具体说明了未来需要探索的几个开放研究课题。
{"title":"Intelligent computational techniques for physical object properties discovery, detection, and prediction: A comprehensive survey","authors":"Shaili Mishra,&nbsp;Anuja Arora","doi":"10.1016/j.cosrev.2023.100609","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100609","url":null,"abstract":"<div><p>The exploding usage of physical object properties has greatly facilitated real-time applications such as robotics to perceive exactly as it appears in existence. Changes in the nature and properties of diverse real-time systems are associated with physical properties modification due to environmental factors. These physics-based object properties features attract the researchers’ attention while developing solutions to real-life problems. But, the detection and prediction of physical properties change are very diverse, covering many physics laws and object properties (material, shape, gravitational force, color, state change) which append complexity to these tasks. Instead of well-understood physics laws, elucidating physics laws requires substantial manual modeling with the help of standardized equations and associated factors. To adopt these physical laws to get instinctive and effective outcomes, researchers started applying computational models to learn changing property behavior as a substitute for using handcrafted and equipment-generated variable states. If physical properties detection challenges are not anticipated and required measures are not precluded, the upcoming computational model-driven physical object changing will not be able to serve appropriately. Therefore, this survey paper is drafted to demonstrate comprehensive theoretical and empirical studies of physical object properties detection and prediction. Furthermore, a generic paradigm is proposed to work in this direction along with characterization parameters of numerous physical object properties. A brief summarization of applicable machine learning, deep learning, and metaheuristic approaches is presented. An extensive list of released and openly available datasets for varying objects and parameters rendered for researchers. Additionally, performance measures regarding computational techniques for physical properties discovery and detection for quantitative evaluation of outcomes are also entailed. Finally, a few open research issues that need to be explored in the future are specified.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"51 ","pages":"Article 100609"},"PeriodicalIF":12.9,"publicationDate":"2023-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S157401372300076X/pdfft?md5=64d81bb72e5a43092d4b6d72dfb11873&pid=1-s2.0-S157401372300076X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138582124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secret sharing: A comprehensive survey, taxonomy and applications 秘密共享:一个全面的调查、分类和应用
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-30 DOI: 10.1016/j.cosrev.2023.100608
Arup Kumar Chattopadhyay , Sanchita Saha , Amitava Nag , Sukumar Nandi

The emergence of ubiquitous computing and different disruptive technologies caused magnificent development in information and communication technology. Likewise, cybercriminals are also carefully considering different newer ways of attacks. Protecting the confidentiality, integrity, and authentication of sensitive information is the day’s major challenge. Secret sharing is a method that allows a trusted authority (the dealer) to distribute a secret or a number of secrets among some target participants with the intention that certain predetermined groups of participants can collaborate to recover the secret or secrets. Any other group formed by the participants cannot do so. Threshold secret sharing (TSS) is a particular form of secret sharing. It permits any group consisting of at least a specific number (called the threshold) of participants to reconstruct the secret or secrets. However, any group with fewer than the specified number of participants is forbidden to do so. It provides tolerance against single point of failure (SPOF), which has attracted a large number of researchers to contribute in this field. It has the potential to be implemented in numerous practical and secure applications. In this paper, we present a comprehensive survey of a variety of existing threshold secret sharing schemes. We have identified various aspects of developing secure and efficient secret sharing schemes. We have also highlighted some of the applications based on secret sharing. Finally, the open challenges and future research directions in the field of secret sharing are identified and discussed.

普适计算和各种颠覆性技术的出现,使信息通信技术得到了巨大的发展。同样,网络犯罪分子也在仔细考虑不同的新攻击方式。保护敏感信息的机密性、完整性和身份验证是当今的主要挑战。秘密共享是一种允许受信任的权威机构(经销商)在一些目标参与者之间分发一个或多个秘密的方法,目的是某些预定的参与者组可以协作以恢复秘密。任何其他参与者组成的小组不能这样做。阈值秘密共享(TSS)是一种特殊的秘密共享形式。它允许至少由特定数量(称为阈值)的参与者组成的任何组来重建一个或多个秘密。但是,任何少于规定人数的小组都禁止这样做。它提供了对单点故障(SPOF)的容错,这吸引了大量的研究人员在这一领域做出贡献。它具有在许多实际和安全的应用程序中实现的潜力。在本文中,我们对现有的各种阈值秘密共享方案进行了全面的综述。我们已经确定了开发安全和有效的秘密共享方案的各个方面。我们还重点介绍了一些基于秘密共享的应用程序。最后,对秘密共享领域存在的挑战和未来的研究方向进行了识别和讨论。
{"title":"Secret sharing: A comprehensive survey, taxonomy and applications","authors":"Arup Kumar Chattopadhyay ,&nbsp;Sanchita Saha ,&nbsp;Amitava Nag ,&nbsp;Sukumar Nandi","doi":"10.1016/j.cosrev.2023.100608","DOIUrl":"10.1016/j.cosrev.2023.100608","url":null,"abstract":"<div><p>The emergence of ubiquitous computing and different disruptive technologies caused magnificent development in information and communication technology. Likewise, cybercriminals are also carefully considering different newer ways of attacks. Protecting the confidentiality, integrity, and authentication of sensitive information is the day’s major challenge. Secret sharing is a method that allows a trusted authority (the dealer) to distribute a secret or a number of secrets among some target participants with the intention that certain predetermined groups of participants can collaborate to recover the secret or secrets. Any other group formed by the participants cannot do so. Threshold secret sharing (TSS) is a particular form of secret sharing. It permits any group consisting of at least a specific number (called the threshold) of participants to reconstruct the secret or secrets. However, any group with fewer than the specified number of participants is forbidden to do so. It provides tolerance against single point of failure (SPOF), which has attracted a large number of researchers to contribute in this field. It has the potential to be implemented in numerous practical and secure applications. In this paper, we present a comprehensive survey of a variety of existing threshold secret sharing schemes. We have identified various aspects of developing secure and efficient secret sharing schemes. We have also highlighted some of the applications based on secret sharing. Finally, the open challenges and future research directions in the field of secret sharing are identified and discussed.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"51 ","pages":"Article 100608"},"PeriodicalIF":12.9,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574013723000758/pdfft?md5=aabda2ece860c3a66317209935753119&pid=1-s2.0-S1574013723000758-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138455748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT systems modeling and performance evaluation 物联网系统建模和性能评估
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-01 DOI: 10.1016/j.cosrev.2023.100598
Alem Čolaković

The continuous increase of IoT applications leads to a vast amount of data that needs to be transmitted, stored, and processed. Many IoT applications rely on the Cloud infrastructure to handle these specific application demands. However, the integration of IoT and Cloud poses challenges such as network delays, throughput, energy consumption, reliability, etc. Therefore, a new computing concept is required to support emerging IoT applications. These new concepts include fog computing, edge computing, mobile edge computing, mobile cloud computing, and cloudlets. They use various approaches to distribute resources, processes, and services among IoT system architecture layers. The challenge is to decide which offloading system is the best for a specific use case that emphasizes the IoT system modeling issue. In this paper, a model for the formal description of IoT systems is presented. In addition, an analytical evaluation method was proposed to design these systems using the corresponding architecture, technologies, protocols, and integration model to optimize performance. The proposed approach facilitates and simplifies the selection of the corresponding model for the system architecture. This approach enables an efficient method for performance optimization based on offloading processes (load balancing). Also, this paper provides some insights into specific emerging issues and ideas to be addressed by future research.

物联网应用的不断增加导致了大量需要传输、存储和处理的数据。许多物联网应用程序依赖云基础设施来处理这些特定的应用程序需求。然而,物联网和云的集成带来了网络延迟、吞吐量、能耗、可靠性等挑战。因此,需要一种新的计算概念来支持新兴的物联网应用。这些新概念包括雾计算、边缘计算、移动边缘计算、手机云计算和cloudlets。他们使用各种方法在物联网系统架构层之间分配资源、流程和服务。挑战在于决定哪种卸载系统最适合强调物联网系统建模问题的特定用例。本文提出了一个物联网系统的形式化描述模型。此外,还提出了一种分析评估方法来设计这些系统,使用相应的体系结构、技术、协议和集成模型来优化性能。所提出的方法便于并简化了系统架构的相应模型的选择。这种方法实现了基于卸载过程(负载平衡)的性能优化的有效方法。此外,本文还对未来研究中需要解决的具体新问题和想法提供了一些见解。
{"title":"IoT systems modeling and performance evaluation","authors":"Alem Čolaković","doi":"10.1016/j.cosrev.2023.100598","DOIUrl":"10.1016/j.cosrev.2023.100598","url":null,"abstract":"<div><p>The continuous increase of IoT applications leads to a vast amount of data that needs to be transmitted, stored, and processed. Many IoT applications rely on the Cloud infrastructure to handle these specific application demands. However, the integration of IoT and Cloud poses challenges such as network delays, throughput, energy consumption, reliability, etc. Therefore, a new computing concept is required to support emerging IoT applications. These new concepts include fog computing, edge computing, mobile edge computing, mobile cloud computing, and cloudlets. They use various approaches to distribute resources, processes, and services among IoT system architecture layers. The challenge is to decide which offloading system is the best for a specific use case that emphasizes the IoT system modeling issue. In this paper, a model for the formal description of IoT systems is presented. In addition, an analytical evaluation method was proposed to design these systems using the corresponding architecture, technologies, protocols, and integration model to optimize performance. The proposed approach facilitates and simplifies the selection of the corresponding model for the system architecture. This approach enables an efficient method for performance optimization based on offloading processes (load balancing). Also, this paper provides some insights into specific emerging issues and ideas to be addressed by future research.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"50 ","pages":"Article 100598"},"PeriodicalIF":12.9,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71507436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Science Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1