Computer Science Review最新文献

筛选
英文 中文
More than a framework: Sketching out technical enablers for natural language-based source code generation 不仅仅是一个框架:勾勒基于自然语言的源代码生成的技术手段
IF 12.9 1区 计算机科学
Computer Science Review Pub Date : 2024-05-25 DOI: 10.1016/j.cosrev.2024.100637
Chen Yang, Yan Liu, Changqing Yin
{"title":"More than a framework: Sketching out technical enablers for natural language-based source code generation","authors":"Chen Yang,&nbsp;Yan Liu,&nbsp;Changqing Yin","doi":"10.1016/j.cosrev.2024.100637","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100637","url":null,"abstract":"<div><p>Natural Language-based Source Code Generation (NLSCG) holds the promise to revolutionize the way how software is developed by means of facilitating a collection of intelligent technical enablers, based on sustained improvements on the natural language to source code pipelines and continuous adoption of new coding paradigms. In recent years, a large variety of NLSCG technical solutions have been proposed, and quite exciting experimental results have been reported. Meanwhile, current researches and initiative application projects in this area reflect a large diversity of NLSCG contexts and of major technical enablers. Such heterogeneity, fragmentation, and vagueness of the NLSCG technical landscape are currently frustrating the full realization of the NLSCG research and application vision. Players in this field could not find systematic guidelines on how to effectively address the ”known unknowns” and how to simply spot the ”unknown unknowns”, which eventually hinder the turning of NLSCG solutions into further research enhancements or production applications. Understanding the context, boundaries, capabilities, and integrations of NLSCG enablers is considered as one of the key drivers for the more practical application of NLSCG models. In this paper, we analyze in detail the natural language to source code pipelines and the evolvement of source code generation tasks, by considering both the problem context and technological aspects. A foresight reference framework for NLSCG is proposed to help handle the source code generation tasks with proper intelligent models. We review the present-day NLSCG technical landscape, as well as the core technical enablers along the source code generation pipelines. Relevant experiments are conducted to validate the role of representative models across different technical enablers on typical datasets, and we finally highlight the contribution of different enablers to code generation capabilities.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"53 ","pages":"Article 100637"},"PeriodicalIF":12.9,"publicationDate":"2024-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141095944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive review on applications of Raspberry Pi 树莓派应用综述
IF 12.9 1区 计算机科学
Computer Science Review Pub Date : 2024-05-01 DOI: 10.1016/j.cosrev.2024.100636
Sudha Ellison Mathe , Hari Kishan Kondaveeti , Suseela Vappangi , Sunny Dayal Vanambathina , Nandeesh Kumar Kumaravelu
{"title":"A comprehensive review on applications of Raspberry Pi","authors":"Sudha Ellison Mathe ,&nbsp;Hari Kishan Kondaveeti ,&nbsp;Suseela Vappangi ,&nbsp;Sunny Dayal Vanambathina ,&nbsp;Nandeesh Kumar Kumaravelu","doi":"10.1016/j.cosrev.2024.100636","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100636","url":null,"abstract":"<div><p>Raspberry Pi is an invaluable and popular prototyping tool in scientific research for experimenting with a wide variety of ideas, ranging from simple to complex projects. This review article explores how Raspberry Pi is used in various studies, discussing its pros and cons along with its applications in various domains such as home automation, agriculture, healthcare, industrial control, and advanced research. Our aim is to provide a useful resource for researchers, educators, students, product developers, and enthusiasts, helping them to grasp the current status and discover new research possibilities using Raspberry Pi.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"52 ","pages":"Article 100636"},"PeriodicalIF":12.9,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140917835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on modeling for behaviors of complex intelligent systems based on generative adversarial networks 基于生成式对抗网络的复杂智能系统行为建模概览
IF 12.9 1区 计算机科学
Computer Science Review Pub Date : 2024-04-27 DOI: 10.1016/j.cosrev.2024.100635
Yali Lv , Jingpu Duan , Xiong Li
{"title":"A survey on modeling for behaviors of complex intelligent systems based on generative adversarial networks","authors":"Yali Lv ,&nbsp;Jingpu Duan ,&nbsp;Xiong Li","doi":"10.1016/j.cosrev.2024.100635","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100635","url":null,"abstract":"<div><p>This paper provides an extensive and in-depth survey of behavior modeling for complex intelligent systems, focusing specifically on the innovative applications of Generative Adversarial Networks (GANs). The survey not only delves into the fundamental principles of GANs, but also elucidates their pivotal role in accurately modeling the behaviors exhibited by complex intelligent systems. By categorizing behavior modeling into prediction and learning, this survey meticulously examines the current landscape of research in each domain, shedding light on the latest advancements and methodologies driven by GANs. Furthermore, the paper offers insights into both the theoretical underpinnings and practical implications of GANs in behavior modeling for complex intelligent systems, and proposes potential future research directions to advance the field. Overall, this comprehensive survey serves as a valuable resource for researchers, practitioners, and scholars seeking to deepen their understanding of behavior modeling using GANs and to chart a course for future exploration and innovation in this dynamic field.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"52 ","pages":"Article 100635"},"PeriodicalIF":12.9,"publicationDate":"2024-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140650636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Harnessing Heterogeneous Information Networks: A systematic literature review 利用异构信息网络:系统文献综述
IF 12.9 1区 计算机科学
Computer Science Review Pub Date : 2024-04-27 DOI: 10.1016/j.cosrev.2024.100633
Leila Outemzabet , Nicolas Gaud , Aurélie Bertaux , Christophe Nicolle , Stéphane Gerart , Sébastien Vachenc
{"title":"Harnessing Heterogeneous Information Networks: A systematic literature review","authors":"Leila Outemzabet ,&nbsp;Nicolas Gaud ,&nbsp;Aurélie Bertaux ,&nbsp;Christophe Nicolle ,&nbsp;Stéphane Gerart ,&nbsp;Sébastien Vachenc","doi":"10.1016/j.cosrev.2024.100633","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100633","url":null,"abstract":"<div><p>The integration of multiple heterogeneous data into graph models has been the subject of extensive research in recent years. Harnessing these resulting Heterogeneous Information Networks (HINs) is a complex task that requires reasoning to perform various prediction tasks.</p><p>In the last decade, multiple Artificial Intelligence (AI) approaches have been developed to bridge the gap between the abundance of diverse data within various fields, their heterogeneity and complexity within HINs. A focus has been directed on developing graph-oriented algorithms that can effectively analyze and leverage the rich information in HINs.</p><p>Given the sheer volume of approaches being developed, selecting the most suitable one for a specific objective has become a daunting challenge. This article reviews the recent advances in AI methods for modeling and analyzing HINs. It proposes a cartography of these approaches, structured as a pipeline, offering diverse options at each stage. This structured framework aims to guide practitioners in choosing the most fitting methods based on the nature of their data and specific objectives.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"52 ","pages":"Article 100633"},"PeriodicalIF":12.9,"publicationDate":"2024-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140807234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Twenty-two years since revealing cross-site scripting attacks: A systematic mapping and a comprehensive survey 跨站脚本攻击被揭露已有 22 年:系统映射和全面调查
IF 12.9 1区 计算机科学
Computer Science Review Pub Date : 2024-04-23 DOI: 10.1016/j.cosrev.2024.100634
Abdelhakim Hannousse , Salima Yahiouche , Mohamed Cherif Nait-Hamoud
{"title":"Twenty-two years since revealing cross-site scripting attacks: A systematic mapping and a comprehensive survey","authors":"Abdelhakim Hannousse ,&nbsp;Salima Yahiouche ,&nbsp;Mohamed Cherif Nait-Hamoud","doi":"10.1016/j.cosrev.2024.100634","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100634","url":null,"abstract":"<div><p>Cross-site scripting (XSS) is one of the major threats menacing the privacy of data and the navigation of trusted web applications. Since its disclosure in late 1999 by Microsoft security engineers, several techniques have been developed with the aim of securing web navigation and protecting web applications against XSS attacks. XSS has been and is still in the top 10 list of web vulnerabilities reported by the Open Web Applications Security Project (OWASP). Consequently, handling XSS attacks has become one of the major concerns of several web security communities. Despite the numerous studies that have been conducted to combat XSS attacks, the attacks continue to rise. This motivates the study of how the interest in XSS attacks has evolved over the years, what has already been achieved to prevent these attacks, and what is missing to restrain their prevalence. In this paper, we conduct a systematic mapping and a comprehensive survey with the aim of answering all these questions. We summarize and categorize existing endeavors that aim to handle XSS attacks and develop XSS-free web applications. The systematic mapping yielded 157 high-quality published studies. By thoroughly analyzing those studies, a comprehensive taxonomy is drawn out outlining various techniques used to prevent, detect, protect, and defend against XSS attacks and vulnerabilities. The study of the literature revealed a remarkable interest bias toward basic (84.71%) and JavaScript (81.63%) XSS attacks as well as a dearth of vulnerability repair mechanisms and tools (only 1.48%). Notably, existing vulnerability detection techniques focus solely on single-page detection, overlooking flaws that may span across multiple pages. Furthermore, the study brought to the forefront the limitations and challenges of existing attack detection and defense techniques concerning machine learning and content-security policies. Consequently, we strongly advocate the development of more suitable detection and defense techniques, along with an increased focus on addressing XSS vulnerabilities through effective detection (hybrid solutions) and repair strategies. Additionally, there is a pressing need for more high-quality studies to overcome the limitations of promising approaches such as machine learning and content-security policies while also addressing diverse XSS attacks in different languages. Hopefully, this study can serve as guidance for both the academic and practitioner communities in the development of XSS-free web applications.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"52 ","pages":"Article 100634"},"PeriodicalIF":12.9,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140638499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A contemporary review on chatbots, AI-powered virtual conversational agents, ChatGPT: Applications, open challenges and future research directions 关于聊天机器人、人工智能驱动的虚拟对话代理、ChatGPT 的当代综述:应用、公开挑战和未来研究方向
IF 12.9 1区 计算机科学
Computer Science Review Pub Date : 2024-04-09 DOI: 10.1016/j.cosrev.2024.100632
Avyay Casheekar, Archit Lahiri, Kanishk Rath, Kaushik Sanjay Prabhakar, Kathiravan Srinivasan
{"title":"A contemporary review on chatbots, AI-powered virtual conversational agents, ChatGPT: Applications, open challenges and future research directions","authors":"Avyay Casheekar,&nbsp;Archit Lahiri,&nbsp;Kanishk Rath,&nbsp;Kaushik Sanjay Prabhakar,&nbsp;Kathiravan Srinivasan","doi":"10.1016/j.cosrev.2024.100632","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100632","url":null,"abstract":"<div><p>This review paper offers an in-depth analysis of AI-powered virtual conversational agents, specifically focusing on OpenAI’s ChatGPT. The main contributions of this paper are threefold: (i) an exhaustive review of prior literature on chatbots, (ii) a background of chatbots including existing chatbots/conversational agents like ChatGPT, and (iii) a UI/UX design analysis of prominent chatbots. Another contribution of this review is the comprehensive exploration of ChatGPT’s applications across a multitude of sectors, including education, business, public health, and more. This review highlights the transformative potential of ChatGPT, despite the challenges it faces such as hallucination, biases in training data, jailbreaks, and anonymous data collection. The review paper then presents a comprehensive survey of prior literature reviews on chatbots, identifying gaps in the prior work and highlighting the need for further research in areas such as chatbot evaluation, user experience, and ethical considerations. The paper also provides a detailed analysis of the UI/UX design of prominent chatbots, including their conversational flow, visual design, and user engagement. The paper also identifies key future research directions, including mitigating language bias, enhancing ethical decision-making capabilities, improving user interaction and personalization, and developing robust governance frameworks. By solving these issues, we can ensure that AI chatbots like ChatGPT are used responsibly and effectively across a broad variety of applications. This review will be a valuable resource for researchers and practitioners in understanding the current state and future potential of AI chatbots like ChatGPT.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"52 ","pages":"Article 100632"},"PeriodicalIF":12.9,"publicationDate":"2024-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140540470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI techniques for IoT-based DDoS attack detection: Taxonomies, comprehensive review and research challenges 基于物联网的 DDoS 攻击检测的人工智能技术:分类法、综合评述和研究挑战
IF 12.9 1区 计算机科学
Computer Science Review Pub Date : 2024-03-30 DOI: 10.1016/j.cosrev.2024.100631
Bindu Bala , Sunny Behal
{"title":"AI techniques for IoT-based DDoS attack detection: Taxonomies, comprehensive review and research challenges","authors":"Bindu Bala ,&nbsp;Sunny Behal","doi":"10.1016/j.cosrev.2024.100631","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100631","url":null,"abstract":"<div><p>Distributed Denial of Service (DDoS) attacks in IoT networks are one of the most devastating and challenging cyber-attacks. The number of IoT users is growing exponentially due to the increase in IoT devices over the past years. Consequently, DDoS attack has become the most prominent attack as vulnerable IoT devices are becoming victims of it. In the literature, numerous techniques have been proposed to detect IoT-based DDoS attacks. However, techniques based on Artificial Intelligence (AI) have proven to be effective in the detection of cyber-attacks in comparison to other alternative techniques. This paper presents a systematic literature review of AI-based tools and techniques used for analysis, classification, and detection of the most threatening, prominent, and dreadful IoT-based DDoS attacks between the years 2019 to 2023. A comparative study of real datasets having IoT traffic features has also been illustrated. The findings of this systematic review provide useful insights into the existing research landscape for designing AI-based models to detect IoT-based DDoS attacks specifically. Additionally, the study sheds light on IoT botnet lifecycle, various botnet families, the taxonomy of IoT-based DDoS attacks, prominent tools used to launch DDoS attack, publicly available IoT datasets, the taxonomy of AI techniques, popular software available for ML/DL modeling, a list of numerous research challenges and future directions that may aid in the development of novel and reliable methods for identifying and categorizing IoT-based DDoS attacks.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"52 ","pages":"Article 100631"},"PeriodicalIF":12.9,"publicationDate":"2024-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140330585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiple clusterings: Recent advances and perspectives 多重聚类:最新进展与展望
IF 12.9 1区 计算机科学
Computer Science Review Pub Date : 2024-02-26 DOI: 10.1016/j.cosrev.2024.100621
Guoxian Yu , Liangrui Ren , Jun Wang , Carlotta Domeniconi , Xiangliang Zhang
{"title":"Multiple clusterings: Recent advances and perspectives","authors":"Guoxian Yu ,&nbsp;Liangrui Ren ,&nbsp;Jun Wang ,&nbsp;Carlotta Domeniconi ,&nbsp;Xiangliang Zhang","doi":"10.1016/j.cosrev.2024.100621","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100621","url":null,"abstract":"<div><p>Clustering is a fundamental data exploration technique to discover hidden grouping structure of data. With the proliferation of big data, and the increase of volume and variety, the complexity of data multiplicity is increasing as well. Traditional clustering methods can provide only a single clustering result, which restricts data exploration to one single possible partition. In contrast, multiple clustering can simultaneously or sequentially uncover multiple non-redundant and distinct clustering solutions, which can reveal multiple interesting hidden structures of the data from different perspectives. For these reasons, multiple clustering has become a popular and promising field of study. In this survey, we have conducted a systematic review of the existing multiple clustering methods. Specifically, we categorize existing approaches according to four different perspectives (i.e., multiple clustering in the original space, in subspaces and on multi-view data, and multiple co-clustering). We summarize the key ideas underlying the techniques and their objective functions, and discuss the advantages and disadvantages of each. In addition, we built a repository of multiple clustering resources (i.e., benchmark datasets and codes). Finally, we discuss the key open issues for future investigation.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"52 ","pages":"Article 100621"},"PeriodicalIF":12.9,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139975673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sustainable computing across datacenters: A review of enabling models and techniques 跨数据中心的可持续计算:有利模式和技术综述
IF 12.9 1区 计算机科学
Computer Science Review Pub Date : 2024-02-13 DOI: 10.1016/j.cosrev.2024.100620
Muhammad Zakarya , Ayaz Ali Khan , Mohammed Reza Chalak Qazani , Hashim Ali , Mahmood Al-Bahri , Atta Ur Rehman Khan , Ahmad Ali , Rahim Khan
{"title":"Sustainable computing across datacenters: A review of enabling models and techniques","authors":"Muhammad Zakarya ,&nbsp;Ayaz Ali Khan ,&nbsp;Mohammed Reza Chalak Qazani ,&nbsp;Hashim Ali ,&nbsp;Mahmood Al-Bahri ,&nbsp;Atta Ur Rehman Khan ,&nbsp;Ahmad Ali ,&nbsp;Rahim Khan","doi":"10.1016/j.cosrev.2024.100620","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100620","url":null,"abstract":"<div><p>The growth rate in big data and internet of things (IoT) is far exceeding the computer performance rate at which modern processors can compute on the massive amount of data. The cluster and cloud technologies enriched by machine learning applications had significantly helped in performance growths subject to the underlying network performance. Computer systems have been studied for improvement in performance, driven by user’s applications demand, in the past few decades, particularly from 1990 to 2010. By the mid of 2010 to 2023, albeit parallel and distributed computing was omnipresent, but the total performance improvement rate of a single computing core had significantly reduced. Similarly, from 2010 to 2023, our digital world of big data and IoT has considerably increased from 1.2 Zettabytes (i.e., sextillion bytes) to approximately 120 zettabytes. Moreover, in 2022 cloud datacenters consumed <span><math><mo>∼</mo></math></span> 200TWh of energy worldwide. However, due to their ever-increasing energy demand which causes <span><math><msub><mrow><mi>CO</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span> emissions, over the past years the focus has shifted to the design of architectures, software, and in particular, intelligent algorithms to compute on the data more efficiently and intelligently. The energy consumption problem is even greater for large-scale systems that involve several thousand servers. Combining these fears, cloud service providers are presently facing more challenges than earlier because they fight to keep up with the extraordinary network traffic being produced by the world’s fast-tracked move to online due to global pandemics. In this paper, we deliberate the energy consumption and performance problems of large-scale systems and present several taxonomies of energy and performance aware methodologies. We debate over the energy and performance efficiencies, both, which make this study different from those previously published in the literature. Important research papers have been surveyed to characterise and recognise crucial and outstanding topics for further research. We deliberate numerous state-of-the-art methods and algorithms, stated in the literature, that claim to advance the energy efficiency and performance of large-scale computing systems, and recognise numerous open challenges.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"52 ","pages":"Article 100620"},"PeriodicalIF":12.9,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139726310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fundamental design aspects of UAV-enabled MEC systems: A review on models, challenges, and future opportunities 无人机 MEC 系统的基本设计方面:模型、挑战和未来机遇综述
IF 12.9 1区 计算机科学
Computer Science Review Pub Date : 2024-02-01 DOI: 10.1016/j.cosrev.2023.100615
Mohd Hirzi Adnan , Zuriati Ahmad Zukarnain , Oluwatosin Ahmed Amodu
{"title":"Fundamental design aspects of UAV-enabled MEC systems: A review on models, challenges, and future opportunities","authors":"Mohd Hirzi Adnan ,&nbsp;Zuriati Ahmad Zukarnain ,&nbsp;Oluwatosin Ahmed Amodu","doi":"10.1016/j.cosrev.2023.100615","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100615","url":null,"abstract":"<div><p>The huge prospects of the internet of things (IoT) have led to an ever-growing demand for computing power by IoT users to enable various applications. Multi-access edge computing (MEC) research and development has rapidly gained attention during the last decade. The ability to deploy edge servers at different points across a content delivery network that can offer communication and computing services close to mobile user devices is one of the main factors driving the evolution of MEC. Furthermore, MEC has been considered a potentially transformational approach for fifth-generation (5 G) and beyond 5 G (B5G) networks, as well as a potential improvement to conventional cloud computing. Unmanned aerial vehicles (UAVs) can be used as effective aerial platforms to offer reliable and ubiquitous connections in wireless communication networks due to their distinctive qualities, such as high cruising altitude, on-demand deployment, and three-dimensional (3D) maneuverability. The number of research studies published in this area has dramatically increased due to the growing interest in UAV-enabled MEC. Although UAV-enabled MEC systems have been well studied, the existing models are becoming increasingly heterogeneous and scattered without harmony. This paper provides a comprehensive analysis of the literature on UAV-enabled MEC systems with a special focus on the system modeling, and optimization techniques for five identified domains, such as energy efficiency, resource allocation, trajectory control, latency, and security. For each domain, we have highlighted the recent advances, critical findings, and the advantages and disadvantages. Additionally, the identified proposed techniques were analyzed and discussed, with emphasize on the constraints and performance metrics. We also discuss a general system model for each highlighted domain. Moreover, the lessons are also derived from the study on system optimization and system modeling techniques identified in this paper. Then we discuss open issues related to UAV-enabled MEC systems in each highlighted domain, including problem formulation and optimization techniques. Finally, this paper lay out directions for future research to solve the aforementioned problems associated with UAV-enabled MEC systems.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"51 ","pages":"Article 100615"},"PeriodicalIF":12.9,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574013723000825/pdfft?md5=82077d59b65835005a3894d0bb65ba35&pid=1-s2.0-S1574013723000825-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139699623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信