Journal of Network and Computer Applications最新文献

筛选
英文 中文
Robustness of multilayer interdependent higher-order network 多层相互依存高阶网络的鲁棒性
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2024-10-24 DOI: 10.1016/j.jnca.2024.104047
Hao Peng , Yifan Zhao , Dandan Zhao , Bo Zhang , Cheng Qian , Ming Zhong , Jianmin Han , Xiaoyang Liu , Wei Wang
{"title":"Robustness of multilayer interdependent higher-order network","authors":"Hao Peng ,&nbsp;Yifan Zhao ,&nbsp;Dandan Zhao ,&nbsp;Bo Zhang ,&nbsp;Cheng Qian ,&nbsp;Ming Zhong ,&nbsp;Jianmin Han ,&nbsp;Xiaoyang Liu ,&nbsp;Wei Wang","doi":"10.1016/j.jnca.2024.104047","DOIUrl":"10.1016/j.jnca.2024.104047","url":null,"abstract":"<div><div>In real-world complex systems, most networks are interconnected with other networks through interlayer dependencies, forming multilayer interdependent networks. In each system, the interactions between nodes are not limited to pairwise but also exist in a higher-order interaction composed of three or more individuals, thus inducing a multilayer interdependent higher-order network (MIHN). First, we build four types of artificial MIHN models (i.e., chain-like, tree-like, star-like and ring-like), in which the higher-order interactions are described by the simplicial complexes, and the interlayer dependency is built via a one-to-one matching dependency link. Then, we propose a cascading failure model on MIHN and suggest a corresponding percolation-based theory to study the robustness of MIHN by investigating the giant connected components (GCC) and percolation threshold. We find that the density of the simplicial complexes and the number of layers of the network affect its penetration behavior. When the density of simplicial complexes exceeds a certain threshold, the network has a double transition, and the increase in network layers significantly enhances the vulnerability of MIHN. By comparing the simulation results of MIHNs with four types, we observe that under the same density of simplicial complexes, the size of the GCC is independent of the topological structures of MIHN after removing a certain number of nodes. Although the cascading failure process of MIHNs with different structures is different, the final results tend to be the same. We further analyze in detail the cascading failure process of MIHN with different structures and elucidate the factors influencing the speed of cascading failures. Among these four types of MIHNs, the chain-like MIHN has the slowest cascading failure rate and more stable robustness compared to the other three structures, followed by the tree-like MIHN and star-like MIHN. The ring-like MIHN has the fastest cascading failure rate and weakest robustness due to its ring structure. Finally, we give the time required for the MIHN with different structures to reach the stable state during the cascading failure process and find that the closer to the percolation threshold, the more time the network requires to reach the stable state.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"233 ","pages":"Article 104047"},"PeriodicalIF":7.7,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142553101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PTTS: Zero-knowledge proof-based private token transfer system on Ethereum blockchain and its network flow based balance range privacy attack analysis PTTS:以太坊区块链上基于零知识证明的私人代币转移系统及其基于网络流的平衡范围隐私攻击分析
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2024-10-24 DOI: 10.1016/j.jnca.2024.104045
Goshgar Ismayilov, Can Özturan
{"title":"PTTS: Zero-knowledge proof-based private token transfer system on Ethereum blockchain and its network flow based balance range privacy attack analysis","authors":"Goshgar Ismayilov,&nbsp;Can Özturan","doi":"10.1016/j.jnca.2024.104045","DOIUrl":"10.1016/j.jnca.2024.104045","url":null,"abstract":"<div><div>Blockchains are decentralized and immutable databases that are shared among the nodes of the network. Although blockchains have attracted a great scale of attention in the recent years by disrupting the traditional financial systems, the transaction privacy is still a challenging issue that needs to be addressed and analyzed. We propose a <em>P</em>rivate <em>T</em>oken <em>T</em>ransfer <em>S</em>ystem (PTTS) for the Ethereum public blockchain in the first part of this paper. For the proposed framework, zero-knowledge based protocol has been designed using Zokrates and integrated into our private token smart contract. With the help of web user interface designed, the end users can interact with the smart contract without any third-party setup. In the second part of the paper, we provide security and privacy analysis including the replay attack and the balance range privacy attack which has been modeled as a network flow problem. It is shown that in case some balance ranges are deliberately leaked out to particular organizations or adversarial entities, it is possible to extract meaningful information about the user balances by employing minimum cost flow network algorithms that have polynomial complexity. The experimental study reports the Ethereum gas consumption and proof generation times for the proposed framework. It also reports network solution times and goodness rates for a subset of addresses under the balance range privacy attack with respect to number of addresses, number of transactions and ratio of leaked transfer transaction amounts.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"233 ","pages":"Article 104045"},"PeriodicalIF":7.7,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142573474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging blockchain and federated learning in Edge-Fog-Cloud computing environments for intelligent decision-making with ECG data in IoT 利用边缘-雾-云计算环境中的区块链和联合学习,利用物联网中的心电图数据进行智能决策
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2024-10-19 DOI: 10.1016/j.jnca.2024.104037
Shinu M. Rajagopal , Supriya M. , Rajkumar Buyya
{"title":"Leveraging blockchain and federated learning in Edge-Fog-Cloud computing environments for intelligent decision-making with ECG data in IoT","authors":"Shinu M. Rajagopal ,&nbsp;Supriya M. ,&nbsp;Rajkumar Buyya","doi":"10.1016/j.jnca.2024.104037","DOIUrl":"10.1016/j.jnca.2024.104037","url":null,"abstract":"<div><div>Blockchain technology combined with Federated Learning (FL) offers a promising solution for enhancing privacy, security, and efficiency in medical IoT applications across edge, fog, and cloud computing environments. This approach enables multiple medical IoT devices at the network edge to collaboratively train a global machine learning model without sharing raw data, addressing privacy concerns associated with centralized data storage. This paper presents a blockchain and FL-based Smart Decision Making framework for ECG data in microservice-based IoT medical applications. Leveraging edge/fog computing for real-time critical applications, the framework implements a FL model across edge, fog, and cloud layers. Evaluation criteria including energy consumption, latency, execution time, cost, and network usage show that edge-based deployment outperforms fog and cloud, with significant advantages in energy consumption (0.1% vs. Fog, 0.9% vs. Cloud), network usage (1.1% vs. Fog, 31% vs. Cloud), cost (3% vs. Fog, 20% vs. Cloud), execution time (16% vs. Fog, 28% vs. Cloud), and latency (1% vs. Fog, 79% vs. Cloud).</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"233 ","pages":"Article 104037"},"PeriodicalIF":7.7,"publicationDate":"2024-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142553100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Controller load optimization strategies in Software-Defined Networking: A survey 软件定义网络中的控制器负载优化策略:调查
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2024-10-16 DOI: 10.1016/j.jnca.2024.104043
Yong Liu , Yuanhang Ge , Qian Meng , Quanze Liu
{"title":"Controller load optimization strategies in Software-Defined Networking: A survey","authors":"Yong Liu ,&nbsp;Yuanhang Ge ,&nbsp;Qian Meng ,&nbsp;Quanze Liu","doi":"10.1016/j.jnca.2024.104043","DOIUrl":"10.1016/j.jnca.2024.104043","url":null,"abstract":"<div><div>In traditional networks, the static configuration of devices increases the complexity of network management and limits the development of network functions. Software-Defined Networking (SDN) employs controllers to manage switches, thereby simplifying network management. However, with the expansion of network scale, the early single controller architecture gradually became a performance bottleneck for the entire network. To solve this problem, SDN uses multiple controllers to manage the network, which improves the scalability of the network. However, due to the dynamic change in network traffic, multi-controller architectures face the challenge of load imbalance among controllers. In recent years, researchers have proposed various novel load optimization strategies to improve resource utilization and the performance of SDN networks. This paper reviews load optimization strategies in SDN, including the latest research results in switch migration and controller placement. Subsequently, we analyze the advantages and disadvantages of existing load optimization strategies. Finally, we discuss the future development direction of the load optimization strategy.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"233 ","pages":"Article 104043"},"PeriodicalIF":7.7,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142527121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On challenges of sixth-generation (6G) wireless networks: A comprehensive survey of requirements, applications, and security issues 第六代(6G)无线网络的挑战:需求、应用和安全问题综合调查
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2024-10-14 DOI: 10.1016/j.jnca.2024.104040
Muhammad Sajjad Akbar , Zawar Hussain , Muhammad Ikram , Quan Z. Sheng , Subhas Chandra Mukhopadhyay
{"title":"On challenges of sixth-generation (6G) wireless networks: A comprehensive survey of requirements, applications, and security issues","authors":"Muhammad Sajjad Akbar ,&nbsp;Zawar Hussain ,&nbsp;Muhammad Ikram ,&nbsp;Quan Z. Sheng ,&nbsp;Subhas Chandra Mukhopadhyay","doi":"10.1016/j.jnca.2024.104040","DOIUrl":"10.1016/j.jnca.2024.104040","url":null,"abstract":"<div><div>Fifth-generation (5G) wireless networks are likely to offer high data rates, increased reliability, and low delay for mobile, personal, and local area networks. Along with the rapid growth of smart wireless sensing and communication technologies, data traffic has increased significantly and existing 5G networks are not able to fully support future massive data traffic for services, storage, and processing. To meet the challenges that are ahead, both research communities and industry are exploring the sixth generation (6G) Terahertz-based wireless network that is expected to be offered to industrial users in just ten years. Gaining knowledge and understanding of the different challenges and facets of 6G is crucial in meeting the requirements of future communication and addressing evolving quality of service (QoS) demands. This survey provides a comprehensive examination of specifications, requirements, applications, and enabling technologies related to 6G. It covers disruptive and innovative, integration of 6G with advanced architectures and networks such as software-defined networks (SDN), network functions virtualization (NFV), Cloud/Fog computing, and Artificial Intelligence (AI) oriented technologies. The survey also addresses privacy and security concerns and provides potential futuristic use cases such as virtual reality, smart healthcare, and Industry 5.0. Furthermore, it identifies the current challenges and outlines future research directions to facilitate the deployment of 6G networks.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"233 ","pages":"Article 104040"},"PeriodicalIF":7.7,"publicationDate":"2024-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142445657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A deep reinforcement learning approach towards distributed Function as a Service (FaaS) based edge application orchestration in cloud-edge continuum 云-边缘连续体中基于边缘应用协调的分布式功能即服务(FaaS)深度强化学习方法
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2024-10-10 DOI: 10.1016/j.jnca.2024.104042
Mina Emami Khansari, Saeed Sharifian
{"title":"A deep reinforcement learning approach towards distributed Function as a Service (FaaS) based edge application orchestration in cloud-edge continuum","authors":"Mina Emami Khansari,&nbsp;Saeed Sharifian","doi":"10.1016/j.jnca.2024.104042","DOIUrl":"10.1016/j.jnca.2024.104042","url":null,"abstract":"<div><div>Serverless computing has emerged as a new cloud computing model which in contrast to IoT offers unlimited and scalable access to resources. This paradigm improves resource utilization, cost, scalability and resource management specifically in terms of irregular incoming traffic. While cloud computing has been known as a reliable computing and storage solution to host IoT applications, it is not suitable for bandwidth limited, real time and secure applications. Therefore, shifting the resources of the cloud-edge continuum towards the edge can mitigate these limitations. In serverless architecture, applications implemented as Function as a Service (FaaS), include a set of chained event-driven microservices which have to be assigned to available instances. IoT microservices orchestration is still a challenging issue in serverless computing architecture due to IoT dynamic, heterogeneous and large-scale environment with limited resources. The integration of FaaS and distributed Deep Reinforcement Learning (DRL) can transform serverless computing by improving microservice execution effectiveness and optimizing real-time application orchestration. This combination improves scalability and adaptability across the edge-cloud continuum. In this paper, we present a novel Deep Reinforcement Learning (DRL) based microservice orchestration approach for the serverless edge-cloud continuum to minimize resource utilization and delay. This approach, unlike existing methods, is distributed and requires a minimum subset of realistic data in each interval to find optimal compositions in the proposed edge serverless architecture and is thus suitable for IoT environment. Experiments conducted using a number of real-world scenarios demonstrate improvement of the number of successfully composed applications by 18%, respectively, compared to state-of-the art methods including Load Balance, Shortest Path algorithms.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"233 ","pages":"Article 104042"},"PeriodicalIF":7.7,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142445470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RT-APT: A real-time APT anomaly detection method for large-scale provenance graph RT-APT:大规模出处图的实时 APT 异常检测方法
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2024-10-10 DOI: 10.1016/j.jnca.2024.104036
Zhengqiu Weng , Weinuo Zhang , Tiantian Zhu , Zhenhao Dou , Haofei Sun , Zhanxiang Ye , Ye Tian
{"title":"RT-APT: A real-time APT anomaly detection method for large-scale provenance graph","authors":"Zhengqiu Weng ,&nbsp;Weinuo Zhang ,&nbsp;Tiantian Zhu ,&nbsp;Zhenhao Dou ,&nbsp;Haofei Sun ,&nbsp;Zhanxiang Ye ,&nbsp;Ye Tian","doi":"10.1016/j.jnca.2024.104036","DOIUrl":"10.1016/j.jnca.2024.104036","url":null,"abstract":"<div><div>Advanced Persistent Threats (APTs) are prevalent in the field of cyber attacks, where attackers employ advanced techniques to control targets and exfiltrate data without being detected by the system. Existing APT detection methods heavily rely on expert rules or specific training scenarios, resulting in the lack of both generality and reliability. Therefore, this paper proposes a novel real-time APT attack anomaly detection system for large-scale provenance graphs, named RT-APT. Firstly, a provenance graph is constructed with kernel logs, and the WL subtree kernel algorithm is utilized to aggregate contextual information of nodes in the provenance graph. In this way we obtain vector representations. Secondly, the FlexSketch algorithm transforms the streaming provenance graph into a sequence of feature vectors. Finally, the K-means clustering algorithm is performed on benign feature vector sequences, where each cluster represents a different system state. Thus, we can identify abnormal behaviors during system execution. Therefore RT-APT enables to detect unknown attacks and extract long-term system behaviors. Experiments have been carried out to explore the optimal parameter settings under which RT-APT can perform best. In addition, we compare RT-APT and the state-of-the-art approaches on three datasets, Laboratory, StreamSpot and Unicorn. Results demonstrate that our proposed method outperforms the state-of-the-art approaches from the perspective of runtime performance, memory overhead and CPU usage.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"233 ","pages":"Article 104036"},"PeriodicalIF":7.7,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142527120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint optimization scheme for task offloading and resource allocation based on MO-MFEA algorithm in intelligent transportation scenarios 基于 MO-MFEA 算法的智能交通场景下任务卸载和资源分配联合优化方案
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2024-10-10 DOI: 10.1016/j.jnca.2024.104039
Mingyang Zhao, Chengtai Liu, Sifeng Zhu
{"title":"Joint optimization scheme for task offloading and resource allocation based on MO-MFEA algorithm in intelligent transportation scenarios","authors":"Mingyang Zhao,&nbsp;Chengtai Liu,&nbsp;Sifeng Zhu","doi":"10.1016/j.jnca.2024.104039","DOIUrl":"10.1016/j.jnca.2024.104039","url":null,"abstract":"<div><div>With the surge of transportation data and diversification of services, the resources for data processing in intelligent transportation systems become more limited. In order to solve this problem, this paper studies the problem of computation offloading and resource allocation adopting edge computing, NOMA communication technology and edge(content) caching technology in intelligent transportation systems. The goal is to minimize the time consumption and energy consumption of the system for processing structured tasks of terminal devices by jointly optimizing the offloading decisions, caching strategies, computation resource allocation and transmission power allocation. This problem is a mixed integer nonlinear programming problem that is nonconvex. In order to solve this challenging problem, proposed a multi-task multi-objective optimization algorithm (MO-MFEA-S) with adaptive knowledge migration based on MO-MFEA. The results of a large number of simulation experiments demonstrate the convergence and effectiveness of MO-MFEA-S.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"233 ","pages":"Article 104039"},"PeriodicalIF":7.7,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142441835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMUNE: A novel evolutionary algorithm for influence maximization in UAV networks IMUNE:无人飞行器网络中影响最大化的新型进化算法
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2024-10-10 DOI: 10.1016/j.jnca.2024.104038
Jiaqi Chen , Shuhang Han , Donghai Tian , Changzhen Hu
{"title":"IMUNE: A novel evolutionary algorithm for influence maximization in UAV networks","authors":"Jiaqi Chen ,&nbsp;Shuhang Han ,&nbsp;Donghai Tian ,&nbsp;Changzhen Hu","doi":"10.1016/j.jnca.2024.104038","DOIUrl":"10.1016/j.jnca.2024.104038","url":null,"abstract":"<div><div>In a network, influence maximization addresses identifying an optimal set of nodes to initiate influence propagation, thereby maximizing the influence spread. Current approaches for influence maximization encounter limitations in accuracy and efficiency. Furthermore, most existing methods are aimed at the IC (Independent Cascade) diffusion model, and few solutions concern dynamic networks. In this study, we focus on dynamic networks consisting of UAV (Unmanned Aerial Vehicle) clusters that perform coverage tasks and introduce IMUNE, an evolutionary algorithm for influence maximization in UAV networks. We first generate dynamic networks that simulate UAV coverage tasks and give the representation of dynamic networks. Novel fitness functions in the evolutionary algorithm are designed to estimate the influence ability of a set of seed nodes in a dynamic process. On this basis, an integrated fitness function is proposed to fit both the IC and SI (Susceptible–Infected) models. IMUNE can find seed nodes for maximizing influence spread in dynamic UAV networks with different diffusion models through the improvements in fitness functions and search strategies. Experimental results on UAV network datasets show the effectiveness and efficiency of the IMUNE algorithm in solving influence maximization problems.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"233 ","pages":"Article 104038"},"PeriodicalIF":7.7,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142441834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive systematic review on machine learning application in the 5G-RAN architecture: Issues, challenges, and future directions 关于 5G-RAN 架构中机器学习应用的全面系统综述:问题、挑战和未来方向
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2024-10-09 DOI: 10.1016/j.jnca.2024.104041
Mohammed Talal , Salem Garfan , Rami Qays , Dragan Pamucar , Dursun Delen , Witold Pedrycz , Amneh Alamleh , Abdullah Alamoodi , B.B. Zaidan , Vladimir Simic
{"title":"A comprehensive systematic review on machine learning application in the 5G-RAN architecture: Issues, challenges, and future directions","authors":"Mohammed Talal ,&nbsp;Salem Garfan ,&nbsp;Rami Qays ,&nbsp;Dragan Pamucar ,&nbsp;Dursun Delen ,&nbsp;Witold Pedrycz ,&nbsp;Amneh Alamleh ,&nbsp;Abdullah Alamoodi ,&nbsp;B.B. Zaidan ,&nbsp;Vladimir Simic","doi":"10.1016/j.jnca.2024.104041","DOIUrl":"10.1016/j.jnca.2024.104041","url":null,"abstract":"<div><div>The fifth-generation (5G) network is considered a game-changing technology that promises advanced connectivity for businesses and growth opportunities. To gain a comprehensive understanding of this research domain, it is essential to scrutinize past research to investigate 5G-radio access network (RAN) architecture components and their interaction with computing tasks. This systematic literature review focuses on articles related to the past decade, specifically on machine learning models integrated with 5G-RAN architecture. The review disregards service types like the Internet of Medical Things, Internet of Things, and others provided by 5G-RAN. The review utilizes major databases such as IEEE Xplore, ScienceDirect, and Web of Science to locate highly cited peer-reviewed studies among 785 articles. After implementing a two-phase article filtration process, 143 articles are categorized into review articles (15/143) and learning-based development articles (128/143) based on the type of machine learning used in development. Motivational topics are highlighted, and recommendations are provided to facilitate and expedite the development of 5G-RAN. This review offers a learning-based mapping, delineating the current state of 5G-RAN architectures (e.g., O-RAN, C-RAN, HCRAN, and F-RAN, among others) in terms of computing capabilities and resource availability. Additionally, the article identifies the current concepts of ML prediction (categorical vs. value) that are implemented and discusses areas for future enhancements regarding the goal of network intelligence.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"233 ","pages":"Article 104041"},"PeriodicalIF":7.7,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信