<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Inverse Problems in Emerging Technology</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sara Bousba</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Naila Marir</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>LIRE Laboratory, Constantine 2-Abdelhamid Mehri University</institution>
          ,
          <addr-line>Constantine</addr-line>
          ,
          <country country="DZ">Algeria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>LaMa Laboratory, Setif University 1</institution>
          ,
          <addr-line>Setif</addr-line>
          ,
          <country country="DZ">Algeria</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Inverse problems are a fundamental tool in many emerging technologies, enabling the recovery of important information from limited and noisy observations. In this survey, we aim to provide a comprehensive overview of the state of the art in inverse problems within emerging technologies. We focus on several important areas, including artificial intelligence, healthcare, machine learning, wireless communication, and energy modeling. We discuss the challenges and limitations of these inverse problems, as well as the recent advancements in their solution. Additionally, we highlight the significance of these inverse problems in each of these areas, and the potential impact they have on the development of new technologies. This survey provides a comprehensive overview of inverse problems in emerging technologies and serves as a valuable resource for researchers and practitioners in the field.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Inverse problems</kwd>
        <kwd>Emerging technologies</kwd>
        <kwd>Machine learning</kwd>
        <kwd>Modern and emerging systems</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Mathematical modeling is a powerful tool to solve problems emerging from the development of
science and technology. The goal is frequently to gain quantities that can only be indirectly
detected through measurements. For instance, a direct scan of the human body’s interior is not
conceivable. However, there exist methods that can obtain a scan by measuring the remaining
intensity of X-rays that go through the body. Such indirect measurements are the result of
processes, which are usually mathematically modeled and depend on the quantities we wish to
ifnd. This type of problem is called an inverse problem, involve calculating causal factors from
observations [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ].
      </p>
      <p>Meanwhile, emerging technologies, such as Artificial Intelligence (AI), Internet of Things
(IoT), medical imaging, augmented reality, and energy, are particularly well-suited to the use of
inverse problems due to their need for fast and accurate solutions to complex problems. An
example of an emerging technology problem that can be posed as an inverse problem is in
the field of medical imaging. Medical imaging techniques, such as computed tomography (CT)
and magnetic resonance imaging (MRI), allow doctors to visualize the internal structure of the
human body. However, these images are often limited by factors such as noise and limited
spatial resolution, which can reduce their accuracy and usefulness. One approach to improving
the accuracy of these images is to treat the imaging problem as an inverse problem. In this
approach, the goal is to estimate the internal structure of the body from the observed images,
while taking into account the various limitations and uncertainties associated with the imaging
process.</p>
      <p>The purpose of this survey is to provide an overview of the current state of the field of inverse
problems in emerging technologies. It covers the key concepts and theories in inverse problems,
as well as the various applications and challenges associated with the use of inverse problems in
emerging technologies. This survey aims to provide a comprehensive and accessible resource for
researchers and practitioners interested in the use of inverse problems in emerging technologies.
By highlighting the importance of inverse problems in this field and the potential for continued
growth and innovation, this survey can help to encourage further research and development in
this area.</p>
      <p>The reminder of this paper is organized as follows. Section 2 covers the background behind
the inverse problems. Section 3 discuss the employed research method. Section 4 provides the
ifnding of our survey. Future directions are given in section 4. Finally, the conclusion to our
work is given to section 5.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Background</title>
      <sec id="sec-2-1">
        <title>2.1. what is an inverse problems</title>
        <p>Inverse problems involve the recovery of information about an unknown system or process
from observations or measurements of its outputs. A problem is called inverse if the solution
of the first part is required to formulate the second part. In other words, it is the technique of
discovering causes from the information of their efects. This process is illustrated in Figure 1.</p>
        <p>Diferentiation of data is a common example of an inverse problem. Given a set of data points
that represent a function, the goal of the diferentiation problem is to recover the derivative of
the function from the data.</p>
        <p>• Direct problem: let  : [0.1] → R be a continuous function, compute
() :=
∫︁ 
0</p>
        <p>
          ()d,  ∈ [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ].
        </p>
        <p>• Inverse Problem: Given a diferentiable function  : [0.1] → R, determine  := ′
In practice, the diferentiation of data is an important problem that arises in many fields.
Accurately diferentiating data is crucial for understanding the underlying dynamics and behavior
of signals and systems, and for making informed decisions and predictions based on the data.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Well-Ill posed problems</title>
        <p>
          The three conditions for a problem to be well-posed in the sense of Hadamard [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] are 1)Existence
of a solution, 2)Uniqueness of solution and 3) Stability or continuity.
        </p>
        <p>
          Mathematically, we formulate the notion of well-posedness [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] as follow:
        </p>
        <p>Let  and  be nomed spaces,  :  →  a linear or nonlinear mapping. The equation
 =  is called well-posed if the following holds:
1. Existence of solution: For every  ∈  there is at least one  ∈  such that  = .
2. Uniqueness of a solution: For every  ∈  there is at most one  ∈  with  = .
3. Continuous dependence of the solution on the data: The solution  depends continuously
on . That is, for every sequence () ⊂  with  →  ( → ∞), it follows that
 →  ( → ∞).</p>
        <p>These three conditions are important because they ensure that the problem is well-defined and
that the solution is both predictable and stable. In many practical applications, it is essential to
have a well-posed problem in order to make accurate predictions and ensure the stability of
the solution. If any of the three condition are not satisfied, the problem is called
improperlyposed or ill-posed.This ill-posed fundamental property makes inverse problems dificult and
mathematically challenging. Ill-posed problems can pose significant dificulties when trying to
solve them numerically, as small errors can result in arbitrarily large variations in the solution.
To mitigate these dificulties, various regularization techniques can be used to stabilize the
solution of an ill-posed problem. The idea behind regularization is to add additional information
or constraints to the problem, in order to make it well-posed and to obtain a stable solution.
This additional information is usually encoded as a penalty term in the objective function that
is being minimized.</p>
        <p>There are several types of regularization methods, including: 1) Tikhonov Regularization, 2)
Morozov’s discrepancy principle and Bayesian Regularization.</p>
        <p>Each of these regularization methods has its own strengths and weaknesses, and the choice
of method depends on the specific problem and the available data. In some cases, it may
be beneficial to use a combination of regularization methods, or to adapt the regularization
parameters based on the data.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Research method</title>
      <p>
        This study aims to investigate the inverse problems in emerging technologies to identify
innovative techniques that can help to address the challenges of existing methods. These
advancements can help to improve the accuracy and reliability of systems and applications.
This research employs a systematic review methodology known as mapping study or scoping
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], which is based on the following steps: A. Specifying research questions. B. Search strategy.
C. Identification of primary studies. D. Data extraction. E. Threat to validity.
      </p>
      <sec id="sec-3-1">
        <title>3.1. Research questions</title>
        <p>The prime question that leads the investigation of inverse problems in emerging technologies is
"How can we find the unknown inputs or parameters that produce a given output or observation
in modern emerging systems?" This question is at the heart of our work, and drives the search
for new and improved solutions and techniques. To pipeline this systematic mapping review
this key question was split into two research questions:
1. What are the diferent emerging technologies that uses inverse problem solutions?
2. How this technologies defined their problems as an inverse problem?
The motivation behind understanding the diferent emerging technologies that use inverse
problem solutions is to keep up-to-date with the latest developments and advancements in these
ifelds. By having a clear understanding of the diferent technologies that use inverse problems,
one can have a better appreciation of the diverse applications of this mathematical concept. This
knowledge can be useful for researchers and engineers who are developing new algorithms and
systems that use inverse problems. Overall, the motivation behind understanding the diferent
emerging technologies that use inverse problem solutions is to stay informed and to have a
deeper understanding of this important mathematical concept and its many applications.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Search strategy</title>
        <p>The time frame covered by this study is from 2009 to 2022 inclusive. Additionally, the publications
were re-searched using IEEEXplore, ACM Digital Library, Science Direct, and Google Scholar
as the repositories.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Finding and discussions</title>
      <p>In this section, we will try to answer the research questions posted in section 3.
1. What are the diferent emerging technologies that uses inverse problem solutions?
There are several emerging technologies that use inverse problem solutions, including:
Artificial Intelligence :</p>
      <p>
        The importance of inverse problems in artificial intelligence is due to their ability to provide
valuable insights and solutions to complex problems. By combining mathematical models and
machine learning algorithms, AI systems can extract information from data, find hidden patterns
and relationships, and make predictions and decisions in real-time [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], the authors
presented an original contribution to the intersection of inverse problems and deep learning and
proposed a new strategy for handling the regularization task in inverse problems. The approach
taken in the paper is to leverage the inherent structure and information within the image data
itself, rather than relying on external data or prior knowledge. The results showed that the deep
neural network was capable of restoring images with high accuracy, even when the degradation
was severe. The authors conclude that the Deep Image Prior is a powerful tool for solving
inverse problems in computer vision, and can be applied to a wide range of image processing
tasks such as denoising, super-resolution, and inpainting. They also suggest that the approach
can be extended to other inverse problems in other fields, such as audio and speech processing.
The authors in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], provides a review of the use of inverse problems in artificial intelligence,
in which they discuss the diferent types of inverse problems and their applications in various
areas such as image processing, pattern recognition, and computer vision. The authors highlight
the importance of inverse problems in artificial intelligence and how they can be used to address
some of the challenging problems in the field. They provide examples of how inverse problems
have been used in various applications such as image restoration, image recognition, and object
detection. They also discuss some of the limitations and challenges of using inverse problems
in artificial intelligence and suggest future directions for research.
      </p>
      <p>Health care:</p>
      <p>
        In the field of healthcare, mathematical inverse problems have been used to address a variety of
problems, such as image analysis and interpretation, disease diagnosis, and treatment planning
[
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13">10, 11, 12, 13</xref>
        ]. For example, medical imaging techniques such as magnetic resonance imaging
(MRI) and computed tomography (CT) use inverse problems to reconstruct images of internal
organs and tissues based on measurements taken from the body. Additionally, inverse problems
have been used in the analysis of biological signals, such as electroencephalography (EEG) and
electrocardiography (ECG), to identify and diagnose diseases.
      </p>
      <p>
        One example of a research paper in this area is [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. This paper provides an overview of
inverse problems in medical imaging and the various techniques used to address these problems,
including MRI, CT, and ultrasound. The author also discusses the challenges and limitations of
using inverse problems in medical imaging and the future directions for research in this area.
      </p>
      <p>Overall, the use of mathematical inverse problems in healthcare has shown promise in the
analysis and interpretation of medical data and has the potential to improve patient outcomes
by providing more accurate and eficient diagnoses and treatments.</p>
      <p>Cybersecurity:</p>
      <p>
        The inverse problem in cybersecurity refers to the process of determining the cause of a
security breach or vulnerability by analyzing its efects and symptoms. Anomaly and misuse
detection in cybersecurity can be considered as an inverse problem, as it requires the identification
of unusual and malicious behavior in a complex network system. To tackle these challenges,
researchers are exploring a range of solutions, including machine learning algorithms, artificial
intelligence, and data analytics, to develop more accurate and efective methods for detecting
anomalies and misuses in cybersecurity. The inverse machine learning algorithm described in
[
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] appears to be a novel approach for addressing the problem of cyber anomaly detection. The
authors model an anomaly detection system using an inverse model approach, which involves
mapping observed network activity data to the underlying causes of anomalous behavior.
      </p>
      <p>Energy:</p>
      <p>
        The use of inverse problems in energy systems is becoming increasingly important as we look
for more eficient and sustainable energy solutions. One example of the use of inverse problems
in energy systems is in the field of renewable energy sources such as wind and solar power
[
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. The goal of these systems is to maximize the energy output while minimizing the costs
associated with energy production. However, this is a complex task, as the energy output of
these systems is influenced by a variety of factors, including weather patterns, energy demand,
and technological limitations. To tackle this challenge, researchers are using inverse problems to
model and optimize the energy output of these systems. Another area where inverse problems
are being used in energy systems is in the development of smart energy grids [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Smart energy
grids are designed to help optimize the distribution and use of energy in a more eficient and
sustainable manner. To achieve this goal, researchers are using inverse problems to model and
optimize the energy demand patterns, energy distribution networks, and other aspects of smart
energy grids.
      </p>
      <p>2. How this technologies defined their problems as an inverse problem?</p>
      <p>There are several examples of emerging technologies that have defined their problems as
inverse problems:</p>
      <p>Intrusion detection systems:</p>
      <p>
        One common approach to intrusion detection is to treat the problem as an inverse problem.
In this context, the inverse problem is to determine the underlying behavior patterns of the
network or system, and to identify deviations from these patterns that may indicate an intrusion
[
        <xref ref-type="bibr" rid="ref15 ref17 ref18">17, 18, 15</xref>
        ]. For example, one could consider a network trafic monitoring system, where the
goal is to detect malicious activity by analyzing the incoming and outgoing trafic. This can be
posed as an inverse problem, where the goal is to infer the presence of an intrusion based on
observed network trafic patterns. The inverse problem is to reconstruct the network behavior
patterns, taking into account the normal trafic patterns and any anomalies that might indicate
an intrusion. The inverse problem can be formalized as a mathematical optimization problem,
where the goal is to find the most likely intrusion scenario that fits the observed data. The
solution to this inverse problem can then be used to identify and respond to potential intrusions
in real-time.
      </p>
      <p>
        Internet of Things (IoT) systems: Internet of Things (IoT) systems can encounter various
problems that can be defined as inverse problems such as sensor calibration, localization [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ],
wireless channel estimation and fault detection and diagnosis [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. One of the key challenges
in IoT systems is the calibration of sensors, which is often necessary to obtain accurate and
reliable measurements. The problem of sensor calibration can be defined as an inverse problem,
where the goal is to estimate the parameters of the sensor model from the observed data.
Another common problem in IoT systems is the localization of devices, which is the process
of determining the physical location of a device based on its measurements. The problem of
localization can be defined as an inverse problem, where the goal is to estimate the location of
a device from the observed measurements and a model of the environment. These are some
examples of how IoT problems can be defined as inverse problems, and the solutions to these
inverse problems can help to improve the performance and reliability of IoT systems.
      </p>
      <p>Overall, the use of inverse problems in modern emerging technologies provides a powerful
tool for solving a wide range of problems where limited information is available. By formulating
the problem as an inverse problem, the unknowns can be found through mathematical modeling
and numerical algorithms, leading to improved solutions and better outcomes.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Future Directions</title>
      <p>Inverse problems have been a topic of research for many years and have been used in various
emerging technologies. As these technologies continue to evolve, the future directions of inverse
problems are expected to focus on several key areas. Some of these directions include:</p>
      <p>Machine Learning and deep learning approaches: In machine and deep learning, the
future direction is expected to focus on developing more eficient and scalable inverse problems
solutions that can handle large datasets, as well as new machine learning models that can be
integrated with existing inverse problem algorithms. This integration is likely to lead to the
development of new hybrid approaches that can address even more challenging problems, such
as non-linear inverse problems and multi-modal inverse problems. In addition, we can expect to
see more applications of inverse problems in machine learning, particularly in natural language
processing.</p>
      <p>Real-time and big data applications: The increasing demand for real-time and big data
applications in emerging technology is driving research eforts to develop methods that can
eficiently solve inverse problems in these contexts. In real-time applications, inverse problems
can be used to process large amounts of data in real-time and provide quick, accurate results. Big
data applications, on the other hand, can benefit from the use of inverse problems by leveraging
the scalability and eficiency of inverse problem algorithms. Inverse problems can be used to
process large amounts of data and extract meaningful insights, even when the data is noisy or
incomplete. In both real-time and big data applications, the use of inverse problems can help
to improve the accuracy of results and reduce the amount of time and resources required to
process large amounts of data.</p>
      <p>Internet of Things (IoT): Inverse problems can be used to process and analyze the massive
amounts of data generated by IoT devices, helping to uncover insights and make informed
decisions. Energy: Inverse problems can be used to improve the eficiency and accuracy of
energy systems, such as wind and solar power, by allowing engineers to better understand and
model the underlying dynamics of these systems.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>In conclusion, the use of inverse problems in emerging technologies is growing as more
researchers and practitioners explore the potential applications of this field. Inverse problems
are becoming increasingly relevant in areas such as artificial intelligence, internet of things,
medical imaging, augmented reality, and energy, where they are being used to address problems
such as model inversion, data analysis, and image and signal processing.</p>
      <p>The future direction of the use of inverse problems in emerging technologies is likely to
be driven by the need for fast and accurate solutions to complex problems in a wide range
of applications. As new technologies emerge and existing ones continue to evolve, the use
of inverse problems solutions is likely to play an increasingly important role in shaping the
future of many industries and fields. Therefore, this survey highlights the importance of inverse
problems in emerging technologies and the potential for continued growth and innovation in
this field. By providing a comprehensive overview of the current state of the field, this survey
can serve as a useful resource for researchers and practitioners interested in the use of inverse
problems in emerging technologies.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tarantola</surname>
          </string-name>
          , Inverse Problems: An Introduction, Springer Science and Business Media,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>U.</given-names>
            <surname>Gunther</surname>
          </string-name>
          ,
          <article-title>Inverse problems: seeing the unseen</article-title>
          ,
          <source>Bull. Math. Sci. 4</source>
          (
          <year>2014</year>
          )
          <fpage>209</fpage>
          -
          <lpage>279</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>J. Hadamard,</surname>
          </string-name>
          <article-title>Lectures on Cauchy's Problems in Linear Partial Diferential Equations</article-title>
          , Yale University Press, New Haven,
          <year>1923</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kirsch</surname>
          </string-name>
          , An Introduction to the
          <source>Mathematical Theory of Inverse Problems</source>
          , Springer,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>M. A. M Saleemi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Rehman</surname>
          </string-name>
          ,
          <article-title>Services classification, trends, and analysis: A systematic mapping study</article-title>
          ,
          <source>IEEE Access 5</source>
          (
          <year>2017</year>
          )
          <fpage>26104</fpage>
          -
          <lpage>26123</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>C. A. M. R. G. B. A. G. D. G Ongie</surname>
            ,
            <given-names>A Jalal</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Willett</surname>
          </string-name>
          ,
          <article-title>Inverse identification of temperature dependent volumetric heat capacity by neural networks</article-title>
          ,
          <source>Int. J. Thermophys</source>
          .
          <volume>34</volume>
          (
          <year>2013</year>
          )
          <fpage>284</fpage>
          -
          <lpage>305</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>H. R. R</given-names>
            <surname>Samuel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S</given-names>
            <surname>Santiago</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>M. Antonio, Untrained graph neural networks for denoising</article-title>
          ,
          <source>IEEE Trans. Signal Process</source>
          .
          <volume>70</volume>
          (
          <year>2022</year>
          )
          <fpage>5708</fpage>
          -
          <lpage>5723</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>V. A. U</given-names>
            <surname>Dmitry</surname>
          </string-name>
          , L. Victor,
          <article-title>Deep image prior</article-title>
          ,
          <source>In IEEE CVPR</source>
          (
          <year>2020</year>
          )
          <fpage>9446</fpage>
          -
          <lpage>9454</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <source>Inverse problems in artificial intelligence: a review 42</source>
          (
          <year>2014</year>
          )
          <fpage>223</fpage>
          -
          <lpage>246</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Goncharsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. Y.</given-names>
            <surname>Romanov</surname>
          </string-name>
          ,
          <article-title>Iterative methods for solving coeficient inverse problems of wave tomography in models with attenuation</article-title>
          ,
          <source>Inverse Prb</source>
          <volume>33</volume>
          (
          <year>2017</year>
          )
          <fpage>025003</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Goncharsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. Y.</given-names>
            <surname>Romanov</surname>
          </string-name>
          ,
          <article-title>Inverse problems of ultrasound tomography in models with attenuation</article-title>
          ,
          <source>Phys Med Biol</source>
          <volume>59</volume>
          (
          <year>2014</year>
          )
          <fpage>1979</fpage>
          -
          <lpage>2004</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Goncharsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. Y.</given-names>
            <surname>Romanov</surname>
          </string-name>
          ,
          <article-title>Supercomputer technologies in inverse problems of ultrasound tomography</article-title>
          ,
          <source>Inverse Prb</source>
          <volume>29</volume>
          (
          <year>2013</year>
          )
          <fpage>075004</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>L. X. Y</given-names>
            <surname>Song</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L</given-names>
            <surname>Shen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ermon</surname>
          </string-name>
          ,
          <article-title>Solving inverse problems in medical imaging with score-based generative models</article-title>
          ,
          <source>International Conference on Learning Representations</source>
          (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>K. H. Jin</surname>
          </string-name>
          , Inverse Problems in Medical Imaging, Springer, New York,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>A. Sever,</surname>
          </string-name>
          <article-title>A machine learning algorithm based on inverse problems for cyber anomaly detection</article-title>
          ,
          <source>Curr. j. appl. sci. technol</source>
          .
          <volume>28</volume>
          (
          <year>2018</year>
          )
          <fpage>1</fpage>
          -
          <lpage>14</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>H. A. L.</given-names>
            <surname>Thi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          ,
          <article-title>Smart energy grid: An overview of challenges and recent advances</article-title>
          ,
          <source>Renewable Sustainable Energy Rev</source>
          .
          <volume>80</volume>
          (
          <year>2017</year>
          )
          <fpage>1267</fpage>
          -
          <lpage>1279</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>M. A. A.</given-names>
            <surname>Guezzaz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Asimi</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Asimi,
          <article-title>Mathematical validation of proposed machine learning classifier for heterogeneous trafic and anomaly detection</article-title>
          ,
          <source>Big Data Mining and Analytics</source>
          <volume>4</volume>
          (
          <year>2021</year>
          )
          <fpage>18</fpage>
          -
          <lpage>24</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>N. Y. W</given-names>
            <surname>Zhong</surname>
          </string-name>
          , C. Ai,
          <article-title>Applying big data based deep learning system to intrusion detection</article-title>
          ,
          <source>Big Data Mining and Analytics</source>
          <volume>3</volume>
          (
          <year>2020</year>
          )
          <fpage>181</fpage>
          -
          <lpage>195</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (Ed.),
          <source>Sensor networks and inverse scattering</source>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Z. J. W. F. R. Y. Y Chi</surname>
            ,
            <given-names>Y</given-names>
          </string-name>
          <string-name>
            <surname>Dong</surname>
            ,
            <given-names>V. C. M.</given-names>
          </string-name>
          <string-name>
            <surname>Leung</surname>
          </string-name>
          ,
          <article-title>Knowledge-based fault diagnosis in industrial internet of things: A survey</article-title>
          ,
          <source>IoT-J</source>
          <volume>9</volume>
          (
          <year>2022</year>
          )
          <fpage>12886</fpage>
          -
          <lpage>12900</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>