-
Pervasive Technology-Enabled Care and Support for People with Dementia: The State of Art and Research Issues
Authors:
Sayan Kumar Ray,
Geri Harris,
Akbar Hossain,
NZ Jhanjhi
Abstract:
Dementia is a mental illness that people live with all across the world. No one is immune. Nothing can predict its onset. The true story of dementia remains unknown globally, partly due to the denial of dementia symptoms and partly due to the social stigma attached to the disease. In recent years, dementia as a mental illness has received a lot of attention from the scientific community and health…
▽ More
Dementia is a mental illness that people live with all across the world. No one is immune. Nothing can predict its onset. The true story of dementia remains unknown globally, partly due to the denial of dementia symptoms and partly due to the social stigma attached to the disease. In recent years, dementia as a mental illness has received a lot of attention from the scientific community and healthcare providers. This paper presents a state of art survey of pervasive technology enabled care and support for people suffering from Alzheimers dementia. We identify three areas of pervasive technology support for dementia patients, focusing on care, wellness and active living. A critical analysis of existing research is presented here, exploring how pervasive computing, artificial intelligence (AI) and the Internet of Things (IoT) are already supporting and providing comfort to dementia patients, particularly those living alone in the community. The work discusses key challenges and limitations of technology-enabled support owing to reasons like lack of accessibility, availability, usability and affordability of technology, limited holistic care approach, and lack of education and information. Future research directions focusing on how pervasive and connected healthcare can better support the well being and mental health impacts of Alzheimers dementia are also highlighted.
△ Less
Submitted 23 June, 2024;
originally announced June 2024.
-
A Reliable Target Evolved Node B Selection Scheme in LTE-Advanced Handover
Authors:
Sayan Kumar Ray,
NZ Jhanjhi,
Akbar Hossain
Abstract:
The problem of improving the handover performance in Long Term Evolution-Advanced (LTE-A) networks has not been fully solved yet. Traditionally, the selection of the target Evolved Node B (TeNB) in the handover procedure is based on the signal strength measurements, which may not produce a reliable handover. A reliable handover method may reduce the instances of unstable or frequent handovers that…
▽ More
The problem of improving the handover performance in Long Term Evolution-Advanced (LTE-A) networks has not been fully solved yet. Traditionally, the selection of the target Evolved Node B (TeNB) in the handover procedure is based on the signal strength measurements, which may not produce a reliable handover. A reliable handover method may reduce the instances of unstable or frequent handovers that otherwise waste network resources. The signal strength measurement process is inherently time consuming as the user equipment (UE) has to measure multiple neighboring eNB (NeNB) frequencies in each measurement period. An efficient handover method is required to improve the overall performance of such systems. In this paper we propose a reliable and fast TeNB selection scheme for LTE-A handover. The proposed scheme outperforms the existing LTE-A handover methods. The improved performance is achieved by selecting the TeNB based on some three independent parameters, namely orientation matching (OM), current load (CL), and the received signal strengths. An UE essentially measures only the NeNBs shortlisted based on OM and CL; thus measurement time is reduced considerably leading to a reduction of overall handover time. The performance of the proposed scheme is validated by simulation.
△ Less
Submitted 22 May, 2024;
originally announced May 2024.
-
Secure Authentication Mechanism for Cluster based Vehicular Adhoc Network (VANET): A Survey
Authors:
Rabia Nasir,
Humaira Ashraf,
NZ Jhanjhi
Abstract:
Vehicular Ad Hoc Networks (VANETs) play a crucial role in Intelligent Transportation Systems (ITS) by facilitating communication between vehicles and infrastructure. This communication aims to enhance road safety, improve traffic efficiency, and enhance passenger comfort. The secure and reliable exchange of information is paramount to ensure the integrity and confidentiality of data, while the aut…
▽ More
Vehicular Ad Hoc Networks (VANETs) play a crucial role in Intelligent Transportation Systems (ITS) by facilitating communication between vehicles and infrastructure. This communication aims to enhance road safety, improve traffic efficiency, and enhance passenger comfort. The secure and reliable exchange of information is paramount to ensure the integrity and confidentiality of data, while the authentication of vehicles and messages is essential to prevent unauthorized access and malicious activities. This survey paper presents a comprehensive analysis of existing authentication mechanisms proposed for cluster-based VANETs. The strengths, weaknesses, and suitability of these mechanisms for various scenarios are carefully examined. Additionally, the integration of secure key management techniques is discussed to enhance the overall authentication process. Cluster-based VANETs are formed by dividing the network into smaller groups or clusters, with designated cluster heads comprising one or more vehicles. Furthermore, this paper identifies gaps in the existing literature through an exploration of previous surveys. Several schemes based on different methods are critically evaluated, considering factors such as throughput, detection rate, security, packet delivery ratio, and end-to-end delay. To provide optimal solutions for authentication in cluster-based VANETs, this paper highlights AI- and ML-based routing-based schemes. These approaches leverage artificial intelligence and machine learning techniques to enhance authentication within the cluster-based VANET network. Finally, this paper explores the open research challenges that exist in the realm of authentication for cluster-based Vehicular Adhoc Networks, shedding light on areas that require further investigation and development.
△ Less
Submitted 20 December, 2023;
originally announced December 2023.
-
Survey on Multi-Document Summarization: Systematic Literature Review
Authors:
Uswa Ihsan,
Humaira Ashraf,
NZ Jhanjhi
Abstract:
In this era of information technology, abundant information is available on the internet in the form of web pages and documents on any given topic. Finding the most relevant and informative content out of these huge number of documents, without spending several hours of reading has become a very challenging task. Various methods of multi-document summarization have been developed to overcome this…
▽ More
In this era of information technology, abundant information is available on the internet in the form of web pages and documents on any given topic. Finding the most relevant and informative content out of these huge number of documents, without spending several hours of reading has become a very challenging task. Various methods of multi-document summarization have been developed to overcome this problem. The multi-document summarization methods try to produce high-quality summaries of documents with low redundancy. This study conducts a systematic literature review of existing methods for multi-document summarization methods and provides an in-depth analysis of performance achieved by these methods. The findings of the study show that more effective methods are still required for getting higher accuracy of these methods. The study also identifies some open challenges that can gain the attention of future researchers of this domain.
△ Less
Submitted 20 December, 2023;
originally announced December 2023.
-
A Survey on Scheduling the Task in Fog Computing Environment
Authors:
Faiza Ishaq,
Humaira Ashraf,
Nz Jhanjhi
Abstract:
With the rapid increase in the Internet of Things (IoT), the amount of data produced and processed is also increased. Cloud Computing facilitates the storage, processing, and analysis of data as needed. However, cloud computing devices are located far away from the IoT devices. Fog computing has emerged as a small cloud computing paradigm that is near to the edge devices and handles the task very…
▽ More
With the rapid increase in the Internet of Things (IoT), the amount of data produced and processed is also increased. Cloud Computing facilitates the storage, processing, and analysis of data as needed. However, cloud computing devices are located far away from the IoT devices. Fog computing has emerged as a small cloud computing paradigm that is near to the edge devices and handles the task very efficiently. Fog nodes have a small storage capability than the cloud node but it is designed and deployed near to the edge device so that request must be accessed efficiently and executes in time. In this survey paper we have investigated and analysed the main challenges and issues raised in scheduling the task in fog computing environment. To the best of our knowledge there is no comprehensive survey paper on challenges in task scheduling of fog computing paradigm. In this survey paper research is conducted from 2018 to 2021 and most of the paper selection is done from 2020-2021. Moreover, this survey paper organizes the task scheduling approaches and technically plans the identified challenges and issues. Based on the identified issues, we have highlighted the future work directions in the field of task scheduling in fog computing environment.
△ Less
Submitted 20 December, 2023;
originally announced December 2023.