Experts believe that the Internet of Things (IoT) is a new revolution in technology and has brought many advantages for our society. However, there are serious challenges in terms of information security and privacy protection. Smart objects usually do not have malware detection due to resource limitations and their intrusion detection work on a particular network. Low computation power, low bandwidth, low battery, storage, and memory contribute to a resource-constrained effect on information security and privacy protection in the domain of IoT. The capacity of fog and cloud computing such as efficient computing, data access, network and storage, supporting mobility, location awareness, heterogeneity, scalability, and low latency in secure communication positively influence information security and privacy protection in IoT. This study illustrates the positive effect of fog and cloud computing on the security of IoT systems and presents a decision-making model based on the object's characteristics such as computational power, storage, memory, energy consumption, bandwidth, packet delivery, hop-count, etc. This helps an IoT system choose the best nodes for creating the fog that we need in the IoT system. Our experiment shows that the proposed approach has less computational, communicational cost, and more productivity in compare with the situation that we choose the smart objects randomly to create a fog.KEYWORDS cloud, Fog, information security, Internet of Things, privacy, resource INTRODUCTIONThe Internet has provided a backbone for connecting different objects to each other and has changed human life significantly. The ubiquitous things is a new concept that has been created by the interconnection and intercommunication amongst smart objects. 1 We are faced with a huge volume of data in this environment. Network traffic, increasing demands of real time, latency-sensitive applications, resource-constraints (computational power, storage, memory, etc) in actuators, mobility and geo-distribution of smart objects, and heterogeneity that are new challenges in the domain of IoT. 2 These weaknesses directly or indirectly influence information security and privacy violation in IoT systems. 3Resource-constraint in actuators jeopardises secure communication between different smart objects. 4 Messages need to be sent encrypted;they will be decrypted for process in the target. The result of the process should be encrypted and send to the same object or other smart objects.We have latency; this delays not only creates risk for information security, but it may also impact human safety in some applications of IoT, such as smart vehicles. Lightweight cryptography has been presented to overcome this challenge in vehicle-to-vehicle (V2V) communication and in many other secure communications in IoT. 5 Smart objects usually do not have malware detection due to limitation in resources; their intrusion detection only can detect attacks in particular networks (not hybrid). These are examples of common problems in the IoT domain.Cloud...
The Unified Medical Language System (UMLS) is an internationally recognized medical vocabulary that enables semantic interoperability across various biomedical terminologies. To use its knowledge, the users must understand its complex knowledge structure, a structure that is not interoperable or is not compliant with any known biomedical and healthcare standard. Further, the users also need to have good technical skills to understand its inner working and interact with UMLS in general. These barriers might cause UMLS usage concerns among inter-disciplinary users in biomedical and healthcare informatics. Currently, there exists no terminology service that normalizes UMLS’s complex knowledge structure to a widely accepted interoperable healthcare standard and allows easy access to its knowledge, thus hiding its workings. The objective of this research is to design and implement a light-weight terminology service that allows easy access to UMLS knowledge structured using the fast health interoperability resources (FHIR) standard, a widely accepted interoperability healthcare standard. The developed terminology service, named UMLS FHIR, leverages FHIR resources and features, and can easily be integrated into any application to consume UMLS knowledge in the FHIR format without the need to understand UMLS’s native knowledge structure and its internal working.
Fog computing has been emerged as a promising paradigm with the different applications from industry to academic area. In this paper, we proposed a new concept, namely fog learning with the aim of addressing the critical thinking as a demanding issue in academic area. Due to the distributed architecture of our fog learning model, it can be used anywhere, anytime, and with the minimum latency in comparison with the existing mobile and cloud learning models to foster the critical thinking. To test the effectiveness of the proposed method, we applied the Software Usability Measurement Inventory (SUMI) as well as the acceptance test. We firstly showed that more than 74% of participants suffered from lack of critical thinking. Moreover, the participants indicated that they use several critical thinking skills during information seeking process, which shows there are relationships between critical thinking skills and the information seeking processes.According to the relationships between critical thinking skills and the information seeking processes, we designed a prototype for cultivating of critical thinking on the basis of fog learning. The results of the prototype evaluation emphasized on its positive role to foster critical thinking. KEYWORDScritical thinking skills, fog computing, fog learning, information seeking process, postgraduate students, prototype INTRODUCTIONCritical thinking (CT) is a significant skill in the information society to recognize false, incomplete, old, or new information. One of the main goals of higher education in the information age is to make students active in the learning process. 1 Facione 2 stated that teaching students to think critically is not only important to the society in general but is also vital to the students' learning process. Most instructors claim that it is essential for students to develop CT skills when they start their academic learning because these skills help students to have purposeful and self-regulatory reasoning.CT also helps students to evaluate the opinion of others, make decisions, and arrive at a reasonable conclusion when encountering complicated problems. 3Recently, the Internet has been known as a popular information source to meet different information needs, especially during learning process of students. Due to the variety of information resources, it is an essential task for students to know how to find, analyze, and evaluate the information.The students can find proper information while they attempt to pass the information seeking processes by leveraging the CT. 4 In spite of the importance of CT in higher education and industry, feedback from the industry still indicates the lack of CT skills among new graduate students. 5,6 Therefore, the first problem of this study is lack of CT among postgraduate students who graduate from universities in a variety of degrees and disciplines. As a result, finding a solution to cultivate CT is highly required.On the other hand, well-educated persons with CT skills are able to recognize relevant information...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.