Professional Documents
Culture Documents
patient care and treatment. For learning creation and has been utilized for restorative treatment,
securing, different learning models exist for the conclusion, aversion, and distinguishing proof of
constant extraction of significant data from IoT inconveniences. IoT has additionally been abused to
gadgets and the sharing of data between parental beating challenges in existing social insurance and
figures, patients, and specialists/specialists [12,13]. clinic data administration frameworks [17,18]. IoT
At present, CBL does not have an improvement demonstrates awesome potential in the in social
system for genuine clinical cases utilizing an IoT insurance field, particularly to reduce the cost of care
foundation and there is a want to abuse existing IoT [19]. Because of the minimal effort and decreased
assets and framework for improving medicinal size of sensor gadgets, IoT can assume a vital part in
instruction. Because of these certainties, our upgrading the learning ability of therapeutic
inspiration was to plan a stage that can be utilized for understudies by giving genuine developmental
medicinal learning, and in addition viable learning in restorative cases. At present, numerous IoT stages
different areas. We propose a viable stage called the exist with different arrangements of highlights. This
IoT-based Flipped Learning Platform, which is on the grounds that wellbeing is an essential worry
coordinates the highlights of existing IoT assets. The of society and strongly affects all partners. IoT in the
endeavors IoT framework to help CBL in a flipped human services space not just can possibly enhance
learning condition. The ICBFLT needs bolster for medicinal services for society, but on the other hand
getting certifiable patient cases, which can be is valuable for macroeconomic conditions. CBL is a
accomplished utilizing IoT ideas. This stage bolsters standout amongst the best methodologies in
flipped case-based learning in a cloud situation with understudy based teaching method. Jones et al. [20]
best in class security and protection measures for talked about how CBL emerged from look into
customized information and conveyance of uses in showing that students who endeavored to take care
private, open, and half breed approaches. Similarly of issues before comprehend their fundamental
as with any framework, keeping up security of data, standards had achievement equivalent to or more
giving on-request administrations, and sharing prominent than those accomplished students utilizing
information between associations are viewed as a conventional approach. CBL is depicted as
essential objectives [8,14]. dynamic learning strategy that is centered around a
clinical, shared, or logical issues. Learning starts
II. RELATED WORK with an issue, inquiry, or question that the student
With a specific end goal to viably plan the IoT, we endeavors to understand. The student can endeavors
led a writing audit over different research areas, to take care of a particular issue while procuring
including IoT, CBL, and flipped learning. This area learning on the most proficient method to take care
for the most part talks about how IoT innovation has of different comparative issues. In view of these
been utilized as a part of the restorative space and preferences, a few specialists have connected CBL to
how CBL in a flipped situation has been connected medicinal training. Fish et al. [21] states that
to medicinal instruction. IoT is currently a develop Samford University got a concede to apply CBL in
idea and it has increased huge consideration as of undergrad instruction. CBL was incorporated into
late [15]. As per the Gartner study1 26 billion some nursing courses. This was fruitful and,
gadgets could speak with each other by 2020 with an therefore, CBL was executed over the whole
expected worldwide monetary increment of 1.9 educational modules. CBL was utilized viably in
trillion dollars. IoT has changed the scene of the grown-up wellbeing, psychological well-being,
virtual world for correspondence, data trade, pediatric and obstetrical nursing courses. CBL was
accessibility, and convenience. The ideas of gadget likewise utilized viably in non-clinical courses, for
to-gadget availability is depicted by IoT. In the example, pathophysiology, measurements, and
social insurance field, IoT has been abused for research. Besides, understudies examining
purposes extending from health applications [16] to prescription at the University of Missouri that
treatment and patient care, for example, utilizing graduated in the vicinity of 1993 and 1996
sensors for checking and continuous status discovery experienced a customary educational programs,
[12]. Notwithstanding wellbeing applications, IoT while understudies graduating in the vicinity of 1996
and 2006 experienced a CBL educational modules favored flipped learning over conventional
[22]. As a major aspect of both educational modules educational systems. Likewise, as per Street et al.
understudies, must pass a 'stage 1' test in their third [9], "The flipped classroom could be a helpful and
year examine before advancing to their fourth year. fruitful instructive approach in restorative
They should finish a 'stage 2' test keeping in mind educational program". With the innovation
the end goal to graduate. Since the presentation of accessible today, understudies take in more through
the CBL educational modules, these scores have direct communications rather than inactively viewing
risen altogether and stayed at the hoisted level. With a teacher. The present absence of such frameworks is
a flipped learning condition, the viability of CBL is one of the significant inspirations for our proposed
particularly made strides. The flipped classroom is flipped learning plan for restorative instruction.
an educational system in which the customary
address and task components of a course are flipped
or turned around [23]. Understudies can increase III. IOT-BASED FLIPPED LEARNING
important learning before the class session, while in- PLATFORM
class time is given to activities and dialog revolved This area depicts the engineering of the proposed
around applying the information. Ali et al. proposed IoT stage, portrays functionlity of its layers. The IoT
the Interactive Case-based Flipped Learning Tool incorporates highlights from existing stages and can
[11], which covers the definition of CBL in the be utilized as a part of restorative instruction, and in
flipped learning condition. The assessment comes addition different spaces. Fig. 1 outlines eight layers,
about demonstrates that the level of client fulfillment which are uniquely isolated into 2 obstructs based on
was amazingly high at around 70%. Aazam et al. correspondence and assets. The pieces are known as
[24] exhibited an asset administration and valuing the neighborhood and cloud handling squares. The
model for IoT by means of mist processing. The initial four layers including: Data Perception, Data
creators accentuated the handiness and significance Aggregation and Preprocessing Local Security, and
of client history while deciding the measure of asset Access Technologies handle correspondence and
required for each kind of administration. In any case, assets locally. The four outstanding layers include:
how their asset administration can be mapped to Cloud Security, Presentation, Application and
flipped learning isn't examined. It is an Service, and Business work at the cloud level. These
indistinguishable case from another investigation by layers cover numerous critical highlights including
similar creators displayed in [25], where a brilliant information interoperability for taking care of
portal engineering is talked about. The creators information heterogeneity, savvy portal
proposed a few kinds of administrations that require correspondence for diminishing system activity load,
brilliant and realtime basic leadership, which can be mist calculation for asset administration to maintain
performed by a middleware entryway. Our proposed a strategic distance from delays in data sharing,
work coordinates highlights from [24,25] and different levels of capacity and correspondence
includes these highlights by giving a design to IoT security, mistake taking care of while transcoding,
assets and framework that can be utilized as a part of application conveyance arrangements, and business
restorative training. Moreover, different stages and strategies. Also, these layers give cutting edge
frameworks are connected to gain constant security and protection measures for customized
information through IoT gadgets, for example, information, and in addition offering help for
Masimo Radical-7, the Freescale Home Health Hub application conveyance in private, open, and half
reference stage, Remote Patient Monitoring [19], the breed approaches. The full subtle elements of each
IoT-empowered versatile e-learning stage [26], and layer are examined beneath.
the Remote Monitoring and Management Platform
of Healthcare Information (RMMP-HI) [27]. These 3.1. Data perception layer
framework have been proposed or executed in The identification of devices is performed in this
particular areas for applications other than flipped layer. Devices are used to monitor, track, and store
learning or CBL in therapeutic training. Gilboy et al. patients' vital signs, statistics, or medical
[8] demonstrated that understudies unequivocally information. The devices include Google Gear,3
Google Glass,4 patient monitoring sensors, smart Application Protocol (WAP), Wi-Fi Protected
meters, wearable health monitoring sensors, video Access (WPA), and Transport Layer Security (TLS).
cameras, and smart phones.
3.4. Access technologies layer
3.2. Data aggregation and preprocessing layer Various access networks exist for communication
This layer is divided into Data Aggregation and Data with cloud resources, such as WiFi, WiBro, GPRS,
Preprocessing modules. The Data Aggregation LTE, etc. This layer selects an access technology
module deals with heterogeneous data based on the requirements and availability of service.
interoperability, load balancing, and smart data
communication issues , such as communicating only 3.5. Cloud security layer
when required by either storing data locally or Once data moves from local processing blocks to
temporarily, or discarding it when it is not required. cloud processing blocks, it becomes important to
This data aggregation and preprocessing require secure it from various types of cloudusers. Secured
resources that are not available in sparse sensor User profiling can also become an important issue.
nodes and other perception layer devices. Therefore, This layer handles storage security and user
fog computing is incorporated in this layer. Fog profiling. Security techniques are chosen based on
computing uses a small cloud that acts as an user profiling.
extension to the edge of the network [24]. In order to
perform complex tasks and filter communications, 3.6. Presentation layer
which sensors and light IoT devices are incapable of, The main purpose of this layer is to perform
we use smart gateways [25]. Similarly, the Data encoding, decoding, and error handling during data
Preprocessing module filters irrelevant data for faster transformation. This layer converts data into an
communications and transcodes it via encoding, understandable format, such as an ECG graph, pulse
decoding, and translation. rate, angiography, prescription text, picture, video
etc.
3.3. Local security layer
Security of patient information is a serious ethical 3.7. Application and service layer
issue. Patients are always cautious about sharing In this layer, Application Delivery Policies are
their personal medical data with others. In order to defined in terms of private, public or hybrid access.
secure temporary storage for fog to cloud Delivery policies are chosen based on the service
communication, the Local Security Layer is scope. Additionally, services are categorized based
introduced. This layer deals determines where on requirements ranging from ordinary user access to
security is required and which security techniques to admin user access. For example, one service may be
use. Additionally, security policies are defined in this separated into two parts. One part is accessible to
layer, as well as the decision of which operations every one, while the other part is restricted. The
must be encrypted. As far as where security is same categorization can be applied for medical
required, if the communication is local, temporary center administration and medical institutes.
storages is used which require local security.
Similarly, based on application requirements, it is 3.8. Business layer
determined whether communication will be fast or This layer handles business policies and services
slow. For example, in the case of patient monitoring, packages in terms of free use, or subscription rates.
where communication is urgent, security may not be The packages are offered based on the usage
affordable. Thus, this case requires fast requirements.
communication. The security technique chosen for
storage or communication protocols are determined IV. INTERACTIVE CASE-BASED
based on application requirements. For storage FLIP LEARNING TOOL
security, we use the Message-Digest algorithm
(ICBFLT)
(MD5), Rivest-Shamir-Adleman algorithm (RSA),
Digital-Signature-Algorithm (DSA), etc., while for
communication security, we use the Wireless
[11] M. Ali, H.S.M. Bilal, J. Hussain, S. Lee, [20] R. Jones, Problem-based learning:
B.H. Kang, An interactive case- based flip description, advantages, disadvantages,
learning tool for medical education, in: scenarios and facilitation, Anaesth.
Proceedings of the 13th International Intensive care 34 (4) (2006) 485.
Conference on Smart homes and health [21] T.T.T. FISH, If we teach them to fish:
Telematics (ICOST), Springer, 2015, pp. solving real nursing problems through
355–360. problem-based learning, Annual Review of
[12] A.J. Jara, M.A. Zamora, A.F. Skarmeta, Nursing Education volume 3, 2005:
An internet of things-based personal Strategies for Teaching, Assessment, and
device for diabetes therapy management in Program Planning, 2005, 109.
ambient assisted living (aal), Pers. [22] K. Hoffman, M. Hosokawa, R. Blake Jr, L.
Ubiquitous Comput. 15 (4) (2011) 431– Headrick, G. Johnson, Problem-based
440. learning outcomes: ten years of experience
[13] M. Fahim, M. Idris, R. Ali, C. Nugent, B. at the university of missouri?columbia
Kang, E.-N. Huh, S. Lee, Athena: a school of medicine, Acad. Med. 81 (7)
personalized platform to promote an active (2006) 617–625.
lifestyle and wellbeing based on physical, [23] J.L. Bishop, M.A. Verleger, The flipped
mental and social health primitives, classroom: a survey of the research, in:
Sensors 14 (5) (2014) 9313–9329. ASEE National Conference Proceedings,
[14] C.F. Herreid, N.A. Schiller, Case studies Atlanta, GA, , vol. 30 (9), 2013, pp. 1–18.
and the flipped classroom, J. Coll. Sci. [24] M. Aazam, E.-N. Huh, Fog computing
Teach. 42 (5) (2013) 62–66. micro datacenter based dynamic resource
[15] D. Evans, The internet of things: How the estimation and pricing model for iot, in:
next evolution of the internet is changing Proceedings. IEEE in: Proceedings of the
everything, in: CISCO white paper, vol. 1, 29th International Conference on
2011, p. 14. Advanced Information Networking and
[16] J. Gubbi, R. Buyya, S. Marusic, M. Applications (AINA), 2015, pp. 687–694.
Palaniswami, Internet of things (iot): a [25] M. Aazam, P.P. Hung, E.-N. Huh, Smart
vision, architectural elements, and future gateway based communication for cloud of
directions, Future Gener. Comput. Syst. 29 things, in: Proceedings of the Ninth
(7) (2013) 1645–1660. International Conference on Intelligent
[17] S. Hussain, J.H. Bang, M. Han, M.I. Sensors, Sensor Networks and Information
Ahmed, M.B. Amin, S. Lee, C. Nugent, S. Processing (ISSNIP), 2014, pp. 1–6.
McClean, B. Scotney, G. Parr, Behavior [26] C.-W. Chang, P. Lin, C.-W. Tseng, Y.-K.
life style analysis for mobile sensory data Kong, W.-C. Lien, M.-C. Wu, C.-Y. Wu,
in cloud computing through mapreduce, Poster: design and implementation of
Sensors 14 (11) (2014) 22001–22020. mobile e- learning platform for medical
[18] O. Banos, M.B. Amin, W.A. Khan, M. training, in: Proceedings of the 16th ACM
Afzel, M. Ahmad, M. Ali, T. Ali, International Symposium on Mobile Ad
S…….and Lee, An innovative platform Hoc Networking and Computing, ACM,
for person- centric health and wellness 2015, pp. 385–386.
support, in: Bioinformatics and [27] W. Zhao, C. Wang, Y. Nakahira, Medical
Biomedical Engineering, Springer, 2015, application on internet of things, in: IET
pp. 131–140. International Conference on
[19] D. Niewolny, How the internet of things is Communication Technology and
revolutionizing healthcare, in: White Application (ICCTA 2011), 2011, pp.
paper, 2013, pp. 1–8. 660–665.