Task
You are required to prepare for this Assessment Item by:
1. READING the Subject outline,
2. COMPLETING Topic 2 Project Planning
3. BUILDING your PLAN up from the ProjectTitle and Abstract in Assessment Task 1
WHAT TO DO:
1. Follow the Study Schedule and work with the Topics in Interact as they provide a "scaffold" for your learning in this subject.
2. Develop a detailed Capstone Project Proposal and Plan using project management software (as listed in the Study Schedule) and the skills you have acquired from IT Project Management to develop a project plan with a Work Breakdown Structure (WBS), milestones and Gantt chart. These tools may help.
1. MicrosoftProject Pro (http://office.microsoft.com/en-au/project/);
2. Open source tools like GanttProject (http://www.ganttproject.biz/);
3. OpenProj(http://sourceforge.net/projects/openproj/)
4. OpenProject (https://www.openproject.org/about).
5. ProjectLibre (http://www.projectlibre.org/)
3. Begin using the 'project blog' as a tool beyond the weekly progress reportsfor your chosen emerging technology topic:
1. The blog helps you to "think by writing" and also store your notes, project files and links in a cloud-based service.
2. Consider sharing the site with your peers as a way to tell a story and harness each other’s knowledge.
4. The blog is ideally updated each week with 3 or 4 entries for documenting your project notes and as the foundation for editing and writing the Capstone Project Report. An ideal blog entry will have around 50-150 words (150-600 words a week).
Presentation
Project Plan Sample Format
(subject to change or modified to include systems development projects)
1. Title: Emerging Technology and Innovation Topic
1. Project Blog ( Web address provided)
2. Weekly Progress Reports Plan (In class, Discussion Board or Project Blog entries)
2. Rationale
1. Problem domain
2. Purpose and justification
3. Supervisor Approval
4. Research Questions
5. Conceptual or Theoretical Framework
6. Methodology
1. Analysis of sources of information (EndNote, APA Referencing Style)
2. Research method(s)
3. Data collection or systems design methods
4. Ethical Issues
5. Compliance Requirements (Workplace, Industry or Government regulations)
7. Project Plan
1. Deliverables (Annotated Bibliography, Journal Paper, Report, Seminar)
2. Work breakdown structure (WBS)
3. Risk Analysis
4. Duration
5. Gantt chart
8. References
9. Appendix (if required)
Final project
Formulating Strategic Management Decisions
This final project is based on the following Harvard Business case study:
Khachatryan, D. (2014). Amarcord Incorporated: Combating money laundering using data analytics. Harvard Business Case Study. Retrieved from https://hbsp.harvard.edu/tu/789925b5
Assume your client accepted your urgent business proposal to design a data-driven approach to effectively accomplish the goal of fraud detection in financial institutions. Data analytics for fraud detection in financial institutions is the strat.
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxmanningchassidy
Term Paper: Managing an IT Infrastructure Audit
Due Week 10 and worth 210 points
This assignment consists of four (4) sections: an internal IT audit policy, a management plan, a project plan, and a disaster recovery plan.
You must submit all four (4) sections as separate files for the completion of this assignment.
Label each file name according to the section of the assignment it is written for. Additionally, you may create and /or assume all necessary assumptions needed for the completion of this assignment.
Imagine you are an Information Security Manager for a large national retailer. You have been hired to be directly responsible for the planning and oversight of IT audits. At the request of the Board of Directors, the CEO has tasked you with developing a plan for conducting regular audits of the IT infrastructure. The planning and management aspects of IT audit are critical to the overall success of the audit, and as a result, the overall success of the systems implemented within the organization. You must develop a policy for conducting IT audits and develop a project plan for conducting two week IT audits.
In addition to the typical networking and Internetworking infrastructure of a medium-sized organization, the organization has the following characteristics:
They have a main office and 268 stores in the U.S.
They utilize a cloud computing environment for storage and applications.
Their IT infrastructure includes Cisco workgroup and core switches, Cisco routers, Cisco firewalls and intrusion prevention systems, and servers running Microsoft Windows Server 2012.
They have over 1000 desktops and approximately 500 organization-owned laptops in the main headquarters.
They allow employees to bring their own devices into the organization; however, they are subject to being searched upon entry and exit from the building.
They enable remote access to corporate information assets for employees and limited access to extranet resources for contractors and other business partners.
They enable wireless access at the main office and the stores.
They process an average of 67.2 credit card transactions per hour every day at each location and via their corporate Website.
Section 1: Internal IT Audit Policy
Write a three to four (3-4) page paper in which you:
1. Develop an Internal IT Audit Policy, which includes at a minimum:
a. Overview
b. Scope
c. Goals and objectives
d. Compliance with applicable laws and regulations
e. Management oversight and responsibility
f. Areas covered in the IT audits
g. Frequency of the audits
h. Use at least two (2) quality resources in this assignment.
Note
: Wikipedia and similar Websites do not qualify as quality resources.
Section 2: Management Plan
Write a four to six (4-6) page paper in which you:
2. Explain the management plan for conducting IT audits, including:
a. Risk management
b. System Software and Applications
c. Wireless Networking
...
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woeleanorabarrington
erm Paper: Managing an IT Infrastructure Audit
Due Week 10 and worth 210 points
This assignment consists of four (4) sections: an internal IT audit policy, a management plan, a project plan, and a disaster recovery plan.
You must submit all four (4) sections as separate files for the completion of this assignment.
Label each file name according to the section of the assignment it is written for. Additionally, you may create and /or assume all necessary assumptions needed for the completion of this assignment.
Imagine you are an Information Security Manager for a large national retailer. You have been hired to be directly responsible for the planning and oversight of IT audits. At the request of the Board of Directors, the CEO has tasked you with developing a plan for conducting regular audits of the IT infrastructure. The planning and management aspects of IT audit are critical to the overall success of the audit, and as a result, the overall success of the systems implemented within the organization. You must develop a policy for conducting IT audits and develop a project plan for conducting two week IT audits.
In addition to the typical networking and Internetworking infrastructure of a medium-sized organization, the organization has the following characteristics:
They have a main office and 268 stores in the U.S.
They utilize a cloud computing environment for storage and applications.
Their IT infrastructure includes Cisco workgroup and core switches, Cisco routers, Cisco firewalls and intrusion prevention systems, and servers running Microsoft Windows Server 2012.
They have over 1000 desktops and approximately 500 organization-owned laptops in the main headquarters.
They allow employees to bring their own devices into the organization; however, they are subject to being searched upon entry and exit from the building.
They enable remote access to corporate information assets for employees and limited access to extranet resources for contractors and other business partners.
They enable wireless access at the main office and the stores.
They process an average of 67.2 credit card transactions per hour every day at each location and via their corporate Website.
Section 1: Internal IT Audit Policy
Write a three to four (3-4) page paper in which you:
1. Develop an Internal IT Audit Policy, which includes at a minimum:
a. Overview
b. Scope
c. Goals and objectives
d. Compliance with applicable laws and regulations
e. Management oversight and responsibility
f. Areas covered in the IT audits
g. Frequency of the audits
h. Use at least two (2) quality resources in this assignment.
Note
: Wikipedia and similar Websites do not qualify as quality resources.
Section 2: Management Plan
Write a four to six (4-6) page paper in which you:
2. Explain the management plan for conducting IT audits, including:
a. Risk management
b. System Software and Applications
c. Wireless Networking
d ...
Project Deliverable 2 Business Requirements1Project Deliverab.docxwkyra78
Project Deliverable 2: Business Requirements 1
Project Deliverable 2: Business Requirements 3
Project Deliverable 2: Business Requirements
Jessica Hill
Dr. Jan Felton
CIS 590: Directed Research Project
February 1, 2015
Table of Contents
1 Business Requirements……………………………………………………………….………3
1.1 Project Overview…………………………………………………………………….........3
1.2 Background including current process…………………………………………….3
1.3 Scope………………………………………………………………………………3
1.3.1 Scope of Project……………………………………………………….........4
1.3.2 Constraints and Assumptions……………………………………….............5
1.3.3. Risks…………………………………………………………………..........5
1.3.4. Scope Control ………………………………………………………………5
1.3.5. Relationship to Other Systems/Projects ……………………………………6
1.3.6. Definition of Terms (if applicable)………………………………………...6
1.1 Project Overview
This project is an information Technology project that was requested by WebFOCUS Company. The project is a development of a secure website that offers online advertisements, sharing, collection and storage of visual tools. The Website should be hosted in a cloud environment and should provide database functions for use in data warehousing
1.2 Background including current process
WebFOCUS was developed in order to generate profit through online advertisements as well as offshoring and outsourcing of business operations. Currently the business uses the relational database analysis. The company’s website in operated on both Windows and Mac OS X operating systems. In order to enhance virtualization, the company is seeking cloud computing services as well as data warehousing for data analysis purposes.
The project goals include;
a. Generation of profit through the charges on advertisement
b. Integration of database and operating systems in employee management.
c. Outsourcing work at a reduced cost (Olsen, 2006)
d. Developing a secure network infrastructure
e. The use of cloud computing to handle and share data
Tasks
a. Develop a website for advertisement
b. Install security measures
c. Integrate the website with cloud computing functionalities
d. Develop the outsourcing functionalities within the website
1.3 Scope
The scope of this project involves the determination and documentation of the project goals, deliverable, tasks, the cost and the deadlines.
1.3.1 Scope of the Project
Project Deliverables:
Scope Statement: This statement outlines the major activities to be carried out within the time allocated for the project. The scope statement’s goal is the financial analysis and financial documents regarding the operation of the project. The cost incurred and the revenue generated can be compared to observe the progress of the project.
Progress Reports: These include the process and the stages at which the project is undergoing. For the development of secure network infrastructure, the progress report deliverables would be network firewall types, authenticati ...
Cis 599 Enthusiastic Study / snaptutorial.comStephenson7
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 120 points
This assignment consists of two (2) sections: a project introduction and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
Business RequirementsReference number Document ControlTawnaDelatorrejs
Business Requirements
Reference number:
Document Control
Change Record
Date
Author
Version
Change Reference
Reviewers
Name
Position
Table of Contents
2Document Control
1
Business Requirements
4
1.1
Project Overview
4
1.2
Background including current process
4
1.3
Scope
4
1.3.1
Scope of Project
4
1.3.2
Constraints and Assumptions
5
1.3.3
Risks
5
1.3.4
Scope Control
5
1.3.5
Relationship to Other Systems/Projects
5
1.3.6
Definition of Terms (if applicable)
5
1 Business Requirements
1.1 Project Overview
Provide a short, yet complete, overview of the project.
1.2 Background including current process
Describe the background to the project, (same section may be reused in the Quality Plan) include:
This project is
The project goal is to
The IT role for this project is
1.3 Scope
1.3.1 Scope of Project
The scope of this project includes a number of areas. For each area, there should be a corresponding strategy for incorporating these areas into the overall project.
Applications
In order to meet the target production date, only these applications will be implemented:
Sites
These sites are considered part of the implementation:
Process Re-engineering
Re-engineering will
Customization
Customizations will be limited to
Interfaces
the interfaces included are:
Architecture
Application and Technical Architecture will
Conversion
Only the following data and volume will be considered for conversion:
Testing
Testing will include only
Funding
Project funding is limited to
Training
Training will be
Education
Education will include
1.3.2 Constraints and Assumptions
The following constraints have been identified:
The following assumptions have been made in defining the scope, objectives and approach:
1.3.3 Risks
The following risks have been identified as possibly affecting the project during its progression:
1.3.4 Scope Control
The control of changes to the scope identified in this document will be managed through the Change Control, with business owner representative approval for any changes that affect cost or timeline for the project.
1.3.5 Relationship to Other Systems/Projects
It is the responsibility of the business unit to inform IT of other business initiatives that may impact the project. The following are known business initiatives:
1.3.6 Definition of Terms (if applicable)
List any definitions that will be used throughout the duration of the project.
5
Project Deliverable 1: Project Plan Inception
Overview
This assignment consists of two sections: a project introduction and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and/or assume all necessary assumptions needed for the completion of this assignment.
You are currently the Chief Information Officer (CIO) for an innovative Internet-based compa ...
For more classes visit
www.snaptutorial.com
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 50 points
This assignment consists of two (2) sections: a project introduction and a Gantt chart or project plan.You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxmanningchassidy
Term Paper: Managing an IT Infrastructure Audit
Due Week 10 and worth 210 points
This assignment consists of four (4) sections: an internal IT audit policy, a management plan, a project plan, and a disaster recovery plan.
You must submit all four (4) sections as separate files for the completion of this assignment.
Label each file name according to the section of the assignment it is written for. Additionally, you may create and /or assume all necessary assumptions needed for the completion of this assignment.
Imagine you are an Information Security Manager for a large national retailer. You have been hired to be directly responsible for the planning and oversight of IT audits. At the request of the Board of Directors, the CEO has tasked you with developing a plan for conducting regular audits of the IT infrastructure. The planning and management aspects of IT audit are critical to the overall success of the audit, and as a result, the overall success of the systems implemented within the organization. You must develop a policy for conducting IT audits and develop a project plan for conducting two week IT audits.
In addition to the typical networking and Internetworking infrastructure of a medium-sized organization, the organization has the following characteristics:
They have a main office and 268 stores in the U.S.
They utilize a cloud computing environment for storage and applications.
Their IT infrastructure includes Cisco workgroup and core switches, Cisco routers, Cisco firewalls and intrusion prevention systems, and servers running Microsoft Windows Server 2012.
They have over 1000 desktops and approximately 500 organization-owned laptops in the main headquarters.
They allow employees to bring their own devices into the organization; however, they are subject to being searched upon entry and exit from the building.
They enable remote access to corporate information assets for employees and limited access to extranet resources for contractors and other business partners.
They enable wireless access at the main office and the stores.
They process an average of 67.2 credit card transactions per hour every day at each location and via their corporate Website.
Section 1: Internal IT Audit Policy
Write a three to four (3-4) page paper in which you:
1. Develop an Internal IT Audit Policy, which includes at a minimum:
a. Overview
b. Scope
c. Goals and objectives
d. Compliance with applicable laws and regulations
e. Management oversight and responsibility
f. Areas covered in the IT audits
g. Frequency of the audits
h. Use at least two (2) quality resources in this assignment.
Note
: Wikipedia and similar Websites do not qualify as quality resources.
Section 2: Management Plan
Write a four to six (4-6) page paper in which you:
2. Explain the management plan for conducting IT audits, including:
a. Risk management
b. System Software and Applications
c. Wireless Networking
...
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woeleanorabarrington
erm Paper: Managing an IT Infrastructure Audit
Due Week 10 and worth 210 points
This assignment consists of four (4) sections: an internal IT audit policy, a management plan, a project plan, and a disaster recovery plan.
You must submit all four (4) sections as separate files for the completion of this assignment.
Label each file name according to the section of the assignment it is written for. Additionally, you may create and /or assume all necessary assumptions needed for the completion of this assignment.
Imagine you are an Information Security Manager for a large national retailer. You have been hired to be directly responsible for the planning and oversight of IT audits. At the request of the Board of Directors, the CEO has tasked you with developing a plan for conducting regular audits of the IT infrastructure. The planning and management aspects of IT audit are critical to the overall success of the audit, and as a result, the overall success of the systems implemented within the organization. You must develop a policy for conducting IT audits and develop a project plan for conducting two week IT audits.
In addition to the typical networking and Internetworking infrastructure of a medium-sized organization, the organization has the following characteristics:
They have a main office and 268 stores in the U.S.
They utilize a cloud computing environment for storage and applications.
Their IT infrastructure includes Cisco workgroup and core switches, Cisco routers, Cisco firewalls and intrusion prevention systems, and servers running Microsoft Windows Server 2012.
They have over 1000 desktops and approximately 500 organization-owned laptops in the main headquarters.
They allow employees to bring their own devices into the organization; however, they are subject to being searched upon entry and exit from the building.
They enable remote access to corporate information assets for employees and limited access to extranet resources for contractors and other business partners.
They enable wireless access at the main office and the stores.
They process an average of 67.2 credit card transactions per hour every day at each location and via their corporate Website.
Section 1: Internal IT Audit Policy
Write a three to four (3-4) page paper in which you:
1. Develop an Internal IT Audit Policy, which includes at a minimum:
a. Overview
b. Scope
c. Goals and objectives
d. Compliance with applicable laws and regulations
e. Management oversight and responsibility
f. Areas covered in the IT audits
g. Frequency of the audits
h. Use at least two (2) quality resources in this assignment.
Note
: Wikipedia and similar Websites do not qualify as quality resources.
Section 2: Management Plan
Write a four to six (4-6) page paper in which you:
2. Explain the management plan for conducting IT audits, including:
a. Risk management
b. System Software and Applications
c. Wireless Networking
d ...
Project Deliverable 2 Business Requirements1Project Deliverab.docxwkyra78
Project Deliverable 2: Business Requirements 1
Project Deliverable 2: Business Requirements 3
Project Deliverable 2: Business Requirements
Jessica Hill
Dr. Jan Felton
CIS 590: Directed Research Project
February 1, 2015
Table of Contents
1 Business Requirements……………………………………………………………….………3
1.1 Project Overview…………………………………………………………………….........3
1.2 Background including current process…………………………………………….3
1.3 Scope………………………………………………………………………………3
1.3.1 Scope of Project……………………………………………………….........4
1.3.2 Constraints and Assumptions……………………………………….............5
1.3.3. Risks…………………………………………………………………..........5
1.3.4. Scope Control ………………………………………………………………5
1.3.5. Relationship to Other Systems/Projects ……………………………………6
1.3.6. Definition of Terms (if applicable)………………………………………...6
1.1 Project Overview
This project is an information Technology project that was requested by WebFOCUS Company. The project is a development of a secure website that offers online advertisements, sharing, collection and storage of visual tools. The Website should be hosted in a cloud environment and should provide database functions for use in data warehousing
1.2 Background including current process
WebFOCUS was developed in order to generate profit through online advertisements as well as offshoring and outsourcing of business operations. Currently the business uses the relational database analysis. The company’s website in operated on both Windows and Mac OS X operating systems. In order to enhance virtualization, the company is seeking cloud computing services as well as data warehousing for data analysis purposes.
The project goals include;
a. Generation of profit through the charges on advertisement
b. Integration of database and operating systems in employee management.
c. Outsourcing work at a reduced cost (Olsen, 2006)
d. Developing a secure network infrastructure
e. The use of cloud computing to handle and share data
Tasks
a. Develop a website for advertisement
b. Install security measures
c. Integrate the website with cloud computing functionalities
d. Develop the outsourcing functionalities within the website
1.3 Scope
The scope of this project involves the determination and documentation of the project goals, deliverable, tasks, the cost and the deadlines.
1.3.1 Scope of the Project
Project Deliverables:
Scope Statement: This statement outlines the major activities to be carried out within the time allocated for the project. The scope statement’s goal is the financial analysis and financial documents regarding the operation of the project. The cost incurred and the revenue generated can be compared to observe the progress of the project.
Progress Reports: These include the process and the stages at which the project is undergoing. For the development of secure network infrastructure, the progress report deliverables would be network firewall types, authenticati ...
Cis 599 Enthusiastic Study / snaptutorial.comStephenson7
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 120 points
This assignment consists of two (2) sections: a project introduction and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
Business RequirementsReference number Document ControlTawnaDelatorrejs
Business Requirements
Reference number:
Document Control
Change Record
Date
Author
Version
Change Reference
Reviewers
Name
Position
Table of Contents
2Document Control
1
Business Requirements
4
1.1
Project Overview
4
1.2
Background including current process
4
1.3
Scope
4
1.3.1
Scope of Project
4
1.3.2
Constraints and Assumptions
5
1.3.3
Risks
5
1.3.4
Scope Control
5
1.3.5
Relationship to Other Systems/Projects
5
1.3.6
Definition of Terms (if applicable)
5
1 Business Requirements
1.1 Project Overview
Provide a short, yet complete, overview of the project.
1.2 Background including current process
Describe the background to the project, (same section may be reused in the Quality Plan) include:
This project is
The project goal is to
The IT role for this project is
1.3 Scope
1.3.1 Scope of Project
The scope of this project includes a number of areas. For each area, there should be a corresponding strategy for incorporating these areas into the overall project.
Applications
In order to meet the target production date, only these applications will be implemented:
Sites
These sites are considered part of the implementation:
Process Re-engineering
Re-engineering will
Customization
Customizations will be limited to
Interfaces
the interfaces included are:
Architecture
Application and Technical Architecture will
Conversion
Only the following data and volume will be considered for conversion:
Testing
Testing will include only
Funding
Project funding is limited to
Training
Training will be
Education
Education will include
1.3.2 Constraints and Assumptions
The following constraints have been identified:
The following assumptions have been made in defining the scope, objectives and approach:
1.3.3 Risks
The following risks have been identified as possibly affecting the project during its progression:
1.3.4 Scope Control
The control of changes to the scope identified in this document will be managed through the Change Control, with business owner representative approval for any changes that affect cost or timeline for the project.
1.3.5 Relationship to Other Systems/Projects
It is the responsibility of the business unit to inform IT of other business initiatives that may impact the project. The following are known business initiatives:
1.3.6 Definition of Terms (if applicable)
List any definitions that will be used throughout the duration of the project.
5
Project Deliverable 1: Project Plan Inception
Overview
This assignment consists of two sections: a project introduction and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and/or assume all necessary assumptions needed for the completion of this assignment.
You are currently the Chief Information Officer (CIO) for an innovative Internet-based compa ...
For more classes visit
www.snaptutorial.com
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 50 points
This assignment consists of two (2) sections: a project introduction and a Gantt chart or project plan.You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary
For more classes visit
www.snaptutorial.com
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 50 points
This assignment consists of two (2) sections: a project introduction and a Gantt chart or project plan.You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
Capstone Project OverviewThe purpose of this capstone project is.docxhumphrieskalyn
Capstone Project Overview
The purpose of this capstone project is for students to assume a senior management approach and apply project management techniques to create an integrative information technology solution to address organizational issues in order to satisfy an executive team and venture capital group. Students will critically assess existing information systems infrastructures, emerging technologies, and how enabling technologies affect organizational strategy. Deliverables 1 through 6 focus on preparing students toward the final capstone project. Skills, experience, and knowledge gained through the completion of prerequisite courses will be used throughout each deliverable. The project contents to be addressed are as follows:
1. Project Deliverable 1: Project Plan Inception.In this deliverable, you will create a project introduction that includes background information of the company, the type of business that the company is involved in, speculation upon outsourcing and offshoring opportunities, identification of skilled information systems personnel need for project, specific types of data that the company collects, and a description of the integrative information systems that the company should have to support the business. You will also create a project plan to record tasks, subtasks, and resources, and identify the schedule of the project. Additionally, the plan will outline the planning, analysis, design, and implementation phases of your project.
Submission Requirements
0. Project Introduction (MS Word)
0. Project Plan (MS Project)
1. Project Deliverable 2: Business Requirements. In this deliverable, you will create an original business requirements document for the project plan using the template provided under Additional Resources in the Student Center tab of the online course shell. You will be asked to describe the detailed project including the scope, possible risks, constraints, and assumptions, integration with other systems and infrastructure, and relevant terms that will be used throughout project. You will also need to update the project plan.
Submission Requirements
0. Business Requirements Document (MS Word)
0. Revised Project Plan (MS Project)
1. Project Deliverable 3: Database and Data Warehousing Design.In this deliverable, you will create a database schema that supports the company’s business and processes, explain and support the database schema, create database tables, normalize the database tables, create an Entity-Relationship (E-R) Diagram and create a Data Flow Diagram (DFD). You will also be asked to create sample queries that will support the organizational reporting needs and screen layouts that illustrate the interface that organizational users will utilize. You will need to update the project plan.
Submission Requirements
0. Design Document (MS Word)
0. Revised Project Plan (MS Project)
1. Project Deliverable 4: Analytics, Interfaces, and Cloud Technology. In this deliverable, you will support t ...
Hospitals currently use a manual system for visiting Doctor Slip as a token. The current system
requires numerous paper forms, with data stores spread throughout the hospital management infrastructure.
Often information (on forms) is incomplete, or does not follow management standards. Forms are often lost
in transit between departments requiring a comprehensive auditing process to ensure that no vital
information is lost. Multiple copies of the same information exist in the hospital and may lead to
inconsistencies in data in various data stores.
A significant part of the operation of any hospital involves the acquisition, management and timely
retrieval of great volumes of information. This information typically involves; Doctor, Room, Department
and Patient personal Information. All of this information must be managed in an efficient and cost wise
fashion so that an institution's resources may be effectively utilized Hospital E-Token management will
automate the management of the hospital making it more efficient and error free for outdoor patient. It aims
at standardizing data, consolidating data ensuring data integrity and reducing inconsistencies.
[Insert project title, e.g. Cosmo Inc.”] Project Scope State.docxgerardkortney
[Insert project title, e.g. “Cosmo Inc.”]: Project Scope Statement[Insert learner name]Capella UniversityProject Scope Statement
Note: Any work not explicitly included in the Project Scope Statement is implicitly excluded from the project.
Project Name
Prepared By
Date
(MM/DD/YYYY)Version History (insert rows as needed):VersionDateComments
1.0
1. Executive Summary
Provide below a brief overview of this project (for example, project purpose and justification).
Note: In any instance where there is a discrepancy between the Project Charter and the Project Scope Statement, the latter is considered authoritative.2. Business Objectives2.1 Product Description (
Solution
)
2.2 Business Objectives
3. Project Description
For each area below, provide sufficient detail to define this project adequately.3.1 Project Scope
Includes (list deliverables):
Does not include:
3.2 Dependencies (External and Internal)
3.3 Assumptions
3.4 Constraints
4. Project MilestonesTarget Date
Project Start
Project Complete
5. Project Approach
Briefly describe how each of the following will be handled. Provide links to relevant documents as appropriate. 5.1 Change Management
5.2 Communication Management
5.3 Quality Management
5.4 Resource Management
5.5 Critical Success Factors
5.6 Risk Management
5.7 Project Organization
6. AuthorizationsThe Project Scope Statement is approved by the:
Project Sponsor
Project Manager
Project performance baseline changes will be approved by the:
Project Sponsor
Project Manager
Project deliverables will be approved and accepted by the:
Project Sponsor
Key Stakeholders
7. Project Scope Statement ApprovalProject Name
Project Manager
The purpose of this document is to provide a vehicle for documenting the initial planning efforts for the project. It is used to reach a satisfactory level of mutual agreement between the Project Manager and the Project Sponsors and Owners with respect to the objectives and scope of the project before significant resources are committed and expenses incurred.
I have reviewed the information contained in this Project Scope Statement and agree:NameRoleSignatureDate
The signatures above indicate an understanding of the purpose and content of this document by those signing it. By signing this document, they agree to this as the formal Project Scope Statement document.
References
2
PM5018 Business Case
PM5018 Business CaseCosmo, Inc.
Cosmo, Inc. is a leader in the development and distribution of wearable technology, including fitness coaching, nutritional coaching, and lifestyle advising products. The company holds a 33-percent market share in the wearable technology category. After doing marketing analysis, senior leadership realizes the onset of competition could negatively impact future earnings.
CEO and President Harold Living tells his leadership Cosmo, Inc. needs a new marketing strategy to not only increase market share but to maintain current le.
CIS 498 Effective Communication - snaptutorial.comdonaldzs1
For more classes visit
www.snaptutorial.com
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 50 points
This assignment consists of two (2) sections: a project introduction and a Gantt chart or project plan.
For more classes visit
www.snaptutorial.com
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 110 points
This assignment consists of two (2) sections: a project introduction and a project plan. You must submit both
Cis 499 Enthusiastic Study / snaptutorial.comStephenson05
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 110 points
This assignment consists of two (2) sections: a project introduction and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
Enterprise Architecture - An Introduction Daljit Banger
The Slides are from my session at "An Evening of Enterprise Architecture Awareness" held at theUniversity of Sussex Hosted by the BCS Local Chapter and facilitated by the BCS EA Specialist Group.
Project NameYour Full NameCourse Number and Name (As i.docxwkyra78
Project Name
Your Full Name
Course Number and Name (As it appears on your Course Guide.)
Professor’s Name (As it appears on your Course Guide.)
University Name (As it appears on the Course Guide.)
Date (Month must be spelled out. Use the date that the paper is due.)
*
*
*
Project Description & ObjectivesDescribe the project in non-technical terms.Describe the project objectives and how the project has met each objective.Explanation #1Explanation #2Explanation #3State the project scope statement. Detail the requirements of the project.Adhere to quality management.
*
*
*
Work Breakdown Structure (WBS)Insert the WBS.Highlight brief task explanation on the slide but explain thoroughly on the speaker notes.
*
Project Schedule and MilestonesCreate timeline.List activity sequences and durations.Indicate the critical path.
*
Project Human Resource ManagementIdentify stakeholders.Indicate the project team matrix (weak, balanced, and strong).Explain how the project team was developed and managed.Identify procurement management, i.e., vendors, contractors, suppliers, etc.
*
Project CostEstablish the approved budget.Identify the cost for the resources.State the cost of the project. (Is it under or over budget?)Note the technology used with associated cost.BenefitsDrawbacks or barriers
*
Project CommunicationsEnsure that all project information is collected, documented, and archived.Distribute and share information with stakeholders, management, and project team members.Identify risks.Qualitative RisksQuantitative Risks
*
Competitive Analysis
*
*
*
Competitive Analysis, Cont.
*
*
*
Procedures
*
*
*
Assumptions, Constraints & DependenciesIdentify the assumptions used to determine the project scope.Evaluate project’s success from these assumptions.Evaluate project’s obstacles from these assumptions.Explain the scope, time, and cost constraints.List any dependencies. Explain.
*
Project Lessons LearnedRecommend methods to avoid similar obstacles in future projects.List of six (6) best practices arising from this project.#1#2#3#4#5#6
*
Next Steps
NOTE: Is there another phase for this project? What is the project closure?
*High-level GoalsRelationshipUltimate Goal
*
*
ReferencesYou must use references that coincide with the in-text citations in your presentation written in correct APA format. All references should come from Strayer University databases such as EbscoHost, eLibrary, ProQuest, etc. If your professor allows use of the internet avoid using .com sites, but you may use .org or .gov sites that are copyrighted.
*
ABC: INFORMATION TECHNOLOGY PROJECT CHARTER
Name:
Institutional Affiliation:
1.0. INTRODUCTIONPurpose of INFORMATION TECHNOLOGY Project Charterthe abc’s INFORMATIONA tECHNONOLOGY pROJECT PROPOSAL charter documents a research and formulation of a surveillance security system which is targeted to appraise in ...
Develop a detailed outline for the data collection plan to include .docxbradburgess22840
Develop a detailed outline for the data collection plan to include: (1) required permissions for use of instruments and/or sources of data, (2) proposed sampling approach, (3) detailed data collection steps for each of the instruments and data sources, and (4) a data management plan.
Incorporate instructor feedback on your post to revise the Sources of Data/Instruments and Data Collection sections of the prospectus.
.
Develop a 3–4 page research paper based on a selected case study rel.docxbradburgess22840
Develop a 3–4 page research paper based on a selected case study related to reproductive choices. Since the processes of reproduction and birth represent one of the potential biological outcomes of heterosexual activity, it is important to examine the biological foundations of human sexuality. This includes knowledge of fertilization and early development, including some of the most recent findings. There is more than a litany of birth control methods; this assessment offers a sound basis for understanding the issues to be weighed in personal decision making about contraception and abortion, which continue to generate debate and controversy.
By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and assessment criteria:
Competency 1: Apply psychological theories to topics in human sexuality.
Apply psychological theories to a case study in human sexuality.
Competency 2: Apply scholarly research findings to topics in human sexuality.
Apply scholarly research findings to a case study in human sexuality.
Competency 3: Explain how ethics inform professional behavior in the field of human sexuality.
Explain how ethics inform professional behavior in the field of human sexuality.
Competency 4: Communicate in a manner that is scholarly, professional, and consistent with expectations for professionals in the field of psychology.
Write coherently to support a central idea with correct grammar, usage, and mechanics as expected of a psychology professional.
Use APA format and style.
APA Resources
Because this is a psychology course, you need to format this assessment according to APA guidelines. Additional resources about APA can be found in the Research Resources in the left navigation menu of your courseroom. Use the resources to guide your work as needed.
American Psychological Association. (2010).
Publication manual of the American Psychological Association
(6th ed.). Washington, DC: Author.
Available from the
bookstore
.
APA Paper Template [DOCX]
.
Required Resources
The following resource is required to complete the assessment.
Human Sexuality Case Studies: Sexuality Confronts Social Policy
|
Transcript
.
Suggested Resources
The resources provided here are optional and support the assessment. They provide helpful information about the topics. You may use other resources of your choice to prepare for this assessment; however, you will need to ensure that they are appropriate, credible, and valid. The
PSYC-FP2800 – Introduction to Human Sexuality Library Guide
can help direct your research. The Supplemental Resources and Research Resources, both linked from the left navigation menu in your courseroom, provide additional resources to help support you.
Human Sexuality and Reproductive Choices
Kelly, G. F. (2015).
Sexuality today
(11th ed.). New York, NY: McGraw-Hill.
Available from the
bookstore
.
Chapter 10, "Reprod.
Develop a 5- to 6-slide PowerPoint presentation for a staff meet.docxbradburgess22840
Develop a 5- to 6-slide PowerPoint presentation for a staff meeting that addresses the following:
Identify your selected transition of care. ------" Transitions of care” refer to the movement of patients between health care practitioners, settings, and home as their condition and care need change. For example, a patient might receive care from a primary care physician or specialist in an outpatient setting, then transition to a hospital physician and nursing team during an inpatient admission before moving on to yet another care team at a skilled nursing facility. Finally, the patient might return home, where he or she may receive care from a visiting nurse or support from a family member or friend.
Explain how you, as a nurse leader, along with your healthcare team, would apply systems thinking when providing a transition of care aligned with the IHI Quadruple Aim framework in order to improve it. Explain what the fourth aim in your strategy would be and why.
These are the four areas:
Experience of care
Population health
Per capita cost
Care team well-being
Describe the key stakeholders that might be involved in this transition of care and how you would engage and influence them to improve the transition of care processes.
Explain how systems thinking would inform your improvement plan for your transition of care.
.
More Related Content
Similar to TaskYou are required to prepare for this Assessment Item by1..docx
For more classes visit
www.snaptutorial.com
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 50 points
This assignment consists of two (2) sections: a project introduction and a Gantt chart or project plan.You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
Capstone Project OverviewThe purpose of this capstone project is.docxhumphrieskalyn
Capstone Project Overview
The purpose of this capstone project is for students to assume a senior management approach and apply project management techniques to create an integrative information technology solution to address organizational issues in order to satisfy an executive team and venture capital group. Students will critically assess existing information systems infrastructures, emerging technologies, and how enabling technologies affect organizational strategy. Deliverables 1 through 6 focus on preparing students toward the final capstone project. Skills, experience, and knowledge gained through the completion of prerequisite courses will be used throughout each deliverable. The project contents to be addressed are as follows:
1. Project Deliverable 1: Project Plan Inception.In this deliverable, you will create a project introduction that includes background information of the company, the type of business that the company is involved in, speculation upon outsourcing and offshoring opportunities, identification of skilled information systems personnel need for project, specific types of data that the company collects, and a description of the integrative information systems that the company should have to support the business. You will also create a project plan to record tasks, subtasks, and resources, and identify the schedule of the project. Additionally, the plan will outline the planning, analysis, design, and implementation phases of your project.
Submission Requirements
0. Project Introduction (MS Word)
0. Project Plan (MS Project)
1. Project Deliverable 2: Business Requirements. In this deliverable, you will create an original business requirements document for the project plan using the template provided under Additional Resources in the Student Center tab of the online course shell. You will be asked to describe the detailed project including the scope, possible risks, constraints, and assumptions, integration with other systems and infrastructure, and relevant terms that will be used throughout project. You will also need to update the project plan.
Submission Requirements
0. Business Requirements Document (MS Word)
0. Revised Project Plan (MS Project)
1. Project Deliverable 3: Database and Data Warehousing Design.In this deliverable, you will create a database schema that supports the company’s business and processes, explain and support the database schema, create database tables, normalize the database tables, create an Entity-Relationship (E-R) Diagram and create a Data Flow Diagram (DFD). You will also be asked to create sample queries that will support the organizational reporting needs and screen layouts that illustrate the interface that organizational users will utilize. You will need to update the project plan.
Submission Requirements
0. Design Document (MS Word)
0. Revised Project Plan (MS Project)
1. Project Deliverable 4: Analytics, Interfaces, and Cloud Technology. In this deliverable, you will support t ...
Hospitals currently use a manual system for visiting Doctor Slip as a token. The current system
requires numerous paper forms, with data stores spread throughout the hospital management infrastructure.
Often information (on forms) is incomplete, or does not follow management standards. Forms are often lost
in transit between departments requiring a comprehensive auditing process to ensure that no vital
information is lost. Multiple copies of the same information exist in the hospital and may lead to
inconsistencies in data in various data stores.
A significant part of the operation of any hospital involves the acquisition, management and timely
retrieval of great volumes of information. This information typically involves; Doctor, Room, Department
and Patient personal Information. All of this information must be managed in an efficient and cost wise
fashion so that an institution's resources may be effectively utilized Hospital E-Token management will
automate the management of the hospital making it more efficient and error free for outdoor patient. It aims
at standardizing data, consolidating data ensuring data integrity and reducing inconsistencies.
[Insert project title, e.g. Cosmo Inc.”] Project Scope State.docxgerardkortney
[Insert project title, e.g. “Cosmo Inc.”]: Project Scope Statement[Insert learner name]Capella UniversityProject Scope Statement
Note: Any work not explicitly included in the Project Scope Statement is implicitly excluded from the project.
Project Name
Prepared By
Date
(MM/DD/YYYY)Version History (insert rows as needed):VersionDateComments
1.0
1. Executive Summary
Provide below a brief overview of this project (for example, project purpose and justification).
Note: In any instance where there is a discrepancy between the Project Charter and the Project Scope Statement, the latter is considered authoritative.2. Business Objectives2.1 Product Description (
Solution
)
2.2 Business Objectives
3. Project Description
For each area below, provide sufficient detail to define this project adequately.3.1 Project Scope
Includes (list deliverables):
Does not include:
3.2 Dependencies (External and Internal)
3.3 Assumptions
3.4 Constraints
4. Project MilestonesTarget Date
Project Start
Project Complete
5. Project Approach
Briefly describe how each of the following will be handled. Provide links to relevant documents as appropriate. 5.1 Change Management
5.2 Communication Management
5.3 Quality Management
5.4 Resource Management
5.5 Critical Success Factors
5.6 Risk Management
5.7 Project Organization
6. AuthorizationsThe Project Scope Statement is approved by the:
Project Sponsor
Project Manager
Project performance baseline changes will be approved by the:
Project Sponsor
Project Manager
Project deliverables will be approved and accepted by the:
Project Sponsor
Key Stakeholders
7. Project Scope Statement ApprovalProject Name
Project Manager
The purpose of this document is to provide a vehicle for documenting the initial planning efforts for the project. It is used to reach a satisfactory level of mutual agreement between the Project Manager and the Project Sponsors and Owners with respect to the objectives and scope of the project before significant resources are committed and expenses incurred.
I have reviewed the information contained in this Project Scope Statement and agree:NameRoleSignatureDate
The signatures above indicate an understanding of the purpose and content of this document by those signing it. By signing this document, they agree to this as the formal Project Scope Statement document.
References
2
PM5018 Business Case
PM5018 Business CaseCosmo, Inc.
Cosmo, Inc. is a leader in the development and distribution of wearable technology, including fitness coaching, nutritional coaching, and lifestyle advising products. The company holds a 33-percent market share in the wearable technology category. After doing marketing analysis, senior leadership realizes the onset of competition could negatively impact future earnings.
CEO and President Harold Living tells his leadership Cosmo, Inc. needs a new marketing strategy to not only increase market share but to maintain current le.
CIS 498 Effective Communication - snaptutorial.comdonaldzs1
For more classes visit
www.snaptutorial.com
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 50 points
This assignment consists of two (2) sections: a project introduction and a Gantt chart or project plan.
For more classes visit
www.snaptutorial.com
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 110 points
This assignment consists of two (2) sections: a project introduction and a project plan. You must submit both
Cis 499 Enthusiastic Study / snaptutorial.comStephenson05
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 110 points
This assignment consists of two (2) sections: a project introduction and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
Enterprise Architecture - An Introduction Daljit Banger
The Slides are from my session at "An Evening of Enterprise Architecture Awareness" held at theUniversity of Sussex Hosted by the BCS Local Chapter and facilitated by the BCS EA Specialist Group.
Project NameYour Full NameCourse Number and Name (As i.docxwkyra78
Project Name
Your Full Name
Course Number and Name (As it appears on your Course Guide.)
Professor’s Name (As it appears on your Course Guide.)
University Name (As it appears on the Course Guide.)
Date (Month must be spelled out. Use the date that the paper is due.)
*
*
*
Project Description & ObjectivesDescribe the project in non-technical terms.Describe the project objectives and how the project has met each objective.Explanation #1Explanation #2Explanation #3State the project scope statement. Detail the requirements of the project.Adhere to quality management.
*
*
*
Work Breakdown Structure (WBS)Insert the WBS.Highlight brief task explanation on the slide but explain thoroughly on the speaker notes.
*
Project Schedule and MilestonesCreate timeline.List activity sequences and durations.Indicate the critical path.
*
Project Human Resource ManagementIdentify stakeholders.Indicate the project team matrix (weak, balanced, and strong).Explain how the project team was developed and managed.Identify procurement management, i.e., vendors, contractors, suppliers, etc.
*
Project CostEstablish the approved budget.Identify the cost for the resources.State the cost of the project. (Is it under or over budget?)Note the technology used with associated cost.BenefitsDrawbacks or barriers
*
Project CommunicationsEnsure that all project information is collected, documented, and archived.Distribute and share information with stakeholders, management, and project team members.Identify risks.Qualitative RisksQuantitative Risks
*
Competitive Analysis
*
*
*
Competitive Analysis, Cont.
*
*
*
Procedures
*
*
*
Assumptions, Constraints & DependenciesIdentify the assumptions used to determine the project scope.Evaluate project’s success from these assumptions.Evaluate project’s obstacles from these assumptions.Explain the scope, time, and cost constraints.List any dependencies. Explain.
*
Project Lessons LearnedRecommend methods to avoid similar obstacles in future projects.List of six (6) best practices arising from this project.#1#2#3#4#5#6
*
Next Steps
NOTE: Is there another phase for this project? What is the project closure?
*High-level GoalsRelationshipUltimate Goal
*
*
ReferencesYou must use references that coincide with the in-text citations in your presentation written in correct APA format. All references should come from Strayer University databases such as EbscoHost, eLibrary, ProQuest, etc. If your professor allows use of the internet avoid using .com sites, but you may use .org or .gov sites that are copyrighted.
*
ABC: INFORMATION TECHNOLOGY PROJECT CHARTER
Name:
Institutional Affiliation:
1.0. INTRODUCTIONPurpose of INFORMATION TECHNOLOGY Project Charterthe abc’s INFORMATIONA tECHNONOLOGY pROJECT PROPOSAL charter documents a research and formulation of a surveillance security system which is targeted to appraise in ...
Similar to TaskYou are required to prepare for this Assessment Item by1..docx (19)
Develop a detailed outline for the data collection plan to include .docxbradburgess22840
Develop a detailed outline for the data collection plan to include: (1) required permissions for use of instruments and/or sources of data, (2) proposed sampling approach, (3) detailed data collection steps for each of the instruments and data sources, and (4) a data management plan.
Incorporate instructor feedback on your post to revise the Sources of Data/Instruments and Data Collection sections of the prospectus.
.
Develop a 3–4 page research paper based on a selected case study rel.docxbradburgess22840
Develop a 3–4 page research paper based on a selected case study related to reproductive choices. Since the processes of reproduction and birth represent one of the potential biological outcomes of heterosexual activity, it is important to examine the biological foundations of human sexuality. This includes knowledge of fertilization and early development, including some of the most recent findings. There is more than a litany of birth control methods; this assessment offers a sound basis for understanding the issues to be weighed in personal decision making about contraception and abortion, which continue to generate debate and controversy.
By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and assessment criteria:
Competency 1: Apply psychological theories to topics in human sexuality.
Apply psychological theories to a case study in human sexuality.
Competency 2: Apply scholarly research findings to topics in human sexuality.
Apply scholarly research findings to a case study in human sexuality.
Competency 3: Explain how ethics inform professional behavior in the field of human sexuality.
Explain how ethics inform professional behavior in the field of human sexuality.
Competency 4: Communicate in a manner that is scholarly, professional, and consistent with expectations for professionals in the field of psychology.
Write coherently to support a central idea with correct grammar, usage, and mechanics as expected of a psychology professional.
Use APA format and style.
APA Resources
Because this is a psychology course, you need to format this assessment according to APA guidelines. Additional resources about APA can be found in the Research Resources in the left navigation menu of your courseroom. Use the resources to guide your work as needed.
American Psychological Association. (2010).
Publication manual of the American Psychological Association
(6th ed.). Washington, DC: Author.
Available from the
bookstore
.
APA Paper Template [DOCX]
.
Required Resources
The following resource is required to complete the assessment.
Human Sexuality Case Studies: Sexuality Confronts Social Policy
|
Transcript
.
Suggested Resources
The resources provided here are optional and support the assessment. They provide helpful information about the topics. You may use other resources of your choice to prepare for this assessment; however, you will need to ensure that they are appropriate, credible, and valid. The
PSYC-FP2800 – Introduction to Human Sexuality Library Guide
can help direct your research. The Supplemental Resources and Research Resources, both linked from the left navigation menu in your courseroom, provide additional resources to help support you.
Human Sexuality and Reproductive Choices
Kelly, G. F. (2015).
Sexuality today
(11th ed.). New York, NY: McGraw-Hill.
Available from the
bookstore
.
Chapter 10, "Reprod.
Develop a 5- to 6-slide PowerPoint presentation for a staff meet.docxbradburgess22840
Develop a 5- to 6-slide PowerPoint presentation for a staff meeting that addresses the following:
Identify your selected transition of care. ------" Transitions of care” refer to the movement of patients between health care practitioners, settings, and home as their condition and care need change. For example, a patient might receive care from a primary care physician or specialist in an outpatient setting, then transition to a hospital physician and nursing team during an inpatient admission before moving on to yet another care team at a skilled nursing facility. Finally, the patient might return home, where he or she may receive care from a visiting nurse or support from a family member or friend.
Explain how you, as a nurse leader, along with your healthcare team, would apply systems thinking when providing a transition of care aligned with the IHI Quadruple Aim framework in order to improve it. Explain what the fourth aim in your strategy would be and why.
These are the four areas:
Experience of care
Population health
Per capita cost
Care team well-being
Describe the key stakeholders that might be involved in this transition of care and how you would engage and influence them to improve the transition of care processes.
Explain how systems thinking would inform your improvement plan for your transition of care.
.
Develop a 5–10-year strategic plan for achieving specific health.docxbradburgess22840
Develop a 5–10-year strategic plan for achieving specific health care quality and safety improvements, based on the analysis you completed in Assessment 1. Use either an AI approach or your SWOT analysis and a chosen strategic planning model.
Note:
Each assessment in this course builds on the work you completed in the previous assessment. Therefore, you must complete the assessments in this course in the order in which they are presented.
SHOW LESS
Evaluation of strategic choices is important. The methods for selecting strategic alternatives help leaders organize significant issues to support decision making. However, it is important that the techniques do not make the decision. Rather, leaders should use the techniques to reveal the inherent situation and to organize their thought processes. This assessment provides you with an opportunity to evaluate and apply some of the techniques for successful strategy development and implementation.
By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and assessment criteria:
Competency 1: Evaluate qualities and skills that promote effective leadership within health care organizations.
Evaluate the leadership qualities and skills that will be most important to successfully implementing a strategic plan and sustaining strategic direction.
Competency 2: Apply strategies to lead high-performing health care teams to meet organizational quality and safety goals.
Develop strategic goal statements and outcomes that support the achievement of specific quality and safety improvements for a care setting.
Justify the relevance of proposed strategic goals and outcomes in relation to the mission, vision, and values of a care setting.
Competency 3: Apply cultural, ethical, and regulatory considerations to leadership decision making.
Analyze the extent to which strategic goals and outcomes address the use of technology and the ethical, cultural, and regulatory environments.
Competency 4: Integrate leadership and health care theories into the role of the nurse leader.
Explain how relevant leadership and health care theories will be used to help achieve proposed strategic goals and objectives.
Competency 5: Communicate with stakeholders and constituencies to build collaborative partnerships and create inclusive work environments.
Communicate analyses clearly and in a way that demonstrates professionalism and respect for stakeholders and colleagues.
Integrate relevant and credible sources of evidence to support assertions, correctly formatting citations and references using APA style.
Suggested Resources
The resources provided here are optional. You may use other resources of your choice to prepare for this assessment; however, you will need to ensure that they are appropriate, credible, and valid. The
MSN-FP6210: Leadership and Management for Nurse Executives Library Guide
can help direct your res.
Develop a 2–4-page proposal for a policy that should help to imp.docxbradburgess22840
Develop a 2–4-page proposal for a policy that should help to improve health care and outcomes for your target population.
Note
: Each assessment in this course builds on the work you completed in the previous assessment. Therefore, you must complete the assessments in this course in the order in which they are presented.
Cost and access to care continue to be main concerns for patients and providers. As technology improves our ability to care for and improve outcomes in patients with chronic and complex illnesses, questions of cost and access become increasingly important. As a master’s-prepared nurse, you must be able to develop policies that will ensure the delivery of care that is effective and can be provided in an ethical and equitable manner.
SHOW LESS
By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and assessment criteria:
Competency 1: Design evidence-based advanced nursing care for achieving high-quality population outcomes.
Propose a policy and guidelines that will lead to improved outcomes and quality of care for a specific issue in a target population.
Competency 2: Evaluate the efficiency and effectiveness of interprofessional interventions in achieving desired population health outcomes.
Analyze the potential for an interprofessional approach to implementing a proposed policy to increase the efficiency or effectiveness of the care setting to achieve high quality outcomes.
Competency 3: Analyze population health outcomes in terms of their implications for health policy advocacy.
Advocate the need for a proposed policy in the context of current outcomes and quality of care for a specific issue in a target population.
Competency 4: Communicate effectively with diverse audiences, in an appropriate form and style, consistent with organizational, professional, and scholarly standards.
Communicate proposal in a professional and persuasive manner, writing content clearly and logically with correct use of grammar, punctuation, and spelling.
Integrate relevant sources to support assertions, correctly formatting citations and references using APA style.
CONTEXT:
As a master's-prepared nurse, you have a valuable viewpoint and voice with which to advocate for policy developments. As a nurse leader and health care practitioner, often on the front lines of helping individuals and populations, you are able to articulate and advocate for the patient more than any other professional group in health care. This is especially true of populations that may be underserved, underrepresented, or are otherwise lacking a voice. By advocating for and developing policies, you are able to help drive improvements in outcomes for specific populations. The policies you advocate for could be internal ones (just within a specific department or health care setting) that ensure quality care and compliance. Or they could be external policies (local, st.
Develop a 10- to 12- slide PowerPoint Presentation designed for .docxbradburgess22840
Develop a 10- to 12- slide PowerPoint Presentation designed for training the staff at a local high school. The PowerPoint Presentation should focus on strategies that promote communication skills among adolescents.
Students are encouraged to approach the assignment creatively, adding graphics, visuals, charts and/or graphs to their work. Slides should be designed to address the selected topic clearly and concisely. Each slide should be developed with professional presentation style (e.g., bulleted items in brief statements rather than complete sentences). Notes should complement the slides and provide details useful to the speaker if an oral presentation were to be given.
Creating the PowerPoint Presentation
The PowerPoint Presentation:
Must be 10 to 12 slides, and formatted according to APA style as outlined by the Ashford Writing Center.
Must include a title slide with the following:
Title of the training
Student’s name
Course name and number
Instructor’s name
Date submitted
Must present a thesis statement regarding why social skills training would be appropriate for adolescents.
Must explain different types of communication (e.g., aggressive and assertive).
Must share four strategies on how adolescents could improve their communication skills.
Must create at least three hypothetical scenarios of problems that adolescents might encounter, including one that involves cultural/ethnic issues. The scenarios should show how adolescents could use improved communication skills to solve these problems.
Must develop conclusions that reiterate the opening thesis statement, include a summary of the social skills training discussed, and offer evidence of its effectiveness.
Must use at least four scholarly sources (in addition to the course text), including a minimum of two from the Ashford Online Library. References are to be provided as needed within the slides.
Must include a separate reference slide, formatted according to APA style as outlined in the Ashford Writing Center.
.
DetailsPlease answer the following questions. 1. Desc.docxbradburgess22840
Details
Please answer the following questions.
1.
Describe the different stages of meiosis
2.
In a certain hypothetical animal, the allele G is responsible for green skin, g is for purple skin color; B is black hair and b is for brown hair. If a male animal with the genotype GgBb is crossed with a female animal with the genotype GgBb, determine the phenotypic ratio of the offspring’s.
Show how you arrived at the ratio using a punned square.
3.
Hemophilia in humans is an
X
-linked recessive disorder. Using a punnet square, show the results of mating between a normal (non-carrier) female and a hemophilic male? What percentage of their offspring’s are hemophilic?
4.
What are linked genes? Are they an exception to Mendel's law of Segregation? Why or why not?
NO Copy Or Past Please
12 point font
.
Despite the literature supporting technology use in schools as ben.docxbradburgess22840
Despite the literature supporting technology use in schools as beneficial for students, and despite the wide use of social technology, schools continue to be slow to change its integration in the classroom (Livingstone, 2012). It is imperative that teachers increase their use of technology in the classroom in order to prepare our K-12 students referred to as "digital natives," for the 21st century. Though many schools have technology available for use (Alger & Kopcha, 2008), barriers exist in incorporating technology into lesson plans, namely teacher reluctance (Keengwe, Onchwari, & Wachira, 2008). Teachers' hesitation in using technology more frequently is due to a number of factors, such as lack of time to learn new technology and incorporate it into lesson plans, beliefs around using technology in instruction, availability of working technology and technical support, comprehensive professional development, and a culture that promotes using new technology, self-efficacy, and teaching methods (Alger & Kopcha, 2008).
Literature Review
Self-Efficacy toward Technology
According to Bandura (1986) individuals possess a self-system that determines how much effort people will expend on any activity. Bandura also asserts that self-efficacy beliefs may be a strong predictor of related performance. Studies have shown a positive correlation between self-efficacy in technology and technology ability (Anderson & Maninger, 2007; Anderson, Grouulx, & Maninger, 2011). According to the technology acceptance model introduced by Davis (1989), there is a correlation between users' perceived ease of use and predicted adoption of technology. In his study investigating Moodles, Yeou (2016) found self-efficacy to be a critical factor in undergraduates' use of the technology tool. In a similar study investigating pre-service teachers, Albion (2001) found that self-efficacy was the most significant factor in predicting technology use. Pre-service and in-service teachers who possess high self-efficacy in regard to technology are more apt to use technology in the classroom because they are more confident in their ability. In their study investigating teachers' use of technology, Holden and Rada (2011) found that self-efficacy directly influenced individuals' ease of use and usability of technology.
Need for Technology Integration
With the adoption of the National Education Technology Plan (NETP), providing access to technology is no longer sufficient; the NETP stresses that schools are expected to ensure "all students understand how to use technologies as a tool to engage in creative, productive, lifelong learning" (p. 16 Herold, 2016). A key element in the plan is the need to move from passive to active use of technology. Often referred to as the "digital use and divide," a gap exists between learners who are using technology in active, creative ways to support their learning and those who predominantly use technology for passive content consumption.
To develop .
Details: http://source.sakaiproject.org/viewsvn/?view=rev&rev=39772
Author: [email protected]
Date: 2008-01-05 09:12:07 -0500 (Sat, 05 Jan 2008)
New Revision: 39772
Modified:
content/branches/sakai_2-5-x/content-impl/impl/src/java/org/sakaiproject/content/impl/ContentServiceSqlOracle.java
content/branches/sakai_2-5-x/content-impl/impl/src/java/org/sakaiproject/content/impl/DbContentService.java
Log:
SAK-12501 merge to 2-5-x: r39622, r39624:5, r39632:3 (resolve conflict from differing linebreaks for r39622)
----------------------
This automatic notification message was sent by Sakai Collab (https://collab.sakaiproject.org/portal) from the Source site.
You can modify how you receive notifications at My Workspace > Preferences.
Details: http://source.sakaiproject.org/viewsvn/?view=rev&rev=39771
Author: [email protected]
Date: 2008-01-04 18:08:50 -0500 (Fri, 04 Jan 2008)
New Revision: 39771
Modified:
bspace/site-manage/sakai_2-4-x/site-manage-tool/tool/src/bundle/sitesetupgeneric.properties
bspace/site-manage/sakai_2-4-x/site-manage-tool/tool/src/java/org/sakaiproject/site/tool/SiteAction.java
Log:
BSP-1415 New (Guest) user Notification
----------------------
This automatic notification message was sent by Sakai Collab (https://collab.sakaiproject.org/portal) from the Source site.
You can modify how you receive notifications at My Workspace > Preferences.
Details: http://source.sakaiproject.org/viewsvn/?view=rev&rev=39770
Author: [email protected]
Date: 2008-01-04 16:09:01 -0500 (Fri, 04 Jan 2008)
New Revision: 39770
Modified:
site-manage/branches/sakai_2-5-x/site-manage-tool/tool/src/webapp/vm/sitesetup/chef_site-siteInfo-list.vm
Log:
merge fix to SAK-9996 into 2-5-x branch: svn merge -r 39687:39688 https://source.sakaiproject.org/svn/site-manage/trunk/
----------------------
This automatic notification message was sent by Sakai Collab (https://collab.sakaiproject.org/portal) from the Source site.
You can modify how you receive notifications at My Workspace > Preferences.
Details: http://source.sakaiproject.org/viewsvn/?view=rev&rev=39769
Author: [email protected]
Date: 2008-01-04 15:44:39 -0500 (Fri, 04 Jan 2008)
New Revision: 39769
Modified:
gradebook/trunk/app/ui/src/java/org/sakaiproject/tool/gradebook/ui/helpers/beans/AssignmentGradeRecordBean.java
gradebook/trunk/app/ui/src/java/org/sakaiproject/tool/gradebook/ui/helpers/producers/GradeGradebookItemProducer.java
gradebook/trunk/app/ui/src/webapp/WEB-INF/applicationContext.xml
gradebook/trunk/app/ui/src/webapp/WEB-INF/bundle/messages.properties
gradebook/trunk/app/ui/src/webapp/WEB-INF/requestContext.xml
Log:
SAK-12180 - Fixed errors with grading helper
----------------------
This automatic notification message was sent by Sakai Collab (https://collab.sakaiproject.org/portal) from the Source site.
You can modify how you receive notifications at My Workspace > Preferences.
Details: http://source.sakaiproject.org/viewsvn/?view=rev&rev=39766
Author: [email prot.
Description:
Ch .17:
Newborn transitioning
Ch. 18:
Nursing management of the
newborn
Ch.19:
Nursing Management at risk:
Pregnancy-related complications
Ch.20:
Nursing Management of the
Pregnancy at Risk: Health
conditions and vulnerable populations
Ch. 21:
Nursing management of
labor and birth at risk
Ch. 22:
Nursing management of the
postpartum woman at risk
.
Description of the assignment The following 4 men created a p.docxbradburgess22840
Description of the assignment:
The following 4 men created a paradigm shift within Western culture: Luther, Columbus, Gutenberg, and Charles Darwin. In this assignment, explain which one of these you deem to have had the most influence on Western culture. Provide concrete reasons that clarify your position. If you include sources, cite them in current APA format. This assignment must be 250–300 words and must include the word count in parentheses. S
.
Description of the AssignmentThis assignment presents a mo.docxbradburgess22840
Description of the Assignment
This assignment presents a modified method for conducting a concept analysis of
one
concept that is important and useful to the nurse practitioner role. The concept for this assignment must be supported by a published
nursing
theory. The selected concept is identified and then the elements of the analysis process are applied in order to synthesize knowledge for application as demonstrated through the creation of a model case. Theoretical applications of the concept are also discussed. Non-nursing theories may
not
be used. Scholarly literature is incorporated throughout the analysis.
Only the elements identified in this assignment should be used for this concept analysis.
Possible Concepts:
The following concepts are not required; students may select one of these concepts or find another concept. Each selected concept must be associated with a nursing theory; the use of non-nursing theories is
not
allowed. If you have any questions regarding your concept or the nursing theory, please consult with your faculty member for assistance.
Please note: the concepts of caring or cultural humility are not permitted for this assignment.
Adaptation
Burnout
Civility
Comfort
Compassion
Compassion fatigue
Competence
Empowerment
Engagement
Health
Leadership
Meaningfulness
Modeling
Noise
Pain
Palliative care
Quality of life
Resilience
Self-care
Sensory overload
Situational awareness
Criteria for Content
Definition/Explanation of the selected nursing concept
Defines/explains the concept using scholarly literature (a dictionary maybe used for this section
only
)
Support from nursing literature is required.
2.
Defining attributes:
A minimum of
three (3)
attributes are required.
Support from nursing literature is required.
Explanation: An attribute identifies characteristics of a concept. For this question, the characteristics of the selected nursing concept are identified and discussed.
Antecedent and Consequence
1 antecedent
of the selected nursing concept.
1 consequence
of the selected nursing concept.
Support from nursing literature is required.
Explanation:
An antecedent is an identifiable occurrence that happens before an event. An antecedent precedes a selected nursing concept. A consequence follows or is the result of an event. The selected consequence follows or is the result of the selected nursing concept.
4.
Model Case
1 Model Case
is created by the student and discussed substantively by demonstrating within the case each of the following areas:
Definition
All identified attributes
Theoretical Applications of the Concept
Explain how the concept applies to the selected nursing theory.
Support from nursing literature is required.
Reflection
Reflect on how the concept analysis findings apply to your advanced nursing practice, specifically as an NP.
Self-reflection may be written in first-person.
Preparing the Assi.
Description of theNationalMilitary Strategy2018.docxbradburgess22840
Description of the
National
Military
Strategy
2018
The Joint Staff
1
Overview
The 2018 National Military Strategy (NMS) provides the
Joint Force a framework for protecting and advancing U.S.
national interests. Pursuant to statute, it reflects a
comprehensive review conducted by the Chairman with the
other members of the Joint Chiefs of Staff and the unified
combatant commanders.
As an overarching military strategic framework, this
strategy implements the substantial body of policy and
strategy direction provided in the 2017 National Security
Strategy, the 2018 National Defense Strategy (NDS), the
Defense Planning Guidance (DPG), and other documents.
The 2018 NMS provides the Chairman’s military advice for
how the Joint Force implements the defense objectives in
the NDS and the direction from the President and the
Secretary of Defense.
The 2018 NMS also reflects lessons learned from
implementing global integration over the last two years. The
strategy articulates a continuum of strategic direction to
frame global integration into three strategy horizons to meet
the challenges of the existing and future security
environment. Force employment addresses planning, force
management, and decisionmaking to fulfill the defense
objectives of the NDS. Force development adapts functions,
capabilities, and concepts to improve the current Joint
Force. Force design innovates to enable the Joint Force to
do what it does differently to retain a competitive advantage
against any adversary.
The vision of the Joint Force articulated in the 2018 NMS is
a Joint Force capable of defending the homeland and
projecting power globally, now and into the future.
2
Strategic Approach
From its global perspective, the NMS premises an adaptive
and innovative Joint Force capable of employing its
capabilities seamlessly across multiple regions and all
domains -- continuing the transition from a regional to a
global mindset and approach.
This strategy
anchors its
approach against a
set of clearly
identified security
trends outlined in
the NDS (see inset).
These trends,
especially those
posed by the
reemergence of
great power
competition with China and Russia, represent the most
difficult challenges facing the Joint Force. However, the full
scope of global integration must recognize uncertainty and
be vigilant for emerging threats to the security and interests
of the United States, its allies and partners. In a security
environment where the homeland is no longer a sanctuary
and every operating domain is contested, competitors and
adversaries will continue to operate across geographic
regions and span multiple domains to offset or erode Joint
Force advantages.
To achieve military advantage over competitors and
adversaries, the NMS introduces the notion of joint
combined arms, defined as the conduct of operational art
through the integration of joint capabilities.
Description This is a 4 page paper about either a creative genius o.docxbradburgess22840
Description: This is a 4 page paper about either a creative genius of your choosing (Thomas Edison? Einstein? Michelangelo? Beyonce? Lucille Ball?) or a creative business (DuPont, Corning, IDEO? Pixar?). You can either read a full biography or research the person or organization using several sources. The paper should include: Description and background of the person/organization, 2) why you chose him/her/it, 3) what this person/org achieved (briefly), 4) how he/she/it fuels their creativity (his or her own, or if a company, its workforce) and 5) include a self reflection. Knowing what they do, what are some things YOU DO to fuel your creativity? What else could you do going forward? . #4 and #5 are most important. At the end of the paper, summarize by listing at least ten to fifteen things that this individual did to fuel his/her/its creativity. Here are some examples:
Da Vinci kept journals and notebooks. He dissected eyes and other body parts. He learned many mediums - painting sculpting, etc.
Ian Flemming (author), designed golf courses in his spare time.
Steven Hillenburg, the creator of Spongebob, had been a marine biology professor who had a keen interest in art and began drawing visual images for his student which he then began animating. He continuously worked on acquiring new skills. He watched old movies.
Beyonce learned dressmaking from her mom, who designed all of her early costumes. Her mom had sewn clothing for priests and nuns in exchange for Beyonce’s tuition.
Etsy has employee-led workshops where associates teach others their hobbies, and they regularly engage their shop owners in planning
The important thing about this project is that you learn and be able to share not just what they achieved, but what they did to nurture their creativity. You must include sources.
.
Describe your experience with electronic healthmedical record.docxbradburgess22840
Describe your experience with electronic health/medical records (EHR/EMR).
Have you used a health care IT system as a patient/provider? If yes, what system(s) did you use?
What were your impressions of the system?
Did you find it user-friendly?
Did you have concerns about privacy/security?
Did it seem to make health care seeking/delivery easier or more burdensome?
.
Description Develop a paper describing how the knowledge, skill.docxbradburgess22840
Description:
Develop a paper describing how the knowledge, skills, or theories
of this course
have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge applied to an employment opportunity in your field of study.
Requirements:
Provide a >500 word (2 or more pages) paper (excluding title and reference pages in page count). The paper should include a title page, body (include Introduction and Conclusion sections), and a reference page. An abstract is not required for this assignment. Use proper APA formatting of the entire paper including sources on the reference page and citations in the body of the paper.
.
Describing Research FindingsResearchers take many steps to p.docxbradburgess22840
Describing Research Findings
Researchers take many steps to prepare, organize, and analyze research data. In this discussion, you will examine the importance of taking a systematic approach to describing research findings. Be sure to address the following in your main post:
What is the purpose of computing descriptive statistics and exploratory analyses?
Why should researchers graph their data? What are the benefits of graphing?
How might you assess the distribution of data?
What does the “spread” of data tell us?
What does Pearson
r
tell us about two variables?
.
Description I. Introduction A. Summarize the client. What is the rat.docxbradburgess22840
Description I. Introduction A. Summarize the client. What is the rationale for seeking counseling?
II. Biopsychosocial Summary
A. Describe the problem that brought the client to treatment. i. Make sure to address any problems, issues, or challenges the client may be facing.
B. Explain the symptoms affecting the client. i. What are the behavioral symptoms? ii. What are the cognitive symptoms? iii. What are the emotional symptoms? iv. What are the physiological symptoms?
C. Identify any environmental factors that may be contributing to the client's problem.
D. Identify any potential harmful behavior: i. Aggression ii. Harm to others iii. Harm to self iv. Criminal activity v. Impulsive behaviors vi. High-risk activity
E. Determine if the client has a family history of the diagnosis. Consider how this may affect the client. F. Use evidence-based research to support the biological factors presented in the case.
G. Outline how the client identifies him- or herself in regard to cultural characteristics. Make sure to add rationale for any answers that are not straightforward. i. What are the addressing factors?
a. Age and generational influences
b. Developmental disabilities (acquired at birth or during childhood)
c. Disabilities acquired later in life (e.g., traumatic brain injury, multiple sclerosis, stroke)
d. Religion and spirituality
e. Ethnic and racial identity
f. Socioeconomic status
g. Sexual orientation
h. Indigenous heritage
i. National origin j. Gender
H. Summarize how the client culturally identifies him- or herself.
i. With the identifiers above, how does the client culturally identify him- or herself? ii. What is the order of importance for the client? Assessment III. Co-occurring Disorders
A. Identify any co-occurring disorders. B. Describe the initial DSM diagnosis. i. What is the overall descriptor of the diagnosis? ii. What criteria must be met to meet the diagnosis? iii. Describe which client behaviors are being used to meet the diagnostic criteria.
C. Discuss the rationale behind the diagnosis. i. Identify what other diagnoses should be ruled out. Make sure to provide rationale. ii. Identify limitations with this diagnosis. Make sure to provide rationale.
D. Use evidence-based research to support your justification. IV. Addiction Assessments
A. Describe how the assessment was administered.
B. Describe the assessment scoring.
C. Summarize the assessment results.
i. How do you interpret the results? Plan V. Recommendations
A. Summarize what you recommend for this client based on the information collected.
i. Describe what you recommend for recovery.
ii. Describe what you recommend for relapse prevention.
resources you would provide to the client. Rubric Guidelines for Submission: Consider using the headings from the critical elements outlined above when drafting your DAP note, as you will do this when you submit for your final project. You may also consider using double spac.
Describes the use of Computers in Nursing in general clearly and com.docxbradburgess22840
Describes the use of Computers in Nursing in general clearly and comprehensively.
Address the significance of Computers, attributes of Computers (i.e., accuracy, cost, accessibility, etc.), and provide specific examples with rationale of situations in which Computers as an educational tool would provide advantages as well as disadvantages.
Relate the use of Computers to the appropriate professional standards and competencies.
.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
TaskYou are required to prepare for this Assessment Item by1..docx
1. Task
You are required to prepare for this Assessment Item by:
1. READING the Subject outline,
2. COMPLETING Topic 2 Project Planning
3. BUILDING your PLAN up from the ProjectTitle and
Abstract in Assessment Task 1
WHAT TO DO:
1. Follow the Study Schedule and work with the Topics in
Interact as they provide a "scaffold" for your learning in this
subject.
2. Develop a detailed Capstone Project Proposal and Plan using
project management software (as listed in the Study Schedule)
and the skills you have acquired from IT Project Management to
develop a project plan with a Work Breakdown
Structure (WBS), milestones and Gantt chart. These tools may
help.
1. MicrosoftProject Pro (http://office.microsoft.com/en-
au/project/);
2. Open source tools like GanttProject
(http://www.ganttproject.biz/);
3. OpenProj(http://sourceforge.net/projects/openproj/)
4. OpenProject (https://www.openproject.org/about).
5. ProjectLibre (http://www.projectlibre.org/)
3. Begin using the 'project blog' as a tool beyond the weekly
progress reportsfor your chosen emerging technology topic:
1. The blog helps you to "think by writing" and also store your
notes, project files and links in a cloud-based service.
2. Consider sharing the site with your peers as a way to tell a
story and harness each other’s knowledge.
4. The blog is ideally updated each week with 3 or 4 entries for
documenting your project notes and as the foundation for
editing and writing the Capstone Project Report. An ideal blog
entry will have around 50-150 words (150-600 words a week).
2. Presentation
Project Plan Sample Format
(subject to change or modified to include systems development
projects)
1. Title: Emerging Technology and Innovation Topic
1. Project Blog ( Web address provided)
2. Weekly Progress Reports Plan (In class, Discussion Board or
Project Blog entries)
2. Rationale
1. Problem domain
2. Purpose and justification
3. Supervisor Approval
4. Research Questions
5. Conceptual or Theoretical Framework
6. Methodology
1. Analysis of sources of information (EndNote, APA
Referencing Style)
2. Research method(s)
3. Data collection or systems design methods
4. Ethical Issues
5. Compliance Requirements (Workplace, Industry or
Government regulations)
7. Project Plan
1. Deliverables (Annotated Bibliography, Journal Paper, Report,
Seminar)
2. Work breakdown structure (WBS)
3. Risk Analysis
4. Duration
5. Gantt chart
3. 8. References
9. Appendix (if required)
Final project
Formulating Strategic Management Decisions
This final project is based on the following Harvard Business
case study:
Khachatryan, D. (2014). Amarcord Incorporated: Combating
money laundering using data analytics. Harvard Business Case
Study. Retrieved from https://hbsp.harvard.edu/tu/789925b5
Assume your client accepted your urgent business proposal to
design a data-driven approach to effectively accomplish the
goal of fraud detection in financial institutions. Data analytics
for fraud detection in financial institutions is the strategic
management vision of Amarcord Inc.’s Chief Compliance
Officer. Your work in teams is based on the average or
aggregate monthly incoming wire transfer of $500,000 for a
swimwear chain, considered highly unusual by business analysts
for that business chain. In other words, it is impossible for a
business chain of that size to earn such high monthly revenue.
After reading and analyzing the case, each team is required as
part of the final project to address the following:
Identify and address the business problem and explain the need
for a data analytic solution.
Explain the data analytic approach to tackle the business
problem.
Explain the nature and structure of the received data (i.e., the
average monthly revenue of $500,000)
4. and how data inconsistencies can be resolved.
To what extent is competitive intelligence and ethical standards
relevant to your analysis and solution(s)?
How does cultural diversity impact the problem identification
and or analysis of this case?
Elaborate on all the undertaken modeling and forecasting
strategies.
Emphasize and summarize key findings as well as observations
and recommend further steps that your client should undertake
in the data analysis realm which could potentially lead to
another engagement with your team.
Include how the company could work with various stakeholders
currently and in the future; include desired outcomes.
Address how the organization’s culture influenced the situation
within the case and give recommendations for culture
improvements and your team’s ideas about changes that support
innovation and ethical conduct.
Deliver your project report to provide clear and thorough
answers that both technical and non-technical audiences will
understand.
Your team’s written paper should meet the following
requirements:
Be eight to ten pages in length, plus exhibits or illustrations
Be divided into the following sections:
Identification of business problem and evaluation of the need
for a data analytic solution.
Explanation of the data analytic approach to tackle the business
problem.
Explanation of the nature and structure of the received data
(i.e., the average monthly revenue of $500,000) and how data
inconsistencies can be resolved. Do you agree or disagree with
the business analysts that the aggregate monthly revenue of
swimwear is three times higher than the industry average?
Justify your position.
5. Evaluation of all the modeling and forecasting strategies
undertaken as brainstorming solutions and so forth.
Summary of key findings as well as observations and
recommended further steps that your client should undertake in
the data-analytic realm, which could potentially lead to another
engagement with your team.
Deliver your project report to provide clear and thorough
answers that both technical and non-technical audiences will
understand.
Support your project with 10 to 12 peer-reviewed articles. Be
formatted according to APA.
Include a title page, introduction, conclusion, and references
page.
A Secure IoT Service Architecture With an Efficient Balance
Dynamics Based on Cloud and Edge Computing
Abstract:
The Internet of Things (IoT)-Cloud combines the IoT and cloud
computing, which not only enhances the IoT's capability but
also expands the scope of its applications. However, it exhibits
significant security and efficiency problems that must be
solved. Internal attacks account for a large fraction of the
associated security problems, however, traditional security
strategies are not capable of addressing these attacks
effectively. Moreover, as repeated/similar service requirements
become greater in number, the efficiency of IoT-Cloud services
is seriously affected. In this paper, a novel architecture that
integrates a trust evaluation mechanism and service template
with a balance dynamics based on cloud and edge computing is
proposed to overcome these problems. In this architecture, the
edge network and the edge platform are designed in such a way
as to reduce resource consumption and ensure the extensibility
of trust evaluation mechanism, respectively. To improve the
6. efficiency of IoT-Cloud services, the service parameter template
is established in the cloud and the service parsing template is
established in the edge platform. Moreover, the edge network
can assist the edge platform in establishing service parsing
templates based on the trust evaluation mechanism and meet
special service requirements. The experimental results illustrate
that this edge-based architecture can improve both the security
and efficiency of IoT-Cloud systems.
Published in: IEEE Internet of Things Journal ( Volume:
6 , Issue: 3 , June 2019 )
Page(s): 4831 - 4843
Date of Publication: 13 September 2018
ISSN Information:
INSPEC Accession Number: 18757966
DOI: 10.1109/JIOT.2018.2870288
Publisher: IEEE
Funding Agency:
SECTION I.Introduction
The Internet of Things (IoT) is based on a very large number of
objects/things that connect to the Internet to help humans
perceive the world and improve their quality of life [1].
However, there are many IoT characteristics, such as limited
storage and processing capacity, that can reduce the service
performance of the IoT [2]. Cloud computing can address these
limitations associated with the IoT in terms of management,
storage, computation, and processing. Moreover, cloud
computing can create more services by integrating IoT
resources. Due to these advantages, the concept of IoT-Cloud
has been proposed. This concept combines the advantages of the
IoT and cloud computing technologies to provide more and
better services [3]. However, there are still some security and
efficiency problems with IoT-Cloud that must be solved.
The IoT is vulnerable to security threats, especially internal
attacks that frequently occur in the physical device layer and
7. the network communication layer [4]. Unlike internal attacks,
external attacks can be resisted by traditional security
mechanisms, such as encryption, authorization, and auditing [5].
However, traditional security mechanisms cannot resist internal
attacks effectively, especially in the resource-constrained
IoT [6]. In an internal attack, the attacker is in possession of
some IoT devices and then conducts further attacks using these
captured devices [7]. The trust evaluation mechanism, which is
designed to solve internal attack issues, is an effective
supplement to the traditional security mechanism [8]. However,
many trust evaluation mechanisms in the IoT consume a lot of
resources, which has a large impact on the IoT performance and
lifetime. With increasingly many types of internal attacks
appearing, it is unlikely that the size of the trust evaluation
mechanism will be reduced.
With the increase in the number of IoT-Cloud applications,
increasingly more repeated/similar requirements are sent to the
cloud. It is inefficient for an IoT-Cloud system to address these
requirements one by one and constantly improving hardware
performance is not a long-term solution. In addition, there are
delay issues in IoT-Cloud services since the cloud is far away
from users and the IoT [9]. As failed services also reduce
efficiency, it is necessary to solve some uncertainties in the
IoT, such as device faults, network congestion, and large
environment changes. In order to avoid these situations,
monitoring, and data analysis tasks can be performed, however,
it is not advised to perform these tasks in the cloud.
To solve the above problems, an edge-based IoT-Cloud
architecture with a trust evaluation mechanism and service
template was established. Edge computing is performed at the
Internet’s edge with a lot of computing and storage nodes, such
as gateways, routers, mobile fog nodes, and edge servers, which
are close to the underlying network [10]. Edge computing also
refers to cloudlets, micro datacenters, and fog nodes, which has
advantages in the quick response to cloud services [11], [12].
The edge computing layer in this architecture is divided into
8. two main parts: 1) the edge network and 2) the edge platform.
The edge network is established on underlying edge nodes
(move/static powerful nodes) and is parallel to the IoT. The
edge platform is composed of edge nodes (edge servers) that lie
between the IoT and cloud, and this platform is a central hub of
the IoT-Cloud service architecture [13].
The main contributions can be summarized as follows.
1. An edge network was adopted to move a large part of the
trust evaluation mechanism out of the IoT. In the IoT, devices
perform the direct trust calculation and send exceptions to the
edge network. The edge network collects trust information from
devices and analyzes this information for the entire trust state
of the IoT.
2. Service templates were established in the cloud and on the
edge platform. The service parameter template in the cloud
stores the matching information while the service parsing
template on the edge platform stores the matching information
and parsing strategies.
3. The trust evaluation mechanism was integrated into IoT-
Cloud services via edge computing. In the process of IoT
service strategy establishment, the trust evaluation mechanism
enables the edge platform to select trusted devices in order to
generate or transfer data. Moreover, the edge network can
monitor the IoT network load with balance dynamics and assist
the edge platform in timely adjusting strategies.
This paper is organized as follows. In Section II, related work is
introduced. The basic concept of a novel architecture is
presented in Section III. Section IV presents the detailed design
of the edge network, the edge platform and the functions in the
cloud. Experiment results and analyses are reported in Section
V. The final section concludes this paper.
SECTION II.Related Work
To address internal attack issues, many trust mechanisms have
been proposed. The trust mechanism plays an important role in
many aspects, such as reliable data fusion and mining, user
privacy protection, information security enhancement, and
9. service assurance [14], [15].
In some cases, the IoT has both physical and social attributes.
Based on this feature, Chen et al. [16] proposed a trust
mechanism that can select effective feedback through a
similarity filtering method based on friendship, social contact,
and community of interest relationships. Moreover, to minimize
the trust convergence time and resist recommendation trust
attacks, an adaptive filtering technique is designed to find the
best means of combining direct trust and recommendation trust.
To resist attacks aimed at the recommendation trust, such as
bad-mouthing, Alshehri et al. [17] proposed a scalable trust
management solution based on IoT clustering to address
practical and pressing issues. Of course, all storage and
computation tasks are performed by physical IoT devices, which
requires greater energy consumption. Considering trust
derivation, Duan et al. [18] proposed an energy-aware trust
derivation scheme that manages overheads through adopting a
game theoretic approach in the trust derivation process.
However, this scheme only provides partial security, and it is
difficult to accurately measure the level of security.
There are many trust-based intrusion detection systems (IDSs)
in wireless sensor networks (WSNs), which are used to defend
against internal attacks. However, the efficiency of IDS is
reduced on the IoT due to the very large amount of data that is
generated during a short period. Meng et al. [19] proposed a
Bayesian-based trust management method that incorporates
traffic sampling into IDS under a hierarchical structure. Liu et
al. [20] proposed a physical IDS-to-gateway and virtual IDS-to-
gateway detection model that detects attacks against both
physical sensors and virtual sensors (VSs). In IDSs, false alarm
messages cannot be avoided and the intrusion detection
threshold is difficult to set.
To solve data error issues in WSNs, Yang et al. [21] proposed a
data error detection approach via which the cloud can quickly
detect and locate errors in large sensor data sets. Data
collection and transmission is an important part to maintain the
10. QoS of IoT-Cloud. To ensure trustworthy data collection,
Wang et al. [12] adopted mobile sinks to collect sensor data and
used a CTDC system to evaluate the trustworthiness of both
sensors and mobile sinks. To improve the data transfer
environment, Zhu et al. [22]proposed a trust-assisted sensor-
cloud (TASC) system that selects trusted sensors in WSNs and
trusted data centers in the cloud to constitute the data transfer
route from sensor to user. However, there are still many
problems to be solved in the data trust level, such as time
delays, data level attacks, and data integrity.
In IoT-Cloud, a very large number of connected devices and
services emerge, causing network load issues in the centralized
cloud architecture. To optimize IoT-Cloud services, Barcelo et
al. [23] defined the service distribution problem (SDP) of IoT-
Cloud as IoT-CSDP and solve this problem through linear
programming. For IoT-Cloud services, one single service cannot
meet users’ uncertain requirements. Automatic service
compositing is designed and used to realize automatic matching
of services and requirements with the goal of fulfilling users’
requirements with the least number of IoT-Cloud services. In a
multiple Cloud-based IoT application context, Baker et
al. [24] proposed an optimization algorithm to realize energy-
aware service composition.
Service optimization problems (SOPs)—problems with service
selection and service resource scheduling—are caused by the
increasing number of services and increasing variety of
requirements. Based on service domain features, Xu et
al. [25] proposed a paradigm of service domain-oriented
optimization algorithms with artificial bee colony algorithms to
solve SOPs effectively. For services in IoT-Cloud systems,
there are two issues that deserve more attention to achieve the
goal of green and sustainable development; one is that many
users require the same data from the cloud and the other is that
multiple users request data from the cloud simultaneously. To
reduce the resource cost due to these two issues, Zhu et
al. [26] proposed an MMDD scheme. In the process of IoT-
11. Cloud systems providing service, many applications require data
from different regions, i.e., a single virtual machine (VM) in a
particular data center needs to integrate many VSs from
different data centers. To ensure high QoS and maintain user
satisfaction, Chatterjee et al. [27] designed an optimal decision
rule for selecting the appropriate data center, which stores a
single VM to serve users.
However, existing schemes have some shortcomings in terms of
security management and service provision, such as one-
sidedness, low expandability, high resource consumption, large
delay, and inefficiency. Moreover, few studies consider the
repeated/similar service issues encountered in many fields, such
as smart transportation, healthcare, and augmented
reality [28], [29]. Edge computing may present a more
advantageous platform for solving these issues via an integrated
approach; edge computing is an affordable and sustainable
computing paradigm to provide many services [30], [31]. For
the design, the edge network can reduce the unnecessary
communication in the trust evaluation mechanism, maintain the
IoT load balance, perform special IoT services, and ensure data
transfer reliability. Moreover, the edge network is more suitable
for mobile IoT. More fine-grained or integrated service
templates are saved in the edge platform, which is flexible and
scalable to an increasing number of IoT services. Moreover,
many trust evaluation mechanisms can be established in the
edge platform, such as the device fault detection, data error
detection, and internal attack detection at the data level because
edge computing has a lower latency and can identify problems
with a smaller computational cost.
SECTION III.Preliminary
A. Trust Evaluation Mechanism
The concept of trust is based on human social relationships.
There is no precise definition for such a thing in IoT-Cloud.
Zhu et al. [22] proposed a definition in the context of wireless
communications.
12. The trust of a node A in a node B is the subjective expectation
of node A receiving positive outcomes from interaction with
node B in a specific context.
B. Novel Service Architecture
The service architecture of the IoT-Cloud system is divided into
three layers: 1) the data collection layer; 2) the data processing
layer; and 3) the application service layer, as shown in Fig. 1.
In this novel service architecture, the edge network lies in the
data collection layer, the edge platform is located in the data
processing layer and the application service layer, and the cloud
is a part of the application service layer.
Fig. 1.
Typical example for IoT-Cloud service.
View All
The edge network has the following primary advantages.
1. Replacing the recommendation/indirect trust.
2. Balancing the IoT load dynamically and selecting trusted
devices to perform the service by establishing the entire trust
state of the IoT.
3. Executing special user requirements, such as delay, integrity,
and precision.
The edge platform consists of four primary functions.
1. Virtualizing physical devices into virtual devices.
2. Creating the parameter template Templateparameter and the
parsing template Templateparsing in the edge platform.
3. Balancing dynamically the cloud load by providing some
service on the edge platform.
4. Cooperating with the edge network to ensure IoT reliability
at the data level.
The cloud mainly performs the following functions.
1. Parsing user requirements and finding the
related Templateparameter in the cloud, before sending the
special digital information to the target edge platforms.
13. 2. Cooperating with the edge platform to create a
new Templateparsing when there is no
corresponding Templateparsing and storing this
new Templateparameter .
3. Preferentially processing services that have more stringent
demands.
4. Storing a lot of historical data to be used for deeper data
mining and analysis.
C. Three Basic Service Scenes
There are three basic service scenes in which the user
requirements are limited to one IoT, as shown in Fig. 2. Many
mixed-service scenes where the user requirements are based on
multiple IoTs can be expressed as combinations of basic scenes,
for example smart environment applications, such as smart
transportation, healthcare [32], and augmented reality. These
smart environment applications have many users and receive a
large number of repeated/similar requirements.
Fig. 2.
Three types of service scenes. (a) Service Scene 1. (b) Service
Scene 2. (c) Service Scene 3.
View All
In Scene 1, a user requires a service from IoT-1, as shown
in Fig. 2(a). The user enters their requirement in an
application/Web, and then the application/Web sends this
requirement to Edge-1. Edge-1 digitizes this requirement and
checks whether there is a corresponding Templateparameter . If
there is a Templateparameter , the user requirement is
completed by the corresponding Templateparsing in Edge-1. If
not, Edge-1 sends the digitized requirement to the cloud. The
cloud then cooperates with Edge-1 to establish a
new Templateparsing according the specifications of the IoT,
such as its functions, limitations, and precision. Finally, the
cloud sends Templateparameter to Edge-1.
14. In Scene 2, the required IoT-2 is closer to IoT-1. If Edge-1 has
a Templateparameter for the user’s requirement, the requirement
is completed by Edge-1. Edge-1 sends the special digital
information to Edge-2 and receives service results from Edge-2.
If Edge-1 has no Templateparameter , there are several further
steps to satisfy the user’s requirement, as shown in Fig. 2(b). In
step 1, the user sends the service requirement to Edge-1. In step
2, Edge-1 digitizes this requirement. In step 3, Edge-1 sends the
digitized requirement to the cloud because this requirement is
beyond the capability of Edge-1. In step 4, the cloud
seeks Templateparameter , sends the special digital information
to Edge-2, and informs Edge-2 to communicate with Edge-1. If
there is no Templateparameter , the cloud cooperates with Edge-
2 to establish a new Templateparsing . Finally, Edge-2
communicates with Edge-1 to send the service results to the
user. Edges periodically obtain the
latest Templateparameter from the cloud, or the updating is
triggered by the users’ service requirements.
In Scene 3, the situation is similar to Scene 2 except that Edge-
3 is far away from Edge-1. As there is no Templateparameter in
Edge-1, the requirement is completed by performing many
steps, as shown in Fig. 2(c). Starting with step 4, the following
steps have some differences from those described in Scene 2. In
step 4, the cloud seeks a Templateparameter and sends the
special digital information to Edge-3. If there is
no Templateparameter , the cloud cooperates with Edge-3 to
establish a new Templateparsing. In step 5, Edge-3
executes Templateparsing and returns the result to the cloud.
Finally, the cloud returns the service result to Edge-1.
SECTION IV.Design of the Proposed Novel Service
Architecture
A. Coverage of the Edge Network
The design of IoT in IoT-Cloud systems is usually hierarchical,
as shown in Fig. 3. Moreover, mobile IoTs are also based on
similar hierarchical architectures. It is ideal that the edge
15. network obtains high effective coverage through fewer edge
nodes in the IoT [33]. There are two means of managing edge
nodes: 1) the fixed mode and 2) the moving mode.
Fig. 3.
Typical example of IoT.
View All
For the fixed mode, edge nodes are placed in fixed positions of
isoheight. However, this mode requires a large number of edge
nodes to achieve high coverage.
For the moving mode, edge nodes have a fixed isoheight moving
range; this mode needs less edge nodes but has slightly weaker
real-time performance. Internal attacks do not occur all the
time, so the moving mode is a good choice in certain situations.
The key issue associated with this mode is determining how to
dispatch edge nodes to move and how to update the trust state
of the IoT in the edge network. As an example, there are three
isoheights and many edge nodes, such as isoheight−1:(D1,D2 ,
and D3 ), isoheight−2:(D4,D5,D6,D7,D8 , and D9 ),
and isoheight−3:(D10,D11,D12,D13,D14,D15,D16,D17,D18,D1
9,D20 , and D21 ). Every inner edge node communicates with
two outer edge nodes, such as D1with (D4 , D5 ), D2 with
(D6 , D7 ), and D4 with (D10 , D11 ). For information
interaction in the edge network, the outer edge nodes perform
interactions prior to the inner edge nodes. In these
circumstances, the inner edge nodes have more comprehensive
knowledge regarding the IoT. The information updating is
periodic or triggered by great changes, such as devices moving
across areas. The general process of information updating is
from the outside to the inside, and the inner node is used as the
information relay point between two further nodes. If there are
abnormal trust states for some devices, inner edge nodes
interact with corresponding outer edge nodes to verify and even
isolate malicious devices.
16. B. Physical Device Virtualization in the Edge Platform
The virtualization of physical devices is designed to solve the
problem that one physical device cannot be shared by multiple
applications. For virtualization, it is better to prepare a
corresponding virtual device in advance for every physical
device; these virtual devices are stored in the edge platform as
finer-grained resources. As an example of data sharing, when
service parsing templates need to call the physical device, the
edge platform allocates corresponding virtual device interfaces
to these service parsing templates, as shown in (1). The virtual
device sends data to service templates and changes the
parameter settings of physical devices according to relevant
requirements. The key to virtualization is standardization of the
data output format because the data format of physical devices
may be heterogeneous, as shown in (2). A virtual device
receives heterogeneous data and transforms it into a standard
data format. This data is then sent to service templates.
Standardization of the data output format is beneficial for
further data processing, such as aggregation, integration, and
extraction
Devicephysical⇒virtualization⎧ ⎩ ⎨ ⎪ ⎪ Formatdevice−1⋮ Format
device−n⇒access⇒transformationDevicevirtual⇒interface⎧ ⎩ ⎨
⎪ ⎪ Service1⋮ Servicen⎧ ⎩ ⎨ ⎪ ⎪ Device1virtual⋮ DevicenvirtualF
ormatstandard.(1)(2)
View Source
C. Trust Evaluation Mechanism
Table I shows the correspondence relationship between words
and abbreviations.
TABLE I List of Abbreviations
1) Trust Evaluation Mechanism in the IoT:
In the IoT, the main body of trust evaluation mechanism is the
direct trust Tdirect , which is calculated based on evidences
from direct communications among adjacent devices. These
evidences may include the device residual energy, the device
17. routing failure rate, the device communication success rate, the
device data correctness rate, the device signal strength, and the
device forwarding delay. These evidences can be further
organized into three categories: 1) the general trust evidence; 2)
the network state detection evidence; and 3) the confirmation
trust evidence. In every device, the general trust evidence is
stored in an array Arrayevidences , which is then used to
calculate Tdirect , as
Tdirect=f(xi)=∑i=1nWeighti×f(xi)⎧ ⎩ ⎨ ⎪ ⎪ ⎪ ⎪ EvnormalEvtotal
,w1×EvnormalEvtotal+w2×TEvold,0,if ∣ ∣ TEvold−EvnormalEv
total∣ ∣ <Td1if Td1<∣ ∣ TEvold−EvnormalEvtotal∣ ∣ <Td2else(
3)
View Sourcewhere, Weighti is the weight value of the i th piece
of evidence, which is set according to the importance of the i th
piece of evidence. f(xi) is the trust value of the i th piece of
evidence, whose value is between 0 and 1. n is the number of
needed pieces of evidence, which may vary in different IoT
environment. Evnormal is the normal behavior number of times
for the i th device, whereas Evtotal is the total monitoring
number of times for the ith device. Td1 and Td2 are two
thresholds for the difference value between the old trust value
and new trust state, and w1 and w2 are two weight values for
the old trust value and new trust state, whose values are set
according to the monitoring sensitivity. The smaller the values
of Td1 and Td2 are, the higher the sensitivity is. If the value
of w1 is larger, the value of f(xi) would converge quickly
to (Evnormal/Evtotal) in (3).
The network state detection evidence mainly focuses on how to
reduce device communication pressure and ensure network load
balancing dynamically, such as monitoring the routing failure
rate and the communication collision rate to dynamically adjust
the data transfer route of Templateparsing . When this type of
evidence reveals outliers, they are sent to the edge network as
exceptions.
The confirmation trust evidence refers to seriously abnormal
behaviors that directly trigger the trust state confirmation
18. procedure in the edge network, such as larger forwarding delays
and frequent communication requests. There are two types of
exceptions that trigger the trust state confirmation procedure:
one is that the difference value shown in (4) is greater
than Td3 (a threshold set by the manager) during the direct trust
calculation, while the other is that the confirmation trust
evidence triggers this procedure
Difference=∣ ∣ Tnewdirect−Tolddirect∣ ∣ .(4)
View Source2) Trust Evaluation Mechanism in the Edge
Network:
The edge network is parallel to the IoT and does not participate
in normal IoT data transfer. In the edge network, there is a table
in every edge node that stores some information about the
devices and trust states, which is used to ensure that the entire
IoT is credible, as shown in Table II. Time in Table II is the
time since the last trust update.
TABLE II Information About Devices and Trust States
There are a set of rules for the execution of the trust evaluation
mechanism in the edge network.
1. The edge network periodically updates and stores the trust
values of every device. The trust values of every device in the
edge network are affected by three aspects: the first aspect is
the trust values in the IoT (when the updating period arrives,
the edge network selects trust values from trusted devices and
calculates the mean trust value for every device); the second
aspect is the exceptions from the IoT (when the cumulative
amount of these exceptions reaches threshold , trust updating
and the trust confirmation procedure are triggered); and the
third aspect is the exceptions from the edge platform (when
such exceptions happen, the trust value of the corresponding
device is temporarily set to 0, and the trust confirmation
procedure is triggered).
2. In the trust confirmation procedure, the edge network
proactively detects the target device’s behavior and monitors
19. environment information to confirm whether the target device’s
data is unrealistic.
3. For trust values in the IoT, when the updating period arrives,
the edge node obtains trust tables from every device in its
managing scope. Every trust value in these trust tables is
compared with the corresponding final trust value, and trust
values beyond the tolerance range of the corresponding final
trust value are flagged as outliers. If there is a high fraction of
outliers in one trust table, the device is considered to be
malicious.
4. The physical device does not proactively obtain
recommendation trust from the edge network unless there is no
trusted device to transmit data or there is a new device in the
IoT. If the trust value in the physical device is not very
different from the final trust value in the edge network, the edge
network will not change the trust value in physical devices.
5. For isolating malicious devices, the edge node informs
normal devices to remove the route that has malicious devices.
The method of isolating malicious devices using the edge
network is efficient, accurate, and fast.3) Trust Evaluation
Mechanism in the Edge Platform:
The edge platform ensures data credibility at the data level. If
possible, it is more beneficial to collect every physical devices
historical trust values to be used in analyses, such as analyzing
the relationship between the device performance change curve
and the trust value curve, the effect of environment changes on
device trust value and the connection between the load and trust
state for every part of the IoT. Moreover, the edge platform has
the potential to expand further to address the increasing variety
of internal attack types.
Some hidden data attackers may behave normally but produce
incorrect data causing users to make wrong decisions. Detecting
this type of attack is difficult in the IoT because the
establishment of this detection mechanism in the IoT consumes
more resources, such as communication, computation, and
storage. However, the edge platform can use data correlations in
20. the IoT to address hidden data attacks.
1. Device data redundancy. For obtaining more precisely
integrated and stable data, many IoTs allocate more devices to
monitor the same parameter in a certain area. Thus, data from
different devices fluctuate within a fixed range. In the edge
platform, this data can be picked out and judgments can be
performed when the period of detection arrives, as
Tdevice={1,0,if Tdlower<Datadevice<Tdupperelse.(5)
View SourceThe upper limit, Tdupper , and the lower
limit, Tdlower , can be obtained from the underlying edge node
in this area. If data are out of range, the exception would trigger
the detection mechanism.
2. Device data gradualness. The monitored target has
directionality, which can be orderly sensed by devices in this
direction. The topology of the monitoring area is perceived by
underlying edge nodes and this topology is then sent to the edge
platform. According to the data gradualness and topology, the
edge platform can determine the ideal data model, obtain real
data from devices, and contrast this data with the ideal data
model. If there are many outliers, the corresponding physical
devices are considered malicious.
3. Some impossibilities. In monitoring areas, there are some
barriers that prevent devices from detecting the target although
they are close to the target. Thus, if a device breaks this
impossibility, it is considered malicious.
Of course, there may be many factors that cause the trust
evaluation mechanism to misjudge legitimate devices as
malicious devices, such as sudden changes in the environment,
temporary failure of devices, and attacks against the trust
evaluation mechanism. In most cases, these devices will need to
be analyzed based on their previous and future data to
determine whether they are malicious. If not, it is necessary to
perform trust recovery of these devices via the trust
confirmation procedure.
D. Service
21. Since the cloud connects different areas together, services in the
cloud can be divided into two categories: 1) local services and
2) remote services. In local services, users’ requirements can be
completed locally by the edge platform, whereas in remote
services, users’ requirements are completed by the cloud or both
the cloud and the edge platform. The selection of local or
remote services is determined by the resource
consumption Conresource and the total time
consumption Contotaltime , as shown in (6). There are several
judgment criteria and these are shown in Table III
Conresource=Contotaltime=Constorageresource∩Conprocessing
resource∩ConbandwidthresourceContransmissiontime+Contrans
fertime+Conprocessingtime.(6)
View Source
TABLE III Judgment Criteria
In the above, Constorageresource is the required storage
space. Conprocessingresource is the required hardware resource
that is used to process data. Conbandwidthresource is the
bandwidth required for the user service. The values of the above
three factors are 1 or 0. If the value of any factor is 0, the value
of Conresource is 0. Contransmissiontime is the time required
for data transmission, Contransfertime is the required transfer
time spent on routes among the user, cloud and IoT,
and Conprocessingtime is the time required for data processing.
To free the edge platform and cloud from addressing the same
or similar service requirements, it is better to create service
templates (Templateparameter and Templateparsing ) in the
cloud and the edge platform. Templateparameter is created in
the cloud and focuses on areas, service types, service
parameters, etc. Additionally, the edge platform
stores Templateparameter to complete local service
requirements. Another type of template in the edge platform
is Templateparsing , which corresponds
to Templateparameter . Templateparsing pays more attention to
22. the IoT, device, parameter setting, basic service parsing
template Templatebasicparsing ,
etc. Templateparameter consists of three parts: 1) the serial
number of Templateparameter (corresponding to the digitization
of the requirement); 2) the IDcloud (the special serial number
that corresponds to that IDedge in Templateparsing ); and 3) the
execution command (how the cloud sends IDcloud and where
the cloud sends IDcloud ). Templateparsing is composed of
three parts: 1) the IDedge ; 2) the number of strategies
(one Templateparsing may have several strategies); and 3) a
series of commands (the implementation of one strategy). The
service process is presented in Algorithm 1, and the result
processing is rendered in Algorithm 2.
Algorithm 1 Service Process
User’s Requirement
ArrayEdge−1result,Arraycloudresult , Resultintegration // Two
result sets that are in the cloud and Edge-1, respectively
Req→Edge−1 ; // User’s requirement is sent to Edge-1 in these
service scenes
Req→extraction Set(area,rangeparameter,typeparameter,⋯,types
ervice) ; // Edge-1 extracts important information from the
user’s requirement and puts it into Set
Set→digitizationArrayparameter+Resultintegration ; //Edge-1
digitizes Set into a series of numbers that correspond
to Templateparameter , and the integration manner of these
results is stored in Resultintegration
Arrayparameter→lengthLengtharray ;
for i from 1 to LengthArray do //Finding Templateparameter for
every Parameter
if Array[i]∈ Templateparameter and Conresource==1 in Edge-
1 then //Templateparameter is in Edge-1 and Edge-1 can
complete this part
Edge-1 sends IDcloud in Templateparameter to corresponding
Edges;
Edges find Templateparsing according to IDcloud and execute
23. it;
Edges return results to Edge-1, and Edge-1 stores these results
into ArrayEdge−1result ;
else
Send Array[i] to the cloud;
if Array[i]∈ Templateparameter in
cloud then // Templateparameter is in the cloud
if Cloud.Contotaltime>Edge1.Contotaltime and Conresource==1
of Edge-1 then //Edge-1 can independently accomplish this part
with less time
The cloud sends IDcloud in Templateparameter to
corresponding target Edges;
Edges find Templateparsing according to IDcloud and execute
it;
Edges return results to Edge-1, and Edge-1 stores these results
into ArrayEdge−1result ;
Edge-1 updates its Templateparameter from the cloud;
else
The cloud sends IDcloud in Templateparameter to
corresponding target Edges;
Edges find Templateparsing according to IDcloud and execute
it;
Edges return results to the cloud, and the cloud stores these
results into Arraycloudresult ;
end if
else //Creating new Templateparameter
The cloud checks specifications of Edges and generate a
new Templateparameter ;
The cloud sends parsing commands and Templateparameter to
target Edges and instructs Edges to construct a
new Templateparsing ;
Edges complete services through the edge network;
if Cloud.Contotaltime>Edge.Contotaltime and Conresource==1
of Edge-1 then
Edges return results to Edge-1, and Edge-1 stores these results
into ArrayEdge−1result ;
24. else
Edges return results to the cloud, and the cloud stores these
results into Arraycloudresult ;
end if
end if
end if
end for
Algorithm 2 Result Processing
ArrayEdge−1result,Arraycloudresult , Resultintegration
Service Result
if Edge-1 satisfies Resultintegration then //Edge-1 can perfect
final result processing
Calculating the transmission time of ArrayEdge−1result from
Edge-1 to the cloud, Edge1.Contransmissiontime ; //Method:
removing the common parts of two assumptions, and compare
their different parts
Calculating the transmission time of Arraycloudresult from the
cloud to Edge-1, Cloud.Contransmissiontime ;
Getting the transfer time consumption from Edge-1 to
cloud, Contransfertime ;
if Edge1.Contransmissiontime+Contransfertime<Cloud.Contrans
missiontime then //The expected time consumption in Edge-1 is
larger than in the cloud
Selecting the cloud as the platform for final result processing;
Returning the final result to Edge-1 and user;
else
Selecting Edge-1 as the platform for final result processing;
Returning the final result to user;
end if
else
Selecting the cloud as the platform for final result processing;
Returning the final result to Edge-1 and user;
end ifTheorem 1:
All time complexities in digitization,
Seeking Templateparameter and
25. Seeking Templateparsing are O(1) .Proof:
The digitization of requirement is correlated with the method of
establishing the table. As an example, assume that the number
of broad categories is M , and the number of subgroupings for
every broad category is a variable N . The maximum number of
lookups is (M+Nmax) , whose time complexity is O(1) . Of
course, there may be many levels, such as level(M,J,I) . In this
case, the total number of lookups is (M+J+I+Nmax), whose time
complexity is also O(1) .
The seeking of Templateparameter and Templateparsing can be
realized by converting from the number to the address of table,
whose time complexity is O(1) . To reduce the size of the data
table, tables are also built in a hierarchical manner, such
as level(A,B,C). In this case, the number of lookups
is (A+B+C) , whose time complexity is O(1) .
Next, the services of IoT-Cloud are introduced in detail from
three aspects as follows.1) Service in the Cloud and the Edge
Platform:
Requniversal⇒extraction⇒match⎧ ⎩ ⎨ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ areatypeser
vice⋮ typeparameter⇒digitizationParameterTemplateparameter⇒
distribution⎧ ⎩ ⎨ ⎪ ⎪ Edge−1⋮ Edge−n.(7)
View Source
User requirements can be divided into two categories: 1)
universal requirements Requniversal and 2) special
requirements Reqspecial . For Requniversal , there is a
corresponding Templateparameter in the cloud or the edge
platform. The execution process of Requniversal is shown
in (7). First, some important information is extracted
from Requniversal and placed into a
set Set(area , typeservice, typeparameter,…, rangeparameter ).
Second, Set is digitized as a Parameter (single service) or a set
of Parameter that are Set(parameter) (combined services).
Third, the cloud or the edge platform locates the
corresponding Templateparameter from its database.
Finally, IDcloud is sent to the corresponding edge platforms.
Every Templateparameter may have several IDcloud that
26. correspond to several edge platforms. This method not only
reduces the data transfer volume but also shortens the service
parsing time.
There are many notes.
1. The user requirements are from websites or Apps that have
fixed formats.
2. The cloud digitizes important information as a serial number
and seeks an appropriate Templateparameter using this serial
number. Of course, the digitization mostly occurs on the edge
platform.
3. For the distribution, it is better to select high-trust edges.
However, if there are many requirements that are in the waiting
queue, the cloud should select other trusted edges unless the
user has special demands.
4. If there are some new edges, the cloud should create or
update new Templateparameter according to the edges’
specifications.
For Reqspecial , there is no Templateparameter in the cloud or
the edge platform. After digitizing important information about
the users requirement as Parameter, the cloud finds appropriate
edges according to Parameter and the edges’ specifications. The
cloud then generates Templateparameter . Subsequently, parsing
commands and this new Templateparameter are sent to the
corresponding edges. Finally, the cloud guides the edge
platforms to establish Templateparsing . Meanwhile, the service
is finished by the edge network. If there are many edge
platforms that can meet the demands, the cloud will select
trusted edge platforms to complete this requirement. If edge
platforms can finish it, Templateparameter is stored in the cloud
and the edge platform, and Templateparsing is stored in the
edge platform.2) More Services in the Edge Platform:
In different Templateparsing , commands tend to contain a lot
of overlapping parts, so combinations of overlapping parts can
fulfill these commands. These overlapping parts are designed
as Templatebasicparsing ; these Templatebasicparsing constitute
more complex Templateparsing , as shown in (8). Moreover,
27. these Templatebasicparsing should be variable to address
changing service requirements
⎧ ⎩ ⎨ ⎪ ⎪ ⎪ ⎪ Templatebasic−1parsing⋮ Templatebasic−nparsing
→combinationTemplateparsing.(8)
View Source
There are several notes.
1. Since many applications can share data from one physical
device, the standard state setting of this physical device should
be based on the frequency of requirements.
2. For low-frequency requirements whose state setting norms
are lower than the standard state setting, the data volume can be
reduced to satisfy these requirements. In this manner, the
performance of the edge is guaranteed, and the service waiting
time is decreased.
3. For low-frequency requirements whose state setting norms
are high than the standard state settings, the edge network can
be utilized to perform these services.
These Templatebasicparsing and Templateparsing are stored in
the edge platform. When parsing commands from the cloud are
sent to the edge platform, the edge platform directly finishes
them using the edge network and creates Templateparsing .
When IDcloudis sent from the cloud to the edge platform, the
edge platform directly seeks the
corresponding Templateparsing to finish it.3) Service in the
Edge Network:
Edge computing takes on two important roles in IoT-Cloud
services. The first is that edge computing can maintain the
performance and QoS of the IoT. The second is that edge
computing can execute special tasks without increasing the
communication load of the IoT.
The edge network records the trust states of all devices in the
IoT and these records are used to create data transfer routes.
Moreover, in the process of creating or
updating Templateparsing , the edge network provides the trust
state of every device to the edge platform. The edge platform
creates one or more transfer routes for
28. every Templatebasicparsingor Templateparsing . When one
transfer route has some problems, Templateparsingadopts other
transfer routes to perform services. Through this method, the
credibility and real-time nature of data can be well guaranteed.
Since edge computing has advantages for performing IoT
functions, the edge network is employed to realize special
services, such as more-real-time services, higher priority
services, and more precise location services.
SECTION V.Evaluation
In this section, the performance of the trust evaluation
mechanism and the service time consumption are described and
discussed.
A. Parameter Settings
The simulation platform is MATLAB R2016b. The experimental
setting consists of four IoTs and one cloud, where every IoT has
an edge platform, and the cloud is located in the middle of the
four IoTs. Edge-2 and Edge-4 are closer to Edge-1, and Edge-3
is far from Edge-1. In every IoT, there are 56 devices. These
devices are randomly distributed in the IoT, and different types
of devices are placed in each IoT for some specific experiments.
Six underlying edge nodes are placed on two isoheights of every
IoT. We set the following: for general IoT services, the transfer
time from the user to the cloud is 26 ms. However, for novel
IoT-Cloud services based on edge (BOE) computing, the
transfer time from the user to the cloud is divided into two
parts: 1) the transfer time from the user to the edge (8 ms) and
2) the transfer time from the edge to the cloud (18 ms). The
transfer time between two adjacent edges is 12 ms. In the
experiment, there are four types of abnormal devices: 1)
temporary fault devices; 2) malicious behavior devices; 3)
general abnormal devices; and 4) malicious data devices. These
parameters are shown in Table IV.
TABLE IV Experimental Parameters
29. B. Service Time
In this part, the service time consists of three parts: 1) the data
transfer time; 2) the data transmission time; and 3) the data
processing time. For a clear comparison, the service time is
divided into three phases: 1) the service time from the user to
the target edge; 2) the service execution time in the IoT; and 3)
the service time from the target edge to the user.
Symbols and their corresponding names are listed in Table V,
and these symbols are used in the following formulas.
TABLE V Symbols and Their Corresponding Names
1) Service Time From the User to the Target Edge:
There are some differences between service processes of the
general IoT service and the novel IoT service BOE computing.
These differences in the service time are demonstrated by using
three basic experimental scenes and four mixed experimental
scenes, as shown in Fig. 4.
Fig. 4.
Service time from the user to the target edge. (a) Three basic
scenes. (b) Four mixed scenes.
View All
Fig. 4(a) shows that the service time of “service with parameter
template” is shorter than that of “general IoT-Cloud service” in
the basic scenes. The reason is that service with parameter
template avoids repeatedly executing the service parsing
procedure.
For general IoT-Cloud service, the service time is calculated
using (12). In the basic Scene 1, the service time of service with
parameter template is calculated using (9), which
removes Timecommand , T.TimeEdge−1cloud and T.TimecloudI
oT . In the basic Scene 2, the service time of service with
parameter template is calculated via (10), which does not
require relay via the cloud. In Scene 3, the service time of
30. service with parameter template is calculated via (11), which
has advantages in the process of parsing user
requirements. Timematch spends less time than Timecommand ,
and Timedigi in service with parameter template is similar
to Timeextraction of general IoT-Cloud service.
The total service time in mixed scenes is calculated through the
combination of three basic equations. Service with parameter
template has advantages in shortening total service time relative
to general IoT-Cloud service, as shown in Fig. 4(b)
TimeReqScene1=TimeReqScene2=TimeReqScene3=TimeReqge
neral=T.TimeuserEdge−1+Timedigi+TimematchT.TimeuserEdge
−1+Timedigi+Timematch+T.TimeEdge−1Edge−2T.TimeuserEdg
e−1+Timedigi+Timematch+T.TimeEdge−1cloud+T.TimecloudE
dge−3T.Timeusercloud+Timeextraction+Timecommand+T.Time
cloudIoT.(9)(10)(11)(12)
View Source2) Service Execution Time in the IoT:
The service execution time in the IoT mainly consists of two
parts: 1) the service time from edge to the target
device Timeedgetargetdevice and 2) the service time from the
target device to edge Timetargetdeviceedge , as shown in (13).
The service execution time based on the edge network is
minimal because it can more accurately locate the target device
and has shorter routes. The service execution time of “template
with trust evaluation mechanism” is shorter than that of
“template without trust evaluation mechanism” because the trust
evaluation mechanism is more likely to select high-trust devices
to transfer data and can balance the IoT load dynamically.
Moreover, the trust evaluation mechanism can
help Templateparsing create several better data transfer routes
to enhance the service stability. The fraction of low-
performance devices and the degree of network congestion have
certain influences on the service execution time, as shown
in Fig. 5. Since the edge network is located outside the IoT, the
fraction of low-performance devices and the degree of network
congestion have weaker influences on its service execution
time. Template with trust evaluation mechanism selects
31. appropriate data transfer routes in advance; thus, it can
effectively avoid low-performance devices, as shown in Fig.
5(a). As the fraction of low-performance devices exceeds 50%,
the time consumption obviously increases because template with
trust evaluation mechanism is more likely to select trusted
devices that are in the same level. When considering the
influence of network congestion on the service execution time,
the number of low-performance device is set to 5. The influence
of network congestion on template with trust evaluation
mechanism is slightly weaker than that on “template without
trust evaluation mechanism” originally, as shown in Fig. 5(b),
but the phenomenon begins to reverse after the fraction of busy
devices reaches 50%. The reason for this result is that template
with trust evaluation mechanism tends to select trusted devices
in the peer level to balance the network load
TimeExecutionIoT=Timeedgetargetdevice+Timetargetdeviceedg
e.(13)
View Source
Fig. 5.
Service execution time in IoT. (a) Influence from the number of
low-performance device. (b) Influence from the degree of
network congestion.
View All3) Service Time From the Target Edge to the User:
To calculate the service time from the target edge to the user,
the service data volume and location of the service data
processing center must be considered (edge or cloud). “1+x”
indicates that there is a very large amount of service data, and
“0+x ” indicates that there is a small amount of service data.
Additionally, “x+1 ” indicates that the service data processing
center lies at edge, whereas “x+0 ” indicates that the service
data processing center is situated in the cloud.
For 1+x , the service time consists of the data transmission
time, the data transfer time, and the data processing time, as
shown in (14). For 0+x , the service time is composed of the
32. data transfer and the data processing time, as shown in (15).
Because the data processing time is changeable, the data
transmission time and the data transfer time are the major
factors considered
Timeresult1+x=Timeresult0+x=Timetransmission+Timetransfer
+TimeprocessingTimetransfer+Timeprocessing.(14)(15)
View Source
0+1: If users’ requirements can be completed in edge, the total
service time of service with parameter template would be
shorter, as shown in Fig. 6. For the three basic scenes, service
with parameter template can obviously shorten the service time
in Scene 1 and Scene 2, as shown in Fig. 6(a), because service
with parameter template avoids relay via the cloud. The service
time of service with parameter template in Scene 3 is almost
equal to that of general IoT-Cloud service. For the four mixed
scenes, the total service time of service with parameter template
is shorter than that of general IoT-Cloud service because Scene
1 or Scene 2 is in the mixed scenes, as shown in Fig. 6(b).
Fig. 6.
Service time from the target edge to the user (0 + 1). (a) Basic
scene. (b) Mixed scenes.
View All
0+0: In this situation, the service time of service with parameter
template is almost the same as that of general IoT-Cloud
service. It should not be ignored that edge has certain
pretreatment capabilities and can independently perform part of
mixed services. Moreover, with improving edge performance,
this situation is becoming rarer.
1+1: When the volume of service data influences the total
service time, we perform several experiments to measure the
degree of this influence. This part is related to Algorithm 2. For
the basic Scenes 1 and 2, it is a better choice to select Edge-1 as
the data processing center, as shown in Fig. 7. If the cloud is
the data processing center, there would be additional costs in
33. the transfer time since the cloud is a relay point. For the basic
Scene 3, if the data volume difference between Edge-3 and
Edge-1 (Edge-3 has more data) has less time
consumption Timetransmission than T.TimeEdge−1cloud , it
would be a better choice that selecting Edge-1 as the data
processing center. This method derives from “Remove the
common parts of two assumptions, and compare their different
parts.” For mixed scenes, we select two mixed scenes in the
experiment, as shown in Fig. 7(c) and (d). The data volume of
the result in the cloud is set as Volumecloud (more data) and
the data volume of result in the edge as Volumeedge ;
otherwise, Edge-1 is the better selection. Only when the data
volume difference
between Volumecloud and Volumeedgeexceeds the threshold
value [the intersection points in Fig. 7(c) and (d)], the data
processing center is the cloud. The threshold value represents
that the time consumption of different parts whose two
assumptions are the same. Mixed Scene 2 + 3 has fewer
advantages than mixed Scene 1+3 in selecting edge as the data
processing center, since the threshold in mixed Scene 2+3 is
smaller than that in mixed Scene 1+3. Other mixed scenes
change the threshold value through adjusting the slope of
“Additional cost in the transmission time (Edge).” The higher
the transmission rate is, the more likely it is that edge is
selected.
Fig. 7.
Service time from the target edge to the user (1 + 1). (a) Basic
Scene 1. (b) Basic Scene 2. (c) Mixed Scene 1 + 3. (d) Mixed
Scene 2 + 3.
View All
1+0: When the service data processing center must be in the
cloud, the service times of both service with parameter template
and general IoT-Cloud services are almost equal. However, with
enhanced edge performance, edge can address more service
34. requirements in the future.
Note: For some mixed scenes in this novel architecture, their
basic scenes can quickly perform the next service when
completing part of the service.
C. Trust Evaluation Mechanism Performance
In the IoT, there are four types of abnormal devices: 1)
temporary fault devices; 2) malicious behavior devices; 3)
general abnormal devices; and 4) malicious data devices. The
change in the trust value of an abnormal device is measured
after it is detected, as shown in Fig. 8. There are three types of
trust evaluation mechanisms that are used for comparison: 1)
BOE; 2) based on cluster head (BOCH); and 3) general
combined trust (GCT, consisting of direct trust,
recommendation trust or indirect trust). The difference between
the BOE and BOCH trust mechanisms is that the latter belongs
to the IoT and may have multihop distances to the outermost
devices. In the trust evaluation mechanism, there should be
periodic trust updating to ensure the latest network trust state,
and this trust updating period was set to 50.
Fig. 8.
Trust value changes of abnormal devices. Trust value changes
of the (a) temporary fault device, (b) malicious behavior device,
(c) general abnormal device, and (d) malicious data device.
View All
In this experiment, the “mean trust value” is calculated based on
the trust values from all other devices that have interactions
with the abnormal device except for the abnormal discovery
device. The first discovery device performs a trust evaluation of
the abnormal device and generates the “trust value of the
device.” The trust updating in the edge network is triggered by
three types of events: 1) periodic trust updating; 2)
accumulation value exception; and 3) command from the edge
platform. In GCT and BOCH, the discovery device first requests
35. recommendation values from adjacent devices or cluster heads
when an abnormality is detected. The discovery device then
calculates the final trust value of the abnormal device using
rules, such as basing the calculation on weight.
The temporary fault device returns to normal after a short time
(ten time slots); the trust value change of this device is shown
in Fig. 8(a). “Trust value in the edge network” has no changes
due to fewer exceptions from the IoT. However, the “mean trust
value (BOE)” decreases because the discovery devices update
the trust value of the abnormal device through the direct trust.
In GCT, the discovery device finds and updates the trust value
of the abnormal device, but the mean trust value is greater
because other adjacent devices have not yet detected this
abnormal device. BOCH is similar to GCT except for featuring
a longer delay.
When the accumulation of exceptions exceeds a threshold, the
edge network updates and confirms the trust value of the
abnormal device, as shown in Fig. 8(b). For GCT and BOCH,
the trust value of the abnormal device is approximately 0.4 (no
trust); thus, discovery devices no longer communicate with this
abnormal device. When the trust updating period arrives, the
abnormal device is regarded as a malicious device, and its trust
value is set to 0 throughout the entire IoT.
For the general abnormal device, the execution process of BOE
is similar to that in the malicious behavior detection, as shown
in Fig. 8(c). The general abnormal device still has a higher trust
value, so it can be selected to transfer data. When the trust
updating period arrives, the final trust is calculated.
The malicious data device behaves normally but generates
incorrect data to cause the user to make incorrect decisions; the
trust value change of this device is shown in Fig. 8(d). This
abnormality is difficult to detect unless there are some data
analyses at a higher level. Because it is preferable to not
perform a large amount of data analyses in the IoT, GCT, and
BOCH have few advantages for the detection of malicious data
devices. The edge network is located out of the IoT and can thus
36. perform these analyses at a higher level without affecting IoT
performance.
The network resource consumption is an important factor in
estimating the performance of trust evaluation mechanism.
Because BOE is out of the IoT, it consumes less communication
resources than other schemes, as shown in Fig. 9. Moreover,
BOE can perform malicious device detection at the data level,
so the trust updating period can be extended to reduce the IoT
resource consumption. For BOCH, its communication resource
consumption is determined by the cluster depth and cluster
member number (a larger depth and more cluster members
require more communication resource consumption). For GCT,
its communication resource consumption is associated with
executing recommendations or indirect trust calculations, which
is influenced by the number of adjacent devices.
Fig. 9.
IoT communication resource consumption.
View All
SECTION VI.Conclusion
The IoT-Cloud system combines IoT and cloud computing and
has gradually become a research hotspot. However, there are
some security and efficiency problems that must be solved in
IoT-Cloud application services. Aiming at overcoming internal
attacks and repeated/similar service requirements, a novel IoT-
Cloud architecture is designed based on edge computing, in
which the trust evaluation mechanism ensures the IoT’s security
and assists the service template in solving service efficiency
problems. The edge computing layer is composed of two parts:
1) the edge network and 2) the edge platform. The edge network
builds on underlying edge nodes that spread over the IoT, which
are responsible for ensuring the IoT’s security and performing
special tasks. The edge platform consists of a set of powerful
edge nodes (edge servers), which perform well at parsing users’
requirements through service templates with a balance
37. dynamics. Extensive experimental results show that this novel
architecture can greatly improve IoT-Cloud systems service
efficiency and ensure data trustworthiness.
However, for the entire IoT-Cloud system, there is still much
work to be done. Future work will seek to perfect the
architecture and solve other issues through this architecture and
edge computing, such as the IoT service pricing, the service
scheduling, and the service access points setting.