Write My Paper Button

WhatsApp Widget

LU Shandi Buckner Capstone Proposal

Share this post on:

LU Shandi Buckner Capstone Proposal – Description

Replies require peer review of at least 3 of your classmates’ problem statements and research questions. Evaluate existing problem statements and research questions according to the assigned reading and relevant scholarly journal articles. Peer review must be constructive! Although it can be difficult to hear, “The research question can be improved based upon…,” relevant and appropriate feedback must help peers develop a strong Master’s Thesis! The goal in the replies is to help colleagues in a respectful manner using constructive critique. Reference 2 Timothy 2:23–26 as an example.

Post 1
Shandi Buckner
Shandi Buckner
Analyzing the Effects of Virtual Reality on the Healthcare Sector
Lack of Research on the Benefit of VR in Healthcare

Virtual reality, often referred to as the metaverse, has swiftly taken society by storm. Virtual reality allows for users to step outside of actual reality and step into a world with endless backdrops and experiences through virtual reality. Virtual reality usually consists of a headset with handheld controllers or interactive gloves that can stimulate a unique environment and portray the users’ actual movements into that environment either through a first person or third person view. Virtual can be defined as “being in essence but not in fact” and reality as “a state or quality of being real.” Since virtual worlds can be created through virtual reality, this can allow creators to design virtual products, environments, and experiences. Since virtual reality is a relatively new concept, the issue with this is that there is little research done on the effects of using virtual reality and VR assisted tools. Bu et el. (2021) states that virtual reality (VR) technology has a great benefit as it allows the combination of manufacturing and information technology. It is important to study the effects of this in multiple sectors but most particularly, the healthcare sector could greatly benefit through having a virtual reality platform or have products that are assisted by the use of virtual reality. Bu et el. (2021) states that VR assisted healthcare products offer increased prevention, rehabilitation, and palliative care services to patients. Unfortunately, due to the lack of consistent of VR and VR supported tools in healthcare, there is no simple way to track the benefits of VR in healthcare. “Demonstrating significant improvement in healthcare outcomes using the metaverse will be difficult to prove” (Ganapathy, 2022). In an article written by nursing students, Saap et el. (2022) writes that VR in healthcare can provide unique benefits such as reaching a group of people in need of care who would otherwise be difficult to reach via traditional measures. This would be particularly helpful for patients who need at-home care and are unable to travel to a hospital for treatment.

3.1 Aim and Objectives

The aim of this project is to develop an application that takes patient input and data from their virtual reality sessions and displays this information for their healthcare professionals. Kouijzer et el. (2023) states that despite potential value to healthcare, virtual reality in healthcare is still in its infancy and has taken longer to implement on a large scale. Kouijzer et el. (2023) also states that in order for VR to better suit the healthcare sector, there must be standardization in implementation as well as strategies to use the data from VR to help doctors, patients, and companies. This application will help aid healthcare professionals who are among the first to adapt virtual reality to their practice with assistance in tracking patient information such as their progress and response to their virtual reality treatments, making better decisions regarding their patient’s care, and supporting the advancement of the healthcare environment. This information will be tracked and recording on the application. For this application, the patient’s response to their virtual reality treatment will be given in a percentage. The goal for this application is to also highlight areas that are responding well in treatment and places where there can be improvement. This will help give healthcare professionals the data they need to better tailor their simulated VR environments and tools.

To achieve the above aim, the following objectives would be addressed during the project:

To develop a user-friendly GUI that allows healthcare professionals to easily see how their patient is responding to their virtual reality treatment
To integrate patient data and analyze it for decision making about their care
To record patient progress and monitor this data against patients’ goals
To have a database management system to store patient information for future use and also for the advancement of using virtual reality in the healthcare sector

3.2 Recommendations

Kouijzer et el. (2023) recommends that in order for VR to better suit the healthcare sector, there must be standardization in implementation as well as strategies to use the data from VR to help doctors, patients, and companies. This application will serve as a basis for a framework to be built upon to better support VR in healthcare.

3.3 Research Question

What are the effects and benefits of virtual reality in healthcare?

3.4 Methodology

I will be using SQL programming language to create a GUI for a database management system to display the outcomes of using virtual reality in healthcare. This GUI will display the patient’s personal information, their scheduled virtual reality tasks, their progress to completion, and which tasks the patients excels in and/or needs improvement. SQL is being used as it is relatively simple to design a GUI using this platform. A GUI, or graphical user interface, is a visualization of data being recorded. This visualization will help aid in the determination of any benefit of virtual reality in healthcare. Lee et el. (2023) states GUIs are preferred over text-based approaches due to better understanding and satisfaction with content layout, images, navigation, and aesthetics. Lee et el. (2023) also states that GUIs are especially helpful for novice to low-literacy user as the extensive graphics help provide a better understanding.

3.5 Expected Product and Model

The expected product will be a database management system presented as a GUI using SQL. There will be two actors – patient and doctor. The doctor will have access to the back-end system and will be able to update information stored within the database such as assigning tasks to patients, recording the results of the task, and viewing the patient’s information such as tasks completed and any notes or comments. The patient will have a limited view and only have access to the front-end system which will display their patient information, VR tasks completed, and any notes or feedback from the doctor on their task. Both doctor and patient will have a login. This will help provide extra security as the patient does not need access to the back-end system. This will prevent any unwanted access to sensitive data of the patients. Below is the use case and functions of the application:

REFERENCES

Bu, L., Chen, C., Ng, K. K. H., Zheng, P., Dong, G., & Liu, H. (2021). A user-centric design approach for smart product-service systems using virtual reality: A case study. Journal of Cleaner Production, 280, 124413. https://doi.org/10.1016/j.jclepro.2020.124413

Ganapathy, K. (2022). Metaverse and healthcare: A clinician’s perspective. Apollo Medicine, 19(4), 256-261. https://doi.org/10.4103/am.am_103_22

Kouijzer, Marileen M T E, Kip, H., Bouman, Y. H. A., & Kelders, S. M. (2023). Implementation of virtual reality in healthcare: A scoping review on the implementation process of virtual reality in various healthcare settings. Implementation Science Communications, 4(1), 67-67. https://doi.org/10.1186/s43058-023-00442-2

Lee, M., Kang, D., Joi, Y., Yoon, J., Kim, Y., Kim, J., Kang, M., Oh, D., Shin, S., & Cho, J. (2023). Graphical user interface design to improve understanding of the patient-reported outcome symptom response. PloS One, 18(1), e0278465-e0278465. https://doi.org/10.1371/journal.pone.0278465

Saab, M. M., Landers, M., Murphy, D., O’Mahony, B., Cooke, E., O’Driscoll, M., & Hegarty, J. (2022). Nursing students’ views of using virtual reality in healthcare: A qualitative study. Journal of Clinical Nursing, 31(9-10), 1228-1242. https://doi.org/10.1111/jocn.15978
Post 2:
Sean Fitzgerald

Problem Statement:

Internet of Things (IoT) devices have become increasingly popular and as such have created congestion with the interoperability between the gateway and the device itself inside home networks. To fix this, the router should have a protocol that limits the amount of congestion that one device can produce on the network. This will limit the number of packets an IoT device can produce in a particular set of time.

Research Question:

Will there be an increase in interoperability between the gateway and IoT devices with the implementation of a new packet-limiting protocol?

Article 1:

Authors: Abhishek Khanna & Sanmeet Kaur
Title: Internet of Things (IoT), Applications and Challenges: A Comprehensive Review
Citation: Khanna, A., & Kaur, S. (2020). Internet of Things (IoT), Applications and Challenges: A Comprehensive Review. Wireless Personal Communications, 114(2), 1687–1762. https://doi.org/10.1007/s11277-020-07446-4
Gaps: The article talks about the concepts of IoT such as an overview of the evolution of the devices and talks about the potential future integration of Artificial Intelligence (AI) into the IoT infrastructure. However, there is a lack of literature about the interoperability and standardization of IoT.
Recommendations: The authors recommend that as IoT devices continue to proliferate there would need to be standardization of the protocols used and frameworks to ensure interoperability among the vast amounts of IoT devices. Thus, future research could help investigate the development and adoption of standards that could create better data exchanges between IoT devices.

Article 2:

Authors: Moussa Aboubakar, Mounir Kellil, & Pierre Roux
Title: A review of IoT network management: Current status and perspectives
Citation: Aboubakar, M., Kellil, M., & Roux, P. (2022). A review of IoT network management: Current status and perspectives. Journal of King Saud University – Computer and Information Sciences, 34(7), 4163–4176. https://doi.org/10.1016/j.jksuci.2021.03.006
Gaps: The gaps in this literature refer to network performance problems due to a variety of different reasons. Some of these include error-prone communication and poor radio channels. Another gap is the lack of efficient management for IoT networks, which would be needed to ensure decent network performance.
Recommendation: One of the recommendations of this article is to continue research on improved network management protocols to make network traffic more efficient with IoT devices. According to the article, they should focus on resource-constrained devices and error-prone communication channels. One of the other recommendations is to enhance the `discovery of different IoT devices which could include device configuration, discovery, monitoring, and control of IoT devices on a network. Lastly, the authors talk about the need for future research into standardization and interoperability as there is a vastly large number of different manufacturers of IoT devices with no set standard or framework. With more research into this, it could allow for more seamless integration with IoT devices on a network.

Article 3:

Authors: N.N. Srinidhi, S.M. Dilip Kumar, & K.R. Venugopal
Title: Network optimizations in the Internet of Things: A review
Citation: Srinidhi, N. N., Kumar, S., & Venugopal, K. R. (2019). Network optimizations in the Internet of Things: A review. Engineering Science and Technology, an International Journal, 22(1), 1–21. https://doi.org/10.1016/j.jestch.2018.09.003
Gaps: There are a few gaps in this literature that were not focused on but the primary one for this study was the gap in IoT networks requiring optimized routing. IoT devices require a vast amount of data to ensure structured communication between the gateway and other devices.
Recommendations: This article talked about future research needed in congestion management where there can be a technique or protocol that can handle large amounts of data generated by IoT devices. Along with this, there also would need to be work in standardization and interoperability of IoT devices to achieve better integrations among the gateway and the diverse IoT devices.

Article 4:

Authors: Dylan Kauling, May AlTaei, & Qusay H. Mahmoud
Title: Impact of IoT device saturation on home WiFi networks
Citation: Kauling, D., AlTaei, M., & Mahmoud, Q. (2018, April 1). Impact of IoT device saturation on home Wi-Fi networks. IET Conference Publication | IEEE Xplore. https://ieeexplore.ieee.org/document/8643192/metri…
Gaps: This article had gaps regarding limited research on the impacts of always-on IoT devices on a home wireless network. Insufficient exploration of how IoT devices can impact a router and network performance. One of the other gaps is the discrepancies with different routers when they were subjected to the increasing number of active IoT devices.
Recommendations: The authors recommend testing additional smart devices to determine their impact on network performance and find what devices if any require more data to be transmitted. Doing this future research will help with understanding and performance of consumer-grade routers with large amounts of IoT devices.
Post 3:
David Healy

David Healy
Impact of artificial intelligence on network security
Exploring the role of artificial intelligence in the detection, prevention, and mitigation of ransomware in enterprise networks.

The growing number of ransomware attacks on businesses and institutions demonstrates that a stronger and smarter solution in the detection and prevention of these attacks is needed. The problem statement addresses the role artificial intelligence (AI) can play in mitigating ransomware attacks. The research will look into AI as it applies to network security including intrusion detection and prevention, threat analysis, network security posture and incident response. Traditional methods of threat detection and prevention will be compared to AI methods to evaluate effectiveness.

Businesses are experiencing a cyber security talent shortage, leaving critical roles vacant and current IT staff overloaded with network responsibilities (Rashotte, 2023). Cybercrime is becoming more sophisticated and widespread; businesses are more likely to experience a breach. According to Rashottle (2023) in the past year, 84% of organizations surveyed said they fell victim to a cyberattack. Nearly a third of enterprises confirmed they suffered five or more breaches representing a 53% increase over the previous year (Rashotte, 2023). With this alarming information businesses need an improved security solution that can adapt and learn as the threat landscape changes. The ability of AI to learn without human intervention and analyze vast amounts of data can help IT departments with limited resources. This research aims to provide and answer to whether AI can defend against the growing number of threats. AI should be used to assist cyber analysts, not replace them. AI can process large amounts of data quickly and has a good recognition effect but may not judge the situation accurately. Human beings can give a quick judgement of network changes as they are more flexible, AI may not judge the same situation the same or accurately (Zhang et al., 2021).

Rapid response to a cyber attack is crucial to prevent a system breach and loss of data. AI machine learning techniques may use information to detect breaches after they occur to provide alerts to possible impending breaches before they occur by detecting attempts to scan a network or deliver malware payloads (Wolf, 2021). AI tools may be used to aid in isolating threats before they can damage systems or used to collect forensic data to aid incident response and recovery (Wolf, 2021).

3.1 Aim and objectives.

The aim of this project is to examine the use of AI in network security in relation to traditional security tools including the limitations of an AI based security approach. A traditional security system is the installation of a firewall to prevent unauthorized access. An intrusion detection system is based on passive measures that use statistical analysis and look for know signatures of threats ((Demertzis & Iliadis, 2015).

To achieve the above aim, the following objectives would be addressed during the project:

AI based threat detection and prevention compared to traditional signature-based detection methods.
How AI can use behavior analysis to learn normal network traffic and differentiate between potential threatening traffic.
Vulnerability management through the use of AI to automatically update and patch discovered vulnerabilities.
AI’s incident response measures in securing a network during an attack.

3.2 Research Question

What role will AI play in the detection and prevention of ransomware and how can it be used effectively against ransomware threats to secure enterprise networks?

REFERENCES

Rashotte, R. (2023, March 23). Fortinet 2023 skills gap report: How organizations can fill the talent shortage. CSO Online. https://www.csoonline.com/article/574881/fortinet-2023-skills-gap-report-how-organizations-can-fill-the-talent-shortage.html

Wolf, C. (2021, April 1). Breaking down the pros and cons of AI in cybersecurity. ASIS. https://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2021/april/breaking-down-the-pros-and-cons-of-ai-in-cybersecurity/

Demertzis, K., Iliadis, L. (2015). A Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security. In: Daras, N., Rassias, M. (eds) Computation, Cryptography, and Network Security. Springer, Cham. https://doi.org/10.1007/978-3-319-18275-9_7

Zhang, Z., Ning, H., Shi, F., Farha, F., Xu, Y., Xu, J., Zhang, F., & Choo, K. R. (2021). Artificial intelligence in cyber security: Research advances, challenges, and opportunities. Artificial Intelligence Review, 55(2), 1029-1053. https://doi.org/10.1007/s10462-021-09976-0

The post LU Shandi Buckner Capstone Proposal first appeared on .

Share this post on:

Affordable and Dependable Platform for Your Academic Assignments

X