{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T22:45:53Z","timestamp":1761864353444,"version":"3.41.2"},"reference-count":26,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T00:00:00Z","timestamp":1635206400000},"content-version":"vor","delay-in-days":298,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Computational Intelligence and Neuroscience"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Families, physicians, and hospital environments use remote patient monitoring (RPM) technologies to remotely monitor a patient\u2019s vital signs, reduce visit time, reduce hospital costs, and improve the quality of care. The Internet of Medical Things (IoMT) is provided by applications that provide remote access to patient\u2019s physiological data. The Internet of Medical Things (IoMT) tools basically have a user interface, biosensor, and Internet connectivity. Accordingly, it is possible to record, transfer, store, and process medical data in a short time by integrating IoMT with the data communication infrastructure in edge computing. (Edge computing is a distributed computing paradigm that brings computation and data storage closer to the sources of data. This is expected to improve response times and save bandwidth. A common misconception is that edge and IoT are synonymous.) But, this approach faces problems with security and intrusion into users\u2019 medical data that are confidential. Accordingly, this study presents a secure solution in order to be used in the IoT infrastructure in edge computing. In the proposed method, first the clustering process is performed effectively using information about the characteristics and interests of users. Then, the people in each cluster evaluated by using edge computing and people with higher scores are considered as influential people in their cluster, and since users with high user interaction can publish information on a large scale, it can be concluded that, by increasing user interaction, information can be disseminated on a larger scale without any intrusion and thus in a safe way in the network. In the proposed method, the average of user interactions and user scores are used as a criterion for identifying influential people in each cluster. If there is a desired number of people who are considered to start disseminating information, it is possible to select people in each cluster with a higher degree of influence to start disseminating information. According to the research results, the accuracy has increased by 0.2 and more information is published in the proposed method than the previous methods.<\/jats:p>","DOI":"10.1155\/2021\/6509982","type":"journal-article","created":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T22:35:15Z","timestamp":1635287715000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Improving the Security and Confidentiality in the Internet of Medical Things Based on Edge Computing Using Clustering"],"prefix":"10.1155","volume":"2021","author":[{"given":"Anita","family":"Hatamian","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7829-7885","authenticated-orcid":false,"given":"Mohammad Bagher","family":"Tavakoli","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7215-0807","authenticated-orcid":false,"given":"Masoud","family":"Moradkhani","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"311","published-online":{"date-parts":[[2021,10,26]]},"reference":[{"key":"e_1_2_7_1_2","first-page":"87","article-title":"Inform ation discovery in location-based social networks (LBSN) with the aim of providing a spatial recommender system","volume":"3","author":"Forghani A.","year":"2014","journal-title":"Journal of Surveying Science and Technology"},{"key":"e_1_2_7_2_2","first-page":"40","article-title":"Investigation of user interface elements and components in clustering information retrieval systems","volume":"26","author":"Hosseini R.","year":"2011","journal-title":"Information Science and Technology"},{"key":"e_1_2_7_3_2","unstructured":"MirzaeiM. HamidzadehJ. andSavadiS. A new fuzzy method for clustering heterogeneous nodes in wireless sensor networks Proceedings of the International Conference on Nonlinear Systems and Electrical and Computer Engineering Optimization November 2015 Shillong India."},{"key":"e_1_2_7_4_2","unstructured":"EslamiR. Samaneh GolpayeganiH. andAlirezaS. Identifying associations in social networks based on user behavior and using game theory approach Proceedings of the 8th International Conference on Information and Knowledge Technology Hamedan Iran Information and Communication Technology Association September 1395 Hamedan Iran Bu Ali Sina University."},{"key":"e_1_2_7_5_2","unstructured":"HooshmandnejadN.andNoushfarM. Recognizing the association in the social media graph using structural similarities between individuals Proceedings of the First International Conference on New Perspectives in Electrical and Computer Engineering Tehran International Federation of Inventors\u2019 Associations (IFIA) Comprehensive University of Applied Sciences July 2016 London UK."},{"key":"e_1_2_7_6_2","unstructured":"SharifzadehF.andBarariM. Presenting a new index to identify active and influential nodes in social networks using imperialist competitive algorithms Proceedings of the International Conference on Information Engineering and Technology August 2017 Dalian China UAE-Dubai Culture and Technology Research Institute Research Center For Culture Art."},{"key":"e_1_2_7_7_2","unstructured":"VernamkhastiJ. Mohammad andNedaJ. Identification and ranking of social networks in Iran and their role in business management Proceedings of the First International Conference on Systems Optimization and Business Management August 2017 Jaipur India Babol Noshirvani University of Technology - Iranian Association for operations research."},{"key":"e_1_2_7_8_2","unstructured":"DastaniM.andMokhtarzadehM. Motivation to use virtual social networks in Iranian users: a review of texts Proceedings of the 12th Annual Research Congress of Medical Students in the East Gonabad September 2017 Gonabad Iran Student Research Committee of Gonabad University of Medical Sciences and Health Services."},{"key":"e_1_2_7_9_2","article-title":"Graph in social networks","volume":"2","author":"Saberi A.","year":"2017","journal-title":"Journal of Science and Engineering Elites"},{"key":"e_1_2_7_10_2","unstructured":"MirzarzaH.andJavanmardM. Clustering social networks using multilayer perceptron neural network 10 Proceedings of the Third National Conference on Distribution Computing and Big Data Processing May 2017 Tabriz Iran Azerbaijan Shahid Madani University."},{"key":"e_1_2_7_11_2","unstructured":"LavasaniA. B. ShamilaS. andHamidiH. The impact of social networks on information dissemination through viral marketing 8 Proceedings of the Second International Conference on Management and Accounting Tehran August 2017 Bandung Indonesia Salehan Institute of Higher Education."},{"key":"e_1_2_7_12_2","article-title":"A new mechanism to reduce the error of detecting shill attacks in recommender systems","volume":"4","author":"Lee U. J.","year":"2016","journal-title":"Journal of Management the Information Technology, Shuanghai, China"},{"key":"e_1_2_7_13_2","unstructured":"DostiM. Application of decision tree algorithm in data mining 6 Proceedings of the Fifth International Conference on Computer Electrical and Electronics Engineering January 2016 Kuala Lumpur - Malaysia Pendar Hamayesh Pars Institute IUMW University of Kuala Lumpur."},{"key":"e_1_2_7_14_2","unstructured":"YarA.andAlireza Presenting the problem of optimizing a three-method system and a path generation algorithm based on graph theory to find optimal paths in a social network 11 Proceedings of the Second National Conference on Computer and Electrical Sciences Hamedan Permanent Conference Secretariat October 2014 Prayagraj India Shahid Mofteh University."},{"volume-title":"Provide a Genetic Algorithm to Identify Hierarchical Clustering in Social Networks, Master\u2019s Degree in Computer Engineering","year":"2016","author":"Donaldson M.","key":"e_1_2_7_15_2"},{"key":"e_1_2_7_16_2","unstructured":"AndersonR. The discovery of information in the location-based social networks with the aim of providing a spatial advisory system Texas University USA Austin TX USA 2015 M. S Thesis of Computer- Software."},{"key":"e_1_2_7_17_2","first-page":"8","article-title":"Identify effective communication channels in social networks based on message diffusion","volume":"5","author":"Manson F.","year":"2015","journal-title":"Computer Science Quarterly"},{"key":"e_1_2_7_18_2","unstructured":"FitzS. Discover communities on social networks by exploring repetitive patterns Berlin University Berlin Germany 2012 MS Thesis of Information Technology."},{"key":"e_1_2_7_19_2","unstructured":"BensonR. Virtual social networks and identity crisis (with an emphasis on identity crisis) Oxford University Oxford UK 2016 MS Thesis of Information Technology."},{"key":"e_1_2_7_20_2","first-page":"12","article-title":"Investigating factors affecting information dissemination in social networks with clustering and artificial neural networks methods","volume":"7","author":"Ashley T.","year":"2016","journal-title":"Computer Engineering Magazine"},{"key":"e_1_2_7_21_2","first-page":"15","article-title":"Violation of security in the dissemination of information in social networking associations","volume":"8","author":"Alex S.","year":"2015","journal-title":"Computer Magazine"},{"key":"e_1_2_7_22_2","unstructured":"BroniF. Investigate the dissemination of information on social networks Paris University Paris France 2015 MS Thesis of Information Technology."},{"key":"e_1_2_7_23_2","first-page":"3","article-title":"Study and review the main data exchange in the intranet networks","volume":"4","author":"Kloni T.","year":"2015","journal-title":"Computer Quarterly"},{"key":"e_1_2_7_24_2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511996368"},{"volume-title":"Research Methods in Various Technical and Engineering Sciences","year":"2011","author":"Bayani A.","key":"e_1_2_7_25_2"},{"key":"e_1_2_7_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3051080"}],"container-title":["Computational Intelligence and Neuroscience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/cin\/2021\/6509982.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/cin\/2021\/6509982.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/6509982","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T12:03:49Z","timestamp":1722945829000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/6509982"}},"subtitle":[],"editor":[{"given":"Navid","family":"Razmjooy","sequence":"additional","affiliation":[],"role":[{"role":"editor","vocabulary":"crossref"}]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/6509982"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6509982","archive":["Portico"],"relation":{},"ISSN":["1687-5265","1687-5273"],"issn-type":[{"type":"print","value":"1687-5265"},{"type":"electronic","value":"1687-5273"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-07-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-09-14","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-10-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"6509982"}}