131 research outputs found

    Combining Mobile Crowdsensing and Ecological Momentary Assessments in the Healthcare Domain

    Get PDF
    The increasing prevalence of smart mobile devices (e.g., smartphones) enables the combined use of mobile crowdsensing (MCS) and ecological momentary assessments (EMA) in the healthcare domain. By correlating qualitative longitudinal and ecologically valid EMA assessment data sets with sensor measurements in mobile apps, new valuable insights about patients (e.g., humans who suffer from chronic diseases) can be gained. However, there are numerous conceptual, architectural and technical, as well as legal challenges when implementing a respective software solution. Therefore, the work at hand (1) identifies these challenges, (2) derives respective recommendations, and (3) proposes a reference architecture for a MCS-EMA-platform addressing the defined recommendations. The required insights to propose the reference architecture were gained in several large-scale mHealth crowdsensing studies running for many years and different healthcare questions. To mention only two examples, we are running crowdsensing studies on questions for the tinnitus chronic disorder or psychological stress. We consider the proposed reference architecture and the identified challenges and recommendations as a contribution in two respects. First, they enable other researchers to align our practical studies with a baseline setting that can satisfy the variously revealed insights. Second, they are a proper basis to better compare data that was gathered using MCS and EMA. In addition, the combined use of MCS and EMA increasingly requires suitable architectures and associated digital solutions for the healthcare domain

    Social Welfare Maximization Auction in Edge Computing Resource Allocation for Mobile Blockchain

    Full text link
    Blockchain, an emerging decentralized security system, has been applied in many applications, such as bitcoin, smart grid, and Internet-of-Things. However, running the mining process may cost too much energy consumption and computing resource usage on handheld devices, which restricts the use of blockchain in mobile environments. In this paper, we consider deploying edge computing service to support the mobile blockchain. We propose an auction-based edge computing resource market of the edge computing service provider. Since there is competition among miners, the allocative externalities (positive and negative) are taken into account in the model. In our auction mechanism, we maximize the social welfare while guaranteeing the truthfulness, individual rationality and computational efficiency. Based on blockchain mining experiment results, we define a hash power function that characterizes the probability of successfully mining a block. Through extensive simulations, we evaluate the performance of our auction mechanism which shows that our edge computing resources market model can efficiently solve the social welfare maximization problem for the edge computing service provider

    Is it crowdsourcing or crowdsensing? An analysis of human participation in digital platforms in the age of surveillance capitalism

    Get PDF
    This paper contributes to studies on the dark side of digitization by relying on the concept of surveillance capitalism to analyze the role of individuals in digital organizations in performing activities known as crowdsourcing. Even though there is a discourse of empowerment and mutual interest exchanges between organizations and individuals through crowdsourcing, the transformation of computer systems into the so-called 4.0 era or 4.0 industry seems to have altered their role in digital organizations as well. These individuals began to be analyzed from the data they produce, and no longer from their desires, thus approaching the sensors of these organizations. Using the case study method, we analyze the contents of the Netflix, Facebook and Google platform home pages, as well as their terms of service and privacy policies. The way users participate in these platforms is analyzed, as well as the way their data are exploited, and the reason why this continuous exploitation of data occurs. We argue that this exploration alienates the empowering and participatory concept of crowdsourcing and brings the passive concept of individuals closer together as sensors, or crowdsensing. This approach, instead of treating individuals as singular, quantifies and categorizes their uniqueness to meet the controlling longings of hegemonic organizational structures, limited by capitalist discourse, or surveillance capitalism

    Analysis of web3 solution development principles

    Get PDF
    In the master's thesis, we researched the principles of Web3 solution development. We studied the blockchain and blockchain-related technology, development of the Web including all versions of the Web and the differences between them. We presented the popular technologies for Web3 development and the most common Web3 solutions with examples. With help of systematic literature review we explored the state-of-art technologies for Web3 solution development and proposed a full-stack for Web3. In the final part we implemented a proof-of-concept Ethereum decentralized application and compared it with equivalent concept of Web2 application. We proposed future work of researching other popular blockchain protocols like Solana or Polygon

    A tutorial on the internet of things: from a heterogeneous network integration perspective

    Get PDF
    The days when the Internet was the only focus of the information society have already gone, and innovative network paradigms such as IoT, cloud computing, smartphone networks, social networks, and industrial networks are gaining popularity and establishing themselves as indispensable ingredients of the future smart universe. Among them, IoT is the most widespread one, envisioned to involve all things in the world. However, its potential will never be fully explored before the complete formation of cyberspace, where humans, computers, and smart objects are pervasively interconnected. Therefore, one of the most important development trends of IoT is its integration with existing network systems. In this tutorial, we provide a detailed analysis of this issue. In particular, the latest achievements, technical solutions, and influential ongoing projects are described, and possible visions and open challenges are also discussed

    Crowdsourced network measurements: Benefits and best practices

    Get PDF
    Network measurements are of high importance both for the operation of networks and for the design and evaluation of new management mechanisms. Therefore, several approaches exist for running network measurements, ranging from analyzing live traffic traces from campus or Internet Service Provider (ISP) networks to performing active measurements on distributed testbeds, e.g., PlanetLab, or involving volunteers. However, each method falls short, offering only a partial view of the network. For instance, the scope of passive traffic traces is limited to an ISP’s network and customers’ habits, whereas active measurements might be biased by the population or node location involved. To complement these techniques, we propose to use (commercial) crowdsourcing platforms for network measurements. They permit a controllable, diverse and realistic view of the Internet and provide better control than do measurements with voluntary participants. In this study, we compare crowdsourcing with traditional measurement techniques, describe possible pitfalls and limitations, and present best practices to overcome these issues. The contribution of this paper is a guideline for researchers to understand when and how to exploit crowdsourcing for network measurements

    Architecture Strategies for Cyber-Foraging: Preliminary Results from a Systematic Literature Review

    Get PDF
    Mobile devices have become for many the preferred way of interacting with the Internet, social media and the enterprise. However, mobile devices still do not have the computing power and battery life that will allow them to perform effectively over long periods of time or for executing applications that require extensive communication or computation, or low latency. Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. This paper presents the preliminary results of a systematic literature review (SLR) on architectures that support cyber-foraging. The preliminary results show that this is an area with many opportunities for research that will enable cyber-foraging solutions to become widely adopted as a way to support the mobile applications of the present and the future
    • …
    corecore