131 research outputs found
Combining Mobile Crowdsensing and Ecological Momentary Assessments in the Healthcare Domain
The increasing prevalence of smart mobile devices (e.g., smartphones) enables the combined use of mobile crowdsensing (MCS) and ecological momentary assessments (EMA) in the healthcare domain. By correlating qualitative longitudinal and ecologically valid EMA assessment data sets with sensor measurements in mobile apps, new valuable insights about patients (e.g., humans who suffer from chronic diseases) can be gained. However, there are numerous conceptual, architectural and technical, as well as legal challenges when implementing a respective software solution. Therefore, the work at hand (1) identifies these challenges, (2) derives respective recommendations, and (3) proposes a reference architecture for a MCS-EMA-platform addressing the defined recommendations. The required insights to propose the reference architecture were gained in several large-scale mHealth crowdsensing studies running for many years and different healthcare questions. To mention only two examples, we are running crowdsensing studies on questions for the tinnitus chronic disorder or psychological stress. We consider the proposed reference architecture and the identified challenges and recommendations as a contribution in two respects. First, they enable other researchers to align our practical studies with a baseline setting that can satisfy the variously revealed insights. Second, they are a proper basis to better compare data that was gathered using MCS and EMA. In addition, the combined use of MCS and EMA increasingly requires suitable architectures and associated digital solutions for the healthcare domain
Social Welfare Maximization Auction in Edge Computing Resource Allocation for Mobile Blockchain
Blockchain, an emerging decentralized security system, has been applied in
many applications, such as bitcoin, smart grid, and Internet-of-Things.
However, running the mining process may cost too much energy consumption and
computing resource usage on handheld devices, which restricts the use of
blockchain in mobile environments. In this paper, we consider deploying edge
computing service to support the mobile blockchain. We propose an auction-based
edge computing resource market of the edge computing service provider. Since
there is competition among miners, the allocative externalities (positive and
negative) are taken into account in the model. In our auction mechanism, we
maximize the social welfare while guaranteeing the truthfulness, individual
rationality and computational efficiency. Based on blockchain mining experiment
results, we define a hash power function that characterizes the probability of
successfully mining a block. Through extensive simulations, we evaluate the
performance of our auction mechanism which shows that our edge computing
resources market model can efficiently solve the social welfare maximization
problem for the edge computing service provider
Is it crowdsourcing or crowdsensing? An analysis of human participation in digital platforms in the age of surveillance capitalism
This paper contributes to studies on the dark side of digitization by relying on the concept of surveillance capitalism to analyze the role of individuals in digital organizations in performing activities known as crowdsourcing. Even though there is a discourse of empowerment and mutual interest exchanges between organizations and individuals through crowdsourcing, the transformation of computer systems into the so-called 4.0 era or 4.0 industry seems to have altered their role in digital organizations as well. These individuals began to be analyzed from the data they produce, and no longer from their desires, thus approaching the sensors of these organizations. Using the case study method, we analyze the contents of the Netflix, Facebook and Google platform home pages, as well as their terms of service and privacy policies. The way users participate in these platforms is analyzed, as well as the way their data are exploited, and the reason why this continuous exploitation of data occurs. We argue that this exploration alienates the empowering and participatory concept of crowdsourcing and brings the passive concept of individuals closer together as sensors, or crowdsensing. This approach, instead of treating individuals as singular, quantifies and categorizes their uniqueness to meet the controlling longings of hegemonic organizational structures, limited by capitalist discourse, or surveillance capitalism
Analysis of web3 solution development principles
In the master's thesis, we researched the principles of Web3 solution development. We studied the blockchain and blockchain-related technology, development of the Web including all versions of the Web and the differences between them. We presented the popular technologies for Web3 development and the most common Web3 solutions with examples. With help of systematic literature review we explored the state-of-art technologies for Web3 solution development and proposed a full-stack for Web3. In the final part we implemented a proof-of-concept Ethereum decentralized application and compared it with equivalent concept of Web2 application. We proposed future work of researching other popular blockchain protocols like Solana or Polygon
A tutorial on the internet of things: from a heterogeneous network integration perspective
The days when the Internet was the only focus of the information society have already gone, and innovative network paradigms such as IoT, cloud computing, smartphone networks, social networks, and industrial networks are gaining popularity and establishing themselves as indispensable ingredients of the future smart universe. Among them, IoT is the most widespread one, envisioned to involve all things in the world. However, its potential will never be fully explored before the complete formation of cyberspace, where humans, computers, and smart objects are pervasively interconnected. Therefore, one of the most important development trends of IoT is its integration with existing network systems. In this tutorial, we provide a detailed analysis of this issue. In particular, the latest achievements, technical solutions, and influential ongoing projects are described, and possible visions and open challenges are also discussed
Crowdsourced network measurements: Benefits and best practices
Network measurements are of high importance both for the operation of networks and for the design and evaluation of new management mechanisms. Therefore, several approaches exist for running network measurements, ranging from analyzing live traffic traces from campus or Internet Service Provider (ISP) networks to performing active measurements on distributed testbeds, e.g., PlanetLab, or involving volunteers. However, each method falls short, offering only a partial view of the network. For instance, the scope of passive traffic traces is limited to an ISP’s network and customers’ habits, whereas active measurements might be biased by the population or node location involved. To complement these techniques, we propose to use (commercial) crowdsourcing platforms for network measurements. They permit a controllable, diverse and realistic view of the Internet and provide better control than do measurements with voluntary participants. In this study, we compare crowdsourcing with traditional measurement techniques, describe possible pitfalls and limitations, and present best practices to overcome these issues. The contribution of this paper is a guideline for researchers to understand when and how to exploit crowdsourcing for network measurements
Architecture Strategies for Cyber-Foraging: Preliminary Results from a Systematic Literature Review
Mobile devices have become for many the preferred way of interacting with the Internet, social media and the enterprise. However, mobile devices still do not have the computing power and battery life that will allow them to perform effectively over long periods of time or for executing applications that require extensive communication or computation, or low latency. Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. This paper presents the preliminary results of a systematic literature review (SLR) on architectures that support cyber-foraging. The preliminary results show that this is an area with many opportunities for research that will enable cyber-foraging solutions to become widely adopted as a way to support the mobile applications of the present and the future
- …