On blockchain integration into mobile crowdsensing via smart embedded devices: A comprehensive survey

2021 ◽  
Vol 115 ◽  
pp. 102011 ◽  
Author(s):  
Zhiyan Chen ◽  
Claudio Fiandrino ◽  
Burak Kantarci
Author(s):  
Marius Iulian Mihailescu ◽  
Stefania Loredana Nita

The current proposal of C++20 features suggests that the coroutines will have dedicated support for the native language. This chapter will provide an analysis that is performed based on a comprehensive survey of coroutines that are used in the development process of the embedded systems and how they are used on dedicated platforms based on their constrained resources. Another important aspect of the work consists of analyzing the performance of designing and implementation of coroutines in software applications related to IoT and embedded devices focusing on the security vulnerabilities of the devices within an IoT ecosystem. The research analysis that forms the basis of the current work is based on metrics, such as software and hardware platform requirements, computation power, scenarios, advantages, and designing user interfaces based on the programming language used. The current work will be completed by adding a comparison with C# 8 programming language and C++20.


2019 ◽  
Vol 21 (3) ◽  
pp. 2849-2885 ◽  
Author(s):  
Yutong Liu ◽  
Linghe Kong ◽  
Guihai Chen

Sensors ◽  
2020 ◽  
Vol 20 (7) ◽  
pp. 2055
Author(s):  
Venkat Surya Dasari ◽  
Burak Kantarci ◽  
Maryam Pouryazdan ◽  
Luca Foschini ◽  
Michele Girolami

Mobile CrowdSensing (MCS) is an emerging paradigm in the distributed acquisition of smart city and Internet of Things (IoT) data. MCS requires large number of users to enable access to the built-in sensors in their mobile devices and share sensed data to ensure high value and high veracity of big sensed data. Improving user participation in MCS campaigns requires to boost users effectively, which is a key concern for the success of MCS platforms. As MCS builds on non-dedicated sensors, data trustworthiness cannot be guaranteed as every user attains an individual strategy to benefit from participation. At the same time, MCS platforms endeavor to acquire highly dependable crowd-sensed data at lower cost. This phenomenon introduces a game between users that form the participant pool, as well as between the participant pool and the MCS platform. Research on various game theoretic approaches aims to provide a stable solution to this problem. This article presents a comprehensive review of different game theoretic solutions that address the following issues in MCS such as sensing cost, quality of data, optimal price determination between data requesters and providers, and incentives. We propose a taxonomy of game theory-based solutions for MCS platforms in which problems are mainly formulated based on Stackelberg, Bayesian and Evolutionary games. We present the methods used by each game to reach an equilibrium where the solution for the problem ensures that every participant of the game is satisfied with their utility with no requirement of change in their strategies. The initial criterion to categorize the game theoretic solutions for MCS is based on co-operation and information available among participants whereas a participant could be either a requester or provider. Following a thorough qualitative comparison of the surveyed approaches, we provide insights concerning open areas and possible directions in this active field of research.


2016 ◽  
Vol 14 (3) ◽  
pp. 253-274 ◽  
Author(s):  
C. M. Lorkowski

I argue that acknowledging Hume as a doxastic naturalist about belief in a deity allows an elegant, holistic reading of his Dialogues. It supports a reading in which Hume's spokesperson is Philo throughout, and enlightens many of the interpretive difficulties of the work. In arguing this, I perform a comprehensive survey of evidence for and against Philo as Hume's voice, bringing new evidence to bear against the interpretation of Hume as Cleanthes and against the amalgamation view while correcting several standard mistakes. I ultimately isolate the interpretation of Philo's Reversal at the end of the Dialogues as of paramount importance, and show how my naturalistic interpretation makes this, and other notoriously difficult passages, unproblematic.


2010 ◽  
Vol 4 (1-2) ◽  
pp. 75-96
Author(s):  
Mohammed Rustom

This article offers the first comprehensive survey of scholarly literature devoted to the Qur??nic works of the famous Muslim philosopher, Mull? ?adr? (d. 1050/1640). While taking account of the merits and shortcomings of studies on ?adr?’s Qur??nic writings, we will also be concerned with highlighting some of the methodological problems raised by the diverse range of approaches adopted in these studies. Chief amongst them is the tendency to pit ?adr? the philosopher against ?adr? the scriptural exegete. Such a dichotomy is not entirely helpful, both with respect to painting a clearer picture of ?adr?’s religious worldview, and to addressing broader questions pertaining to the intimate relationship shared between the “act” of philosophy and the “act” of reading scripture.


2016 ◽  
Vol 2 (1) ◽  
pp. 45-66 ◽  
Author(s):  
Douglas Scott
Keyword(s):  

This paper outlines the background to earlier studies of the orientation of the OrkneyCromarty (OC) passage cairns and the Clava passage and ring cairns, and details the outcome of a new and comprehensive survey carried out by the author over recent years. The paper sets out evidence of orientations in both sets of cairns to the eight divisions of the year and tests whether the alignments were observable. The results were compared to see if the Clava cairns had been influenced by the older OC cairns. Other solar and/or lunar aligned monuments are also briefly examined, as is relevant folklore.


2021 ◽  
Vol 33 (1) ◽  
pp. 012009
Author(s):  
Aiko Narazaki ◽  
Hideyuki Takada ◽  
Dai Yoshitomi ◽  
Kenji Torizuka ◽  
Yohei Kobayashi

Author(s):  
P. Jeyadurga ◽  
S. Ebenezer Juliet ◽  
I. Joshua Selwyn ◽  
P. Sivanisha

The Internet of things (IoT) is one of the emerging technologies that brought revolution in many application domains such as smart cities, smart retails, healthcare monitoring and so on. As the physical objects are connected via internet, security risk may arise. This paper analyses the existing technologies and protocols that are designed by different authors to ensure the secure communication over internet. It additionally focuses on the advancement in healthcare systems while deploying IoT services.


Sign in / Sign up

Export Citation Format

Share Document