scholarly journals Proof-of-Prestige: A Useful Work Reward System for Unverifiable Tasks

2021 ◽  
Vol 21 (2) ◽  
pp. 1-27
Author(s):  
Michał Król ◽  
Alberto Sonnino ◽  
Mustafa Al-Bassam ◽  
Argyrios G. Tasiopoulos ◽  
Etienne Rivière ◽  
...  

As cryptographic tokens and altcoins are increasingly being built to serve as utility tokens, the notion of useful work consensus protocols is becoming ever more important. With useful work consensus protocols, users get rewards after they have carried out some specific tasks useful for the network. While in some cases the proof of some utility or service can be provided, the majority of tasks are impossible to verify reliably. To deal with such cases, we design “Proof-of-Prestige” (PoP)—a reward system that can run directly on Proof-of-Stake (PoS) blockchains or as a smart contract on top of Proof-of-Work (PoW) blockchains. PoP introduces “prestige,” which is a volatile resource that, in contrast to coins, regenerates over time. Prestige can be gained by performing useful work, spent when benefiting from services, and directly translates to users minting power. Our scheme allows us to reliably reward decentralized workers while keeping the system free for the end-users. PoP is resistant against Sybil and collusion attacks and can be used with a vast range of unverifiable tasks. We build a simulator to assess the cryptoeconomic behavior of the system and deploy a full prototype of a content dissemination platform rewarding its participants. We implement the blockchain component on both Ethereum (PoW) and Cosmos (PoS), provide a mobile application, and connect it with our scheme with a negligible memory footprint. Finally, we adapt a fair exchange protocol allowing us to atomically exchange files for rewards also in scenarios where not all the parties have Internet connectivity. Our evaluation shows that even for large Ethereum traces, PoP introduces sub-millisecond computational overhead for miners in Cosmos and less than 0.013$ smart contract invocation cost for users in Ethereum.

2021 ◽  
Author(s):  
Pradeepkumar Ashok ◽  
John D' Angelo ◽  
Dawson Ramos ◽  
Michael Yi ◽  
Taylor Thetford ◽  
...  

Abstract Hole cleaning is important in preventing stuck pipe events during well construction operations. A cuttings transport model is traditionally used to determine the cleanliness of a hole, but its real-time rig site implementation is often made difficult by a lack of necessary inputs. There is a need for a simpler yet reliable approach to quantifying hole cleanliness using data readily available at the rig site. The paper proposes a method that relies on the detection of events over a long time horizon and the use of key parameters relating to such events to quantify hole cleanliness. These events are then related through duration and frequency to probabilistic features in a Bayesian network, to infer the probability that the hole cleaning process has been efficient or poor. These events are also weighted by their age to ensure that current beliefs are not strongly influenced by those that are far in the past. The method was deployed on a drilling advisory system and is currently used on rigs in North American land operations. The events and features found to be most relevant to quantifying hole cleanliness were the circulation rates during drilling, tight spots when moving the drillstring, bit hydraulics, and prolonged periods of inactivity. Proactive hole cleaning actions such as working of the pipe, off bottom circulation and pipe rotation were also considered. The Bayesian network model used by the proposed method was able to be run with low computational overhead (micro-seconds on a standard edge device) compared to a traditional cuttings transport model. This was enabled by an event logging procedure that keeps track of hole-cleaning events over time and consolidates several hours (days) of drilling information into relevant hole-cleaning features that can be processed quickly. The proposed method was validated with statistical methods using surface datasets from six wells involved in North American land operations. Through this validation it was determined that the method was highly effective in correctly characterizing hole conditions throughout the well operation. On the rig, the system was helpful in not only in alerting the drillers whenever hole cleanliness deteriorated but also providing the most likely causes of the deterioration. This provided the rig crew real-time guidance to make actionable decisions to avoid a stuck pipe situation. The proposed method differentiates itself from the published methods of hole cleaning analysis in two main aspects. First, it does not presume to estimate the cuttings bed height or accumulation over time. Instead, it attempts to infer the probability that the hole cleaning operations are effective over time using features in data that suggest efficient or poor hole cleaning. Second, this method provides a clear indication of when hole cleaning actions are needed and why.


Author(s):  
Mohammad Jalalpour ◽  
Mahmoud Reda Taha ◽  
Aly El-Osery

Sensors are frequently used in damage diagnosis for structural health monitoring (SHM) of aerospace structures. This process typically requires a considerably large number of sensors. By increasing the number of sensors, the amount of data collected, though useful, becomes a burden due to the required computational overhead. In this paper, a random correlation cumulative approach is used to track damage intensity and propagation. The relative correlation between any two randomly chosen sensors is recorded and compared over time. The randomness of the process leads to detecting and tracking any arbitrary crack propagation. A case study for damage detection and tracking using 40 sensors in a steel plate is presented and discussed. It is shown that the proposed method can successfully allow damage tracking while limiting the data considered in the sensor network.


Author(s):  
Alka Singh

At the moment, we find that tourists usually spend more time planning their trip because they need to spend every minute. In this context, this application aims to identify the main computer needs to support the improvement of the tourist promotion point, using the mobile application proposal. Currently, for regular tourists and travelers they spend a lot of time planning and deciding on their trip to achieve maximum satisfaction. In this case, the app aims to identify the main computer needs to support the development of the tourist promotion point. This paper suggests a model for use in an intelligent visitor information system. It uses the concept of knowledge-base. The model will be based on a study of human behavior as a tourism guide. It builds a relationship between an information-based system and a guide, to provide a service to any visitor who meets their needs and the purpose of obtaining location information. There are different modules, different methods of acquisition methods and a shorter way to acquire the ingenuity of the artificial intelligence in this thesis. The proposed system should be designed in such a way that it works on most devices namely palmtop and mobiles. So it can be helpful when visiting new places. This application will find the route using user terms. The short-term method of finding an algorithm should work well and in the right way in most cases. The system must find a method that fulfills the user's terms, indicating the name of the item, images related to a brief description of the location. It should also be able to find the distance, time and travel costs to your destination and over time the user can also make bookings using the app interface only.


2021 ◽  
Vol 10 (1) ◽  
Author(s):  
Maisarah Mohd Saleh ◽  
Siti Aishah Abd Rahman ◽  
Ainamardia Nazarudin ◽  
Nurul Ain Abu Kasim ◽  
Fatin Aqilah Abdul Razak

Diet and nutrition apps are among the most popular health and fitness apps used by an increasing number of mobile device users. Undeniably, health and nutrition are some of the valuable aspects of life. With the introduction of mobile computing, health knowledge became much easier to understand due to its mobility and usability. A vast range of smartphone apps is emerging for tracking health and food. However, the existing mobile applications in Malaysia are lacking some important features. To address this limitation, the present mobile application responds by attempting to design and develop a Malaysian mobile nutrition application known as EatNTrack. EatNTrack is a mobile nutrition application that provides crucial features such as the ability to capture the food especially Malaysian foods, scanning food barcode, set the goal and calories of the day, a reminder for the user to capture the food, monthly progress of user, and integration with a wearable device. The needs of these features will give insight into many aspects of a user's eating habits. The more specific and accurate users with reporting, the more accurate their information will be. The aim of the study was to establish an innovative mobile-based dietary awareness tool that could be used to monitor target users' food intake. Keywords: nutrition, mobile application, food calories, track calories, health


Author(s):  
Dongshuo Wang ◽  
Bin Zou ◽  
Minjie Xing

Language learners at all levels need a way of recording and organising newly learned vocabulary for consolidation and for future reference. Listing words alphabetically in a vocabulary notebook has been a traditional way of organising this information. However, paper-based notes are limited in terms of space (learners often run out of space for certain categories; for others the space might be unused) and time (handwritten pages deteriorate over time and cannot easily be updated). Organizing vocabulary in more meaningful categories might make it easier to learn. Textbooks, for example, often introduce new vocabulary thematically. Words can also be organised according to their grammatical class or characteristics, their real world category (e.g. modes of transport, means of communication), their phonological pattern, their etymological elements, or according to when/where they were learnt. This research experiments how the mobile learning of a lexical spreadsheet can be used for the consolidation of and reference to new vocabulary. Offering the learner multiple ways of organising vocabulary at the same time – combining all of the approaches mentioned above, the resource can easily be modified and updated. Importantly, in keeping with autonomous learning theory, the spreadsheet is designed to encourage learners to take more responsibility for their own vocabulary learning and to approach this process more systematically. The resource can be used from any mobile smart phone, tablet or i-Pad.


Data ◽  
2021 ◽  
Vol 6 (4) ◽  
pp. 41
Author(s):  
Stella Markantonatou ◽  
Katerina Toraki ◽  
Panagiotis Minos ◽  
Anna Vacalopoulou ◽  
Vivian Stamou ◽  
...  

We present AΜAΛΘΕΙA (AMALTHIA), an application ontology that models the domain of dishes as they are presented in 112 menus collected from restaurants/taverns/patisseries in East Macedonia and Thrace in Northern Greece. AΜAΛΘΕΙA supports a tourist mobile application offering multilingual translation of menus, dietary and cultural information about the dishes and their ingredients, as well as information about the geographical dispersion of the dishes. In this document, we focus on the food/dish dimension that constitutes the ontology’s backbone. Its dish-oriented perspective differentiates AΜAΛΘΕΙA from other food ontologies and thesauri, such as Langual, enabling it to codify information about the dishes served, particularly considering the fact that they are subject to wide variation due to the inevitable evolution of recipes over time, to geographical and cultural dispersion, and to the chef’s creativity. We argue for the adopted design decisions by drawing on semantic information retrieved from the menus, as well as other social and commercial facts, and compare AMAΛΘΕΙA with other important taxonomies in the food field. To the best of our knowledge, AΜAΛΘΕΙA is the first ontology modeling (i) dish variation and (ii) Greek (commercial) cuisine (a component of the Mediterranean diet).


Author(s):  
Jing Chen ◽  
Huangyi Ge ◽  
Ninghui Li ◽  
Robert W. Proctor

Objective The goal of this study was to examine the relation between users’ reported risk concerns and their choice behaviors in a mobile application (app) selection task. Background Human users are typically regarded as the weakest link in cybersecurity and privacy protection; however, it is possible to leverage the users’ predilections to increase security. There have been mixed results on the relation between users’ self-reported privacy concerns and their behaviors. Method In three experiments, the timing of self-reported risk concerns was either a few weeks before the app-selection task (pre-screen), immediately before it (pre-task), or immediately after it (post-task). We also varied the availability and placement of clear definitions and quizzes to ensure users’ understanding of the risk categories. Results The post-task report significantly predicted the app-selection behaviors, consistent with prior findings. The pre-screen report was largely inconsistent with the reports implemented around the time of the task, indicating that participants’ risk concerns may not be stable over time and across contexts. Moreover, the pre-task report strongly predicted the app-selection behaviors only when elaborated definitions and quizzes were placed before the pre-task question, indicating the importance of clear understanding of the risk categories. Conclusion Self-reported risk concerns may be unstable over time and across contexts. When explained with clear definitions, self-reported risk concerns obtained immediately before or after the app-selection task significantly predicted app-selection behaviors. Application We discuss implications for including personalized risk concerns during app selection that enable comparison of alternative mobile apps.


2021 ◽  
Vol 35 (2) ◽  
pp. 191-216
Author(s):  
Benjamin F. Jones

Economics research is increasingly performed in teams, and team-authored work has a large and increasing impact advantage. This article considers the benefits and costs of this “rise of teams.” Among its benefits, teamwork allows individuals to aggregate knowledge in productive and novel ways. For example, as knowledge accumulates over time, individuals become narrower in their expertise, and teamwork is a natural organizational approach to aggregating expertise and maintaining one’s reach. But teamwork also brings costs. For example, teamwork divides and obscures credit, which is central to the reward system of science. By clouding credit assignment, teamwork can undermine individual career progression and exacerbate issues of bias. In addressing the rise of teamwork, this paper further considers institutional innovations, especially those inspired by the hard sciences, that can help limit the costs teamwork imposes while realizing the benefits.


Author(s):  
Boumediene Ramdani ◽  
Oswaldo Lorenzo ◽  
Peter Kawalek

The attention of software vendors has moved recently to Small to Medium-sized Enterprises (SMEs) offering them a vast range of Information Systems’ (IS) innovations including enterprise systems (ES), which were formerly adopted by large firms only. Although the number of SMEs adopting new IS innovations has increased over time, strong empirical evidence is still lacking. This paper aims to fill this gap by reporting the findings of a survey on SMEs located in the Northwest of England. The survey results reveal that even more complex IS innovations are increasingly adopted by SMEs. Also, nearly half of the surveyed SMEs are willing to adopt ES in the next three years. These findings suggest that there is a considerable opportunity and a need for further research in the adoption and diffusion of new IS innovations among SMEs.


2015 ◽  
Vol 13 (32) ◽  
pp. 75-88
Author(s):  
Faber Ignacio Robayo ◽  
Jhon Alexander Neira ◽  
Martín Adolfo Vásquez

This work consists of the real-time measurement of anthropometric variables, such as weight, by means of a digital scale, and height, by means of an ultrasonic sensor HC-SR04; these data are read by an Arduino Nano card and sent through an HC-05 Bluetooth module to the Android mobile operating system, which has an application where the values are processed. The mobile application uses the received variables and other data that the user enters, calculates the BMI (body mass index), the ideal weight, and, according to the result, creates a personal record of weight and nutritional status to be stored in a database each time the user chooses a new control. In addition, the data accumulated over time can be viewed in a web page that contains dynamic graphs of the evolution of the user’s body weight and baseline nutritional status. This project helps to create awareness among the population about the risks to health of being overweight, obese or lean.


Sign in / Sign up

Export Citation Format

Share Document