SlideShare a Scribd company logo
1 of 69
IoT Notifications: from disruption to
benefit
Architectures for the future of notifications in the IoT
Presenter
Teodoro Montanaro
In collaboration with
Fulvio Corno
Pino Castrogiovanni
Supervisor(s)
2
Research GOAL
Investigate the intelligence component in Internet of Things (IoT) architectures
and applications: study, define, and prototype intelligent distributed
architectures that may extract additional value and intelligent behaviors to some
significant sample problems, representative of future IoT scenarios.
The distribution and customization of notifications in the IoT domain has been
treated as an example of possible future IoT scenarios.
3
Notification Context: sample scenario
Source: https://iot.do/windstream-research-future-connected-home-community-2015-04
4
Notification Context: sample scenario
Source: https://iot.do/windstream-research-future-connected-home-community-2015-04
Date: 9th September 2018
5
Notification Context: sample scenario
Source: https://iot.do/windstream-research-future-connected-home-community-2015-04
Date: 9th September 2018 Time: 19.00
6
Notification Context: sample scenario
Source: https://iot.do/windstream-research-future-connected-home-community-2015-04
Date: 9th September 2018 Time: 19.00
5 people:
Mum: is preparing the washing machine
Dad: is reading a newspaper
Clara: is using her pc on her bedroom
John: is working on his PC
Frank: is working out on the tapis roulant
7
Notification Context: sample scenario
Source: https://iot.do/windstream-research-future-connected-home-community-2015-04
Date: 9th September 2018 Time: 19.00
5 people:
Mum
Dad
Clara
John
Frank
8
Notification Context: sample scenario
Date: 9th September 2018 Time: 19.00
5 people:
Mum
Dad
Clara
John
Frank
Various IoT
devices
Source: https://iot.do/windstream-research-future-connected-home-community-2015-04
9
Notification Context: sample scenario
Date: 9th September 2018 Time: 19.00
5 people:
Mum
Dad
Clara
John
Frank
Various IoT
devices
Events:
1. Cleaning
robot battery
is low
2. Frank stops
to play sport
Source: https://iot.do/windstream-research-future-connected-home-community-2015-04
10
Notification Context: sample scenario
Date: 9th September 2018 Time: 19.00
5 people:
Mum
Dad
Clara
John
Frank
Various IoT
devices
Events:
1. Cleaning
robot battery
is low
2. Frank stops
to play sport
Notifications
Source: https://iot.do/windstream-research-future-connected-home-community-2015-04
11
Notification Context: sample scenario
Date: 9th September 2018 Time: 19.00
5 people:
Mum
Dad
Clara
John
Frank
Various IoT
devices
https://me.me/
Source: https://iot.do/windstream-research-future-connected-home-community-2015-04
12
Main problem
Notifications could be disruptive:
• Wrong moment
• Wrong device on which the notification is shown
• Wrong modality (e.g., vibration instead of sound)
• Wrong person(s)
• Repetitive notifications
• Too many simultaneous notifications
• …
Notification Context: sample scenario
Simplified version (used as a reference)
Cloud
Services
NotificationsNotifications
Notified
People
IoT Sensors / Dervices /
Services
Notification Generator
14
Main Research GOAL
Design and develop new IoT architectures to
a) enhance the effect of IoT notifications on users experience
b) allow developers to effectively exploit the notifications improving
their services, tools and applications.
Notifications
15
Proposed solutions
Two different approaches are possible
1. At the distribution level: notifications are intercepted as soon as
they arrive on the IoT devices and then systems decide if, when, and
how to show them.
IoT Sensors / Dervices /
Services
Notification Generator
Cloud
Services
NotificationsNotifications
Notified
People
16
Proposed solutions
Two different approaches are possible
1. At the distribution level: notifications are intercepted as soon as
they arrive on the IoT devices and then systems decide if, when, and
how to show them.
Solution: Smart Notification System (SNS)
IoT Sensors / Dervices /
Services
Notification Generator
Cloud
Services
NotificationsNotifications
Notified
People
SNS
17
Proposed solutions
Two different approaches are possible
2. At the design level: notifications are designed with the aim of
reducing user disruption.
IoT Sensors / Dervices /
Services
Notification Generator
Cloud
Services
NotificationsNotifications
Notified
People
IoT Sensors / Dervices /
Services
Notification Generator
Cloud
Services
NotificationsNotifications
Notified
People
18
Proposed solutions
Two different approaches are possible
2. At the design level: notifications are designed with the aim of
reducing user disruption.
Solution : XDN (Cross Device Notifications) framework
XDNXDN
Smart Notification System
(SNS)
19
IoT Sensors / Dervices /
Services
Notification Generator
Cloud
Services
NotificationsNotifications
Notified
People
20
SNS
Smart Notification System (SNS): a modular architecture to deal with
notifications at the distribution level.
It uses machine learning algorithms to manage incoming
notifications according to context awareness and users habits.
Our contributions:
1. Architecture design
2. Prototypes implementation of different architectural components
SNS
21
SNS: Architecture
Overview:
ENVIRONMENT
CONTEXT
ANALYSIS
DECISION MAKER
USER
HABITS
Environment
context
User
context
SMART NOTIFICATION
SYSTEM
Converted
Notifications
+ LABELS
(OUT)
Converted
Notifications
(IN)
Online Services
(e.g., Twitter)
IoT
notifications
IoT
notifications
NOTIFICATION
COLLECTOR
DISPATCHER
ENVIRONMENT
CONTEXT
COLLECTORS
USER
CONTEXT
COLLECTORS
USER
CONTEXT
ANALYSIS
Environment
Context
information
User
Context
information
22
SNS: Architecture
23
A modular architecture
aware of
SNS: Architecture
24
A modular architecture
aware of
Environment status
(e.g., weather
information, current
date and time)
SNS: Architecture
25
A modular architecture
aware of
User context (e.g.,
location, status,
current activity),
SNS: Architecture
Environment status
(e.g., weather
information, current
date and time)
26
A modular architecture
aware of
User habits
(e.g., usual lunch time)
SNS: Architecture
User context (e.g.,
location, status,
current activity),
Environment status
(e.g., weather
information, current
date and time)
27
A modular architecture
aware of
User habits
(e.g., usual lunch time)
Decision maker: makes
decisions on who should
receive the notification, best
moment, best devices and
best modalities (including
actuation) to present
notifications.
SNS: Architecture
User context (e.g.,
location, status,
current activity),
Environment status
(e.g., weather
information, current
date and time)
28
SNS: Architecture
How can we map
our use case?
29
SNS: Architecture
How can we map
our use case?
30
1. The Decision Maker contribution:
a) Decision maker prototype
2. The Collectors group of contributions:
a) IoT Collector server
b) Mobile Collector
c) SmartHome Collector
d) SmartCity Collector
SNS: Prototypes
3. The Context Analysis group of
contributions
a) Location Estimator
31
1. The Decision Maker contribution:
a) Decision maker prototype
2. The Collectors group of contributions:
a) IoT Collector server
b) Mobile Collector
c) SmartHome Collector
d) SmartCity Collector
SNS: Prototypes
3. The Context Analysis group of
contributions
a) Location Estimator
32
Objective: demonstrate that Machine Learning algorithms can be adopted to the
IoT notifications domain
Contribution: Preliminary version of the Decision maker module
Context Information to be used by the ML algorithm:
Notification information to be used by the ML algorithm:
SNS: 1. Decision Maker Prototype
33
Objective: demonstrate that Machine Learning algorithms can be adopted to the
IoT notifications domain
Contribution: Preliminary version of the Decision maker module
Context Information to be used by the ML algorithm:
Notification information to be used by the ML algorithm:
SNS: 1. Decision Maker Prototype
Used dataset
Synthetic
information
34
Objective: demonstrate that Machine Learning algorithms can be adopted to the
IoT notifications domain
Contribution: Preliminary version of the Decision maker module
Tests:
• 3 different machine learning algorithms adopted over an existing dataset
(MIT): Support Vector Machine, Gaussian Naïve Bayes and Decision Trees.
SNS: 1. Decision Maker Prototype
Used dataset
Synthetic
information
Used tools
35
Objective: demonstrate that Machine Learning algorithms can be adopted to the
IoT notifications domain
Contribution: Preliminary version of the Decision maker module
Tests:
• 3 different machine learning algorithms adopted over an existing dataset
(MIT): Support Vector Machine, Gaussian Naïve Bayes and Decision Trees.
SNS: 1. Decision Maker Prototype
Used dataset
Synthetic
information
Used tools
Main outcome
- The three algorithms behave as expected:
• DT works better than the others due to the
programmatic approach used to generate synthetic
information
• Almost all the algorithms obtain an high level of
accuracy, precision and recall
- ML is promising technique to enhance the effect of IoT
notifications on users experience
36
1. The Decision Maker contribution:
a) Decision maker prototype
2. The Collectors group of contributions:
a) IoT Collector server
b) Mobile Collector
c) SmartHome Collector
d) SmartCity Collector
SNS: Prototypes
3. The Context Analysis group of
contributions
a) Location Estimator
37
SNS: 2. Collectors
Aims:
1. collect real data
2. validate the Machine Learning approach used in the Decision Maker Prototype
38
SNS: 2.b Mobile Collector
Representative prototype:
Aims:
1. collect real data
2. validate the Machine Learning approach used in the Decision Maker Prototype
39
• Collect user context information (e.g.,
location and activity);
• Collect all the mobile and IoT notifications
received on user smartphone;
• Collect the user reaction to the received
notifications.
29 people (5 females and 24 males)
used the app for 78 days
• users receives an average of 247
notifications a day
• users are almost always in the
same 3 or 4 places
• users receive most of the
notifications from non-important
contacts than from important
ones.
Used tools
SNS: 2.b Mobile Collector
Objective 1: collect real user data
40
Input features:
• Notification type (mobile, IoT)
• Generating service (e.g., Telegram)
• Ringtone mode
• Notification sender
• Sender-Receiver FAMILY relationship
• Sender-Receiver FRIEND relationship
• Sender-Receiver WORK relationship
• Date and time of receipt (day of week,
day of month, month, time)
• User location (Lon/Lat)
• Activity (IN_VEHICLE, ON_BICYCLE,
ON_FOOT, RUNNING, STILL, TILTING,
UNKNOWN, WALKING)
• Battery level
• Battery status (charging or not
charging).
• Connection type (Wifi, network,
NoConn)
• Wifi SSID
Label: annoying or appreciated notification
(14 users for 15 days)
Objective 2: validate the Machine Learning approach used in the Decision Maker
Prototype
SNS: 2.b Mobile Collector
41
1. The Decision Maker contribution:
a) Decision maker prototype
2. The Collectors group of contributions:
a) IoT Collector server
b) Mobile Collector
c) SmartHome Collector
d) SmartCity Collector
SNS: Prototypes
3. The Context Analysis group of
contributions
a) Location Estimator
42
SNS: 3. Context Analysis: location estimation
Proposal: demonstrate possibility of inferring user location without energy-
hungry methods (e.g., GPS)
People usually spend 85% of their time staying in a few places.
The proposed solution uses Decision Trees as Machine Learning supervised
classification algorithm to establish user presence in the two most attended
meaningful places
Model that describes the estimation process performed for each user
43
SNS: 3. Context Analysis: location estimation
Proposal: demonstrate possibility of inferring user location without energy-
hungry methods (e.g., GPS)
Tests:
• 10-fold cross validation through the Weka workbench
• user presence in a meaningful place was estimated every time a new
notification is received.
• Input features: combination of Feature Classes (A-AB-ABC-ABCD-ABCDE-BC-
…)
Results:
• Most important features (that
mainly influence decision) are
related to time
• “Current activity” (E) (i.e., the
only feature that consumes extra
energy), is not necessary
• Accuracy>75% in almost all tests
XDN Framework
44
45
Main Problem: Overwhelming notifications
Second approach
• At the design level: notifications are designed with the aim of reducing
user disruption
XDN: Motivation
46
Main Problem: Overwhelming notifications
Second approach
• At the design level: notifications are designed with the aim of reducing
user disruption
Developers:
- define their strategies to let their software, then, influence users’
behaviors with respect to notifications
- exploiting the advantages of the cross-device approach
XDN: Motivation
47
Main Problem: Overwhelming notifications
Second approach
• At the design level: notifications are designed with the aim of reducing
user disruption
Developers:
- define their strategies to let their software, then, influence users’
behaviors with respect to notifications
- exploiting the advantages of the cross-device approach
XDN: Motivation
48
Main Problem: Overwhelming notifications
Second approach
• At the design level: notifications are designed with the aim of reducing
user disruption
XDN: Our Proposal
Literature
analysis
Requirements
identification
XDN
Architecture
design
Prototype
implementation
XDN tests with
real user
49
XDN (Cross Device Notifications), a framework to assist developers in:
a) personalizing notifications to differentiate important and unimportant
ones
b) designing, implementing, and testing cross-device notifications
strategies to inform users without causing too much disruption and
involving both mobile and IoT devices.
XDN: Our Proposal
IoT Sensors / Dervices /
Services
Notification Generator
Cloud
Services
NotificationsNotifications
Notified
People
XDNXDN
50
XDN: Architecture
51
XDN: Architecture
4 main components:
1. The XDN library
2. The XDN GUI
3. The XDN Runtime Environment
4. The XDN IoT/Mobile library
52
XDN: Architecture
4 main components:
1. The XDN library allows
(through APIs) to:
a) handle incoming
notifications
b) select devices to be
involved
c) perform actions on
selected devices
53
XDN: Architecture
4 main components:
2. The XDN GUI allows
developers to explore and
evaluate different design
alternatives by providing:
a) an IDE to implement
and test developed
notification strategies
b) a simulator to simulate
the behavior of the
devices
54
XDN: Architecture
4 main components:
3. The XDN Runtime Environment is run on a server to:
• accept device registration
requests;
• accept update requests
• accept new notifications
• customize and dispatch the
notifications
55
XDN: Architecture
4 main components:
4. The XDN IoT/Mobile library to be integrated in the IoT/mobile
applications to:
• generate notifications compatible with XDN
• send the generated notifications to the XDN runtime
environment;
• receive commands from the XDN runtime environment
(in JSON)
• execute the received commands.
56
XDN: Architecture
Excepted behaviour
57
XDN: Architecture
Excepted behaviour 1
58
XDN: Architecture
Excepted behaviour 1
2
59
XDN: Architecture
Excepted behaviour 1
2
3
60
XDN: Architecture
Excepted behaviour 1
2
3
4
61
XDN: Architecture
Excepted behaviour 1
2
3
4
5
62
XDN: first prototype
2 components were developed:
1. The XDN library (API)
2. The XDN GUI
Used tools
Tests with 12 volunteers (11 males and 1 female)
Aims:
• demonstrate the fulfillment of all the requirements
• collect a feedback about APIs and GUI
Each user tasks:
• modify an existing notification strategy
• develop a new notification strategy respecting some
given requirements
Volunteers’ main requirement:
• Previous experience with JavaScript
63
XDN: first prototype
Results:
7 participants over 12 were able to complete all the tasks in the required
time.
User feedback: survey (from 0 to 5)
Table 3.6 - Final survey proposed to user
XDN GUI
Is it Useful?
XDN Library (API)
XDN framework in general
64
XDN: first prototype
Results:
7 participants over 12 were able to complete all the tasks in the required
time.
User feedback: survey (from 0 to 5)
Table 3.6 - Final survey proposed to user
XDN GUI
Is it Useful?
XDN Library (API)
XDN framework in general
XDN Main outcome
• Efficacy of the proposed solution to enhance
developers that want to design, develop and test
their own notification strategies
65
Thesis Conclusions
Main Problem: Overwhelming notifications
Our proposals:
1. SNS that acts at the distribution level and fosters ML algorithms
(autonomous system that directly influences end-users)
2. XDN that acts at the design level and fosters cross-device approach
(framework for developers)
Main outcome:
• Feasibility of the proposed approaches was demonstrated
• Efficacy of the proposed solutions to enhance
o user experience with notifications
o developers support in designing, developing and testing their own
notification strategies also exploiting the cross-device approach
• Efficacy of the user-centered design methodology in notification
domain
66
Publications during the Ph.D.
2018
• Corno, F and De Russis, L. and Marcelli, A. and Montanaro, T. . An Unsupervised
and Non-Invasive Model for Predicting Network Resource Demands. In IEEE
Internet of Things Journal.
• Cagliero, L. and De Russis, L. and Farinetti, L and Montanaro, T. . Improving the
effectiveness of SQL learning practice: a data-driven approach. In 2018 IEEE
42nd Annual Computer Software and Applications Conference (COMPSAC).
2017
• Corno F.; De Russis L.; Montanaro T.- XDN: Cross-Device Framework for Custom
Notifications Management - In: The 9th ACM SIGCHI Symposium on Engineering
Interactive Computing Systems, Lisbon (Portugal), June 26-29, 2017. (In Press)
• Corno, Fulvio; Montanaro, Teodoro; Migliore, Carmelo; Castrogiovanni, Pino -
SmartBike: an IoT Crowd Sensing Platform for Monitoring City Air Pollution. In:
INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING (IJECE,
ISSN: 2088-8708, a SCOPUS indexed Journal - Q2), vol. 7 n. 6. (In Press)
P
67
Publications during the Ph.D.
2016
• Corno F., De Russis L., Montanaro T. - Estimate User Meaningful Places through
Low-Energy Mobile Sensing. In: SMC 2016: IEEE International Conference on
Systems, Man, and Cybernetics, Budapest, 9-12 October, 2016.
• Ghajargar M., Zenezini G., and Montanaro T. - Home delivery services:
innovations and emerging needs. In: 8th IFAC Conference on Manufacturing
Modelling, Management and Control MIM 2016, Troyes, France, 28—30 June 2016. pp.
1371-1376
2015
• Corno F.; De Russis L.; Montanaro T.; Castrogiovanni P. - IoT Meets Exhibition
Areas: a Modular Architecture to Improve Proximity Interactions. In: FiCloud
2015: The 3rd International Conference on Future Internet of Things and Cloud, Roma,
24-26 August, 2015. pp. 293-300
• Corno, Fulvio; De Russis, Luigi; Montanaro, Teodoro - A Context and User Aware
Smart Notification System. In: IEEE 2nd World Forum on Internet of Things (WF-
IoT), Milan, Italy, 14-16 December 2015. pp. 645-651
• Montanaro, Teodoro (2015) - SWARM Joint Open Lab Politecnico Di Torino, Italy.
In: CROSSROADS, vol. 22 n. 2, pp. 70-71. - ISSN 1528-4972
P
P
P
68
69
Summary of contributions
Main Problem: Overwhelming notifications
Our proposals:
1. SNS acts at the distribution level and fosters
ML algorithms (autonomous system that
directly influences end-users)
o Decision Maker
o Collectors
o Context Analysis
2. XDN acts at the design level and fosters cross-
device approach (framework for developers)
o XDN library
o XDN GUI
o XDN Runtime Environment
o XDN IoT/Mobile library

More Related Content

What's hot

Brain Tumor Classification using Support Vector Machine
Brain Tumor Classification using Support Vector MachineBrain Tumor Classification using Support Vector Machine
Brain Tumor Classification using Support Vector MachineIRJET Journal
 
Hand gesture recognition system(FYP REPORT)
Hand gesture recognition system(FYP REPORT)Hand gesture recognition system(FYP REPORT)
Hand gesture recognition system(FYP REPORT)Afnan Rehman
 
Brain tumor detection using image segmentation ppt
Brain tumor detection using image segmentation pptBrain tumor detection using image segmentation ppt
Brain tumor detection using image segmentation pptRoshini Vijayakumar
 
Introduction to ML (Machine Learning)
Introduction to ML (Machine Learning)Introduction to ML (Machine Learning)
Introduction to ML (Machine Learning)SwatiTripathi44
 
Detection of plant diseases
Detection of plant diseasesDetection of plant diseases
Detection of plant diseasesMuneesh Wari
 
Object detection with deep learning
Object detection with deep learningObject detection with deep learning
Object detection with deep learningSushant Shrivastava
 
Latent Semantic Indexing For Information Retrieval
Latent Semantic Indexing For Information RetrievalLatent Semantic Indexing For Information Retrieval
Latent Semantic Indexing For Information RetrievalSudarsun Santhiappan
 
Malware Dectection Using Machine learning
Malware Dectection Using Machine learningMalware Dectection Using Machine learning
Malware Dectection Using Machine learningShubham Dubey
 
Keras vs Tensorflow vs PyTorch | Deep Learning Frameworks Comparison | Edureka
Keras vs Tensorflow vs PyTorch | Deep Learning Frameworks Comparison | EdurekaKeras vs Tensorflow vs PyTorch | Deep Learning Frameworks Comparison | Edureka
Keras vs Tensorflow vs PyTorch | Deep Learning Frameworks Comparison | EdurekaEdureka!
 
MUSIC RECOMMENDATION THROUGH FACE RECOGNITION AND EMOTION DETECTION
MUSIC RECOMMENDATION THROUGH FACE RECOGNITION AND EMOTION DETECTIONMUSIC RECOMMENDATION THROUGH FACE RECOGNITION AND EMOTION DETECTION
MUSIC RECOMMENDATION THROUGH FACE RECOGNITION AND EMOTION DETECTIONIRJET Journal
 
Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)Ravindra Dastikop
 
A brief history of machine learning
A brief history of  machine learningA brief history of  machine learning
A brief history of machine learningRobert Colner
 
Abnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenesAbnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenesTELKOMNIKA JOURNAL
 
Machine learning seminar ppt
Machine learning seminar pptMachine learning seminar ppt
Machine learning seminar pptRAHUL DANGWAL
 
AI and machine learning
AI and machine learningAI and machine learning
AI and machine learningITU
 
Machine learning seminar presentation
Machine learning seminar presentationMachine learning seminar presentation
Machine learning seminar presentationsweety seth
 
Information retrieval introduction
Information retrieval introductionInformation retrieval introduction
Information retrieval introductionnimmyjans4
 
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.vivatechijri
 

What's hot (20)

Semantic Web
Semantic WebSemantic Web
Semantic Web
 
Brain Tumor Classification using Support Vector Machine
Brain Tumor Classification using Support Vector MachineBrain Tumor Classification using Support Vector Machine
Brain Tumor Classification using Support Vector Machine
 
Hand gesture recognition system(FYP REPORT)
Hand gesture recognition system(FYP REPORT)Hand gesture recognition system(FYP REPORT)
Hand gesture recognition system(FYP REPORT)
 
Brain tumor detection using image segmentation ppt
Brain tumor detection using image segmentation pptBrain tumor detection using image segmentation ppt
Brain tumor detection using image segmentation ppt
 
Introduction to ML (Machine Learning)
Introduction to ML (Machine Learning)Introduction to ML (Machine Learning)
Introduction to ML (Machine Learning)
 
Detection of plant diseases
Detection of plant diseasesDetection of plant diseases
Detection of plant diseases
 
Object detection with deep learning
Object detection with deep learningObject detection with deep learning
Object detection with deep learning
 
Latent Semantic Indexing For Information Retrieval
Latent Semantic Indexing For Information RetrievalLatent Semantic Indexing For Information Retrieval
Latent Semantic Indexing For Information Retrieval
 
Malware Dectection Using Machine learning
Malware Dectection Using Machine learningMalware Dectection Using Machine learning
Malware Dectection Using Machine learning
 
Keras vs Tensorflow vs PyTorch | Deep Learning Frameworks Comparison | Edureka
Keras vs Tensorflow vs PyTorch | Deep Learning Frameworks Comparison | EdurekaKeras vs Tensorflow vs PyTorch | Deep Learning Frameworks Comparison | Edureka
Keras vs Tensorflow vs PyTorch | Deep Learning Frameworks Comparison | Edureka
 
MUSIC RECOMMENDATION THROUGH FACE RECOGNITION AND EMOTION DETECTION
MUSIC RECOMMENDATION THROUGH FACE RECOGNITION AND EMOTION DETECTIONMUSIC RECOMMENDATION THROUGH FACE RECOGNITION AND EMOTION DETECTION
MUSIC RECOMMENDATION THROUGH FACE RECOGNITION AND EMOTION DETECTION
 
cluster computing
cluster computingcluster computing
cluster computing
 
Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)
 
A brief history of machine learning
A brief history of  machine learningA brief history of  machine learning
A brief history of machine learning
 
Abnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenesAbnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenes
 
Machine learning seminar ppt
Machine learning seminar pptMachine learning seminar ppt
Machine learning seminar ppt
 
AI and machine learning
AI and machine learningAI and machine learning
AI and machine learning
 
Machine learning seminar presentation
Machine learning seminar presentationMachine learning seminar presentation
Machine learning seminar presentation
 
Information retrieval introduction
Information retrieval introductionInformation retrieval introduction
Information retrieval introduction
 
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
 

Similar to PhD Defense of Teodoro Montanaro

2017 eics-lbr-xdn tool-presentation
2017 eics-lbr-xdn tool-presentation2017 eics-lbr-xdn tool-presentation
2017 eics-lbr-xdn tool-presentationTeodoro Montanaro
 
Smartweek 2014 London: EU FP7 SocIoTal project overview - Michele Nati - Univ...
Smartweek 2014 London: EU FP7 SocIoTal project overview - Michele Nati - Univ...Smartweek 2014 London: EU FP7 SocIoTal project overview - Michele Nati - Univ...
Smartweek 2014 London: EU FP7 SocIoTal project overview - Michele Nati - Univ...MicheleNati
 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureredpel dot com
 
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & MiddlewareUBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middlewarevivatechijri
 
SocIoTal project-overview - ICT30 Community Day London
SocIoTal project-overview - ICT30 Community Day LondonSocIoTal project-overview - ICT30 Community Day London
SocIoTal project-overview - ICT30 Community Day LondonMicheleNati
 
IoT-Lite: A Lightweight Semantic Model for the Internet of Things
IoT-Lite:  A Lightweight Semantic Model for the Internet of ThingsIoT-Lite:  A Lightweight Semantic Model for the Internet of Things
IoT-Lite: A Lightweight Semantic Model for the Internet of ThingsPayamBarnaghi
 
Towards Smart Modeling (Environments)
Towards Smart Modeling (Environments)Towards Smart Modeling (Environments)
Towards Smart Modeling (Environments)Benoit Combemale
 
Designing Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things ApplicationsDesigning Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things ApplicationsAmélie Gyrard
 
Intelligent Internet of Things (IIoT): System Architectures and Communica...
   Intelligent Internet of Things (IIoT): System  Architectures and Communica...   Intelligent Internet of Things (IIoT): System  Architectures and Communica...
Intelligent Internet of Things (IIoT): System Architectures and Communica...Raghu Nandy
 
A survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’sA survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’sIOSR Journals
 
Internet of Things - Benefits for the Ummah
Internet of Things - Benefits for the UmmahInternet of Things - Benefits for the Ummah
Internet of Things - Benefits for the UmmahDr. Mazlan Abbas
 
GK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).pptGK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).pptPiyushRanjan269184
 
Io t loraalliance-marketingday_vfinal
Io t loraalliance-marketingday_vfinalIo t loraalliance-marketingday_vfinal
Io t loraalliance-marketingday_vfinalThierry Lestable
 
SOFIA - Smart City: an Event Driven Architecture for Monitoring Public Spaces...
SOFIA - Smart City: an Event Driven Architecture for Monitoring Public Spaces...SOFIA - Smart City: an Event Driven Architecture for Monitoring Public Spaces...
SOFIA - Smart City: an Event Driven Architecture for Monitoring Public Spaces...Sofia Eu
 
iMinds The Conference: Danny Hughes
iMinds The Conference: Danny HughesiMinds The Conference: Danny Hughes
iMinds The Conference: Danny Hughesimec
 
AGILE - Adoptive Gateways for dIverse MuLtiple Environments
AGILE -  Adoptive Gateways for dIverse MuLtiple EnvironmentsAGILE -  Adoptive Gateways for dIverse MuLtiple Environments
AGILE - Adoptive Gateways for dIverse MuLtiple EnvironmentsAGILE IoT
 
Adoptive Gateways for dIverse MuLtiple Environments
Adoptive Gateways for dIverse MuLtiple EnvironmentsAdoptive Gateways for dIverse MuLtiple Environments
Adoptive Gateways for dIverse MuLtiple EnvironmentsCharalampos Doukas
 
An effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learningAn effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learningVenkat Projects
 
I3CON Newsletter #2
I3CON Newsletter #2I3CON Newsletter #2
I3CON Newsletter #2lk314
 
From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...Fread Mzee
 

Similar to PhD Defense of Teodoro Montanaro (20)

2017 eics-lbr-xdn tool-presentation
2017 eics-lbr-xdn tool-presentation2017 eics-lbr-xdn tool-presentation
2017 eics-lbr-xdn tool-presentation
 
Smartweek 2014 London: EU FP7 SocIoTal project overview - Michele Nati - Univ...
Smartweek 2014 London: EU FP7 SocIoTal project overview - Michele Nati - Univ...Smartweek 2014 London: EU FP7 SocIoTal project overview - Michele Nati - Univ...
Smartweek 2014 London: EU FP7 SocIoTal project overview - Michele Nati - Univ...
 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architecture
 
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & MiddlewareUBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
 
SocIoTal project-overview - ICT30 Community Day London
SocIoTal project-overview - ICT30 Community Day LondonSocIoTal project-overview - ICT30 Community Day London
SocIoTal project-overview - ICT30 Community Day London
 
IoT-Lite: A Lightweight Semantic Model for the Internet of Things
IoT-Lite:  A Lightweight Semantic Model for the Internet of ThingsIoT-Lite:  A Lightweight Semantic Model for the Internet of Things
IoT-Lite: A Lightweight Semantic Model for the Internet of Things
 
Towards Smart Modeling (Environments)
Towards Smart Modeling (Environments)Towards Smart Modeling (Environments)
Towards Smart Modeling (Environments)
 
Designing Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things ApplicationsDesigning Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things Applications
 
Intelligent Internet of Things (IIoT): System Architectures and Communica...
   Intelligent Internet of Things (IIoT): System  Architectures and Communica...   Intelligent Internet of Things (IIoT): System  Architectures and Communica...
Intelligent Internet of Things (IIoT): System Architectures and Communica...
 
A survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’sA survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’s
 
Internet of Things - Benefits for the Ummah
Internet of Things - Benefits for the UmmahInternet of Things - Benefits for the Ummah
Internet of Things - Benefits for the Ummah
 
GK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).pptGK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).ppt
 
Io t loraalliance-marketingday_vfinal
Io t loraalliance-marketingday_vfinalIo t loraalliance-marketingday_vfinal
Io t loraalliance-marketingday_vfinal
 
SOFIA - Smart City: an Event Driven Architecture for Monitoring Public Spaces...
SOFIA - Smart City: an Event Driven Architecture for Monitoring Public Spaces...SOFIA - Smart City: an Event Driven Architecture for Monitoring Public Spaces...
SOFIA - Smart City: an Event Driven Architecture for Monitoring Public Spaces...
 
iMinds The Conference: Danny Hughes
iMinds The Conference: Danny HughesiMinds The Conference: Danny Hughes
iMinds The Conference: Danny Hughes
 
AGILE - Adoptive Gateways for dIverse MuLtiple Environments
AGILE -  Adoptive Gateways for dIverse MuLtiple EnvironmentsAGILE -  Adoptive Gateways for dIverse MuLtiple Environments
AGILE - Adoptive Gateways for dIverse MuLtiple Environments
 
Adoptive Gateways for dIverse MuLtiple Environments
Adoptive Gateways for dIverse MuLtiple EnvironmentsAdoptive Gateways for dIverse MuLtiple Environments
Adoptive Gateways for dIverse MuLtiple Environments
 
An effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learningAn effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learning
 
I3CON Newsletter #2
I3CON Newsletter #2I3CON Newsletter #2
I3CON Newsletter #2
 
From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...
 

Recently uploaded

Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIINhPhngng3
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubssamaasim06
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxraffaeleoman
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Vipesco
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsaqsarehman5055
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatmentnswingard
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfSkillCertProExams
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Delhi Call girls
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCamilleBoulbin1
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoKayode Fayemi
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lodhisaajjda
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfSenaatti-kiinteistöt
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxNikitaBankoti2
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Baileyhlharris
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 

Recently uploaded (20)

Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 

PhD Defense of Teodoro Montanaro

  • 1. IoT Notifications: from disruption to benefit Architectures for the future of notifications in the IoT Presenter Teodoro Montanaro In collaboration with Fulvio Corno Pino Castrogiovanni Supervisor(s)
  • 2. 2 Research GOAL Investigate the intelligence component in Internet of Things (IoT) architectures and applications: study, define, and prototype intelligent distributed architectures that may extract additional value and intelligent behaviors to some significant sample problems, representative of future IoT scenarios. The distribution and customization of notifications in the IoT domain has been treated as an example of possible future IoT scenarios.
  • 3. 3 Notification Context: sample scenario Source: https://iot.do/windstream-research-future-connected-home-community-2015-04
  • 4. 4 Notification Context: sample scenario Source: https://iot.do/windstream-research-future-connected-home-community-2015-04 Date: 9th September 2018
  • 5. 5 Notification Context: sample scenario Source: https://iot.do/windstream-research-future-connected-home-community-2015-04 Date: 9th September 2018 Time: 19.00
  • 6. 6 Notification Context: sample scenario Source: https://iot.do/windstream-research-future-connected-home-community-2015-04 Date: 9th September 2018 Time: 19.00 5 people: Mum: is preparing the washing machine Dad: is reading a newspaper Clara: is using her pc on her bedroom John: is working on his PC Frank: is working out on the tapis roulant
  • 7. 7 Notification Context: sample scenario Source: https://iot.do/windstream-research-future-connected-home-community-2015-04 Date: 9th September 2018 Time: 19.00 5 people: Mum Dad Clara John Frank
  • 8. 8 Notification Context: sample scenario Date: 9th September 2018 Time: 19.00 5 people: Mum Dad Clara John Frank Various IoT devices Source: https://iot.do/windstream-research-future-connected-home-community-2015-04
  • 9. 9 Notification Context: sample scenario Date: 9th September 2018 Time: 19.00 5 people: Mum Dad Clara John Frank Various IoT devices Events: 1. Cleaning robot battery is low 2. Frank stops to play sport Source: https://iot.do/windstream-research-future-connected-home-community-2015-04
  • 10. 10 Notification Context: sample scenario Date: 9th September 2018 Time: 19.00 5 people: Mum Dad Clara John Frank Various IoT devices Events: 1. Cleaning robot battery is low 2. Frank stops to play sport Notifications Source: https://iot.do/windstream-research-future-connected-home-community-2015-04
  • 11. 11 Notification Context: sample scenario Date: 9th September 2018 Time: 19.00 5 people: Mum Dad Clara John Frank Various IoT devices https://me.me/ Source: https://iot.do/windstream-research-future-connected-home-community-2015-04
  • 12. 12 Main problem Notifications could be disruptive: • Wrong moment • Wrong device on which the notification is shown • Wrong modality (e.g., vibration instead of sound) • Wrong person(s) • Repetitive notifications • Too many simultaneous notifications • …
  • 13. Notification Context: sample scenario Simplified version (used as a reference) Cloud Services NotificationsNotifications Notified People IoT Sensors / Dervices / Services Notification Generator
  • 14. 14 Main Research GOAL Design and develop new IoT architectures to a) enhance the effect of IoT notifications on users experience b) allow developers to effectively exploit the notifications improving their services, tools and applications. Notifications
  • 15. 15 Proposed solutions Two different approaches are possible 1. At the distribution level: notifications are intercepted as soon as they arrive on the IoT devices and then systems decide if, when, and how to show them. IoT Sensors / Dervices / Services Notification Generator Cloud Services NotificationsNotifications Notified People
  • 16. 16 Proposed solutions Two different approaches are possible 1. At the distribution level: notifications are intercepted as soon as they arrive on the IoT devices and then systems decide if, when, and how to show them. Solution: Smart Notification System (SNS) IoT Sensors / Dervices / Services Notification Generator Cloud Services NotificationsNotifications Notified People SNS
  • 17. 17 Proposed solutions Two different approaches are possible 2. At the design level: notifications are designed with the aim of reducing user disruption. IoT Sensors / Dervices / Services Notification Generator Cloud Services NotificationsNotifications Notified People
  • 18. IoT Sensors / Dervices / Services Notification Generator Cloud Services NotificationsNotifications Notified People 18 Proposed solutions Two different approaches are possible 2. At the design level: notifications are designed with the aim of reducing user disruption. Solution : XDN (Cross Device Notifications) framework XDNXDN
  • 20. IoT Sensors / Dervices / Services Notification Generator Cloud Services NotificationsNotifications Notified People 20 SNS Smart Notification System (SNS): a modular architecture to deal with notifications at the distribution level. It uses machine learning algorithms to manage incoming notifications according to context awareness and users habits. Our contributions: 1. Architecture design 2. Prototypes implementation of different architectural components SNS
  • 21. 21 SNS: Architecture Overview: ENVIRONMENT CONTEXT ANALYSIS DECISION MAKER USER HABITS Environment context User context SMART NOTIFICATION SYSTEM Converted Notifications + LABELS (OUT) Converted Notifications (IN) Online Services (e.g., Twitter) IoT notifications IoT notifications NOTIFICATION COLLECTOR DISPATCHER ENVIRONMENT CONTEXT COLLECTORS USER CONTEXT COLLECTORS USER CONTEXT ANALYSIS Environment Context information User Context information
  • 23. 23 A modular architecture aware of SNS: Architecture
  • 24. 24 A modular architecture aware of Environment status (e.g., weather information, current date and time) SNS: Architecture
  • 25. 25 A modular architecture aware of User context (e.g., location, status, current activity), SNS: Architecture Environment status (e.g., weather information, current date and time)
  • 26. 26 A modular architecture aware of User habits (e.g., usual lunch time) SNS: Architecture User context (e.g., location, status, current activity), Environment status (e.g., weather information, current date and time)
  • 27. 27 A modular architecture aware of User habits (e.g., usual lunch time) Decision maker: makes decisions on who should receive the notification, best moment, best devices and best modalities (including actuation) to present notifications. SNS: Architecture User context (e.g., location, status, current activity), Environment status (e.g., weather information, current date and time)
  • 28. 28 SNS: Architecture How can we map our use case?
  • 29. 29 SNS: Architecture How can we map our use case?
  • 30. 30 1. The Decision Maker contribution: a) Decision maker prototype 2. The Collectors group of contributions: a) IoT Collector server b) Mobile Collector c) SmartHome Collector d) SmartCity Collector SNS: Prototypes 3. The Context Analysis group of contributions a) Location Estimator
  • 31. 31 1. The Decision Maker contribution: a) Decision maker prototype 2. The Collectors group of contributions: a) IoT Collector server b) Mobile Collector c) SmartHome Collector d) SmartCity Collector SNS: Prototypes 3. The Context Analysis group of contributions a) Location Estimator
  • 32. 32 Objective: demonstrate that Machine Learning algorithms can be adopted to the IoT notifications domain Contribution: Preliminary version of the Decision maker module Context Information to be used by the ML algorithm: Notification information to be used by the ML algorithm: SNS: 1. Decision Maker Prototype
  • 33. 33 Objective: demonstrate that Machine Learning algorithms can be adopted to the IoT notifications domain Contribution: Preliminary version of the Decision maker module Context Information to be used by the ML algorithm: Notification information to be used by the ML algorithm: SNS: 1. Decision Maker Prototype Used dataset Synthetic information
  • 34. 34 Objective: demonstrate that Machine Learning algorithms can be adopted to the IoT notifications domain Contribution: Preliminary version of the Decision maker module Tests: • 3 different machine learning algorithms adopted over an existing dataset (MIT): Support Vector Machine, Gaussian Naïve Bayes and Decision Trees. SNS: 1. Decision Maker Prototype Used dataset Synthetic information Used tools
  • 35. 35 Objective: demonstrate that Machine Learning algorithms can be adopted to the IoT notifications domain Contribution: Preliminary version of the Decision maker module Tests: • 3 different machine learning algorithms adopted over an existing dataset (MIT): Support Vector Machine, Gaussian Naïve Bayes and Decision Trees. SNS: 1. Decision Maker Prototype Used dataset Synthetic information Used tools Main outcome - The three algorithms behave as expected: • DT works better than the others due to the programmatic approach used to generate synthetic information • Almost all the algorithms obtain an high level of accuracy, precision and recall - ML is promising technique to enhance the effect of IoT notifications on users experience
  • 36. 36 1. The Decision Maker contribution: a) Decision maker prototype 2. The Collectors group of contributions: a) IoT Collector server b) Mobile Collector c) SmartHome Collector d) SmartCity Collector SNS: Prototypes 3. The Context Analysis group of contributions a) Location Estimator
  • 37. 37 SNS: 2. Collectors Aims: 1. collect real data 2. validate the Machine Learning approach used in the Decision Maker Prototype
  • 38. 38 SNS: 2.b Mobile Collector Representative prototype: Aims: 1. collect real data 2. validate the Machine Learning approach used in the Decision Maker Prototype
  • 39. 39 • Collect user context information (e.g., location and activity); • Collect all the mobile and IoT notifications received on user smartphone; • Collect the user reaction to the received notifications. 29 people (5 females and 24 males) used the app for 78 days • users receives an average of 247 notifications a day • users are almost always in the same 3 or 4 places • users receive most of the notifications from non-important contacts than from important ones. Used tools SNS: 2.b Mobile Collector Objective 1: collect real user data
  • 40. 40 Input features: • Notification type (mobile, IoT) • Generating service (e.g., Telegram) • Ringtone mode • Notification sender • Sender-Receiver FAMILY relationship • Sender-Receiver FRIEND relationship • Sender-Receiver WORK relationship • Date and time of receipt (day of week, day of month, month, time) • User location (Lon/Lat) • Activity (IN_VEHICLE, ON_BICYCLE, ON_FOOT, RUNNING, STILL, TILTING, UNKNOWN, WALKING) • Battery level • Battery status (charging or not charging). • Connection type (Wifi, network, NoConn) • Wifi SSID Label: annoying or appreciated notification (14 users for 15 days) Objective 2: validate the Machine Learning approach used in the Decision Maker Prototype SNS: 2.b Mobile Collector
  • 41. 41 1. The Decision Maker contribution: a) Decision maker prototype 2. The Collectors group of contributions: a) IoT Collector server b) Mobile Collector c) SmartHome Collector d) SmartCity Collector SNS: Prototypes 3. The Context Analysis group of contributions a) Location Estimator
  • 42. 42 SNS: 3. Context Analysis: location estimation Proposal: demonstrate possibility of inferring user location without energy- hungry methods (e.g., GPS) People usually spend 85% of their time staying in a few places. The proposed solution uses Decision Trees as Machine Learning supervised classification algorithm to establish user presence in the two most attended meaningful places Model that describes the estimation process performed for each user
  • 43. 43 SNS: 3. Context Analysis: location estimation Proposal: demonstrate possibility of inferring user location without energy- hungry methods (e.g., GPS) Tests: • 10-fold cross validation through the Weka workbench • user presence in a meaningful place was estimated every time a new notification is received. • Input features: combination of Feature Classes (A-AB-ABC-ABCD-ABCDE-BC- …) Results: • Most important features (that mainly influence decision) are related to time • “Current activity” (E) (i.e., the only feature that consumes extra energy), is not necessary • Accuracy>75% in almost all tests
  • 45. 45 Main Problem: Overwhelming notifications Second approach • At the design level: notifications are designed with the aim of reducing user disruption XDN: Motivation
  • 46. 46 Main Problem: Overwhelming notifications Second approach • At the design level: notifications are designed with the aim of reducing user disruption Developers: - define their strategies to let their software, then, influence users’ behaviors with respect to notifications - exploiting the advantages of the cross-device approach XDN: Motivation
  • 47. 47 Main Problem: Overwhelming notifications Second approach • At the design level: notifications are designed with the aim of reducing user disruption Developers: - define their strategies to let their software, then, influence users’ behaviors with respect to notifications - exploiting the advantages of the cross-device approach XDN: Motivation
  • 48. 48 Main Problem: Overwhelming notifications Second approach • At the design level: notifications are designed with the aim of reducing user disruption XDN: Our Proposal Literature analysis Requirements identification XDN Architecture design Prototype implementation XDN tests with real user
  • 49. 49 XDN (Cross Device Notifications), a framework to assist developers in: a) personalizing notifications to differentiate important and unimportant ones b) designing, implementing, and testing cross-device notifications strategies to inform users without causing too much disruption and involving both mobile and IoT devices. XDN: Our Proposal IoT Sensors / Dervices / Services Notification Generator Cloud Services NotificationsNotifications Notified People XDNXDN
  • 51. 51 XDN: Architecture 4 main components: 1. The XDN library 2. The XDN GUI 3. The XDN Runtime Environment 4. The XDN IoT/Mobile library
  • 52. 52 XDN: Architecture 4 main components: 1. The XDN library allows (through APIs) to: a) handle incoming notifications b) select devices to be involved c) perform actions on selected devices
  • 53. 53 XDN: Architecture 4 main components: 2. The XDN GUI allows developers to explore and evaluate different design alternatives by providing: a) an IDE to implement and test developed notification strategies b) a simulator to simulate the behavior of the devices
  • 54. 54 XDN: Architecture 4 main components: 3. The XDN Runtime Environment is run on a server to: • accept device registration requests; • accept update requests • accept new notifications • customize and dispatch the notifications
  • 55. 55 XDN: Architecture 4 main components: 4. The XDN IoT/Mobile library to be integrated in the IoT/mobile applications to: • generate notifications compatible with XDN • send the generated notifications to the XDN runtime environment; • receive commands from the XDN runtime environment (in JSON) • execute the received commands.
  • 62. 62 XDN: first prototype 2 components were developed: 1. The XDN library (API) 2. The XDN GUI Used tools Tests with 12 volunteers (11 males and 1 female) Aims: • demonstrate the fulfillment of all the requirements • collect a feedback about APIs and GUI Each user tasks: • modify an existing notification strategy • develop a new notification strategy respecting some given requirements Volunteers’ main requirement: • Previous experience with JavaScript
  • 63. 63 XDN: first prototype Results: 7 participants over 12 were able to complete all the tasks in the required time. User feedback: survey (from 0 to 5) Table 3.6 - Final survey proposed to user XDN GUI Is it Useful? XDN Library (API) XDN framework in general
  • 64. 64 XDN: first prototype Results: 7 participants over 12 were able to complete all the tasks in the required time. User feedback: survey (from 0 to 5) Table 3.6 - Final survey proposed to user XDN GUI Is it Useful? XDN Library (API) XDN framework in general XDN Main outcome • Efficacy of the proposed solution to enhance developers that want to design, develop and test their own notification strategies
  • 65. 65 Thesis Conclusions Main Problem: Overwhelming notifications Our proposals: 1. SNS that acts at the distribution level and fosters ML algorithms (autonomous system that directly influences end-users) 2. XDN that acts at the design level and fosters cross-device approach (framework for developers) Main outcome: • Feasibility of the proposed approaches was demonstrated • Efficacy of the proposed solutions to enhance o user experience with notifications o developers support in designing, developing and testing their own notification strategies also exploiting the cross-device approach • Efficacy of the user-centered design methodology in notification domain
  • 66. 66 Publications during the Ph.D. 2018 • Corno, F and De Russis, L. and Marcelli, A. and Montanaro, T. . An Unsupervised and Non-Invasive Model for Predicting Network Resource Demands. In IEEE Internet of Things Journal. • Cagliero, L. and De Russis, L. and Farinetti, L and Montanaro, T. . Improving the effectiveness of SQL learning practice: a data-driven approach. In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). 2017 • Corno F.; De Russis L.; Montanaro T.- XDN: Cross-Device Framework for Custom Notifications Management - In: The 9th ACM SIGCHI Symposium on Engineering Interactive Computing Systems, Lisbon (Portugal), June 26-29, 2017. (In Press) • Corno, Fulvio; Montanaro, Teodoro; Migliore, Carmelo; Castrogiovanni, Pino - SmartBike: an IoT Crowd Sensing Platform for Monitoring City Air Pollution. In: INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal - Q2), vol. 7 n. 6. (In Press) P
  • 67. 67 Publications during the Ph.D. 2016 • Corno F., De Russis L., Montanaro T. - Estimate User Meaningful Places through Low-Energy Mobile Sensing. In: SMC 2016: IEEE International Conference on Systems, Man, and Cybernetics, Budapest, 9-12 October, 2016. • Ghajargar M., Zenezini G., and Montanaro T. - Home delivery services: innovations and emerging needs. In: 8th IFAC Conference on Manufacturing Modelling, Management and Control MIM 2016, Troyes, France, 28—30 June 2016. pp. 1371-1376 2015 • Corno F.; De Russis L.; Montanaro T.; Castrogiovanni P. - IoT Meets Exhibition Areas: a Modular Architecture to Improve Proximity Interactions. In: FiCloud 2015: The 3rd International Conference on Future Internet of Things and Cloud, Roma, 24-26 August, 2015. pp. 293-300 • Corno, Fulvio; De Russis, Luigi; Montanaro, Teodoro - A Context and User Aware Smart Notification System. In: IEEE 2nd World Forum on Internet of Things (WF- IoT), Milan, Italy, 14-16 December 2015. pp. 645-651 • Montanaro, Teodoro (2015) - SWARM Joint Open Lab Politecnico Di Torino, Italy. In: CROSSROADS, vol. 22 n. 2, pp. 70-71. - ISSN 1528-4972 P P P
  • 68. 68
  • 69. 69 Summary of contributions Main Problem: Overwhelming notifications Our proposals: 1. SNS acts at the distribution level and fosters ML algorithms (autonomous system that directly influences end-users) o Decision Maker o Collectors o Context Analysis 2. XDN acts at the design level and fosters cross- device approach (framework for developers) o XDN library o XDN GUI o XDN Runtime Environment o XDN IoT/Mobile library

Editor's Notes

  1. Introduce the problem
  2. Prototypes to demonstrate the feasibility of the system and the effectiveness of the proposed solutions to the IoT notifications domain
  3. The modular nature of the SNS system inspired the design and the prototyping of three main groups of contributions provided as first outcome of the present dissertation
  4. The modular nature of the SNS system architecture inspired the design and the prototyping of three main groups of contributions provided as first outcome of the present dissertation
  5. First step: identify information to be used by the ML algotitms to decide on which device the notification should be sent Then: select existing dataset that contains such an information -> MIT … collected through user smartphne containing that info EXCEPT target device SVM e GNB try to find a correlation between inserted DT algorithm tries to create a flowchart-like structure in which each internal node represents a test on an attribute, each branch represents the outcome of the test, and each leaf node represents a label. The paths from root to leaf represents classification rules and, as can be understood, it does not look for relations between data. MIT researchers used mobile phones to collect data about call logs, Bluetooth devices in proximity, cell tower IDs, application usage, and phone status. 94 people over 9 months were monitored and the collected data were, then, used to infer different user information including location SVM and GNB seem to work worse with unrelated data DT algorithm reports better values with unrelated data. However, it can be observed that the DT algorithm is the only one that obtains a high value for all the reported metrics: while in both experiments (with unrelated and related data) an high value (higher than 90%) of the accuracy and recall falls in a lower value (lower than 90%) of the precision and viceversa, with the DT algorithm the values obtained for all the three measures is always high (higher that 90%). Moreover, through the analysis of each wrong decision (the detailed list of all the made decision is not reported in this dissertation for shortness needs), it can be noticed that all the errors made by DT in the second experiment were related to combination of attributes that were not present in the training set, implying that DT do not work very well with unknown notifications contained in related data.
  6. First step: identify information to be used by the ML algotitms to decide on which device the notification should be sent Then: select existing dataset that contains such an information -> MIT … collected through user smartphne containing that info EXCEPT target device SVM e GNB try to find a correlation between inserted DT algorithm tries to create a flowchart-like structure in which each internal node represents a test on an attribute, each branch represents the outcome of the test, and each leaf node represents a label. The paths from root to leaf represents classification rules and, as can be understood, it does not look for relations between data. MIT researchers used mobile phones to collect data about call logs, Bluetooth devices in proximity, cell tower IDs, application usage, and phone status. 94 people over 9 months were monitored and the collected data were, then, used to infer different user information including location SVM and GNB seem to work worse with unrelated data DT algorithm reports better values with unrelated data. However, it can be observed that the DT algorithm is the only one that obtains a high value for all the reported metrics: while in both experiments (with unrelated and related data) an high value (higher than 90%) of the accuracy and recall falls in a lower value (lower than 90%) of the precision and viceversa, with the DT algorithm the values obtained for all the three measures is always high (higher that 90%). Moreover, through the analysis of each wrong decision (the detailed list of all the made decision is not reported in this dissertation for shortness needs), it can be noticed that all the errors made by DT in the second experiment were related to combination of attributes that were not present in the training set, implying that DT do not work very well with unknown notifications contained in related data.
  7. Algorithms differently behave with related and unrelated data SVM e GNB try to find a correlation between inserted DT algorithm tries to create a flowchart-like structure in which a path from root to leaf is used to make decision (made to represents classification rules and, as can be understood, it does not look for relations between data.) (each internal node represents a test on an attribute, each branch represents the outcome of the test, and each leaf node represents a label. MIT researchers used mobile phones to collect data about call logs, Bluetooth devices in proximity, cell tower IDs, application usage, and phone status. 94 people over 9 months were monitored and the collected data were, then, used to infer different user information including location SVM and GNB seem to work worse with unrelated data DT algorithm reports better values with unrelated data. However, it can be observed that the DT algorithm is the only one that obtains a high value for all the reported metrics: while in both experiments (with unrelated and related data) an high value (higher than 90%) of the accuracy and recall falls in a lower value (lower than 90%) of the precision and viceversa, with the DT algorithm the values obtained for all the three measures is always high (higher that 90%). Moreover, through the analysis of each wrong decision (the detailed list of all the made decision is not reported in this dissertation for shortness needs), it can be noticed that all the errors made by DT in the second experiment were related to combination of attributes that were not present in the training set, implying that DT do not work very well with unknown notifications contained in related data.
  8. SVM e GNB try to find a correlation between inserted DT algorithm tries to create a flowchart-like structure in which each internal node represents a test on an attribute, each branch represents the outcome of the test, and each leaf node represents a label. The paths from root to leaf represents classification rules and, as can be understood, it does not look for relations between data. MIT researchers used mobile phones to collect data about call logs, Bluetooth devices in proximity, cell tower IDs, application usage, and phone status. 94 people over 9 months were monitored and the collected data were, then, used to infer different user information including location SVM and GNB seem to work worse with unrelated data DT algorithm reports better values with unrelated data. However, it can be observed that the DT algorithm is the only one that obtains a high value for all the reported metrics: while in both experiments (with unrelated and related data) an high value (higher than 90%) of the accuracy and recall falls in a lower value (lower than 90%) of the precision and viceversa, with the DT algorithm the values obtained for all the three measures is always high (higher that 90%). Moreover, through the analysis of each wrong decision (the detailed list of all the made decision is not reported in this dissertation for shortness needs), it can be noticed that all the errors made by DT in the second experiment were related to combination of attributes that were not present in the training set, implying that DT do not work very well with unknown notifications contained in related data.
  9. The modular nature of the SNS system architecture inspired the design and the prototyping of three main groups of contributions provided as first outcome of the present dissertation
  10. 29 people helped us by installing the app and data demonstrate that -> LEGGI
  11. understand if the promising adoption of machine learning approach in such domain is actually feasible and, eventually, continue experiments by involving real users in the evaluation.
  12. The modular nature of the SNS system architecture inspired the design and the prototyping of three main groups of contributions provided as first outcome of the present dissertation
  13. The modular nature of the SNS system architecture inspired the design and the prototyping of three main groups of contributions provided as first outcome of the present dissertation K-means algorithm
  14. The modular nature of the SNS system architecture inspired the design and the prototyping of three main groups of contributions provided as first outcome of the present dissertation K-means algorithm Features grouped in classes to perform parallel experiments with a selection of such classes. So we had the opportunity to understand that -> LEGGI
  15. Developers are expected to: Use XDN GUI to develop and test their notification strategies
  16. Create a script to be integrated in the XDN runtime environment
  17. b) As soon as a new notification arrives The IoT/mobile device convert and send it through the XDN IoT/mobile library
  18. the XDN runtime environment interprets the script
  19. The XDN runtime environment sends the notification to the chosen IoT/mobile library
  20. Previous experience with JavaScript to assure that the evaluation is not affected by problems in learning the JavaScript programming language or the concepts on which it is based.
  21. Scale of 5 points: from 0 to 5 2 of the remaining people were facing only one last problem in coding when the time finished Results demonstrate that the XDN library is useful, almost complete and understandable. Then all the components of the XDN GUI are usefull except the Editor, due to the difficulty in finding and resolving errors. Finally, the declared that a DEBUG function could be useful and that, if they will develop notification strategies in the future, they will consider XDN as an available tool SUS è fatto di 10 domande System-Usability-Scale -> ti sei solo ispirato a SUS per alcune domande poiché l’obiettivo della valutazione non era la “semplice” usabilità del sistema
  22. Scale of 5 points: from 0 to 5 2 of the remaining people were facing only one last problem in coding when the time finished SUS è fatto di 10 domande System-Usability-Scale -> ti sei solo ispirato a SUS per alcune domande poiché l’obiettivo della valutazione non era la “semplice” usabilità del sistema Efficient = efficace Efficacy = efficacia
  23. Scale of 5 points: from 0 to 5 2 of the remaining people were facing only one last problem in coding when the time finished SUS è fatto di 10 domande System-Usability-Scale -> ti sei solo ispirato a SUS per alcune domande poiché l’obiettivo della valutazione non era la “semplice” usabilità del sistema
  24. Scale of 5 points: from 0 to 5 2 of the remaining people were facing only one last problem in coding when the time finished SUS è fatto di 10 domande System-Usability-Scale -> ti sei solo ispirato a SUS per alcune domande poiché l’obiettivo della valutazione non era la “semplice” usabilità del sistema