SlideShare a Scribd company logo
A Context and User Aware
Smart Notification
System
Fulvio Corno
Luigi De Russis
Teodoro Montanaro*
http://jol.telecomitalia.com/j
olswarm/
http://elite.polito.it/
2
Outline
1. Context and Motivation
2. Goal
3. Architecture
4. Prototype
5. Preliminary results
6. Conclusion
7. Future work
3
Context
Context
Infographic from "The Connectivist": growing of IoT connected devices
(http://www.theconnectivist.com/2014/05/infographic-the-growth-of-the-internet-of-things/)
4
Motivation
Motivation
5
Motivation
Motivation
IoT devices can generate, receive and show different kinds of notifications
6
Motivation
Motivation
IoT devices can generate, receive and show different kinds of notifications
7
Motivation
Motivation
IoT devices can generate, receive and show different kinds of notifications
8
Motivation
Motivation
IoT devices can generate, receive and show different kinds of notifications
The number of notifications is growing
9
Motivation
Motivation
IoT devices can generate, receive and show different kinds of notifications
The number of notifications is growing
10
Motivation
Motivation
IoT devices can generate, receive and show different kinds of notifications
Nowadays the same notification is replicated on all available devices
The number of notifications is growing
11
Motivation
Motivation
IoT devices can generate, receive and show different kinds of notifications
Nowadays the same notification is replicated on all available devices
The number of notifications is growing
12
Motivation
Motivation
IoT devices can generate, receive and show different kinds of notifications
Nowadays the same notification is replicated on all available devices
The number of notifications is growing
The benefit of displaying the same
notification on all available devices
could put user patience to a hard test
13
Analyze how machine learning approach can improve
IoT notification user experience
Goal
Goal
14
Analyze how machine learning approach can improve
IoT notification user experience
Goal
Goal
15
Analyze how machine learning approach can improve
IoT notification user experience
Goal
Goal
Develop a system able to filter incoming notifications
depending on:
• Notification information
• Environment status
• User context
• User habits
16
Analyze how machine learning approach can improve
IoT notification user experience
Goal
Goal
Develop a system able to filter incoming notifications
depending on:
• Notification information
• Environment status
• User context
• User habits
17
Analyze how machine learning approach can improve
IoT notification user experience
Goal
Goal
Develop a system able to filter incoming notifications
depending on:
• Notification information
• Environment status
• User context
• User habits
Evaluate machine learning approach
18
We propose:
Architecture
Architecture
19
We propose: A modular architecture
Architecture
Architecture
20
We propose: A modular architecture
Architecture
Architecture
21
We propose: A modular architecture
Architecture
Architecture
22
We propose: A modular architecture
aware of
Architecture
Architecture
23
We propose:
Environment status
(e.g., weather information,
current date and time)
A modular architecture
aware of
Architecture
Architecture
24
We propose:
Environment status
(e.g., weather information,
current date and time)
User context (e.g.,
location, status, current
activity),
A modular architecture
aware of
Architecture
Architecture
25
We propose:
Environment status
(e.g., weather information,
current date and time)
User context (e.g.,
location, status, current
activity),
User habits
A modular architecture
aware of
Architecture
Architecture
26
We propose: A modular architecture
Architecture
Architecture
27
We propose:
Decision maker: Machine Learning
algorithm makes decisions (best devices
+ best modes + best moment).
Architecture
Architecture
28
Architecture: example
Architecture
29
Architecture: example
Architecture
Mario is in a
meeting
30
Architecture: example
Architecture
Mario is in a
meeting
31
Architecture: example
Architecture
Every meeting lasts at least 2
hours
Mario is in a
meeting
32
Architecture: example
Architecture
Every meeting lasts at least 2
hours
Mario is in a
meeting
33
Architecture: example
Architecture
Time: 17:00
Meeting started at
16:00
Wife is at home
Every meeting lasts at least 2
hours
Mario is in a
meeting
34
Architecture: example
Architecture
Time: 17:00
Meeting started at
16:00
Wife is at home
Every meeting lasts at least 2
hours
Mario is in a
meeting
35
Architecture: example
Architecture
Notification:the toilet
paper has just finished
Time: 17:00
Meeting started at
16:00
Wife is at home
Every meeting lasts at least 2
hours
Mario is in a
meeting
36
Architecture: example
Architecture
Notification:the toilet
paper has just finished
Time: 17:00
Meeting started at
16:00
Wife is at home
Every meeting lasts at least 2
hours
Mario is in a
meeting
37
Architecture: example
Architecture
Notification:the toilet
paper has just finished
Time: 17:00
Meeting started at
16:00
Wife is at home
Every meeting lasts at least 2
hours
Mario is in a
meeting
38
Architecture: example
Architecture
Notification:the toilet
paper has just finished
Notify:
• At 18:10
• on his personal
smartphone
• Sound
Time: 17:00
Meeting started at
16:00
Wife is at home
Every meeting lasts at least 2
hours
Mario is in a
meeting
39
Architecture: example
Architecture
Notification:the toilet
paper has just finished
Notify:
• At 18:10
• on his personal
smartphone
• Sound
Time: 17:00
Meeting started at
16:00
Wife is at home
Every meeting lasts at least 2
hours
Mario is in a
meeting
40
Architecture: example
Architecture
Notification:the toilet
paper has just finished
Notify:
• At 18:10
• on his personal
smartphone
• Sound
Time: 17:00
Meeting started at
16:00
Wife is at home
Every meeting lasts at least 2
hours
Mario is in a
meeting
41Prototype
Prototype implementation
42Prototype
Prototype implementation
Aim: evaluate machine learning approach to decide
• who should receive an incoming notification;
• the best moment to show the notification;
• the best device(s)
• the best mode to notify the incoming notification
43Prototype
Prototype implementation
Aim: evaluate machine learning approach to decide
• who should receive an incoming notification;
• the best moment to show the notification;
• the best device(s)
• the best mode to notify the incoming notification
44Prototype
Prototype implementation
Preliminary version of
Aim: evaluate machine learning approach to decide
• who should receive an incoming notification;
• the best moment to show the notification;
• the best device(s)
• the best mode to notify the incoming notification
45Prototype
Prototype implementation
Preliminary version of
Aim: evaluate machine learning approach to decide
• who should receive an incoming notification;
• the best moment to show the notification;
• the best device(s)
• the best mode to notify the incoming notification
46Prototype
Prototype implementation
47Prototype
Prototype implementation
Preliminary version of
48Prototype
Prototype implementation
Preliminary version of
Dataset
49Prototype
Prototype implementation
Preliminary version of
Dataset Algorithms
50
Prototype implementation
Prototype
Dataset
51
Prototype implementation
Prototype
94 people over 9 months
monitored through
smartphones in 2004:
• Sender
• Receiver
• Type of notification
• Timestamp of receipt
• User current location
Dataset
52
Prototype implementation
Prototype
94 people over 9 months
monitored through
smartphones in 2004:
• Sender
• Receiver
• Type of notification
• Timestamp of receipt
• User current location
Dataset
Synthetic data:
• User current
activity
• Available devices
for the user
• Target device.
53
Prototype implementation
Prototype
94 people over 9 months
monitored through
smartphones in 2004:
• Sender
• Receiver
• Type of notification
• Timestamp of receipt
• User current location
Dataset
Synthetic data:
• User current
activity
• Available devices
for the user
• Target device.
Real + synthetic dataset:
165,289 samples, almost one per
each hour of the day
(the missing samples are related
to hours in which users turned
off their smartphones)
54
Prototype implementation
Prototype
94 people over 9 months
monitored through
smartphones in 2004:
• Sender
• Receiver
• Type of notification
• Timestamp of receipt
• User current location
Dataset
Synthetic data:
• User current
activity
• Available devices
for the user
• Target device.
Real + synthetic dataset:
165,289 samples, almost one per
each hour of the day
(the missing samples are related
to hours in which users turned
off their smartphones)
Information collected by Decision Maker in previous example
{
“notification“:{
“senderName“:“mySmartHome“,
“type“:“smart Home Notification“,
“receiptTimestamp“:“1447347600“
},
“userStatus“: {
“senderId“:“359“,
“currentActivity“:“STILL“,
“currentActivityConfidence“:“50%“,
“availableDevices”:[“deviceId”:”23”]
},
“deviceStatus“:{
“deviceId“:”23”,
“category“:”Smartphone”,
“currentStatus“:”On”,
“currentMode“:”Ring”,
“wifiStatus“:” Connected through MOBILE”,
“batteryLevel“:” 57%”,
“batteryStatus“:”BATTERY_STATUS_NOT_CHARGING”
}
}
55
Prototype implementation
Prototype
Machine learning algorithms
Dataset
Real + synthetic data (165,289
samples)
56
Prototype implementation
Prototype
Machine learning algorithms
Dataset
Real + synthetic data (165,289
samples)
57
Prototype implementation
Prototype
Machine learning algorithms
Dataset
Real + synthetic data (165,289
samples)
58
Prototype implementation
Prototype
Machine learning algorithms
Dataset
Real + synthetic data (165,289
samples)
Training dataset: 80% of data
Tests dataset: 20% of data
59
Prototype implementation
Prototype
Simplified version of the Decision
maker:
• only one device as receiver;
• only one available mode for each
device;
• no decision about the best time
to deliver the notification;
• not aware of environment
context
Machine learning algorithms
Dataset
Real + synthetic data (165,289
samples)
Training dataset: 80% of data
Tests dataset: 20% of data
60
Prototype implementation
Prototype
Machine learning algorithms
Dataset
Real + synthetic data (165,289
samples)
Training dataset: 80% of data
Tests dataset: 20% of data
61
Prototype implementation
Prototype
Machine learning algorithms
Dataset
Real + synthetic data (165,289
samples)
Training dataset: 80% of data
Tests dataset: 20% of data
62
Prototype implementation
Prototype
Three machine learning
algorithms:
1. SupportVector Machine
2. Gaussian Naïve Bayes
3. Decision Trees.
Machine learning algorithms
Dataset
Real + synthetic data (165,289
samples)
Training dataset: 80% of data
Tests dataset: 20% of data
63
Preliminary results
Preliminary results
64
Preliminary results
Preliminary results
96,10%
83,40%
93,90%
0,00%
20,00%
40,00%
60,00%
80,00%
100,00%
Support
Vector
Machine
Gaussian
Naive Bayes
Decision Trees
Percentage of corrected predictions obtained
with used algorithms
65
Preliminary results
Preliminary results
CPU time (in seconds) for a training phase with
33058 samples
96,10%
83,40%
93,90%
0,00%
20,00%
40,00%
60,00%
80,00%
100,00%
Support
Vector
Machine
Gaussian
Naive Bayes
Decision Trees
5801,1
12,9 13,9
1
10
100
1000
10000
Support
Vector
Machine
Gaussian
Naive Bayes
Decision Trees
Percentage of corrected predictions obtained
with used algorithms
66
Preliminary results
Preliminary results
Average CPU time (in milliseconds) for each
notification classification
SupportVector Machine 40,22 ms
Gaussian Naive Bayes 0,31 ms
Decision Trees 0,001 ms
96,10%
83,40%
93,90%
0,00%
20,00%
40,00%
60,00%
80,00%
100,00%
Support
Vector
Machine
Gaussian
Naive Bayes
Decision Trees
Percentage of corrected predictions obtained
with used algorithms
CPU time (in seconds) for a training phase with
33058 samples
5801,1
12,9 13,9
1
10
100
1000
10000
Support
Vector
Machine
Gaussian
Naive Bayes
Decision Trees
67
Conclusion
Obtained results demonstrated that our system uses a promising technique to
manage the problem of overwhelming notifications.
Specifically, the machine learning approach was tested through 3 different
algorithms and SVM and DT seem to be the most promising one.
Conclusion
Future work:
Define a new dataset to include all the needed real information
Development of a system to collect real data and real notifications
Careful evaluation of the machine learning algorithms
Enhancement of prototype to include unconsidered blocks
68
Thank you
Future work
Notification Collector (beta):
Android app to collect real data
https://goo.gl/pLMWSG
To contribute: download it!
Requirement: Android 5 (Lollipop)
We collect (anonymously):
• Incoming notification info (no
content)
• User current activity
• User current location
• Device status
• User feedback
Ad

More Related Content

Viewers also liked (20)

OWD - Push Notification Server Architecture [DEVCON1_2012]
OWD - Push Notification Server Architecture [DEVCON1_2012]OWD - Push Notification Server Architecture [DEVCON1_2012]
OWD - Push Notification Server Architecture [DEVCON1_2012]
Fernando Sela
 
Dawn Nafus's presentation at eComm 2008
Dawn Nafus's presentation at eComm 2008Dawn Nafus's presentation at eComm 2008
Dawn Nafus's presentation at eComm 2008
eComm2008
 
Mobile Score Notification System
Mobile Score Notification SystemMobile Score Notification System
Mobile Score Notification System
Abdul Rahman Sherzad
 
SenSocial
SenSocialSenSocial
SenSocial
Abhinav Mehrotra
 
Common Alerting Protocol and Procedures
Common Alerting Protocol and ProceduresCommon Alerting Protocol and Procedures
Common Alerting Protocol and Procedures
Nuwan Waidyanatha
 
ISCRAM 2013: Context Ontology for Humanitarian Assistance in Crisis Response
ISCRAM 2013: Context Ontology for Humanitarian Assistance in Crisis ResponseISCRAM 2013: Context Ontology for Humanitarian Assistance in Crisis Response
ISCRAM 2013: Context Ontology for Humanitarian Assistance in Crisis Response
ISCRAM Events
 
ISCRAM 2013: Smartphones as an Alerting, Command and Control System for the P...
ISCRAM 2013: Smartphones as an Alerting, Command and Control System for the P...ISCRAM 2013: Smartphones as an Alerting, Command and Control System for the P...
ISCRAM 2013: Smartphones as an Alerting, Command and Control System for the P...
ISCRAM Events
 
METAA Dinner
METAA DinnerMETAA Dinner
METAA Dinner
robertchappell
 
I Cafe Ordering Process
I Cafe Ordering ProcessI Cafe Ordering Process
I Cafe Ordering Process
I-Café Pilipinas
 
II-SDV 2014 Design and development of a novel Patent Alerting Service (Bayer ...
II-SDV 2014 Design and development of a novel Patent Alerting Service (Bayer ...II-SDV 2014 Design and development of a novel Patent Alerting Service (Bayer ...
II-SDV 2014 Design and development of a novel Patent Alerting Service (Bayer ...
Dr. Haxel Consult
 
[CONTEXTS'10] Using context awareness to foster active lifestyles
[CONTEXTS'10] Using context awareness to foster active lifestyles[CONTEXTS'10] Using context awareness to foster active lifestyles
[CONTEXTS'10] Using context awareness to foster active lifestyles
Josué Freelance
 
Intelligent Wireless Sensor Network Simulation: Flood Use Case
Intelligent Wireless Sensor Network Simulation: Flood Use CaseIntelligent Wireless Sensor Network Simulation: Flood Use Case
Intelligent Wireless Sensor Network Simulation: Flood Use Case
catherine roussey
 
New
NewNew
New
ikrrish
 
Location-based Services - Introduction
Location-based Services - IntroductionLocation-based Services - Introduction
Location-based Services - Introduction
axelkuepper
 
Intelligent Wireless Sensor Network Simulation
Intelligent Wireless Sensor Network SimulationIntelligent Wireless Sensor Network Simulation
Intelligent Wireless Sensor Network Simulation
catherine roussey
 
IoT Meets Exhibition Areas: a Modular Architecture to Improve Proximity Inter...
IoT Meets Exhibition Areas: a Modular Architecture to Improve Proximity Inter...IoT Meets Exhibition Areas: a Modular Architecture to Improve Proximity Inter...
IoT Meets Exhibition Areas: a Modular Architecture to Improve Proximity Inter...
Teodoro Montanaro
 
REST is not enough: Using Push Notifications to better support your mobile cl...
REST is not enough: Using Push Notifications to better support your mobile cl...REST is not enough: Using Push Notifications to better support your mobile cl...
REST is not enough: Using Push Notifications to better support your mobile cl...
Juan Gomez
 
Mobile learning and application-final presentation
Mobile learning and application-final presentationMobile learning and application-final presentation
Mobile learning and application-final presentation
Vasumathy Vardarajan
 
Sensing mobile phones
Sensing mobile phonesSensing mobile phones
Sensing mobile phones
Arpan Pal
 
"Integration of wireless sensor technology, Internet tools y computational me...
"Integration of wireless sensor technology, Internet tools y computational me..."Integration of wireless sensor technology, Internet tools y computational me...
"Integration of wireless sensor technology, Internet tools y computational me...
3JornadasRFID
 
OWD - Push Notification Server Architecture [DEVCON1_2012]
OWD - Push Notification Server Architecture [DEVCON1_2012]OWD - Push Notification Server Architecture [DEVCON1_2012]
OWD - Push Notification Server Architecture [DEVCON1_2012]
Fernando Sela
 
Dawn Nafus's presentation at eComm 2008
Dawn Nafus's presentation at eComm 2008Dawn Nafus's presentation at eComm 2008
Dawn Nafus's presentation at eComm 2008
eComm2008
 
Common Alerting Protocol and Procedures
Common Alerting Protocol and ProceduresCommon Alerting Protocol and Procedures
Common Alerting Protocol and Procedures
Nuwan Waidyanatha
 
ISCRAM 2013: Context Ontology for Humanitarian Assistance in Crisis Response
ISCRAM 2013: Context Ontology for Humanitarian Assistance in Crisis ResponseISCRAM 2013: Context Ontology for Humanitarian Assistance in Crisis Response
ISCRAM 2013: Context Ontology for Humanitarian Assistance in Crisis Response
ISCRAM Events
 
ISCRAM 2013: Smartphones as an Alerting, Command and Control System for the P...
ISCRAM 2013: Smartphones as an Alerting, Command and Control System for the P...ISCRAM 2013: Smartphones as an Alerting, Command and Control System for the P...
ISCRAM 2013: Smartphones as an Alerting, Command and Control System for the P...
ISCRAM Events
 
II-SDV 2014 Design and development of a novel Patent Alerting Service (Bayer ...
II-SDV 2014 Design and development of a novel Patent Alerting Service (Bayer ...II-SDV 2014 Design and development of a novel Patent Alerting Service (Bayer ...
II-SDV 2014 Design and development of a novel Patent Alerting Service (Bayer ...
Dr. Haxel Consult
 
[CONTEXTS'10] Using context awareness to foster active lifestyles
[CONTEXTS'10] Using context awareness to foster active lifestyles[CONTEXTS'10] Using context awareness to foster active lifestyles
[CONTEXTS'10] Using context awareness to foster active lifestyles
Josué Freelance
 
Intelligent Wireless Sensor Network Simulation: Flood Use Case
Intelligent Wireless Sensor Network Simulation: Flood Use CaseIntelligent Wireless Sensor Network Simulation: Flood Use Case
Intelligent Wireless Sensor Network Simulation: Flood Use Case
catherine roussey
 
Location-based Services - Introduction
Location-based Services - IntroductionLocation-based Services - Introduction
Location-based Services - Introduction
axelkuepper
 
Intelligent Wireless Sensor Network Simulation
Intelligent Wireless Sensor Network SimulationIntelligent Wireless Sensor Network Simulation
Intelligent Wireless Sensor Network Simulation
catherine roussey
 
IoT Meets Exhibition Areas: a Modular Architecture to Improve Proximity Inter...
IoT Meets Exhibition Areas: a Modular Architecture to Improve Proximity Inter...IoT Meets Exhibition Areas: a Modular Architecture to Improve Proximity Inter...
IoT Meets Exhibition Areas: a Modular Architecture to Improve Proximity Inter...
Teodoro Montanaro
 
REST is not enough: Using Push Notifications to better support your mobile cl...
REST is not enough: Using Push Notifications to better support your mobile cl...REST is not enough: Using Push Notifications to better support your mobile cl...
REST is not enough: Using Push Notifications to better support your mobile cl...
Juan Gomez
 
Mobile learning and application-final presentation
Mobile learning and application-final presentationMobile learning and application-final presentation
Mobile learning and application-final presentation
Vasumathy Vardarajan
 
Sensing mobile phones
Sensing mobile phonesSensing mobile phones
Sensing mobile phones
Arpan Pal
 
"Integration of wireless sensor technology, Internet tools y computational me...
"Integration of wireless sensor technology, Internet tools y computational me..."Integration of wireless sensor technology, Internet tools y computational me...
"Integration of wireless sensor technology, Internet tools y computational me...
3JornadasRFID
 

Similar to A Context and User Aware Smart Notification System (20)

PhD Defense of Teodoro Montanaro
PhD Defense of Teodoro MontanaroPhD Defense of Teodoro Montanaro
PhD Defense of Teodoro Montanaro
Teodoro Montanaro
 
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
Matteo Ferroni
 
iThings-2012, Besançon, France, 20 November, 2012
iThings-2012, Besançon, France, 20 November, 2012iThings-2012, Besançon, France, 20 November, 2012
iThings-2012, Besançon, France, 20 November, 2012
Charith Perera
 
NATO Workshop on Pre-Detection of Lone Wolf Terrorists of the Future
NATO Workshop on Pre-Detection of Lone Wolf Terrorists of the FutureNATO Workshop on Pre-Detection of Lone Wolf Terrorists of the Future
NATO Workshop on Pre-Detection of Lone Wolf Terrorists of the Future
Jerome Glenn
 
Enabling the physical world to the Internet and potential benefits for agricu...
Enabling the physical world to the Internet and potential benefits for agricu...Enabling the physical world to the Internet and potential benefits for agricu...
Enabling the physical world to the Internet and potential benefits for agricu...
Andreas Kamilaris
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
Abhinav Wagadre
 
Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010
Agora Group
 
PERICLES Workflow for the automated updating of Digital Ecosystem Models with...
PERICLES Workflow for the automated updating of Digital Ecosystem Models with...PERICLES Workflow for the automated updating of Digital Ecosystem Models with...
PERICLES Workflow for the automated updating of Digital Ecosystem Models with...
PERICLES_FP7
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Lastline, Inc.
 
The quest for Ubiquitous Computing: from Ambient Intelligence to the combinat...
The quest for Ubiquitous Computing: from Ambient Intelligence to the combinat...The quest for Ubiquitous Computing: from Ambient Intelligence to the combinat...
The quest for Ubiquitous Computing: from Ambient Intelligence to the combinat...
Diego López-de-Ipiña González-de-Artaza
 
Advancing Impact Measurement | Public Good App House
Advancing Impact Measurement | Public Good App HouseAdvancing Impact Measurement | Public Good App House
Advancing Impact Measurement | Public Good App House
TechSoup
 
Collaboration Between Infosec Community and CERT Teams : Project Sonar case
Collaboration Between Infosec Community and CERT Teams : Project Sonar caseCollaboration Between Infosec Community and CERT Teams : Project Sonar case
Collaboration Between Infosec Community and CERT Teams : Project Sonar case
Valdes Nzalli
 
How to build corporate size fraud prevention
How to build corporate size fraud preventionHow to build corporate size fraud prevention
How to build corporate size fraud prevention
Rakuten Group, Inc.
 
Wireless Sensor Network for AgriTech Applications
Wireless Sensor Network for AgriTech Applications Wireless Sensor Network for AgriTech Applications
Wireless Sensor Network for AgriTech Applications
IoTForum | TiE Bangalore
 
Measuring usability workshop
Measuring usability workshopMeasuring usability workshop
Measuring usability workshop
Stefan Ivanov
 
Internet of Things.pdf
Internet of Things.pdfInternet of Things.pdf
Internet of Things.pdf
OlanrewajuJoe
 
Simon Forge TAFI workshop
Simon Forge TAFI workshopSimon Forge TAFI workshop
Simon Forge TAFI workshop
blogzilla
 
Beyond the screen - UX research methods for novel technology
Beyond the screen - UX research methods for novel technologyBeyond the screen - UX research methods for novel technology
Beyond the screen - UX research methods for novel technology
Swetha Sethu-Jones
 
George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design
360mnbsu
 
GK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).pptGK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).ppt
PiyushRanjan269184
 
PhD Defense of Teodoro Montanaro
PhD Defense of Teodoro MontanaroPhD Defense of Teodoro Montanaro
PhD Defense of Teodoro Montanaro
Teodoro Montanaro
 
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
Matteo Ferroni
 
iThings-2012, Besançon, France, 20 November, 2012
iThings-2012, Besançon, France, 20 November, 2012iThings-2012, Besançon, France, 20 November, 2012
iThings-2012, Besançon, France, 20 November, 2012
Charith Perera
 
NATO Workshop on Pre-Detection of Lone Wolf Terrorists of the Future
NATO Workshop on Pre-Detection of Lone Wolf Terrorists of the FutureNATO Workshop on Pre-Detection of Lone Wolf Terrorists of the Future
NATO Workshop on Pre-Detection of Lone Wolf Terrorists of the Future
Jerome Glenn
 
Enabling the physical world to the Internet and potential benefits for agricu...
Enabling the physical world to the Internet and potential benefits for agricu...Enabling the physical world to the Internet and potential benefits for agricu...
Enabling the physical world to the Internet and potential benefits for agricu...
Andreas Kamilaris
 
Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010
Agora Group
 
PERICLES Workflow for the automated updating of Digital Ecosystem Models with...
PERICLES Workflow for the automated updating of Digital Ecosystem Models with...PERICLES Workflow for the automated updating of Digital Ecosystem Models with...
PERICLES Workflow for the automated updating of Digital Ecosystem Models with...
PERICLES_FP7
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Lastline, Inc.
 
The quest for Ubiquitous Computing: from Ambient Intelligence to the combinat...
The quest for Ubiquitous Computing: from Ambient Intelligence to the combinat...The quest for Ubiquitous Computing: from Ambient Intelligence to the combinat...
The quest for Ubiquitous Computing: from Ambient Intelligence to the combinat...
Diego López-de-Ipiña González-de-Artaza
 
Advancing Impact Measurement | Public Good App House
Advancing Impact Measurement | Public Good App HouseAdvancing Impact Measurement | Public Good App House
Advancing Impact Measurement | Public Good App House
TechSoup
 
Collaboration Between Infosec Community and CERT Teams : Project Sonar case
Collaboration Between Infosec Community and CERT Teams : Project Sonar caseCollaboration Between Infosec Community and CERT Teams : Project Sonar case
Collaboration Between Infosec Community and CERT Teams : Project Sonar case
Valdes Nzalli
 
How to build corporate size fraud prevention
How to build corporate size fraud preventionHow to build corporate size fraud prevention
How to build corporate size fraud prevention
Rakuten Group, Inc.
 
Wireless Sensor Network for AgriTech Applications
Wireless Sensor Network for AgriTech Applications Wireless Sensor Network for AgriTech Applications
Wireless Sensor Network for AgriTech Applications
IoTForum | TiE Bangalore
 
Measuring usability workshop
Measuring usability workshopMeasuring usability workshop
Measuring usability workshop
Stefan Ivanov
 
Internet of Things.pdf
Internet of Things.pdfInternet of Things.pdf
Internet of Things.pdf
OlanrewajuJoe
 
Simon Forge TAFI workshop
Simon Forge TAFI workshopSimon Forge TAFI workshop
Simon Forge TAFI workshop
blogzilla
 
Beyond the screen - UX research methods for novel technology
Beyond the screen - UX research methods for novel technologyBeyond the screen - UX research methods for novel technology
Beyond the screen - UX research methods for novel technology
Swetha Sethu-Jones
 
George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design
360mnbsu
 
GK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).pptGK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).ppt
PiyushRanjan269184
 
Ad

Recently uploaded (20)

#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
MINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PRMINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PR
MIND CTI
 
Build 3D Animated Safety Induction - Tech EHS
Build 3D Animated Safety Induction - Tech EHSBuild 3D Animated Safety Induction - Tech EHS
Build 3D Animated Safety Induction - Tech EHS
TECH EHS Solution
 
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdfAre Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Telecoms Supermarket
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Mastering Advance Window Functions in SQL.pdf
Mastering Advance Window Functions in SQL.pdfMastering Advance Window Functions in SQL.pdf
Mastering Advance Window Functions in SQL.pdf
Spiral Mantra
 
Social Media App Development Company-EmizenTech
Social Media App Development Company-EmizenTechSocial Media App Development Company-EmizenTech
Social Media App Development Company-EmizenTech
Steve Jonas
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
TrsLabs Consultants - DeFi, WEb3, Token Listing
TrsLabs Consultants - DeFi, WEb3, Token ListingTrsLabs Consultants - DeFi, WEb3, Token Listing
TrsLabs Consultants - DeFi, WEb3, Token Listing
Trs Labs
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
MINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PRMINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PR
MIND CTI
 
Build 3D Animated Safety Induction - Tech EHS
Build 3D Animated Safety Induction - Tech EHSBuild 3D Animated Safety Induction - Tech EHS
Build 3D Animated Safety Induction - Tech EHS
TECH EHS Solution
 
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdfAre Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Telecoms Supermarket
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Mastering Advance Window Functions in SQL.pdf
Mastering Advance Window Functions in SQL.pdfMastering Advance Window Functions in SQL.pdf
Mastering Advance Window Functions in SQL.pdf
Spiral Mantra
 
Social Media App Development Company-EmizenTech
Social Media App Development Company-EmizenTechSocial Media App Development Company-EmizenTech
Social Media App Development Company-EmizenTech
Steve Jonas
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
TrsLabs Consultants - DeFi, WEb3, Token Listing
TrsLabs Consultants - DeFi, WEb3, Token ListingTrsLabs Consultants - DeFi, WEb3, Token Listing
TrsLabs Consultants - DeFi, WEb3, Token Listing
Trs Labs
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Ad

A Context and User Aware Smart Notification System