COMP 790 The Internet of Things Shahriar Nirjon SN #258 Date: 8/18.

Slides:



Advertisements
Similar presentations
Click Here to Begin. Objectives Purchasing a PC can be a difficult process full of complex questions. This Computer Based Training Module will walk you.
Advertisements

Deployment of the Light Weight IPv6 protocols In the Internet of Things(IoT) draft-fu-lwig-iot-usecase-00 Qiao Fu China Mobile
Tablet Computers Georgia 4- H Cotton Boll and Consumer Judging 2013.
The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Adrian Ilie COMP 14 Introduction to Programming Adrian Ilie Summer Session II, 2005 MTWRF 9:45-11:15 am.
introduction to MSc projects
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
CS526 Wireless Sensor Networks Instructor: KD Kang.
COMP 14 Introduction to Programming Miguel A. Otaduy Summer Session I, 2004 MTWRF 9:45-11:15 am Sitterson Hall 014.
Welcome to CS 450 Internet Security: A Measurement-based Approach.
A smartphone from Apple that integrates cellphone, iPod, camera, text messaging, and Web browsing. Data and applications can be sent to the phone.
Mobile Commerce and Ubiquitous Computing
Security and Privacy in Ubiquitous Computing. Agenda Project issues? Project issues? Ubicomp quick overview Ubicomp quick overview Privacy and security.
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Wenyuan Xu Department of Computer Science and Engineering University of South.
Welcome to CS 395/495 Internet Measurement and its Reverse Engineering.
Welcome to CS 395/495 Measurement and Analysis of Online Social Networks.
Welcome to CS 395/495 Internet Architectures. What is this class about? (1) Goal: to help you understand what the future Internet will look like –What.
Tablet Computers Georgia 4- H Cotton Boll and Consumer Judging 2013.
Introduction to Computers Essential Understanding of Computers and Computer Operations.
Shala Sylvester, Dejah Sanford, Stephanie Hicks, Tierra Beason.
Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access memory.
ECS15: Introduction to Computers Fall 2013 Patrice Koehl
Alternative Input Devices. Digital Camcorder View recordings on a regular TV or copy them to VHS tape Send MPEG video clips by way of to a mobile.
G OO GLE GLASS For more notes and topics visit: eITnotes.com.
Sensor Coordination using Role- based Programming Steven Cheung NSF NeTS NOSS Informational Meeting October 18, 2005.
1 CMSC 628: Introduction to Mobile Computing Nilanjan Banerjee Introduction to Mobile Computing University of Maryland Baltimore County
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science.
1 CSCE 4013: Mobile Systems Programming Nilanjan Banerjee Mobile Systems Programming University of Arkansas Fayetteville, AR
Theme 2: Working smarter Topic 12: Explore portable devices and learn more about connections Chapter 1.4. Page 61 – 75 Mobile technology.
Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
COMP Introduction to Programming Yi Hong May 13, 2015.
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
COMP 410 Update. The Problems Story Time! Describe the Hurricane Problem Do this with pictures, lots of people, a hurricane, trucks, medicine all disconnected.
1 Pervasive & Ubiquitous Computing (UbiComp) Lecture #1: Introduction Hao-hua Chu ( 朱浩華 )
Turducken: Hierarchical Power Management for Mobile Devices Jacob Sorber, Nilanjan Banerjee, Mark Corner, Sami Rollins University of Massachusetts, Amherst.
1 COMPSCI 110 Operating Systems Who - Introductions How - Policies and Administrative Details Why - Objectives and Expectations What - Our Topic: Operating.
Presentation on 5 pens technology - THE NEXT GEN INCREDIBLE COMPUTER.
CSci8211: Logistics1 CSci8211: Advanced Computer Networks and Their Applications aka Basic Architecture, Mechanisms and Research Issues in Emerging Software-
Welcome to EECS 395/495 Networking Problems in Cloud Computing.
By Sarah. * The battery stays on longer. * Has better screen. * More memory * faster max data speeds * Thinner * Much lighter * Much smaller * Much more.
KSE631: Content Networking Uichin Lee Feb. 07, 2011.
Components of a Computer System
Welcome to CPS 210 Graduate Level Operating Systems –readings, discussions, and programming projects Systems Quals course –midterm and final exams Gateway.
Chapter 1: Applying Computer Basics – Lesson 1 © 2010, 2006 South-Western, Cengage Learning.
Wearable Electronic Device Design for Preventive Health Care-Related Purposes Supervisor: Jörg Ott Author: Todor Aleksandrov Ginchev, 23 November 2015.
Today: Student will be able to describe the basics of their class and computing Tell me about you and how you use computers. Lesson 1 Slide 1.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Adaptive Sleep Scheduling for Energy-efficient Movement-predicted Wireless Communication David K. Y. Yau Purdue University Department of Computer Science.
Lecture 1: Getting Ready Topics: People and Course Overview Date: Jan 12, 2016.
Project. Research Project Due: – Project report due Monday midnight Delayed a bit due to popular demand Can accept an even higher delay (Tuesday at noon)
Welcome to EECS 395/495 Online Advertising: A Systems Approach.
Internet of Things. Creating Our Future Together.
CS120 Purchasing a Computer
Welcome to EECS 395/495 IoT Networks Seminar
Lecture 1: Getting Ready
Department of Computer Science
Welcome to EECS 395/495 Networking Problems in Cloud Computing
English for Advance Learners I
Lecture 1: Getting Ready
CPSC : Collaborative Computing & Personal Informatics
Theory and Practice of Web Technology
Lecture 1: Getting Ready
Algorithms for Big Data Delivery over the Internet of Things
Mobile Commerce and the Internet of Things
Internet of Things (IoT)
Meeting, training & teaching in the interactive iWorld
Course Project Topics for CSE5469
CS6501 Embedded Operating Systems for the IoT
Instructor: Chunyi Peng
Lecture 1: Getting Ready
Presentation transcript:

COMP 790 The Internet of Things Shahriar Nirjon SN #258 Date: 8/18

Agenda 1.Logistics/Course Structure 2.Introduction to the IoT 3.Paper Presentation Guidelines

#1. Logistics

Logistics T and Th (9:30 am – 10:45 am) No Prerequisites No Text Books (mainly papers) Office Hours: after class (by appointment) Course Webpage: Makeup Classes (if needed)

Course Structure 1.Class Participation (15%) 2.Paper Synopsis (10%) 3.Paper Presentation (25%) 4.Mid-term Project Report (25%) 5.Final Project Report (25%)

1. Class Participation Come to the class Bring questions about the paper Participate in discussions No playing with cellphones, laptops, or anything else that distract you and the class

2. Synopsis What is it? Bring it daily (no need for the presenter) Preferred Style: o Use a word processor o 1 pg. (max) o Bullet-list of key insights (e.g. claim, approach, evaluation, your comments)

3. Presentation the slides for an early feedback ~20 min followed by discussion Lead the discussion and Q/A (in and after) Tips: o Not just the facts – present your own view o Find flaws, be a critique o Make it interesting (add surprises) o Follow the guidelines (discussed later)

4. Mid-Term Project Report Individual Report Decide the topic by next week Short 4 page write-up (conference format) – You do not have to implement the idea for a 4 page mid-term report – Due last class before midterm – Follow guideline (discussed next class)

5. Final Project Report Two options: o Complete the mid term project (with full evaluation, 6-8 pages, due last week), or o A different idea (think of it as another mid-term report on a new topic, due last week)

Paper Lottery First N paper presenters Check the course page for updated schedule and paper list (tonight)

#2. Introduction to the IoT

The IoT Hype (2015)

Hype vs. Fact 2011: NFC Payment, Internet TV 2012: BYOD, 3D Printing 2013: Wearable UI, Gamification, Consumer 3D printing 2014: NLP, IoT

The IoT Concept

Example 1 Cupcake Conveyor — Yes, an actual cupcake ATM that Davis called a “confectionery 3D printer.” There are Sprinkles’ cupcakes ATMs in several cities in the United States, including Beverly Hills, Chicago, New York and Atlanta.

Example 2 Smart Loos — Found in Heathrow’s Terminal 2, these smart loos have embedded sensors that track people’s movement and bathroom flow, and can alert maintenance crews if there’s a problem London’s Heathrow Airport

Let’s think of the similarities

Driving Forces of IoT 1.Sensor Technology – Tiny, Cheap, Variety 2.Cheap Miniature Computers 3.Low Power Connectivity 4.Capable Mobile Devices 5.Power of the Cloud

1. Sensor Technology Accelerometer (4mm diameter) Pulse Sensor $25 Force Sensor (0.1N – 10N)

2. Cheap Mini Computers Lily Tiny Key Parameters Flash: 8 Kbytes Pin Count: 8 Max. Operating Freq: 20 MHz CPU: 8-bit AVR Max I/O Pins: 6 Ext Interrupts: 6 SPI: 1 I2C: aspx?tab=parameters Guess the Price?

3. Low Power Connectivity Bluetooth Smart (4.0) (Up to 2 years with a single Coin-cell battery)

4. Capable Mobile Devices Quad Core 1.5 GHz 128 GB Internal Memory 3 GB RAM 16 MP Camera video WiFI, GPS, BLE

5. Power of the Cloud

ABCD’s of IoT Applications Big Data Analytics Connectivity and Communication Devices – that are smart! Photos – Libelium, Google Image Search

Applications Ubiquitous Computing Applications Cyber Physical Systems (CPS) Applications Smart and Connected Health

Big Data Analytics Map-Reduce Frequent Item-sets Similarity Clustering Dimension Reduction Streaming Data

Connectivity M2M Wireless Sensor Networks IPv6 and 6LowPAN Bluetooth LE and ZigBee WiFi and LTE

Devices and Platforms Mobile Systems Sensor Systems Wearables Energy Harvesting Security and Privacy

IoT in the Research Community Mobile Systems (MobiSys, MobiCom) Sensor Systems (SenSys, IPSN) Real-Time Systems (RTSS, RTAS) Human-Computer Interaction (CHI) Applications (UbiComp, PerCom) ML/Data Mining (ICML, KDD) … and more

#3. Paper Presentation Guidelines

Learn from the best ntLGOyHw4 ntLGOyHw4

Claim Statement: Smart and Connected Pen Let’s try this. A pen that _____________ is better than _____________ in terms of _____________, in _______________

COMP 790 The Internet of Things Shahriar Nirjon SN #258 Date: 8/20

Annonuncements 1 pg Synopsis due (everyone) Student presentations start next week Project selection (at least a high-level direction/idea) deadline is next week Send me your paper numbers!

Agenda (8/20) 1.Presentation Guideline (continued) o Example: Smart Connected Pen 2.Synopsis Guideline o Example: Conference Review 3.Project Report Guideline o Handout

#1. Paper Presentation Guidelines (continued)

What do we present? A scientific work: o Theory o Proof A system paper: o Claims o Arguments

Thought Exercise “Smart and Connected Pen” for the IoT 1.It’s a pen 2.Record (track writing) and store 3.Crowdsource to recognize writing 4.Backup notes 5.Emotion detection 6.Authentication (fingerprint) 7.Location, time, date 8.Never run out of ink 9.Finding is easy (RFID)

Forming a Well Posed Claim Statement Simple Claim Statement: “We propose a smart pen that authenticates the user” A Well-posed Claim Statement: “We propose a smart pen that authenticates the user by matching fingerprint, which 7 times faster than typing in pin numbers, in a secure writing scenario.”

Strong Claim Statements Points in a well-posed claim statement: o Approach o Baseline o Metric o Context “We propose a smart pen that authenticates the user by matching fingerprint, which 7 times faster than typing in pin numbers, in a secure writing scenario.”

Class Exercise (claim statements) Let’s try some other claims. 1.It’s a pen 2.Record (track writing) and store 3.Crowdsource to recognize writing 4.Backup notes 5.Emotion detection 6.Authentication (fingerprint) 7.Location, time, date 8.Never run out of ink 9.Finding is easy (RFID)

Arguments Arguments in support of claims o Algorithms/System Building o Experimental Evaluation Claim #1Arguments to support claim #1 Claim #2Arguments to support claim #2 …….

Elements in Arguments Problem Statements Algorithm Design Experimental Design Experimental Results: o X variables o Y variables o Baseline Claim #1 Arguments to support claim #1 Problem Solution Expt Result Problem Solution Expt Result Problem Solution Expt Result …….

Argument: Pen Authentication Problem: Matching fingerprint as the user holds the pen to authenticate. System Design: Fingerprint Scanner - 5V TTL (GT-511C1R) Pen Logic to match and lock/unlock the pen…

Argument: Pen Authentication Experiment Design: o 3 user, store 5 samples per user o Try to authenticate 6 users (3 new users), 10 attempts for each Experiments: – Accuracy of Authentication – Avg. time to Authenticate – User study – …

Argument: Pen Authentication Results/Plots:

Class Exercise Let’s try arguments for another claim 1.It’s a pen 2.Record (track writing) and store 3.Crowdsource to recognize writing 4.Backup notes 5.Emotion detection 6.Authentication (fingerprint) 7.Location, time, date 8.Never run out of ink 9.Finding is easy (RFID)

Paper Presentation 1.Broader Context 2.Claims/Problem Statements 3.Prior Work 4.Approach/Algorithms/System 5.Experimental Design 6.Results 7.Broader Impact

#2. Synopsis Guideline

Structure of Synopsis Summary (claims and arguments) Pros Cons Your Comments

#3. Project Report Guidelines (Handout)

Project Ideas (not limited to this) Net: Gateway to the Internet Net: Redesign Internet to Accommodate Things Net: Heterogeneous Interfaces – Things don’t talk same language. Net: App layer protocol for M2M communication. Dev: Programming Networked Heterogeneous Systems Data: More irrelevant data makes it harder to find a pattern. Data: Real-Time processing of large amount of IoT data. Data: Fast Accumulation, Steady Streams Security and Privacy: Detection, Prevention App: Killer App App: IoT advertisement