SlideShare a Scribd company logo
1 of 50
Download to read offline
Firma convenzione
Politecnico di Milano e Veneranda Fabbrica
del Duomo di Milano
Aula Magna – Rettorato
Mercoledì 27 maggio 2015
Lesson 2: Internet of Things and enabling
technologies
Luca Cerina – luca.cerina@polimi.it
Ver. Updated – 30/11/2017
Luca Cerina, R.A. @ NECSTLab – DEIB
The Cloud
Luca Cerina, R.A. @ NECSTLab – DEIB
The Internet of Things
Luca Cerina, R.A. @ NECSTLab – DEIB
The Quantied Self
“Not all important things in life can be measured and not
everything that can be measured is important”
(Quantified Self Institute)
Luca Cerina, R.A. @ NECSTLab – DEIB
The Hackathon
Device design
Software &
infrastructure
Luca Cerina, R.A. @ NECSTLab – DEIB
Device design: outline
●
Existent technologies
●
NFC
●
Bluetooth
●
LoRa
●
Bird’s eye view on: Fog Computing
●
Focus on: design for human interaction
Luca Cerina, R.A. @ NECSTLab – DEIB
NFC/RFID
●
The reader uses the antenna to
constantly scan the area sending
radio waves
●
The transponder send its ID, with an
active signal (active RFID) or
piggybacking the reader waves
(passive RFID)
The frequencies are:
●
LF (125-134KHz) 1-10cm→
●
HF (13.56MHz) 1m (NFC)→
●
UHF (865-960MHz) long range→
Luca Cerina, R.A. @ NECSTLab – DEIB
NFC/RFID: Example
RC 522 RFID READER
Frequency: 13.56 MHz
Connection protocol: SPI
Support: Read/Write
Usage: Arduino/Microcontrollers
Luca Cerina, R.A. @ NECSTLab – DEIB
Call for Ideas
What would you design?
Luca Cerina, R.A. @ NECSTLab – DEIB
Bluetooth Low Energy
Bluetooth LE enable short-burst wireless
connections and uses multiple network topologies:
●
Point-to-Point (1:1) data transfer and fitness→
trackers
●
Broadcast (1:many) beacons, information→
sharing
●
Mesh (HOT! NEW!) (m:m) large scale topology→
for sensor networks, automation, devices chatting
Luca Cerina, R.A. @ NECSTLab – DEIB
Architecture
Luca Cerina, R.A. @ NECSTLab – DEIB
BLE Radio
●
Frequency: 2.4 GHz ISM
(Industrial Scientific
Medical) band
●
40 channels with 2 MHz
spacing
●
Range 0 – 100m (BT
5.0)
●
Enabling technology
invented by Hedi Lamarr
Luca Cerina, R.A. @ NECSTLab – DEIB
BLE Roles
Advertiser broadcasts adv. packets, can be→
connectable or not
Scanner listen to adv. Packets, passively or→
actively (scan request)
Master/central device connected to→
slave/peripherals
Slave/peripheral device connected to Central→
Mesh node advertise and scan at the same time,→
performs drop logic on the packets
Luca Cerina, R.A. @ NECSTLab – DEIB
BLE Generic Atribute Proile
Provide access to device discovery & connection
control
GAP defines roles:
●
Broadcaster advertiser→
●
Observer scanner→
●
Peripheral always slave→
●
Central always master, never advertise→
Luca Cerina, R.A. @ NECSTLab – DEIB
BLE GAP Modes
Connectable
●
Can make a connection
●
Not connectable / connectable
Discoverable
●
Can be discovered (advertising)
●
None, limited, general
Bondable
●
Can pair with a device for long term connections
●
Not bondable / bondable
Luca Cerina, R.A. @ NECSTLab – DEIB
BLE Generic ATTributes (GATT)
●
GATT defines only two roles: Server and Client
●
The attribute is the smallest data element available, it is
defined by a 128 bit Unique Identifier (UUID) or a 16bit
handle.
An attribute can be: Readable, Writable, R/W, None
Luca Cerina, R.A. @ NECSTLab – DEIB
GATT hierarchy
GATT defines a precise hierarchy
for data and reusability.
Service/Profile:
conceptually related attributes
(e.g. heart rate)
Characteristic:
single value or metadata
container
Descriptor:
single value, which meaning its
defined by the characteristic
metadata.
Luca Cerina, R.A. @ NECSTLab – DEIB
GATT hierarchy
Luca Cerina, R.A. @ NECSTLab – DEIB
How to use BLE in your applicaton
Raspberry Pi & co:
→ Bluepy ( Python )
→ BlueZ ( C )
Microcontrollers:
→ Redbear Nano/Duo (redbear.cc)
→ Arduino 101 (arduino.cc)
→ SensiBLE (sensiedge.com)
Smartphone
→ Bluetooth core libraries
Luca Cerina, R.A. @ NECSTLab – DEIB
Call for Ideas
What would you design?
Luca Cerina, R.A. @ NECSTLab – DEIB
LoRaWAN: Long Range Wide Area Network
Luca Cerina, R.A. @ NECSTLab – DEIB
LoRaWAN: Long Range Wide Area Network
Long range communication link
●
Up to 2.5km in cities
●
Up to 10km in countryside
Frequency (Europe): 868 MHz
Low data rate: 0.3 – 50 kbps
Luca Cerina, R.A. @ NECSTLab – DEIB
LoRaWAN structure
Luca Cerina, R.A. @ NECSTLab – DEIB
LoRa end-device
Every network is identified by a 7bit identifier (NwkID, not
unique).
Private networks use 0x0 as ID.
Each device has a 25bit address, static or given by the
network at join-time.
The full DevAddr is 32bit = NwkID + deviceID
Luca Cerina, R.A. @ NECSTLab – DEIB
LoRa end-device
Every device should comply to a specific “application” and
use a 64bit IEEE AppEUI value.
To increase security, each end-device uses two 128bit AES
symmetric keys:
●
NwkSKey protection from network artefacts→
●
AppSKey protection on application layer traffic→
Luca Cerina, R.A. @ NECSTLab – DEIB
LoRa dynamic join
End-device could also avoid pre-provisioning and perform
a join request to the network. In this case the device needs:
●
A 128 bit unique appKey for encryption
●
A valid 64 bit AppEUI
●
A device ID which should be a valid EUI called devEUI
If the join is successful, the server answers with a join
accept and provide DevAddr, NwkSKey and AppSKey
through the downlink
Luca Cerina, R.A. @ NECSTLab – DEIB
LoRa devices
Nodes
→ The things UNO
→ Arduino MKR WAN 1300
→ Adafruit Feather LoRa
Gateways (~200-250 )€
→ Multitech Conduit
→ Lorrier LR2
→ The things gateway
Luca Cerina, R.A. @ NECSTLab – DEIB
How to connect
Free, community based, LoRa network
Luca Cerina, R.A. @ NECSTLab – DEIB
Call for Ideas
What would you design?
Luca Cerina, R.A. @ NECSTLab – DEIB
The rise of Edge/Fog computng
https://nordicapis.com/what-is-fog-computing/
Luca Cerina, R.A. @ NECSTLab – DEIB
State of the art: challenges
31
To represent the real breakthrough in Cloud and
IoT technologies, the Fog needs to be:
Reliable and
scalable [1]
●
Deployment plan of
nodes
●
Orchestration models
●
Nodes interaction
control
[1] Z. Wen, R. Yang, P. Garraghan, T. Lin, J. Xu, and M. Rovatsos, “Fog orchestration for
internet of things services,” 2017.
Luca Cerina, R.A. @ NECSTLab – DEIB
State of the art: challenges
To represent the real breakthrough in Cloud and
IoT technologies, the Fog needs to be:
Secure [2]
●
Resistance to attacks
●
Trusted authentication
systems
●
Detection of rogue
nodes
[2] A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, “Fog computing for the internet of
things: Security and privacy issues,”, 2017.
Luca Cerina, R.A. @ NECSTLab – DEIB
State of the art: challenges
Manageable [3]
●
Workflow policies
●
Data migration
●
Scheduling at runtime
[3] Z. Hao, E. Novak, S. Yi, and Q. Li, “Challenges and software architecture for fog
computing,” 2017.
To represent the real breakthrough in Cloud and
IoT technologies, the Fog needs to be:
Luca Cerina, R.A. @ NECSTLab – DEIB
FPGAs in the Fog
The OpenFog consortium technical
reference includes hardware
accelerators such as Field
Programmable Gate Arrays (FPGA)
to:
“Provide supplementary computational throughput” and
“satisfy both latency and power constraints as it relates to
a given scenario”
Minimal power consumption
and high performance
Extreme re-programmability
Faster time-to-market and
lower costs
Luca Cerina, R.A. @ NECSTLab – DEIB
Proposed architecture
Luca Cerina, R.A. @ NECSTLab – DEIB
Interacton layer
Sensors produces data, Actuators consume it in form of commands, and
both communicate with the Mesh Layer above them.
The Human-in-the-loop can consume and produce data, and act
upon it (e.g. application interaction or physical outcomes).
All the elements communicate through wireless protocols (BLE 4.2 in the
current deployment)
Luca Cerina, R.A. @ NECSTLab – DEIB
Fog node and cloud
The Fog Node acts as a central point of communication between the
Mesh and the Cloud. It comprises an ARM CPU and an FPGA accelerator
(Xilinx Zynq 7000 Architecture)
The FPGA circuit can be reprogrammed at runtime to handle specific
tasks, like data aggregation from sensors towards the Cloud, or to directly
act on physical actuators without the intervention of Cloud computing.
Luca Cerina, R.A. @ NECSTLab – DEIB
Call for Ideas
What would you design?
Luca Cerina, R.A. @ NECSTLab – DEIB
Design for human interacton
One basic principle:
KISS
Luca Cerina, R.A. @ NECSTLab – DEIB
Them?
Luca Cerina, R.A. @ NECSTLab – DEIB
Of course not
Luca Cerina, R.A. @ NECSTLab – DEIB
Design for human interacton
Luca Cerina, R.A. @ NECSTLab – DEIB
Design for human interacton
“Interaction design is about shaping digital things for
people’s use” (Jonas Lowgren)
“An interaction designer must become an expert in
how human beings relate to each other, and to the
world, and to the changing nature of technology” (Jon
Kolko)
Luca Cerina, R.A. @ NECSTLab – DEIB
Design thinking process
https://www.interaction-design.org/literature/article/5-stages-in-the-design-thinking-process
Luca Cerina, R.A. @ NECSTLab – DEIB
Empathise
CHALLENGE ASSUMPTIONS
Luca Cerina, R.A. @ NECSTLab – DEIB
Deine
https://www.interaction-design.org/literature/article/stage-2-in-the-design-thinking-process-
define-the-problem-and-interpret-the-results
Luca Cerina, R.A. @ NECSTLab – DEIB
Ideate
Brainstorm, Brainwrite, Worst Possible Idea, SCAMPER
Luca Cerina, R.A. @ NECSTLab – DEIB
Prototype
INEXPENSIVE, scaled down versions of the product/feature to be analyzed
Luca Cerina, R.A. @ NECSTLab – DEIB
Test
Pay close attention to the concepts of COGNITIVE FRICTION and OVERLOAD
Luca Cerina, R.A. @ NECSTLab – DEIB
Last take away
www.shutterstock.com
User engagement / Actionable items
No direct meaning in the numbers
Abandon rate up to 33% after 6 months
Jacket1234 @Deviantart
Data quality
Need for consistency and validation
Mean heart rate Insights with low valence→
Kasey McMahon
Technology
To integrate wearables with multi-task smart
ambient devices

More Related Content

What's hot

Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic designudhayakumarc1
 
1. Introduction to IoT
1. Introduction to IoT1. Introduction to IoT
1. Introduction to IoTAbhishek Das
 
Iot architecture report
Iot architecture reportIot architecture report
Iot architecture reportNiranjan Kumar
 
Internet of Things A Vision, Architectural Elements, and Future Directions
Internet of Things A Vision, Architectural Elements, and Future Directions Internet of Things A Vision, Architectural Elements, and Future Directions
Internet of Things A Vision, Architectural Elements, and Future Directions Mostafa Arjmand
 
01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-thingsJohn Soldatos
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Internet of Things (IoT) Presentation
Internet of Things (IoT) PresentationInternet of Things (IoT) Presentation
Internet of Things (IoT) PresentationJason K
 
Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)FabMinds
 
Components of IOT Implementation
Components of IOT ImplementationComponents of IOT Implementation
Components of IOT ImplementationAashiq Ahamed N
 
Iot presentation
Iot presentationIot presentation
Iot presentationhuma742446
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoTVishnupriya T H
 
Introduction to IoT Technologies - The need to know basics
Introduction to IoT Technologies - The need to know basicsIntroduction to IoT Technologies - The need to know basics
Introduction to IoT Technologies - The need to know basicsJaco Bester
 
IoT - Apps & Services
IoT - Apps & ServicesIoT - Apps & Services
IoT - Apps & ServicesDiogo Gomes
 

What's hot (20)

Internet of things
Internet of thingsInternet of things
Internet of things
 
IoT meets Big Data
IoT meets Big DataIoT meets Big Data
IoT meets Big Data
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic design
 
1. Introduction to IoT
1. Introduction to IoT1. Introduction to IoT
1. Introduction to IoT
 
Iot architecture report
Iot architecture reportIot architecture report
Iot architecture report
 
Internet of Things A Vision, Architectural Elements, and Future Directions
Internet of Things A Vision, Architectural Elements, and Future Directions Internet of Things A Vision, Architectural Elements, and Future Directions
Internet of Things A Vision, Architectural Elements, and Future Directions
 
Introduction of iot
Introduction of iotIntroduction of iot
Introduction of iot
 
01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of Things (IoT) Presentation
Internet of Things (IoT) PresentationInternet of Things (IoT) Presentation
Internet of Things (IoT) Presentation
 
Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)
 
Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)
 
Components of IOT Implementation
Components of IOT ImplementationComponents of IOT Implementation
Components of IOT Implementation
 
Iot presentation
Iot presentationIot presentation
Iot presentation
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
Introduction to IoT Technologies - The need to know basics
Introduction to IoT Technologies - The need to know basicsIntroduction to IoT Technologies - The need to know basics
Introduction to IoT Technologies - The need to know basics
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
Questions in iot
Questions in iotQuestions in iot
Questions in iot
 
IoT - Apps & Services
IoT - Apps & ServicesIoT - Apps & Services
IoT - Apps & Services
 

Similar to SnW: Internet of Things and enabling technologies

Using Distributed Node-RED to build fog/edge applications
Using Distributed Node-RED to build fog/edge applicationsUsing Distributed Node-RED to build fog/edge applications
Using Distributed Node-RED to build fog/edge applicationsNam Giang
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.pptAliSalman110
 
Smart invocation.pptx
Smart invocation.pptxSmart invocation.pptx
Smart invocation.pptxJagadeepVinay
 
Smart invocation.pptx
Smart invocation.pptxSmart invocation.pptx
Smart invocation.pptxJagadeepVinay
 
Dov Nimratz, Roman Chobik "Embedded artificial intelligence"
Dov Nimratz, Roman Chobik "Embedded artificial intelligence"Dov Nimratz, Roman Chobik "Embedded artificial intelligence"
Dov Nimratz, Roman Chobik "Embedded artificial intelligence"Lviv Startup Club
 
The Considerations for Internet of Things @ 2017
The Considerations for Internet of Things @ 2017The Considerations for Internet of Things @ 2017
The Considerations for Internet of Things @ 2017Jian-Hong Pan
 
Accelerating TensorFlow with RDMA for high-performance deep learning
Accelerating TensorFlow with RDMA for high-performance deep learningAccelerating TensorFlow with RDMA for high-performance deep learning
Accelerating TensorFlow with RDMA for high-performance deep learningDataWorks Summit
 
A Survey on Key Technologies and Applications of IoT
A Survey on Key Technologies and Applications of IoTA Survey on Key Technologies and Applications of IoT
A Survey on Key Technologies and Applications of IoTIRJET Journal
 
IPv4 to IPv6 network transformation
IPv4 to IPv6 network transformationIPv4 to IPv6 network transformation
IPv4 to IPv6 network transformationNikolay Milovanov
 
How Can We Answer the Really BIG Questions?
How Can We Answer the Really BIG Questions?How Can We Answer the Really BIG Questions?
How Can We Answer the Really BIG Questions?Amazon Web Services
 
All Things Open SDN, NFV and Open Daylight
All Things Open SDN, NFV and Open Daylight All Things Open SDN, NFV and Open Daylight
All Things Open SDN, NFV and Open Daylight Mark Hinkle
 
BROCADE and New IP Story
BROCADE and New IP StoryBROCADE and New IP Story
BROCADE and New IP StoryAntonio Palumbo
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaCodeOps Technologies LLP
 
Rain Technology.pptx
Rain Technology.pptxRain Technology.pptx
Rain Technology.pptxGaneshHS6
 
Seminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approachSeminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approachKarthic C M
 
IoT Applications based on LoRaWan
IoT Applications based on LoRaWanIoT Applications based on LoRaWan
IoT Applications based on LoRaWanDaniel Koller
 
MuCon 2019: Exploring Your Microservices Architecture Through Network Science...
MuCon 2019: Exploring Your Microservices Architecture Through Network Science...MuCon 2019: Exploring Your Microservices Architecture Through Network Science...
MuCon 2019: Exploring Your Microservices Architecture Through Network Science...OpenCredo
 
SDN :: Software Defined Networking –2017 Executive Overview
SDN :: Software Defined Networking –2017 Executive OverviewSDN :: Software Defined Networking –2017 Executive Overview
SDN :: Software Defined Networking –2017 Executive OverviewChristian Esteve Rothenberg
 

Similar to SnW: Internet of Things and enabling technologies (20)

Using Distributed Node-RED to build fog/edge applications
Using Distributed Node-RED to build fog/edge applicationsUsing Distributed Node-RED to build fog/edge applications
Using Distributed Node-RED to build fog/edge applications
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 
Azure Digital Twins
Azure Digital TwinsAzure Digital Twins
Azure Digital Twins
 
Smart invocation.pptx
Smart invocation.pptxSmart invocation.pptx
Smart invocation.pptx
 
Smart invocation.pptx
Smart invocation.pptxSmart invocation.pptx
Smart invocation.pptx
 
Dov Nimratz, Roman Chobik "Embedded artificial intelligence"
Dov Nimratz, Roman Chobik "Embedded artificial intelligence"Dov Nimratz, Roman Chobik "Embedded artificial intelligence"
Dov Nimratz, Roman Chobik "Embedded artificial intelligence"
 
The Considerations for Internet of Things @ 2017
The Considerations for Internet of Things @ 2017The Considerations for Internet of Things @ 2017
The Considerations for Internet of Things @ 2017
 
Accelerating TensorFlow with RDMA for high-performance deep learning
Accelerating TensorFlow with RDMA for high-performance deep learningAccelerating TensorFlow with RDMA for high-performance deep learning
Accelerating TensorFlow with RDMA for high-performance deep learning
 
A Survey on Key Technologies and Applications of IoT
A Survey on Key Technologies and Applications of IoTA Survey on Key Technologies and Applications of IoT
A Survey on Key Technologies and Applications of IoT
 
IPv4 to IPv6 network transformation
IPv4 to IPv6 network transformationIPv4 to IPv6 network transformation
IPv4 to IPv6 network transformation
 
How Can We Answer the Really BIG Questions?
How Can We Answer the Really BIG Questions?How Can We Answer the Really BIG Questions?
How Can We Answer the Really BIG Questions?
 
All Things Open SDN, NFV and Open Daylight
All Things Open SDN, NFV and Open Daylight All Things Open SDN, NFV and Open Daylight
All Things Open SDN, NFV and Open Daylight
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
BROCADE and New IP Story
BROCADE and New IP StoryBROCADE and New IP Story
BROCADE and New IP Story
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
Rain Technology.pptx
Rain Technology.pptxRain Technology.pptx
Rain Technology.pptx
 
Seminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approachSeminar on Intelligent Personal Assistant based on Internet of Things approach
Seminar on Intelligent Personal Assistant based on Internet of Things approach
 
IoT Applications based on LoRaWan
IoT Applications based on LoRaWanIoT Applications based on LoRaWan
IoT Applications based on LoRaWan
 
MuCon 2019: Exploring Your Microservices Architecture Through Network Science...
MuCon 2019: Exploring Your Microservices Architecture Through Network Science...MuCon 2019: Exploring Your Microservices Architecture Through Network Science...
MuCon 2019: Exploring Your Microservices Architecture Through Network Science...
 
SDN :: Software Defined Networking –2017 Executive Overview
SDN :: Software Defined Networking –2017 Executive OverviewSDN :: Software Defined Networking –2017 Executive Overview
SDN :: Software Defined Networking –2017 Executive Overview
 

More from NECST Lab @ Politecnico di Milano

Embedding based knowledge graph link prediction for drug repurposing
Embedding based knowledge graph link prediction for drug repurposingEmbedding based knowledge graph link prediction for drug repurposing
Embedding based knowledge graph link prediction for drug repurposingNECST Lab @ Politecnico di Milano
 
PLASTER - PYNQ-based abandoned object detection using a map-reduce approach o...
PLASTER - PYNQ-based abandoned object detection using a map-reduce approach o...PLASTER - PYNQ-based abandoned object detection using a map-reduce approach o...
PLASTER - PYNQ-based abandoned object detection using a map-reduce approach o...NECST Lab @ Politecnico di Milano
 
EMPhASIS - An EMbedded Public Attention Stress Identification System
 EMPhASIS - An EMbedded Public Attention Stress Identification System EMPhASIS - An EMbedded Public Attention Stress Identification System
EMPhASIS - An EMbedded Public Attention Stress Identification SystemNECST Lab @ Politecnico di Milano
 
Maeve - Fast genome analysis leveraging exact string matching
Maeve - Fast genome analysis leveraging exact string matchingMaeve - Fast genome analysis leveraging exact string matching
Maeve - Fast genome analysis leveraging exact string matchingNECST Lab @ Politecnico di Milano
 

More from NECST Lab @ Politecnico di Milano (20)

Mesticheria Team - WiiReflex
Mesticheria Team - WiiReflexMesticheria Team - WiiReflex
Mesticheria Team - WiiReflex
 
Punto e virgola Team - Stressometro
Punto e virgola Team - StressometroPunto e virgola Team - Stressometro
Punto e virgola Team - Stressometro
 
BitIt Team - Stay.straight
BitIt Team - Stay.straight BitIt Team - Stay.straight
BitIt Team - Stay.straight
 
BabYodini Team - Talking Gloves
BabYodini Team - Talking GlovesBabYodini Team - Talking Gloves
BabYodini Team - Talking Gloves
 
printf("Nome Squadra"); Team - NeoTon
printf("Nome Squadra"); Team - NeoTonprintf("Nome Squadra"); Team - NeoTon
printf("Nome Squadra"); Team - NeoTon
 
BlackBoard Team - Motion Tracking Platform
BlackBoard Team - Motion Tracking PlatformBlackBoard Team - Motion Tracking Platform
BlackBoard Team - Motion Tracking Platform
 
#include<brain.h> Team - HomeBeatHome
#include<brain.h> Team - HomeBeatHome#include<brain.h> Team - HomeBeatHome
#include<brain.h> Team - HomeBeatHome
 
Flipflops Team - Wave U
Flipflops Team - Wave UFlipflops Team - Wave U
Flipflops Team - Wave U
 
Bug(atta) Team - Little Brother
Bug(atta) Team - Little BrotherBug(atta) Team - Little Brother
Bug(atta) Team - Little Brother
 
#NECSTCamp: come partecipare
#NECSTCamp: come partecipare#NECSTCamp: come partecipare
#NECSTCamp: come partecipare
 
NECSTCamp101@2020.10.1
NECSTCamp101@2020.10.1NECSTCamp101@2020.10.1
NECSTCamp101@2020.10.1
 
NECSTLab101 2020.2021
NECSTLab101 2020.2021NECSTLab101 2020.2021
NECSTLab101 2020.2021
 
TreeHouse, nourish your community
TreeHouse, nourish your communityTreeHouse, nourish your community
TreeHouse, nourish your community
 
TiReX: Tiled Regular eXpressionsmatching architecture
TiReX: Tiled Regular eXpressionsmatching architectureTiReX: Tiled Regular eXpressionsmatching architecture
TiReX: Tiled Regular eXpressionsmatching architecture
 
Embedding based knowledge graph link prediction for drug repurposing
Embedding based knowledge graph link prediction for drug repurposingEmbedding based knowledge graph link prediction for drug repurposing
Embedding based knowledge graph link prediction for drug repurposing
 
PLASTER - PYNQ-based abandoned object detection using a map-reduce approach o...
PLASTER - PYNQ-based abandoned object detection using a map-reduce approach o...PLASTER - PYNQ-based abandoned object detection using a map-reduce approach o...
PLASTER - PYNQ-based abandoned object detection using a map-reduce approach o...
 
EMPhASIS - An EMbedded Public Attention Stress Identification System
 EMPhASIS - An EMbedded Public Attention Stress Identification System EMPhASIS - An EMbedded Public Attention Stress Identification System
EMPhASIS - An EMbedded Public Attention Stress Identification System
 
Luns - Automatic lungs segmentation through neural network
Luns - Automatic lungs segmentation through neural networkLuns - Automatic lungs segmentation through neural network
Luns - Automatic lungs segmentation through neural network
 
BlastFunction: How to combine Serverless and FPGAs
BlastFunction: How to combine Serverless and FPGAsBlastFunction: How to combine Serverless and FPGAs
BlastFunction: How to combine Serverless and FPGAs
 
Maeve - Fast genome analysis leveraging exact string matching
Maeve - Fast genome analysis leveraging exact string matchingMaeve - Fast genome analysis leveraging exact string matching
Maeve - Fast genome analysis leveraging exact string matching
 

Recently uploaded

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

SnW: Internet of Things and enabling technologies

  • 1. Firma convenzione Politecnico di Milano e Veneranda Fabbrica del Duomo di Milano Aula Magna – Rettorato Mercoledì 27 maggio 2015 Lesson 2: Internet of Things and enabling technologies Luca Cerina – luca.cerina@polimi.it Ver. Updated – 30/11/2017
  • 2. Luca Cerina, R.A. @ NECSTLab – DEIB The Cloud
  • 3. Luca Cerina, R.A. @ NECSTLab – DEIB The Internet of Things
  • 4. Luca Cerina, R.A. @ NECSTLab – DEIB The Quantied Self “Not all important things in life can be measured and not everything that can be measured is important” (Quantified Self Institute)
  • 5. Luca Cerina, R.A. @ NECSTLab – DEIB The Hackathon Device design Software & infrastructure
  • 6. Luca Cerina, R.A. @ NECSTLab – DEIB Device design: outline ● Existent technologies ● NFC ● Bluetooth ● LoRa ● Bird’s eye view on: Fog Computing ● Focus on: design for human interaction
  • 7. Luca Cerina, R.A. @ NECSTLab – DEIB NFC/RFID ● The reader uses the antenna to constantly scan the area sending radio waves ● The transponder send its ID, with an active signal (active RFID) or piggybacking the reader waves (passive RFID) The frequencies are: ● LF (125-134KHz) 1-10cm→ ● HF (13.56MHz) 1m (NFC)→ ● UHF (865-960MHz) long range→
  • 8. Luca Cerina, R.A. @ NECSTLab – DEIB NFC/RFID: Example RC 522 RFID READER Frequency: 13.56 MHz Connection protocol: SPI Support: Read/Write Usage: Arduino/Microcontrollers
  • 9. Luca Cerina, R.A. @ NECSTLab – DEIB Call for Ideas What would you design?
  • 10. Luca Cerina, R.A. @ NECSTLab – DEIB Bluetooth Low Energy Bluetooth LE enable short-burst wireless connections and uses multiple network topologies: ● Point-to-Point (1:1) data transfer and fitness→ trackers ● Broadcast (1:many) beacons, information→ sharing ● Mesh (HOT! NEW!) (m:m) large scale topology→ for sensor networks, automation, devices chatting
  • 11. Luca Cerina, R.A. @ NECSTLab – DEIB Architecture
  • 12. Luca Cerina, R.A. @ NECSTLab – DEIB BLE Radio ● Frequency: 2.4 GHz ISM (Industrial Scientific Medical) band ● 40 channels with 2 MHz spacing ● Range 0 – 100m (BT 5.0) ● Enabling technology invented by Hedi Lamarr
  • 13. Luca Cerina, R.A. @ NECSTLab – DEIB BLE Roles Advertiser broadcasts adv. packets, can be→ connectable or not Scanner listen to adv. Packets, passively or→ actively (scan request) Master/central device connected to→ slave/peripherals Slave/peripheral device connected to Central→ Mesh node advertise and scan at the same time,→ performs drop logic on the packets
  • 14. Luca Cerina, R.A. @ NECSTLab – DEIB BLE Generic Atribute Proile Provide access to device discovery & connection control GAP defines roles: ● Broadcaster advertiser→ ● Observer scanner→ ● Peripheral always slave→ ● Central always master, never advertise→
  • 15. Luca Cerina, R.A. @ NECSTLab – DEIB BLE GAP Modes Connectable ● Can make a connection ● Not connectable / connectable Discoverable ● Can be discovered (advertising) ● None, limited, general Bondable ● Can pair with a device for long term connections ● Not bondable / bondable
  • 16. Luca Cerina, R.A. @ NECSTLab – DEIB BLE Generic ATTributes (GATT) ● GATT defines only two roles: Server and Client ● The attribute is the smallest data element available, it is defined by a 128 bit Unique Identifier (UUID) or a 16bit handle. An attribute can be: Readable, Writable, R/W, None
  • 17. Luca Cerina, R.A. @ NECSTLab – DEIB GATT hierarchy GATT defines a precise hierarchy for data and reusability. Service/Profile: conceptually related attributes (e.g. heart rate) Characteristic: single value or metadata container Descriptor: single value, which meaning its defined by the characteristic metadata.
  • 18. Luca Cerina, R.A. @ NECSTLab – DEIB GATT hierarchy
  • 19. Luca Cerina, R.A. @ NECSTLab – DEIB How to use BLE in your applicaton Raspberry Pi & co: → Bluepy ( Python ) → BlueZ ( C ) Microcontrollers: → Redbear Nano/Duo (redbear.cc) → Arduino 101 (arduino.cc) → SensiBLE (sensiedge.com) Smartphone → Bluetooth core libraries
  • 20. Luca Cerina, R.A. @ NECSTLab – DEIB Call for Ideas What would you design?
  • 21. Luca Cerina, R.A. @ NECSTLab – DEIB LoRaWAN: Long Range Wide Area Network
  • 22. Luca Cerina, R.A. @ NECSTLab – DEIB LoRaWAN: Long Range Wide Area Network Long range communication link ● Up to 2.5km in cities ● Up to 10km in countryside Frequency (Europe): 868 MHz Low data rate: 0.3 – 50 kbps
  • 23. Luca Cerina, R.A. @ NECSTLab – DEIB LoRaWAN structure
  • 24. Luca Cerina, R.A. @ NECSTLab – DEIB LoRa end-device Every network is identified by a 7bit identifier (NwkID, not unique). Private networks use 0x0 as ID. Each device has a 25bit address, static or given by the network at join-time. The full DevAddr is 32bit = NwkID + deviceID
  • 25. Luca Cerina, R.A. @ NECSTLab – DEIB LoRa end-device Every device should comply to a specific “application” and use a 64bit IEEE AppEUI value. To increase security, each end-device uses two 128bit AES symmetric keys: ● NwkSKey protection from network artefacts→ ● AppSKey protection on application layer traffic→
  • 26. Luca Cerina, R.A. @ NECSTLab – DEIB LoRa dynamic join End-device could also avoid pre-provisioning and perform a join request to the network. In this case the device needs: ● A 128 bit unique appKey for encryption ● A valid 64 bit AppEUI ● A device ID which should be a valid EUI called devEUI If the join is successful, the server answers with a join accept and provide DevAddr, NwkSKey and AppSKey through the downlink
  • 27. Luca Cerina, R.A. @ NECSTLab – DEIB LoRa devices Nodes → The things UNO → Arduino MKR WAN 1300 → Adafruit Feather LoRa Gateways (~200-250 )€ → Multitech Conduit → Lorrier LR2 → The things gateway
  • 28. Luca Cerina, R.A. @ NECSTLab – DEIB How to connect Free, community based, LoRa network
  • 29. Luca Cerina, R.A. @ NECSTLab – DEIB Call for Ideas What would you design?
  • 30. Luca Cerina, R.A. @ NECSTLab – DEIB The rise of Edge/Fog computng https://nordicapis.com/what-is-fog-computing/
  • 31. Luca Cerina, R.A. @ NECSTLab – DEIB State of the art: challenges 31 To represent the real breakthrough in Cloud and IoT technologies, the Fog needs to be: Reliable and scalable [1] ● Deployment plan of nodes ● Orchestration models ● Nodes interaction control [1] Z. Wen, R. Yang, P. Garraghan, T. Lin, J. Xu, and M. Rovatsos, “Fog orchestration for internet of things services,” 2017.
  • 32. Luca Cerina, R.A. @ NECSTLab – DEIB State of the art: challenges To represent the real breakthrough in Cloud and IoT technologies, the Fog needs to be: Secure [2] ● Resistance to attacks ● Trusted authentication systems ● Detection of rogue nodes [2] A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, “Fog computing for the internet of things: Security and privacy issues,”, 2017.
  • 33. Luca Cerina, R.A. @ NECSTLab – DEIB State of the art: challenges Manageable [3] ● Workflow policies ● Data migration ● Scheduling at runtime [3] Z. Hao, E. Novak, S. Yi, and Q. Li, “Challenges and software architecture for fog computing,” 2017. To represent the real breakthrough in Cloud and IoT technologies, the Fog needs to be:
  • 34. Luca Cerina, R.A. @ NECSTLab – DEIB FPGAs in the Fog The OpenFog consortium technical reference includes hardware accelerators such as Field Programmable Gate Arrays (FPGA) to: “Provide supplementary computational throughput” and “satisfy both latency and power constraints as it relates to a given scenario” Minimal power consumption and high performance Extreme re-programmability Faster time-to-market and lower costs
  • 35. Luca Cerina, R.A. @ NECSTLab – DEIB Proposed architecture
  • 36. Luca Cerina, R.A. @ NECSTLab – DEIB Interacton layer Sensors produces data, Actuators consume it in form of commands, and both communicate with the Mesh Layer above them. The Human-in-the-loop can consume and produce data, and act upon it (e.g. application interaction or physical outcomes). All the elements communicate through wireless protocols (BLE 4.2 in the current deployment)
  • 37. Luca Cerina, R.A. @ NECSTLab – DEIB Fog node and cloud The Fog Node acts as a central point of communication between the Mesh and the Cloud. It comprises an ARM CPU and an FPGA accelerator (Xilinx Zynq 7000 Architecture) The FPGA circuit can be reprogrammed at runtime to handle specific tasks, like data aggregation from sensors towards the Cloud, or to directly act on physical actuators without the intervention of Cloud computing.
  • 38. Luca Cerina, R.A. @ NECSTLab – DEIB Call for Ideas What would you design?
  • 39. Luca Cerina, R.A. @ NECSTLab – DEIB Design for human interacton One basic principle: KISS
  • 40. Luca Cerina, R.A. @ NECSTLab – DEIB Them?
  • 41. Luca Cerina, R.A. @ NECSTLab – DEIB Of course not
  • 42. Luca Cerina, R.A. @ NECSTLab – DEIB Design for human interacton
  • 43. Luca Cerina, R.A. @ NECSTLab – DEIB Design for human interacton “Interaction design is about shaping digital things for people’s use” (Jonas Lowgren) “An interaction designer must become an expert in how human beings relate to each other, and to the world, and to the changing nature of technology” (Jon Kolko)
  • 44. Luca Cerina, R.A. @ NECSTLab – DEIB Design thinking process https://www.interaction-design.org/literature/article/5-stages-in-the-design-thinking-process
  • 45. Luca Cerina, R.A. @ NECSTLab – DEIB Empathise CHALLENGE ASSUMPTIONS
  • 46. Luca Cerina, R.A. @ NECSTLab – DEIB Deine https://www.interaction-design.org/literature/article/stage-2-in-the-design-thinking-process- define-the-problem-and-interpret-the-results
  • 47. Luca Cerina, R.A. @ NECSTLab – DEIB Ideate Brainstorm, Brainwrite, Worst Possible Idea, SCAMPER
  • 48. Luca Cerina, R.A. @ NECSTLab – DEIB Prototype INEXPENSIVE, scaled down versions of the product/feature to be analyzed
  • 49. Luca Cerina, R.A. @ NECSTLab – DEIB Test Pay close attention to the concepts of COGNITIVE FRICTION and OVERLOAD
  • 50. Luca Cerina, R.A. @ NECSTLab – DEIB Last take away www.shutterstock.com User engagement / Actionable items No direct meaning in the numbers Abandon rate up to 33% after 6 months Jacket1234 @Deviantart Data quality Need for consistency and validation Mean heart rate Insights with low valence→ Kasey McMahon Technology To integrate wearables with multi-task smart ambient devices