Skip to main content

Bringing Sense into the classroom


 When we (a team of us at the OU who worked on the module My Digital Life) developed the SenseBoard and adapted MIT's Scratch language as Sense to teach entry level programming, we had to develop activities that students could complete while studying at a distance and therefore not overly complicated (at least at first). In fact the approach we gave was to give students partially completed Sense programs and get them to add the missing elements. The overarching goal was to have students build interesting and above all fun projects right from the beginning. However, the programming guide that was written to introduce all of the basics (iteration, selection, variables, etc) was designed to be studied over a 1 week period and there didn't easily lend itself to delivery in a 1-day face to face workshop. It also didn't make much use of the SenseBoard as an I/O device.
Therefore when were approached with the idea of running a workshop together with UCL's Schools Outreach programme to give students some hands on experience of programming and ubiquitous computing, I was given the task of developing a new activity that we could use as an introductory demonstration that the students could be guided through replicating. The idea was to use the SenseBoard as a novel input device to determine the timing for playing notes of a piece of music. Using and infrared LED and sensor to detect a beam break, it was possible to control the timing of each note by moving one's hand in time to the music. The result was pretty neat, and the students had a lot of fun building it for themselves. See the video above for a demonstration. Having completed the activity to build this 'Music Maker' project, students then came up with their own ideas which they then implemented with our help. Watch this space for details of their projects.
2 comments

Popular posts from this blog

Visual programming for 'wiring' the Internet of Things

There is a proliferation of devices being developed to form the building blocks of the Internet of Things (IoT), from Internet-connected power sockets and light bulbs to kettles, toasters and washing machines. However, to realise the full potential of the IoT, it will be necessary to allow these devices to interconnect and share data with each other to deliver the functionalities required by end-users. In recent research on end-user programming for the IoT, my colleagues Pierre Akiki, Yijun Yu and myself have proposed the notion of Visual Simple Transformations (ViSiT), that provides a visual programming paradigm for users to wire together IoT devices. The video above shows a demonstration of the ViSiT solution and full details of the approach will appear in an upcoming special issue of the ACM Transactions on Computer-Human Interaction (ToCHI).

This work is highlighted in a recent IEEE Software Blog: Empowering Users to Build IoT Software with a Puzzle-like Environment and full deta…

Privacy-by-Design Framework for Internet of Things Systems

IOT-2016 7-9 September, 2016, Stuttgart, Germany from Charith Perera
Recent DDoS attacks on key internet services, like the attack that affected the Dyn domain name service, highlighted the security challenges associated with the proliferation of insecure Internet of Things (IoT) systems.  This attack exploited common vulnerabilities like the use of default administration passwords on IoT devices such as internet-enabled CCTV cameras, internet-enabled appliances and smart home devices, to recruit over hundreds of thousands of nodes into a botnet.   This capability highlights the cyber security threats associated with the IoT and brings into sharp relief the importance of considering both security and privacy when designing these systems.

In recent work, presented at the Internet of Things Conference, we describe a privacy-by-design framework for assessing the privacy capabilities of IoT applications and platforms.  Building on more general design strategies for privacy in informaiton …

Are we losing the Internet Security battle?

I was recently invited by Heimdal Security to take part in an expert roundup, with the theme of "Is Internet Security a Losing Battle?".  The main thrust of my answer was to question our use of analogies of conflict in the context of Internet Security or cyber security.  As I said in my response:
"... in this context the metaphors of conflict, such as ‘war’ and ‘battle’ are unhelpful because they suggest that internet security is the responsibility of the technologists who act our defensive force against attackers.   Instead, as has been argued by technology activists like Cory Doctorow and others we might have more success by thinking of cyber security using the analogy of public health and communicable diseases.   By using this analogy, we make cyber security issues more relevant to people and spur them to gain a better understanding that, like diseases, any of us can be afflicted by a cyber security attack.  We can also adopt an analogous approach for handling cyber …