0% found this document useful (0 votes)
29 views

Emerging Technologies Note Natnael Bereta

The document discusses emerging technologies and the industrial revolutions. It covers topics like artificial intelligence, machine learning, internet of things, digital and information revolutions. It also discusses the role of data in emerging technologies and enabling devices and networks.

Uploaded by

Natnael Bereta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views

Emerging Technologies Note Natnael Bereta

The document discusses emerging technologies and the industrial revolutions. It covers topics like artificial intelligence, machine learning, internet of things, digital and information revolutions. It also discusses the role of data in emerging technologies and enabling devices and networks.

Uploaded by

Natnael Bereta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 26

Chapter One ✓ Autonomous Devices

✓ Augmented Analytics
Introduction to Emerging Technology
✓ Digital Twins
✓ Immersive Experiences in Smart Spaces
1.1 Emerging Technology Concepts
1.2 Industrial Revolution (IR)
▪ Technology?
✓ The sum of techniques, skills, methods and
▪ Begin during the late 1700s and early 1800s
process for
✓ The revolution started in England (to increase
➢ the production of goods and services
food production, agriculture revolution)
➢ the accomplishment of objectives such as
✓ The first European countries to be industrialized
scientific investigations.
after England were Belgium, France, and the
➢ application of scientific knowledge for
German state
practical purposes
▪ The IR was a time when the manufacturing of
✓ Branch of knowledge dealing with
goods moved from:
engineering or applied sciences.
✓ small shops and homes to large factories.
▪ Emerging Technology?
▪ This shift brought about changes in culture as
✓ Emerging technology is a term generally used
people moved from rural areas to big cities in order
to describe a new technology
to work.
✓ But it may also refer to the continuing
▪ IR is described as a transition to new
development of existing technology
manufacturing processes. Cont.… .
✓ Commonly refers to technologies that are
▪ Transportation: The Steam Engine, The Railroad,
currently developing, or that are expected to be
The Diesel Engine, The Airplane.
available within the next five to ten years.
▪ Communication: Telegraph, Transatlantic Cable,
▪ In general Emerging Technology refers to the
Phonograph, Telephone.
technological evolution which is a theory of
▪ Industry: Cotton Gin, Sewing Machine, Electric
radical transformation of society through
Lights. The most common Inventions of the IR
technological development.
▪ The four types of industries:
▪ Evolution?
1. Primary industry:
✓ A major, sudden, and hence typically violent
✓ involves getting raw material
alteration in government and in related
✓ e.g. mining, farming, and fishing.
associations and structures. {Social & Political
2. Secondary industry:
Science}
✓ involves manufacturing
✓ A radical and profound change in economic
✓ e.g. making cars and steel.
relationships and technological conditions.
3. Tertiary industries:
{Industrial / Technology Revolution}
✓ provide a service
▪ Design for disruption : What is expected from
✓ e.g. teaching and nursing.
Engineers of today? Cont. . .
4. Quaternary industry:
✓ Artificial Intelligence and Machine Learning
✓ Involves research and development industries ✓
✓ Robotic Processor Automation (RPA)
e.g. IT
✓ Internet of Things (IoT)
Early life style of Human Being
✓ Cloud Computing and Big Data
▪ Hunting, getting a catch fruit and vegetable, and
✓ Enhanced Edge Computing
others
✓ Quantum Computing
▪ Does not settles down at one place
✓ Augmented Reality and Virtual Reality
IR 1.0 (Agriculture Revolution)
✓ Blockchain and Cyber Security
▪ Going from hand production methods to
✓ Angular and React
machines, the increasing use of steam power
✓ DevOps
▪ Transition from a hunting-and-gathering society to
✓ Intelligent Apps (I-Apps) List of Emerging
one based on stationary farming
Technology trends for 2020/21
IR 2.0 (Technological/industry Revolution)
✓ 5G Networks
▪ Development of methods for manufacturing professional development is increasingly being
interchangeable parts recognized.
▪ Adoption of pre-existing technological systems 1.4 Enabling device and networks for Emerging
such as telegraph and railroad networks. Technologies
▪ Vast movement of people and ideas, enhancing ▪ The basic digital devices that enables emerging
communication. technology includes
▪ New technological systems 1.Memory devices – used store random
✓ electrical power information as a spreadsheet or database.
✓ telephones 2.Microprocessors - execute software instructions
✓ seed drill and new fertilizers to perform a wide variety of tasks
IR 3.0 (Digital/information Revolution) ✓ E.g. running a word processing program or video
▪ Shift towards digitization game
▪ The transition from mechanical and analog 3.Logic devices - provide specific functions,
electronic technology to digital electronics including device-to-device interfacing, data
▪ Mass production and use of digital logic communication, signal processing, data display,
circuits timing and control operations etc.
▪ Technologies such as ✓ Logic devices can be classified into two broad
✓ Computer system, hand-phones and the categories - fixed and programmable
Internet ✓ Fixed logic devices – contain fixed circuits and
▪ Digital revolution was driven by three factors: permanent,
✓ information-based occupations, Cheap ▪ Perform one function or set of functions
personal computers , ▪ Once manufactured, they cannot be changed.
The Internet IR 4.0 (knowledge/Smart ✓ Programmable logic devices (PLD) – used to
revolution) build reconfigurable digital circuits
▪ Advancements in various technologies such as ▪ not limited to specific functionality
Artificial Intelligence (AI), robotics, Internet of ▪ must be programmed before used, so that it
Things (IoT), Big data reconfigured by using a specialized program
▪ Additive manufacturing and autonomous ▪ PLDs are standard, off-the-shelf parts
vehicles ✓ Offer customers a wide range of logic capacity,
▪ Cyber-physical system - a mechanism that is features, speed, and voltage characteristics
controlled or monitored by computer-based ✓ Can be changed at any time to perform any
algorithms number of functions.
▪ Simple programmable logic devices (SPLD) :
1.3 Role of data for Emerging Technologies PALs, PLAs, GALs, ROMs
✓ The simplest, smallest and least-expensive forms
▪ Data is regarded as the new oil and strategic of programmable logic devices
asset ✓ Use either fuses or non-volatile memory cells
▪ Data drives or even determines the future of (EPROM, EEPROM, FLASH, and others) to define
science, technology, the economy, and possibly the functionality.
everything in our world today and tomorrow.  ▪ Field programmable gate array(FPGA) : integrated
 The reshaping and paradigm shifting is driven circuit designed to be configured by a customer or a
not just by data itself but all other aspects that designer after manufacturing – hence the term field
could be created, transformed, and/or adjusted programmable.
by understanding, exploring, and utilizing ✓ hardware description language (HDL)
data. ▪ Complex programmable logic devices (CPLD): a
 Emerging technologies – result of data programmable logic device with complexity
intensive scientific discovery between that of PALs and FPGAs
✓ Fourth industrial revolution. ▪ Some uses of the programmable logic devices ✓
 The potential of data science and analytics to Allow designers use inexpensive software tools to
enable data-driven theory, economy, and quickly develop, simulate, and test I
✓ Device-to-device interfacing such as Data  HCI – is the study of how people interact with

communication, Signal processing, Data display, computers and to what extent could computers
Timing, Control operations interact with human beings successfully.
Computer Networks  HCI improves the interaction between users and

▪ Interconnectivity of digital devices computers by making computers more user-friendly


▪ key contributing factors of the Information and receptive to the user's needs.
Technology ▪ History of Computer Networks  An important facet of HCI is user satisfaction (or

✓ 1957 – Russia launched their SPUTNIK simply End User Computing Satisfaction).
Satellite in Space  It draw from supporting knowledge on both the

✓ The American started an agency named machine and the human side.
Advance Research Project Agency (ARPA) and  The main advantages of HCI are
launched their 1st satellite within 18 month after  simplicity, 
establishment.  ease of deployment & operations and 
✓ Then sharing of the information in another  cost savings for smaller set-ups, 
computer they use ARPANET.  reduce solution and design time and
✓ Then in 1969, ARPANET comes in INDIA  reduce integration complexity
and INDIAN switched this name to NETWORK.  The most common means of interacting with
✓ Development of the network began in 1969, computer includes
based on designs developed during the 1960s. ✓ Graphical User Interface (GUI)
✓ Command Line Interface (CLI)
The ARPANET evolved into the modern  HCI consists of three parts:

Internet. ✓ The user,


✓ In the 1980s, the growth of client/server LAN ✓ The computer/machine itself, and
architectures continued while that of mainframe ✓ The ways they work together (Know-how)
computing environments declined.  Poorly designed human-machine interfaces can lead

▪ Future Trend of Networks (Networking to many unexpected problems.


technology: Keep up with the changes)  Classical examples

✓ 5G technology ✓ Three Mile Island accident in USA,


✓ Network developments in edge computing ✓ a nuclear meltdown accident
✓ Rise of decentralization
✓ Changing perspectives on ML and AI
✓ More attention to network security
✓ Going wireless
✓ Cloud repatriation
✓ Smart automation expands

1.5 Human to Machine Interaction (HMI) 

 HMI is a discipline concerned with the design,


evaluation an implementation of interactive  The concepts of human-computer interaction
computing systems for human use and with the include the following
study of major phenomena surrounding them. ✓ User customization - users are the important
(Association for Computing Machinery (ACM)) sources of new applications
 Shortly HMI refers to the communication and ✓ Embedded computation - little computations and
interaction between a human and a machine via a automated processes
user interface. ✓ Augmented reality - notion of layering relevant
✓ Via Hardware for: Input and output – display information into our vision of the world
✓ Sometimes termed human–computer interaction ✓ Social computing - individuals perceive their
(HCI), man-machine interaction (MMI) or interactions with computers more positively than
computer-human interaction (CHI).
humans, despite behaving the same way towards ✓ Need a strong quantitative background in
these machines. statistics and linear algebra as well as programming
✓ Knowledge-driven human–computer knowledge
interaction - semantic gap usually exists between ✓ Need to be curious and result-oriented
human and computer's understandings towards ✓ Must master the full spectrum of the data science
mutual behaviors. life cycle and possess a level of flexibility and
✓ Emotions and human-computer interaction - understanding to maximize returns
affect-detection channels have the potential to
detect human emotions 2.2 Data and Information
✓ Brain–computer interfaces - direct
communication pathway between an enhanced or ▪ Data?
wired brain and an external device ✓ A representation of facts, concepts, or
instructions in a formalized manner, which should
Chapter 2 be suitable for communication, interpretation, or
processing by human or electronic machine.
Introduction to Data Science
▪ Information?
✓ Organized or classified data, which has some
2.1 Overview of Data Science meaningful values for the receiver.
✓ A processed data on which decisions and actions
▪ What is Data science? are based.
✓ A multi-disciplinary field that uses scientific ✓ Principle of information - processed data must
methods, processes, qualify for the following
algorithms and systems to extract knowledge and  Timely − Information should be available when
insights from required.
structured, semi structured and unstructured data.  Accuracy − Information should be accurate. 
✓ is much more than simply analyzing data.  Completeness − Information should be complete.
 Examples of data

 Your notebook
 Prices of items in supermarket
 Files in computer
 Bar code etc.
Overview…
 Data science continues to evolve as one of the
most promising and in demand career paths for
skilled professionals
 To be a successful data professional in today’s
market requires to advance past traditional skills of
analyzing large amounts of data by data mining
and programming skills.
2.3 Data Processing Cycle
Data Science Experts/Scientist? 
 Re-structuring or re-ordering of data by people or

✓ Data scientists are analytical experts who machine to increase their usefulness and add
utilize their skills in both technology and social values for a particular purpose.
 The set of operations used to transform data into
science to find trends and manage data.
✓ They use industry knowledge, contextual useful information.
understanding, uncertainty of existing
assumptions to uncover solutions to business
challenges..
Metadata - data about data that provides additional
information about a specific set of data. e.g.
photographs metadata - describe when and where
the photos were taken

2.5 Data value chain


 Introduced to describe the information flow

within a big data system as a series of steps


needed to generate value and useful insights from
data.

2.4 Data types and their representation


 Data type defines the operations that can be
done on the data, the meaning of the data, and
the way values of that type can be stored.
 Data types can be described from diverse
perspective

2.6 Basic concepts of Big data

▪ Big data is a blanket term for the non-traditional


▪ Structured Data:
strategies and technologies needed to gather,
✓ adheres to a pre-defined data model and
organize and process insights from large datasets.
straightforward to analyze
▪ Big data refers to:
✓ take a tabular format. E.g. Excel files or SQL
✓ large and complex datasets that it becomes
databases
difficult to process using on-hand database
▪ Semi-structured Data:
management tools or traditional data processing
✓ does not conform with the formal structure of
applications
data model.
✓ The category of computing strategies and
✓ Contains tags or other markers for separation
technologies that are used to handle large datasets
semantic elements enforce hierarchies of records
▪ Goal of Big data:
and fields within the data
✓ To surface insights and connections from large
✓ Fore example: JSON and XML
volumes of heterogeneous data that would not be
▪ Unstructured Data 
possible using conventional methods
 does not have a predefined data model or is not

organized in a pre-defined manner. 


 Typically text-heavy but may contain data

such as dates, numbers, and facts as well. 


 Examples: audio, video files or No-SQL

databases.
 Hadoop ecosystem comprises of the following
components
✓ HDFS: Hadoop Distributed File System
✓ YARN: Yet Another Resource Negotiator
✓ MapReduce: Programming based Data
Processing
✓ Spark: In-Memory data processing
✓ PIG, HIVE: Query-based processing of data
services
✓ HBase: NoSQL Database
✓ Mahout, Spark MLLib: Machine Learning
algorithm libraries
✓ Solar, Lucene: Searching and Indexing
✓ Zookeeper: Managing cluster
✓ Oozie: Job Scheduling

The Big data life cycle with Hadoop


▪ Stage 1- Ingesting data into the system
2.7 Hadoop and its Ecosystem ✓ The data is ingested or transferred to Hadoop
▪ Hadoop is an open-source framework intended from various sources such as relational databases,
to make interaction with big data easier. systems, or local files.
▪ It is inspired by a technical document published ▪ Stage 2- Processing the data in storage (stored and
by Google. processed )
▪ It allows for the distributed processing of large ✓ The data is stored in the distributed file system,
datasets across clusters of computers using HDFS, and the NoSQL distributed data, HBase.
simple programming models. Spark and Map Reduce perform data processing.
▪ The four key characteristics of Hadoop ▪ Stage 3- Computing and analyzing data
✓ Economical: Its systems are highly ✓ by processing frameworks such as Pig, Hive, and
economical as ordinary computers can be used Impala.
for data processing. ▪ Stage 4- Visualizing the results (Access)
✓ Reliable: It is reliable as it stores copies of ✓ by tools such as Hue and Cloud era Search
the data on different machines and is resistant to
hardware failure. Chapter 3
✓ Scalable: It is easily scalable both, Introduction to Artificial Intelligence
horizontally and vertically. A few extra nodes
help in scaling up the framework. 3.1 What is Artificial Intelligence (AI?
✓ Flexible: It is flexible and you can store as
much structured and unstructured data as you ▪ Intelligence defines "thinking power", or “the
need to and decide to use them later ability to learn and solve problems”
The 4 core components of Hadoop and its ▪ Intelligence is composed of:
Ecosystem ✓ Reasoning
 The 4 core components of Hadoop includes
✓ Learning
✓ Data Management, ✓ Problem Solving
✓ Data Access, ✓ Perception
✓ Data Processing ✓ Linguistic Intelligence
✓ Data Storage. ▪ Intelligence is an intangible part of our brain
which is a combination of the above components
The 4 core components of Hadoop and its ▪ Artificial defines "man-made," things
Ecosystem ▪ Hence, AI means "a man-made thinking power."
Artificial Intelligence:
✓ The science and engineering of making enabled AI algorithms, in particular from Machine
▪ intelligent machines (intelligent computer Learning and Deep Learning, to leverage Big Data
programs) and perform their tasks more optimally.
✓ Is the branch of computer science by which ▪ Cheaper and more powerful hardware such as
we can create intelligent machines which/that Graphical Processing Units (GPUs) has enabled AI
▪ can behave like a human to evolve into more complex architectures
▪ think like humans and ▪ Machine Learning is an advanced form of AI
▪ able to make decisions where the machine can learn as it goes rather than
✓ AI exists when a machine can have human- having every action programmed by humans
based skills such as learning, reasoning, and ▪ Deep learning The field of neural networks with
solving problems. several hidden layers
▪ In general, the theory and development of ▪ Neural networks are biologically inspired
computer systems/ creation of computer program networks that extract features from the data in a
that hierarchical fashion
▪ Can learn to think and function on its own, High-profile examples of AI:
▪ Able to perform tasks normally requiring ▪ Autonomous vehicles (such as drones and self-
human intelligence, such as visual perception, driving cars),
speech recognition, decision-making, and ▪ Medical diagnosis,
translation between languages. ▪ creating art (such as poetry),
▪ E.g. kind of like robots that don’t need to be ▪ Proving mathematical theorems,
told what to do all the time ▪ Playing games (such as Chess),
▪ Most advanced AI systems use machine ▪ Search engines (such as Google search),
learning technology to analyze current ▪ Online assistants (such as Siri),
conditions and learn from experience ▪ Image recognition in photographs,
Goals of AI (Why AI)? ▪ Spam filtering,
▪ Replicate human intelligence by creating expert ▪ Prediction of judicial decisions
systems ▪ Targeting online advertisements
✓ exhibiting intelligent behavior with the
capability to learn new things by itself,
demonstrate, explain and advice its users. 
Solve Knowledge-intensive tasks
✓ Helping machines find solutions to complex
problems like humans do. 
 An intelligent connection of perception and
action 
 Building a machine which can perform tasks that
requires human intelligence such as:
 Proving a theorem 
 Playing chess
 Plan some surgical operation
 Driving a car in traffic
What Comprises to AI?
▪ AI is not just a part of computer science even
it's so vast and requires lots of other factors that
can contribute to it
▪ AI is multidisciplinary and the areas which
contribute to AI includes
AI and machine learning
▪ The advent of Big Data, driven by the arrival of
the internet, smart mobile and social media has History of Artificial Intelligence (AI)
1943-1952 Maturation of 1952-1956 Birth of Artificial
Artificial Intelligence: Intelligence: the term
a model of artificial “artificial intelligence”
neurons ,Turing test by is coined by John
Alan Turing in 1950. McCharty at a
Dartmouth
conference ;AI is
founded as an
academic discipline
1956–1974 Golden years of AI;
enjoy government
funding in promising,
logicbased problem-
solving approaches;
1974–1980 First “AI winter”,
Overly high
expectations coupled
with the limited
capacities of AI
programs, reduced
funding and interest in
AI research.
1980–1987 Rise of knowledge-
based expert systems;
successes and a change
in the focus of research
& funding toward this
form of AI.
1987–1993 Second “AI winter”;
sudden collapse in
specialized hardware
industry in 1987;
negative perceptions
by governments &
investors, as expert
systems show their
limitations & prove
expensive to update &
maintain.
1993–2011 Optimism about AI
Emergence of returns and increases.
intelligent agents New successes are
marked with the help
of increased
computational power
and AI becomes data-
driven.
1997: IBM’s DeepBlue 3. Software/Hardware for training and running
beats world champion models:
Gary Kasparov (chess) ✓ Graphic Processing Units (GPUs), Parallel
processing tools (like Spark), Cloud data storage
2002: Amazon uses and computer platforms.
automated systems to 4. Programming languages for building models:
provide ✓ Python, TensorFlow, Java, and C/C++ , etc.
recommendations.
2011: Apple releases 3.2 Level of AI 16 How humans think?
Siri and IBM Watson
beats two human ▪ Stage 1- Observe and input the information or
champions at the TV data in the brain.
quiz Jeopardy. ▪ Stage 2- Interpret and evaluate the input that is
2012–today Deep learning, big data received from the surrounding environment.
& artificial general ▪ Stage 3- Make decisions as a reaction towards
intelligence Increased what you received as input and interpreted and
availability of data, evaluated.
connectedness and • AI researchers are simulating the same stages in
computational power building AI systems .
allow for
breakthroughs in 1. Stage 1 – Rule-Based Systems
machine learning, ✓ The most common uses of AI today fit in this
mainly in neural bracket
networks and deep 2. Stage 2 – Context Awareness and Retention:
learning, heralding a ✓ Algorithms that develop information about the
new era of increased specific domain they are being applied in.
funding and optimism 3. Stage 3 – Domain-Specific Expertise:
about the AI potential. ✓ Going beyond the capability of humans, these
2012: Google systems build up expertise in a specific context
driverless cars navigate taking in massive volumes of information.
autonomously ✓ cancer diagnosis and the well-known Google
2014:Chatbot "Eugene Deepmind’s AlphaGo.
Goostman" won a 4. Stage 4 – Reasoning Machines:
competition in Turing ✓ algorithms have some ability to attribute mental
test. states to themselves and others
2016: Google AlphaGo ✓ have a sense of beliefs, intentions, knowledge,
beats a world and how their own logic works
champion in the 5. Stage 5 – Self Aware Systems / Artificial General
complicated board Intelligence (AGI):
game Go. ✓ have human-like intelligence
6. Stage 6 – Artificial Super-intelligence (ASI) :
Components of AI ✓ AI algorithms can outsmart even the most
1. Applications: intelligent humans in every domain.
✓ Image recognition, Speech recognition, 7. Stage 7 – Singularity and Transcendence:
Chatbots, Natural language generation, and ✓ Human augmentation could connect our brains
Sentiment analysis. to each other and to a future successor of the current
2. Types of Models: internet, creating a “hive mind” that shares ideas,
✓ Deep learning, Machine learning, and Neural solves problems collectively, and even gives others
Networks. access to our dreams as observers or participants
Examples of technologies that uses AI  The meaning of big data expanded beyond the
 Machine Learning volume of data after the release of a paper by
 Robotics Googleon MapReduce and the Google File
 Machine Automation System (GFS), which evolved into the Apache
 Virtual Reality Hadoop opensource project.
 Cloud Computing Cloud computing and application programming
 Augmented Reality interfaces
 Neural Networks  Cloud computing is a general term that describes

 Big Data the delivery of on-demand services, usually


 Internet of Things through the internet,
 Computer Vision  These services might be data analysis, social

Influencers of AI media, video storage, e-commerce,


✓ Big data  AI capabilities that are available through the

✓ Advancements in computer processing speed internet and supported by cloud computing 


and new chip architectures Application programming interfaces (APIs)
✓ Cloud computing and APIs expose capabilities and services
✓ The emergence of data science  AI APIs are usually delivered on an open cloud-

Big Data based platform on which developers can infuse AI


 Refers huge amounts of data. capabilities to digital applications, products, and
 Big data requires innovative forms of operations
information processing to draw insights, ➢IBM delivers Watson AI services over IBM
automate processes, and help decision making Cloud
 The exponential growth of unstructured data ➢Amazon AI services are delivered over Amazon
drives the need for a new kind of computer Web Services (AWS).
system such as human deal in natural language ➢ Microsoft AI tools are available over the MS
 Azure cloud.
 The availability of larger volumes and sources of ➢ Google AI services are available in the Google
data is enabling capabilities in AI to analyze Cloud Platform.
massive amounts of data in milliseconds Stages Humans AI
First stage humans perceives
(Sensing acquire information
layer) information from the
from their surrounding
surrounding environment
environments using sensing
through agents specific
human senses to the AI
Advancements in computer processing speed, organs like application like
new chip architectures, and big data file eyes, ears,… voice and
systems imaging
 Significant advancements in computer
recognitions, ...
processing speed and memory speeds enable Second stage interpreting reasoning and
us to quickly big data (Interpretation and thinking about
 New computer chip architectures (brain-like)
layer) evaluating the the gathered
contribute to the rapid evolution of AI input data input that is
applications using brain acquired by the
 whose architecture is configured to mimic the
sensing layer
biological brain’s network of neurons and the
Third stage taking action After
connections between them called synapses
(interacting or making evaluating the
layer) decisions input data, the
interacting c) Theory of Mind
layer performs ✓ Understand the human emotions, people, beliefs,
the necessary and be able to
tasks using interact socially like humans.
actuators. ✓ not yet developed, but researchers are making
lots of efforts and
improvement for developing such AI machines.
✓ Example: Sophia – the humanoid robot is one
example of such effort
where a number of young Ethiopians have
contributed on the
development.
d) Self-awareness
✓ These machines will be super intelligent, and
will have their own
consciousness, sentiments, and self-awareness.
✓ These machines will be smarter than human
mind.
✓ The future of Artificial Intelligence and does not
exist in reality yet.
✓ It is a hypothetical concept.

Applications of AI

Application of AI in Agriculture
 See & Spray Robot
Types of AI - Based on capabilities
 Harvest CROO Robotics

 Crop and Soil Monitoring


a) Reactive Machines
✓ The most basic types of AI. Application of AI in Healthcare
 Precision Medicine
✓ Don’t store memories or past experiences for
 Apple Watch
future actions.
 IBM Watson analysis
✓ Only focus on current scenarios and react on
 Healthcare chatbot
it as per possible best action. Types of AI -
Based on capabilities Applications of AI in Education
✓Example: • Teachers’ Support
➢ IBM's Deep Blue system • Administrative
➢ Google’s AlphaGo Tasks Automation
b) Limited Memory • Students’ Communication
✓ Can store past experiences or some data for a • Virtual Lectures
short period of and Learning Environment
time. Applications of AI in Business
 Improve Customer Services
✓Example:
 Predict Performance
➢ Self-driving cars - cars
 Predict Behavior
can store recent speed
 Manage and Analyze Data
of nearby cars, the
 Improve Marketing and Advertising
distance of other cars,
speed limit, and other
information to navigate AI tools and platforms
the road. Common AI Tools
✓ Search and optimization business (B2B) environments increasingly use
✓ Logic chatbot virtual assistants to handle simple tasks.
✓ Probabilistic methods for
uncertain reasoning Quiz (5%) 1. What does mean intelligence?
✓ Classifiers and statistical 2. Write levels and types AI
learning methods 3. What are the components of AI?
✓ Neural networks 4. List disciplines that contribute to AI
✓ Control theory 5. Mention application domains of AI.
✓ Languages
Common AI Platforms Chapter 4
✓ Microsoft AZURE Machine Internet of Things (IOT)
Learning,
✓ Google Cloud Prediction API,
What is IoT?
✓ IBM Watson,
 IoT is the networking of smart objects, meaning a
✓ TensorFlow,
huge number of devices intelligently
✓ Infosys Nia,
communicating; Internet Architecture Board’s
✓ Wipro HOLMES,
(IAB)
✓ Premonition,
 IoT is a framework of all things that have a
✓ Rainbird, Ayasdi,
representation in the presence of the internet
✓ MindMeld, Meya.
enables Machine-to-Machine (M2M)
Simple AI application
communication ; IEEE Communications
▪ Commuting
 IoT according to the 2020 conceptual
✓ Google’s AI-Powered Predictions
framework is expressed through a simple
✓ Ridesharing Apps Like Uber and Lyft
formula such as:
✓ Commercial Flights Use an AI Autopilot
▪ IoT= Services+ Data+ Networks + Sensors
▪ Email- Spam Filters , Smart Email
 Generally, IoT is the network of physical
Categorization
objects or
▪ Social Networking
"things" embedded with electronics, software,
✓ Facebook, Pinterest, Instagram, Snapchat
sensors, and network connectivity, which enables
▪ Online Shopping
these objects to collect and exchange data.
✓ Search, Recommendations
The most important features of IoT
▪ Mobile Use
 Artificial intelligence:
✓ Voice-to-Text
▪ IoT essentially makes virtually anything “smart”
✓ Smart Personal Assistants : Siri, Alexa,
▪ It enhances life with the power of data collection,
✓ Cortana
AI algorithms, and networks
 Connectivity:
1. What is AI agent? Discuss types of AI agents.
▪ Networks can exist on a much smaller and cheaper
 An AI agent is a software program designed to
scale
interact with its environment, perceive the data it
▪ IoT creates these small networks b/n its system
receives, and take actions based on that data to
devices
achieve specific goals.
 Sensors:
 Types of AI agents include simple reflex agents,
▪ Defining instruments these are capable of
model-based reflex agents, goal-based agents,
understanding real-world and integration with
utility-based agents, learning agents, multi-agent
network
systems, and hierarchical agents.
▪ IoT loses its distinction without sensors
2. What is chatbot? What it used for?
 Active engagement:
A chatbot is a software or computer program
▪ IoT introduces a new paradigm for active content,
that simulates human conversation or chatter
product, or service engagement
through text or voice interactions. Users in both
 Small device:
business-to-consumer (B2C) and business-to-
▪ IoT exploits purpose-built small devices to ➢The first examples of an Internet of Things is in
deliver its precision, scalability, and versatility the early 1980s and was a Coca Cola machine,
located at the Carnegie Melon University .
Components of IoT ➢Kevin Ashton, the Executive Director of Auto-ID
IoT= Services+ Data+ Networks Labs at MIT, was the first to describe the Internet of
+Sensors(Things) Things, during his 1999 speech.
 IoT, refers to the set of devices and systems ➢2013, the Internet of Things had evolved into a
that interconnect realworld sensors and system using multiple technologies
actuators to the Internet.  IoT is a network of devices that can sense,
 Things: natural or man-made object that can accumulate and transfer data over the internet
be assigned an IP address and is able to without any human intervention
transfer data over a network  Its new and advanced elements bring major
✓ person with a heart monitor implant, changes in the delivery of products, goods, and
✓ a farm animal with a biochip transponder, services; and the social, economic, and political
✓ an automobile that has built-in sensor impact of those changes
 Local network
✓ Gateway which translates proprietary
communication protocols to Internet Protocol
 Internet - the Global Network
 Back-end services
✓ Enterprise data systems, or PCs and mobile
devices.
 Data – information captured by sensors
 IoT evolved from machine-to-machine (M2M)
communication, i.e., machines connecting to
each other via a network without human
interaction.
 M2M refers to connecting a device to the
cloud, managing it and collecting data
 In 2013, the IoT had evolved into a system
using multiple technologies, includes
▪ Internet to wireless communication
▪ micro-electromechanical systems (MEMS)
▪ The traditional fields of automation ▪ Wireless
Sensor Networks (WSN),
▪ GPS,
History of IoT ▪ Control systems like SCADA (Supervisory
➢Telegraph (the first landline) - 1830s Control and Data Acquisition)
➢“wireless telegraphy,” the first radio voice  The first to describe the Internet of Things,
transmission - June 3, 1900 during his 1999 speech by Kevin Ashton, at
➢Computers development - 1950s. MIT
➢The Internet, by DARPA (Defense Advanced ▪ He said Radio Frequency Identification (RFID)
Research Projects Agency) in 1962 and evolved was a prerequisite
into ARPANET in 1969 –commercialized in ▪ He concluded if all devices were “tagged,”
1980s. computers could manage, track, and inventory
▪ Tagging of things ➔ by digital watermarking,
➢Global Positioning Satellites (GPS) - 1993, by barcodes, and QR codes
the Department of Defense
IoT − Advantages
 Improved Customer Engagement: remove collect, send and act on data they acquire from their
blind-spots and passive engagement environments.
 Technology Optimization : D2D  Smart devices share collected
 Reduced Waste : IoT provides real-world data through IoT gateway or another edge device
information leading to the more effective where data is either sent to the cloud to be analyzed
management of resources or analyzed locally.
 Enhanced Data Collection: allows an
accurate picture of everything
IoT – Disadvantages
 Privacy and security : Potential hacker may
increase
 If bug in the system, every connected device
will corrupt
 Absence of standards : affects device
interoperability
 Big Data Management
 Device Energy Consumption
Challenges of IoT
 Security: exposed to various kinds of
attackers
 Privacy: provides substantial personal data
How IoT works…the 4 stages
Stage 1 (Sensors/Actuators)
in extreme detail
▪ A thing in the context of “Internet of Things”,
 Complexity: design, deployment, and
should be equipped with sensors and
maintenance
actuators thus giving the ability to emit, accept and
 Flexibility: concerns on how to integrate
process signals
easily, lack of standards
Stage 2 (Data Acquisition Systems):
 Compliance: complexity makes it
▪ The data from the sensors starts in analogue form
challenging to comply with regulation
which needs to be aggregated and
How IoT works?
converted into digital streams for further
 An IoT ecosystem consists:
processing.
➢Web-enabled smart devices that use embedded
▪ This stage performs these data aggregation and
processors and connected to sensors, actuators
conversion functions
and
Stage 3 (Edge Analytics)
internet
▪ Once IoT data has been digitized and aggregated,
➢Sensors to collect data from the environment
it may require further processing before it enters the
and send it back to the end smart device for
data center, this is where Edge Analytics comes in
analysis.
Stage 4 (Cloud Analytics)
➢Communication protocols used by the smart
▪ Data that needs more in-depth processing gets
device to send data to the cloud to be analyze
forwarded to physical data centers or cloudbased
and provide remote access
systems.
 The devices do most of the work without
Architecture of IoT
human intervention, although people can
 The architecture of IoT devices comprises four
interact with the devices.
major components: sensing, network, data
✓to set up devices
processing, and application layers
✓to give special instructions
Internet of Things (IOT) An IoT device consists:
✓access data
➢Hardware,
Example
➢Software,
 Smart devices with embedded
➢Network connectivity, and
processors, sensors & communication hardware
➢Sensors.
Hence, the architecture of IoT
comprises: B. Environmental Sensors : change in
➢Sensing layer, environmental parameters
➢Network layer, ✓Light sensors, Pressure sensors
➢Data processing layer, and C. Position sensors : physical position & location
➢Application layers ✓GPS sensors ➔ navigation
✓Magnetic sensors (digital Compass) ➔ fix
orientation
Network Layer
 Acts as a communication channel to transfer data,
collected in the sensing layer, to other connected
devices
 The network layer is implemented by using diverse
communication technologies (e.g., Wi-Fi,
Bluetooth, Zigbee, ZWave, LoRa, cellular network,
etc.)
Data Processing Layer
 Takes data collected in the sensing layer and
analyses the data to make decisions based on the
result
 The data processing layer also saves the result of
the previous analysis and may share the result with
other connected devices
Application Layer
 Implements and presents the results of the data
processing layer to accomplish disparate
applications of IoT devices
 User-centric layer that executes various tasks for the
users
 Smart transportation, smart home, personal care,
healthcare…
Devices and Networks
 IoT devices can be categorized into three main
groups: consumer, enterprise and industrial
Sensing Layer  Consumer connected devices include smart TVs,
 Used to identify any phenomena in the smart speakers, toys, wearables, and smart
devices’ peripheral and obtain data from the appliances
real world  Smart meters, commercial security systems and
 This layer consists of several sensors smart city technologies ➔ used to monitor traffic
integrated through sensor hubs (point and weather conditions are examples of industrial
multiple sensors connected ) IoT
 Actuators :change the physical conditions  In enterprise, smart air conditioning, smart
that generate the data  thermostats, smart lighting, and smart security, span
▪ eg. shut off a power supply, adjust an airflow home, smart sensors located in a conference room
valve are used
 Sensors in IoT devices can be classified into  IoT network device constrained resources ➔ power,
three broad categories processing speed, memory
A. Motion Sensors: change in motion and  Those devices may be deployed
orientation ▪ Over large areas like smart cities, industrial
✓linear and angular motions plants,
▪ Hard-to-reach areas like war, hazardous place
 Efficient management of IoT networks requires  It allows subscribers to remotely manage and
▪ Low power IoT devices monitor different home devices from anywhere via
▪ Deployment complexity smartphones
 Developing an IoT network management  Remote Control Appliances: Switching on and off
solution is not an easy task because of the remotely appliances to avoid accidents and save
▪ increasing number of connected devices energy.
characterized by their heterogeneity  Weather: Displays outdoor weather conditions such
▪ intrinsic constraints of IoT networks as humidity, temperature, pressure, wind speed and
▪ architecture, technologies, physical layer rain levels with the ability to transmit data over long
 Challenges in IoT network & device distance
management  Smart Home Appliances:
▪ Scalability, interoperability, energy  Safety Monitoring: cameras, and home alarm
efficiency, topology control, Quality of systems making people feel safe in their daily life at
Service (QoS), fault tolerance, and security home.
 M4DN.IoT (Management for Device and  Intrusion Detection Systems: Detection of window
Network in IoT): proposed platform for IoT and door openings and violations to prevent
networks & devices management intruders.
▪ M4DN.IoT ➔ outlines a management  Energy and Water Use: Energy and water supply
structure in two scopes: consumption monitoring to obtain advice on how to
▪ Local management : nearby configure & save cost and resources
monitor : Same ntk IoT Based Smart City
▪ Remote management: remote configure  Structural Health: Monitoring of vibrations and
& monitor: different ntk material conditions in buildings, bridges and
IoT Tools and Platforms historical monuments.
 IoT Platform are based on the Internet of Things  Lightning: intelligent and weather adaptive lighting
and cloud technology in street lights
Some of the IOT platforms are  Safety: Digital video monitoring, fire control
 KAA : Manage an unlimited number of management, public announcement systems
connected devices  Transportation: Smart Roads and Intelligent High-
 SiteWhere : Add devices through self- ways with warning messages and diversions
registration according to climate conditions and unexpected
 ThingSpeak: Collect data in private channels events like accidents or traffic jams.
and Share data with public channels  Smart Parking: Real-time monitoring of parking
 DeviceHive : It supports Big data solutions like spaces available in the city making residents able to
Apache Spark identify and reserve the closest available spaces
 Zetta : allows you to assemble smartphone apps  Waste Management: Detection of rubbish levels in
 ThingsBoard : Real-time data visualization containers to optimize the trash collection routes
IoT Based Smart Farming
 A set of sensors such as light, humidity,
temperature can be used to continuously monitor
the field conditions
 Green Houses: Control micro-climate conditions to
maximize the production of fruits and vegetables
and its quality
 Animal Farming/Tracking: Location and
 identification of animals grazing in open pastures or
 location in big stables, Study of ventilation and air
 quality in farms and detection of harmful gases
from excrement
IoT Based Smart Home
 Field Monitoring: Reducing spoilage and crop  Through augmented vision, a user can digitally
waste with better monitoring, accurate ongoing interact with and adjust information about their
data obtaining, and management of the surrounding environment.
agriculture fields, including better control of AR, VR and MR
fertilizing, electricity and watering  By the help of computer vision and power of
IoT in Healthcare processor development we have three types of
 Wearable IoT devices let hospitals monitor their reality;
patients 'health at home, thereby reducing ▪ Virtual reality (VR),
hospital stays while still providing up to the ▪ Augmented reality (AR)
minute real-time information that could save ▪ Mixed reality (MR)
lives.  Extended reality (XR) is a universal term inclusive
 In hospitals, smart beds keep the staff informed all real-and-virtual combined environments and
as to the availability, thereby cutting wait time human-machine interactions generated by computer
for free space. technology and wearables, such as virtual reality
 Putting IoT sensors on critical equipment means (VR), augmented reality (AR), and mixed reality
fewer breakdowns and increased reliability, (MR).
which can mean the difference between life and Virtual Reality (VR)
death.  VR is fully immersive, which tricks your senses
 Elderly care becomes significantly more into thinking you’re in a different environment or
comfortable with IoT. world apart from the real world
 Real-time home monitoring, sensors can also  It is called a computer-simulated reality
 determine if a patient has fallen or is suffering a  Using a head-mounted display (HMD) or headset,
heart attack. you’ll experience a computer-generated world of
imagery and sounds
Chapter 5  Computer technologies using reality headsets to
generate realistic sounds, images and other
Augmented reality (AR)
sensations that replicate a real environment or
create an imaginary world.
Outline
 You can manipulate objects and move around using
• Overview of AR
haptic controllers while tethered to a console or PC.
• AR, VR and MR
 Advanced VR environment will engage all five
• Architecture of AR Systems
senses (taste, sight, smell, touch, sound), but it is
• Challenges of AR
not always possible
• Applications of AR
✓ Provide freedom of movement – users can move
What is Augmented Reality?
in a digital environment and hear sounds.
Its fundamental idea is to combine, or mix or
✓ Special hand controllers can be used to enhance
integration of
VR experiences.
 the view of the real environment with virtual
 Example of VR tools
content that is presented through computer
✓ HTC Vive, Oculus Rift, gaming console
graphics.
(PlayStation VR) -- connected to computer
 achieved by ensuring that the virtual content is
✓ Google Cardboard – stand alone and work in
aligned and registered with the real objects.
combination with smartphones Augmented Reality
 Personal movement within the real word
 Users can see and interact with the real world while
environment make him/her to perceive its
digital content is added to it
environment from different perspective view 
✓ adds digital elements to a live view often by
 Allows users to overlay computer-generated
using the camera on a smartphone
content in the real world
 Direct or indirect view of a physical, real-world
 Typically done in real-time and in semantic
environment whose elements are augmented (or
context with environmental elements. 
supplemented) by computer-generated sensory
input such as sound, video, graphics or GPS data
 Examples noise- One a bit
✓ Google Glass : digital content is displayed on canceling expensive
a tiny screen in front of a user’s eye. headphones,
✓ Snapchat lenses cameras, and
✓ game Pokemon Go sometimes
motion
Mixed Reality (MR)
capturing
 Sometimes referred to as hybrid reality technology.
 Merging of real and virtual worlds to produce
new environments and visualizations where Architecture of AR Systems
physical & digital objects co-exist & interact in
real-time  The Infrastructure Tracker Unit was
 play a virtual video game, grab your real-world responsible for collecting data from the real
water bottle, and smack an imaginary character world, sending them to the Processing Unit
from the game with the bottle  Processor unit mixes the virtual content with
 Mixed reality hardware is still emerging and the real content and send the result to the Video
hasn’t quite broken into the mainstream Out module of the Visual Unit
consumer market, most likely due to the price  Visual Unit can be classified into two types of
 The middle of AR and Augmented Virtuality system
(AV)  Video see-through : HMD for video mix and
 AR-adds virtual contents to the Real display: closed view
Environment  Optical see-through: HMD employ optical
 AV-adds real content to a predominantly virtual combiner : open view
environment  HMDs are currently the dominant display
 Provides the ability to have one foot (or hand) in technology in the AR field.
the real world, & the other in an imaginary place,  However, they lack in several aspects, such as
 Breaking down basic concepts between real & • ergonomics,
imaginary • high prices and
• relatively low mobility due to their sizes and
connectivity features.
 Collision: difficulty to interact with multiple points
in different depths causes collisions between
interactive zones.
 Alternative approaches to developing ARS involve
the use of monitors and tablets.
• Though Collision problems still are not solved

Applications of AR Systems
AR vs VR vs MR  AR can be applied to many different disciplines
AR VR MR such as 
Overlay Fully digitalDigital  Education
digital content Fully immerseoverlay that  Medical 
on top of the allows  Entertainment
real world interactive
 Engineering Design
virtual
elements to  Manufacturing,
integrate and  Maintenance, and Repair
interact with  Collaborative AR
the real world Applications of AR: Education
Requires Microsoft  It allows flexibility and attractive by extend
specialized Hololens and content into the world outside the classroom
VR headsets, Magic Leap  Affordable learning materials : low cost
 Interactive lessons: try to model
 Higher engagement : activate, improve
attention
 Higher retention: use different senses
 Boost intellectual curiosity : excited and
innovative
 Driving Simulators. a. Games using a virtual table and synthetic objects
 Ship Simulators. b. Advertisement in a Football game
 Flight Simulators. • More vivid
 Tank Simulators • Move exciting
Applications of AR: Medicine • More attractive
 Enhancing medicine and healthcare towards Applications of AR Engineering Design
more safety and efficiency  3D prototyping of Engineering Design 
• Practice Performing Surgery.  Design augmented with a computer-generated
• Perform surgery on a remote patient. image of the current design built from the CAD
• Teach new skills in a safe, and controlled files describing it
environment. Manufacturing, Maintenance, and Repair
 Ultrasound, CT (Computed Tomography) and/or  The image of the equipment would be
MRI (Magnetic Resonance Imaging) scans augmented with annotations and information
provide the surgeon with the necessary view of pertinent to the repair.
the internal anatomy ✓ Makes much easier than consulting a lot of
 AR tools may also aid to detect the signs of repair manuals
depression and other mental illnesses by reading  Boing made an experimental system, where the
from facial expressions, voice tones, and technicians are guided by the augmented
physical gestures display that shows the routing of the cables on
a generic frame used for all harnesses
Collaborative AR
 AR addresses two major issues with
collaboration:
 Describing symptoms: accurate diagnosis • seamless integration with existing tools and
 Nursing care: successful finding of the vein practices, and
(Accuvien) • enhancing practice by supporting remote and co
 Surgery: Three-dimensional reconstructions of -located activities that would otherwise be
organs (Agumedics) impossible
 Diabetes Management : real-time tracking of E.g. Collaborative AR systems using see -through
blood sugar levels displays include both those that use see -through
 Navigation: the nearest hospitals handheld displays and see -through head -worn
Applications of AR: Entertainment displays
AR can be used in music, movies, live shows, CHAPTER 6
games ETHICS AND PROFESSIONALISM OF
 AR in games: for increasing physical
EMERGING TECHNOLOGIES
activity Outline
 AR in music : providing complete
❖Technology and Ethics
information on the track or its performer ❖New Ethical Questions
 AR on TV: adding supplementary
❖Digital Privacy
information ❖Accountability and Trust
 AR in eSports : online gaming
❖Threats and Challenges
 AR in the theater : accessibility (eg. 6.1 Technology and Ethics
Subtitles ) As Technology grows
 Allowing the creation of new tools and new
ways for people to interact
 It has created new concerns about privacy
 It has been vulnerable by spam and viruses
 It threatens to cut off people who lack access to
it
 So that, Technology can serve to promote or
restrict human rights
 Ethics: use of emerging technologies in such a
General Ethical Principles
way as to maximize the benefits that they
 Common ethical rules that must be applied in all
provide while minimizing the harms.
technologies
 Establishing the proper legal or regulatory
▪ Contribute to society and to human well-being
system is important to reduce the effect of
▪ Avoid harm.
abusing technology rather than sharing
▪ Be honest and trustworthy
technological benefits.
▪ Be fair and take action not to discriminate
Technology and Ethics
▪ Respect the work required to produce new ideas,
 A code for professional ethics based on five
inventions, creative works, and computing artifacts
basic principles:
▪ Respect privacy
 Integrity:- truthfulness, trust
▪ Honor confidentiality
 Objectivity: impartiality, fairness
New Ethical Questions
 Competence: capability
Professional Responsibilities
 Confidentiality: privacy
Ethical principles related to professional
 Professional behavior
responsibility
 However, the emergence of new technologies
 Strive to achieve high quality in both the processes
raises some new challenges for the profession to
and products
address.
 Maintain high standards of professional
New Ethical Question
competence, conduct, and ethical practice
 The increasing use of big data, algorithmic
 Know and respect existing rules pertaining to
decision-making, and artificial intelligence can
professional work
enable evidence-based and accurate judgments
 Accept and provide appropriate professional review
more quickly and efficiently
 Give comprehensive and thorough evaluations of
 The ethical use of these fairly new technologies
computer systems and their impacts, including
are questioned (build in errors or systemic biases
analysis of possible risk
data)
 Perform work only in areas of competence
 Role of Human Judgment: humans will still be
 Foster public awareness and understanding of
involved in decision making so that people can
computing, related technologies, and their
be held accountable
consequences
▪ explain the reasons behind a decision
 Access computing and communication resources
 Discrimination: personalization, and the impact
only when authorized
of tailoring decisions very specifically to
 Design and implement systems that are robustly and
individuals, based on preferences, activities and
usably secure
other features.
Professional Leadership Principles
 A central problem of the ethics of technology is
 Ensure that the public good is the central concern
that it tends to arrive too late in technology
 Encourage acceptance and evaluate fulfillment of
design and development
your social responsibilities
▪ desirable to have ethical input at the earlier
 Manage personnel and resources to enhance the
stages
quality of working life
▪ Ethics has traditionally not been well equipped
 Articulate, apply, and support policies and
to deal with issues of future uncertainty
processes that reflect the principles of the Code
 Create opportunities for members of the  If individuals can't exist digitally without
organization or group to grow as professionals interruption from unwanted information; thus their
 Recognize and take special care of systems that individual privacy has been infringed upon.
become integrated into the infrastructure of Digital Privacy Principles
society Data Minimization: collect the minimal amount of
Digital Privacy information necessary from individuals and
 Digital Privacy is the protection of businesses
personally/business identifiable information that Transparency: the purpose of the collection and
is collected from respondents through use of identifiable information will be provided in a
information collection activities clear manner , not be used for any other purpose
 It has three sub-related categories; information unless authorized or mandated by law
privacy, communication privacy, and individual Accuracy: Information collected will be maintained
privacy in a sufficiently accurate, timely, and complete
Information Privacy manner to ensure that the interests of the individuals
 It is the notion that individuals should have the and businesses are protected
freedom to determine their digital information, Security: Adequate physical and IT security
mainly that pertaining to personally identifiable measures will be implemented to ensure that the
information, is collected and used collection, use, and maintenance of identifiable
 Every country has various laws that dictate how information are properly safeguarded
information may be collected and used by Accountability and trust
companies/individuals  Often legal and regulatory frameworks haven’t kept
Communication Privacy pace with digital transformation, and organizations
 It is the notion that individuals should have the are seeking guidance.
right to communicate information digitally in  Emerging technologies can provide improved
secure way. accuracy, better quality and cost efficiencies for
 Messages and communications will only be businesses in every sector
accessible to the sender's original intended ▪ It can enhance trust in the organization’s
recipient. operations and financial processes, which is crucial
 However, Communications possibly intercepted for sustainable success
by various hacking methods.  When emerging technology creates far-reaching and
▪ eg. Without reading companies privacy policy, rapid change, it can also bring new risks
lack transparency of company, potential hackers ▪ Use of technology will degrade people’s
 Discussion of communication privacy willingness to judge and intervene ➔ less
necessarily requires consideration of personally connected to consumers
✓technological methods of protecting  The expected obligation of an individual or
information & communication in digital organization
mediums, ▪ To account for their activities,
✓the effectiveness, & ineffectiveness of such ▪ Accept responsibility, and
methods /systems, and ▪ To disclose the results in a transparent manner
✓the development/advancement of new and Threats & Challenges
current technology  Ethical and regulatory challenges
Individual Privacy Security challenge: prominent solution increase
 It is the notion that individuals have a right to Cyber & Data Security professionals.
exist freely on the internet,  Emerging technologies are making an impact
 They can choose what types of information they include
are exposed to, and unwanted information should ➢Counter-terrorism and law enforcement
not interrupt them informatics ➔ predictive and AI
 eg receiving unwanted ads and emails/spam, or a ➢Real-time horizon scanning and data mining for
computer virus threats and information sharing
➢Automated cybersecurity and information  Driverless car: while a compelling option for
assurance future fleer cars, ➔ bodily injury and property
➢Enhanced Surveillance (sensors, cameras, damage
drones, facial recognition)  Wearables: Google glass, Fitbit ➔ privacy
➢Simulation and augmented reality invasion, general liability or personal injury
technologies for training and modeling claims that weren’t foreseen
➢Safety and security equipment  Drones: Turbulence is in the offing for
➢Advanced forensics enabled by computing : manufacturers and organizations ➔ property
quantum computing damage and bodily injury
➢Situational awareness capabilities via GPS and  Internet of things: The propagation of sensors
crisis responses cenarios and cross-platform integration creates potential
➢Biometrics: assured identity security exposure from privacy invasion, bodily injury
➢Robotic Policing and property damage that may connect an
Ethical & Regulatory Challenges organization to huge liabilities.
 Challenges in using Artificial Intelligence  3D printing: Use of trade secrets, patents or
▪ AI is only as good as the data it is exposed to: other protected materials can create intellectual
▪ How a business teaches and develops its AI property liability.
▪ Potential to replace human workers: more  Telemedicine: As a projected lack of primary
“intelligent” machines could begin to replace physicians drives increased adoption, an
experts in higher-level jobs unhealthy mix of crossover claims may result
 Challenges in using Robotics in from medical consultations, software,
manufacturing hardware, facilities, health insurance, and
▪ Automation and robotics moving from personal data via ISP
production lines out into other areas of work: QUIZ (5%)
greater productivity 1. Why do you need ethics in new emerging
▪ Humans losing jobs ➔ raises ethical and technologies? 2. Describe the 3
cybersecurity concerns categories of digital privacy? 3. List
▪ Automation Technologies advancing digital privacy principles? 4. Mention
▪ greater capability take over more and more the threats and risks of emerging
complex jobs technologies?
▪ Robots teaching each other
▪ Challenges in using the Internet of Things Chapter 7
▪ The amount of data being generated is Other Emerging Technologies
increasing
Contents
▪ plan carefully how this will affect the
 Introduction
customerfacing application
 Nanotechnology
▪ how to best utilize the masses of data being
 Biotechnology
produced.
 Blockchain Technology
▪ Severe security implications of mass
 Cloud and Quantum Computing
connectivity
 Autonomic Computing
Challenges in Big Data
 Computer Vision
▪ Data can be incredibly useful for spotting
 Embedded System
trends and analyzing impacts,
 Cyber Security
▪ Analyzing and understand of daily huge data is
Introduction
challenging task
 From time to time, existing technologies are always
▪ AI could play a role here
improved and new technologies are invented.
Threats
 Presently, there are lots of new technologies under
Some risks of emerging technology
development including the IoT, AI, AR and Big
Data which are presented in the previous chapters’
of this course
 This chapter will cover additional emerging  Development of new medicine, genetically
technologies which will have prominent impact modified plants, production of chemicals, paper,
in the world or in human life. textiles, and food
Nanotechnology Applications of Biotechnology
 Science, engineering, and technology conducted  Medicine – formation of genetically modified
at the nanoscale, which is about 1 to 100 insulin known as humulin
nanometers.  Agriculture –Genetically Modified Organisms such
 Nanoscience and nanotechnology as Crops, Animals, Plants, Fungi, Bacteria,
– are the study and application of extremely  Aquaculture Fisheries – helps in improving the
small things quality and quantity of fishes
– can be used across all the other science fields,  Environment –waste treatment and pollution
such as chemistry, biology, physics, materials prevention
science, and engineering  Industries –production of chemicals, paper, textiles,
– involve the ability to see and to control and food
individual atoms and molecules. Blockchain Technology
 Everything on Earth is made up of atoms  A list of ledgers or records (blocks) which store
– the food we eat, the clothes we wear, the data permanently & publicly in a secure,
buildings and houses we live in, and our own chronological, and immutable way.
bodies –Secured using cryptography, not controlled by a
–Atoms are the building blocks for all matter in central authority, access to anyone in the network,
our universe. everyone has copy of the data.
Applications of Nanotechnology –Blocks are made up of digital pieces of
 Medicine: customized nanoparticles the size of information and have three parts which store
molecules that can deliver drugs directly to information:
diseased cells in your body • about transactions like date, time, and amount.
 Electronic: to reduce their weight and power • about who is participating in transactions.
consumption • that distinguishes them from other blocks
 Food: from how food is grown to how it is Blockchain Technology
packaged  In order for a block to be added to the blockchain,
 Agriculture: from generation to preservation, four things must happen:
handling, bundling, transportation, and even – A transaction must occur.
waste treatment. – That transaction must be verified
 Vehicle manufacturers: lighter and stronger – That transaction must be stored in a block
materials will be valuable for making vehicles – That block must be given a hash
that are both quicker and more secure  By design, a blockchain is resistant to modification
Applications of the data
Biotechnology  The blockchain network has no central authority; it
 Technology based on biology is the very definition of a democratized system.
 It harnesses cellular and biomolecular processes  The first blockchain was conceptualized by a person
to develop technologies and products (or group of people) known as Satoshi Nakamoto in
– help improve our lives and the health of our 2008.
planet.  A blockchain carries no transaction cost.
 One example of modern biotechnology is genetic  simple yet ingenious way of passing information
engineering. from A to B in a fully automated and safe manner.
– the process of transferring individual genes One party to a transaction initiates the process by
between organisms or modifying the genes in an creating a block
organism to remove or add a desired trait or Blockchain Technology (The three
characteristic. Pillars/properties)
1. Decentralization –The information is not stored
by one single entity
2. Transparency –A person’s identity is hidden  The next generation of computing using quantum
via complex cryptography and represented only physics.
by their public address. – Quantum computers are big machines, need deep-
3. Immutability –In the context of the freezing
blockchain, means that once something has been  Currently, the only organization which provides a
entered into the blockchain, it cannot be quantum computer in the cloud is IBM.
tampered with. –They allow free access to anyone who wishes to
 Blockchain technology has become popular use their 5qubit machine
because of the following.  Google provided the fastest quantum computer with
53qubits and speed of 200 seconds computation
while the supercomputer took 10000 years.
 – Qubit is short for a sequence of quantum bits
(1, 0, or some value between).
Advantages of Quantum Computing
 For scientists to crunch very long numbers
 Help in the discovery of new drugs, by
unlocking the complex structure of chemical
molecules.
 Other uses include
– financial trading
Applications of Blockchain Technology – risk management
 The sharing economy – supply chain optimization
 Crowd funding  Data transferred over the internet with much
 Governance safer encryption
 Supply chain auditing Autonomic Computing (AC)
 File storage  Self-managing computing model named after, and
– Banking, Finance, Government, Healthcare, patterned on, the human body's autonomic nervous
Insurance, Media and Entertainment, Retail. system.
applications  AC systems would control the functioning of
Cloud Computing computer applications and systems without input
 Delivery of on demand computing services from from the user
application to storage and processing power over  Its goals is to create systems that run themselves,
the internet on a pay-asyou-go basis. capable of high-level functioning while keeping the
 Means of networking remote servers that are system's complexity invisible to the user.
hosted on the Internet.  Refers to the self-managing characteristics of
 Deployment models distributed resources, adapting to unpredictable
–Public, Private, Community, Hybrid changes while hiding intrinsic complexity to
 Types operators and users.
–Software as a service (SaaS), Platform as a Characteristics of Autonomic Computing (AC)
service (PaaS), Infrastructure as a service (IaaS)  Self-Awareness:“knows itself”.
Advantages of Cloud Computing  Self-Configuring: configure and reconfigure itself
 Cost saving  Self Optimizing: detect suboptimal behaviors and
 High Speed and accessibility optimize itself to improve its execution.
 Back-up and restore data  Self-Healing: detect and recover from potential
 Automatic Software Integration problems and continue to function smoothly.
 Reliability  Self-Protecting: detecting and protecting its
 Mobility resources from attacks.
 Unlimited storage capacity  Context-Aware: aware of its execution environment
Quantum Computing and be able to react to changes in the environment.
 Open: must function in a heterogeneous world
 Anticipatory: manage itself proactively  Modern ESs are often based on microcontrollers,
Computer Vision but ordinary microprocessors are also common,
 It is an interdisciplinary scientific field that deals especially in more complex systems.
with how computers can be made to gain a high  A common standard class of dedicated processors is
level understanding of digital images or videos. the digital signal processor (DSP).
 From the perspective of engineering, it seeks to Advantages & Disadvantages of Embedded
automate tasks that the human visual system can Systems
do.  Advantages
 Computer vision tasks include methods for –Easily Customizable
acquiring, processing, analyzing and –Low power consumption
understanding digital images, and extraction of –Low cost
highdimensional data from the real world in –Enhanced performance
order to produce numerical or symbolic  Disadvantages
information. –High development effort
 Computer vision is building algorithms that can –Larger time to market
understand the content of images and use it for Basic Structure EmbeddedSystems
other applications➔ application perspective
How does Computer Vision work?
 Acquiring an image➔ Processing the image➔
Understanding the image
 There are many types of computer vision that are
used in different ways:
– Image segmentation
– Object detection
– Facial recognition
– Edge detection
– Pattern detection . Cyber Security
– Image classification groups images into  Protection of computer systems from the theft of or
different categories. damage to their hardware, software, or electronic
– Feature matching data, as well as from the disruption or misdirection
Applications of Computer Vision of the services they provide.
– Optical character recognition (OCR)  Cyber crime an unlawful activity in which computer
–Machine inspection or computing devices are used as a tool or/and
–Retail target of criminal activity
–Medical imaging –committed by the people of destructive and
–Automotive safety criminal mindset either for
– Surveillance • Revenge
– Fingerprint recognition and biometrics • greed or adventure
Embedded Systems (ESs) Measures of Cyber Security
 It is a controller with a dedicated function within • Staff awareness training
a larger mechanical or electrical system, often • Application security
with real-time computing constraints. • Network security
 It is embedded as part of a complete device often • Leadership commitment
including hardware and mechanical parts. • Password management
 Embedded systems control many devices in Types of Threat in Cyber Security
common use today.  Ransomware: designed to extort money by
 89% of all microprocessors manufactured are blocking access to files or the computer system
used in ESs. until the ransom is paid.
 Malware:- designed to gain unauthorized
access or to cause damage in to a computer
 Social engineering: a tactic that adversaries
use to trick you into revealing sensitive
information.
– it is the practice of sending fraudulent emails
that resemble emails from reputable sources.
– The aim is to steal sensitive data like credit
card numbers and login information.
– It’s the most common type of cyber-attacks
Benefits & Vendors of Cyber Security
 Business protection against malware,
ransomware, phishing, and social engineering.
 Protection for data and networks. • Prevention of
unauthorized users.
 Improves recovery time after a breach.
 Protection for end-users.
 Improved confidence in the product for both
developers and customers.
– Vendors use endpoint, network and advanced
threat protection security as well as data loss
prevention
–Known venders ➔ Cisco, McAfee, andTrend
Micro
Additive Manufacturing (3D Printing)
 The construction of a three-dimensional object
from a CAD model or a digital 3D model.
 Additive manufacturing (AM) describes types of
advanced manufacturing that are used to
–Create three-dimensional structures out of
plastics, metals, polymers and other materials
that can be sprayed through a nozzle or
aggregated in a vat.
 These constructs are added layer by layer in real
time based on digital design.
 The simplicity and low cost of AM machines,
combined with the scope of their potential
creations,
–could profoundly alter global and local
economies and affect international security.
What is the difference between additive
manufacturing and 3D printing?
 3D printing refers to smaller-scale, at-home
printing operations, while additive
manufacturing has been used to refer to large-
scale or industrial manufacturing. This means
context is important when you're differentiating
between the two terms.

You might also like