Emerging Technologies Note Natnael Bereta
Emerging Technologies Note Natnael Bereta
✓ Augmented Analytics
Introduction to Emerging Technology
✓ Digital Twins
✓ Immersive Experiences in Smart Spaces
1.1 Emerging Technology Concepts
1.2 Industrial Revolution (IR)
▪ Technology?
✓ The sum of techniques, skills, methods and
▪ Begin during the late 1700s and early 1800s
process for
✓ The revolution started in England (to increase
➢ the production of goods and services
food production, agriculture revolution)
➢ the accomplishment of objectives such as
✓ The first European countries to be industrialized
scientific investigations.
after England were Belgium, France, and the
➢ application of scientific knowledge for
German state
practical purposes
▪ The IR was a time when the manufacturing of
✓ Branch of knowledge dealing with
goods moved from:
engineering or applied sciences.
✓ small shops and homes to large factories.
▪ Emerging Technology?
▪ This shift brought about changes in culture as
✓ Emerging technology is a term generally used
people moved from rural areas to big cities in order
to describe a new technology
to work.
✓ But it may also refer to the continuing
▪ IR is described as a transition to new
development of existing technology
manufacturing processes. Cont.… .
✓ Commonly refers to technologies that are
▪ Transportation: The Steam Engine, The Railroad,
currently developing, or that are expected to be
The Diesel Engine, The Airplane.
available within the next five to ten years.
▪ Communication: Telegraph, Transatlantic Cable,
▪ In general Emerging Technology refers to the
Phonograph, Telephone.
technological evolution which is a theory of
▪ Industry: Cotton Gin, Sewing Machine, Electric
radical transformation of society through
Lights. The most common Inventions of the IR
technological development.
▪ The four types of industries:
▪ Evolution?
1. Primary industry:
✓ A major, sudden, and hence typically violent
✓ involves getting raw material
alteration in government and in related
✓ e.g. mining, farming, and fishing.
associations and structures. {Social & Political
2. Secondary industry:
Science}
✓ involves manufacturing
✓ A radical and profound change in economic
✓ e.g. making cars and steel.
relationships and technological conditions.
3. Tertiary industries:
{Industrial / Technology Revolution}
✓ provide a service
▪ Design for disruption : What is expected from
✓ e.g. teaching and nursing.
Engineers of today? Cont. . .
4. Quaternary industry:
✓ Artificial Intelligence and Machine Learning
✓ Involves research and development industries ✓
✓ Robotic Processor Automation (RPA)
e.g. IT
✓ Internet of Things (IoT)
Early life style of Human Being
✓ Cloud Computing and Big Data
▪ Hunting, getting a catch fruit and vegetable, and
✓ Enhanced Edge Computing
others
✓ Quantum Computing
▪ Does not settles down at one place
✓ Augmented Reality and Virtual Reality
IR 1.0 (Agriculture Revolution)
✓ Blockchain and Cyber Security
▪ Going from hand production methods to
✓ Angular and React
machines, the increasing use of steam power
✓ DevOps
▪ Transition from a hunting-and-gathering society to
✓ Intelligent Apps (I-Apps) List of Emerging
one based on stationary farming
Technology trends for 2020/21
IR 2.0 (Technological/industry Revolution)
✓ 5G Networks
▪ Development of methods for manufacturing professional development is increasingly being
interchangeable parts recognized.
▪ Adoption of pre-existing technological systems 1.4 Enabling device and networks for Emerging
such as telegraph and railroad networks. Technologies
▪ Vast movement of people and ideas, enhancing ▪ The basic digital devices that enables emerging
communication. technology includes
▪ New technological systems 1.Memory devices – used store random
✓ electrical power information as a spreadsheet or database.
✓ telephones 2.Microprocessors - execute software instructions
✓ seed drill and new fertilizers to perform a wide variety of tasks
IR 3.0 (Digital/information Revolution) ✓ E.g. running a word processing program or video
▪ Shift towards digitization game
▪ The transition from mechanical and analog 3.Logic devices - provide specific functions,
electronic technology to digital electronics including device-to-device interfacing, data
▪ Mass production and use of digital logic communication, signal processing, data display,
circuits timing and control operations etc.
▪ Technologies such as ✓ Logic devices can be classified into two broad
✓ Computer system, hand-phones and the categories - fixed and programmable
Internet ✓ Fixed logic devices – contain fixed circuits and
▪ Digital revolution was driven by three factors: permanent,
✓ information-based occupations, Cheap ▪ Perform one function or set of functions
personal computers , ▪ Once manufactured, they cannot be changed.
The Internet IR 4.0 (knowledge/Smart ✓ Programmable logic devices (PLD) – used to
revolution) build reconfigurable digital circuits
▪ Advancements in various technologies such as ▪ not limited to specific functionality
Artificial Intelligence (AI), robotics, Internet of ▪ must be programmed before used, so that it
Things (IoT), Big data reconfigured by using a specialized program
▪ Additive manufacturing and autonomous ▪ PLDs are standard, off-the-shelf parts
vehicles ✓ Offer customers a wide range of logic capacity,
▪ Cyber-physical system - a mechanism that is features, speed, and voltage characteristics
controlled or monitored by computer-based ✓ Can be changed at any time to perform any
algorithms number of functions.
▪ Simple programmable logic devices (SPLD) :
1.3 Role of data for Emerging Technologies PALs, PLAs, GALs, ROMs
✓ The simplest, smallest and least-expensive forms
▪ Data is regarded as the new oil and strategic of programmable logic devices
asset ✓ Use either fuses or non-volatile memory cells
▪ Data drives or even determines the future of (EPROM, EEPROM, FLASH, and others) to define
science, technology, the economy, and possibly the functionality.
everything in our world today and tomorrow. ▪ Field programmable gate array(FPGA) : integrated
The reshaping and paradigm shifting is driven circuit designed to be configured by a customer or a
not just by data itself but all other aspects that designer after manufacturing – hence the term field
could be created, transformed, and/or adjusted programmable.
by understanding, exploring, and utilizing ✓ hardware description language (HDL)
data. ▪ Complex programmable logic devices (CPLD): a
Emerging technologies – result of data programmable logic device with complexity
intensive scientific discovery between that of PALs and FPGAs
✓ Fourth industrial revolution. ▪ Some uses of the programmable logic devices ✓
The potential of data science and analytics to Allow designers use inexpensive software tools to
enable data-driven theory, economy, and quickly develop, simulate, and test I
✓ Device-to-device interfacing such as Data HCI – is the study of how people interact with
communication, Signal processing, Data display, computers and to what extent could computers
Timing, Control operations interact with human beings successfully.
Computer Networks HCI improves the interaction between users and
✓ 1957 – Russia launched their SPUTNIK simply End User Computing Satisfaction).
Satellite in Space It draw from supporting knowledge on both the
✓ The American started an agency named machine and the human side.
Advance Research Project Agency (ARPA) and The main advantages of HCI are
launched their 1st satellite within 18 month after simplicity,
establishment. ease of deployment & operations and
✓ Then sharing of the information in another cost savings for smaller set-ups,
computer they use ARPANET. reduce solution and design time and
✓ Then in 1969, ARPANET comes in INDIA reduce integration complexity
and INDIAN switched this name to NETWORK. The most common means of interacting with
✓ Development of the network began in 1969, computer includes
based on designs developed during the 1960s. ✓ Graphical User Interface (GUI)
✓ Command Line Interface (CLI)
The ARPANET evolved into the modern HCI consists of three parts:
Your notebook
Prices of items in supermarket
Files in computer
Bar code etc.
Overview…
Data science continues to evolve as one of the
most promising and in demand career paths for
skilled professionals
To be a successful data professional in today’s
market requires to advance past traditional skills of
analyzing large amounts of data by data mining
and programming skills.
2.3 Data Processing Cycle
Data Science Experts/Scientist?
Re-structuring or re-ordering of data by people or
✓ Data scientists are analytical experts who machine to increase their usefulness and add
utilize their skills in both technology and social values for a particular purpose.
The set of operations used to transform data into
science to find trends and manage data.
✓ They use industry knowledge, contextual useful information.
understanding, uncertainty of existing
assumptions to uncover solutions to business
challenges..
Metadata - data about data that provides additional
information about a specific set of data. e.g.
photographs metadata - describe when and where
the photos were taken
databases.
Hadoop ecosystem comprises of the following
components
✓ HDFS: Hadoop Distributed File System
✓ YARN: Yet Another Resource Negotiator
✓ MapReduce: Programming based Data
Processing
✓ Spark: In-Memory data processing
✓ PIG, HIVE: Query-based processing of data
services
✓ HBase: NoSQL Database
✓ Mahout, Spark MLLib: Machine Learning
algorithm libraries
✓ Solar, Lucene: Searching and Indexing
✓ Zookeeper: Managing cluster
✓ Oozie: Job Scheduling
Applications of AI
Application of AI in Agriculture
See & Spray Robot
Types of AI - Based on capabilities
Harvest CROO Robotics
Applications of AR Systems
AR vs VR vs MR AR can be applied to many different disciplines
AR VR MR such as
Overlay Fully digitalDigital Education
digital content Fully immerseoverlay that Medical
on top of the allows Entertainment
real world interactive
Engineering Design
virtual
elements to Manufacturing,
integrate and Maintenance, and Repair
interact with Collaborative AR
the real world Applications of AR: Education
Requires Microsoft It allows flexibility and attractive by extend
specialized Hololens and content into the world outside the classroom
VR headsets, Magic Leap Affordable learning materials : low cost
Interactive lessons: try to model
Higher engagement : activate, improve
attention
Higher retention: use different senses
Boost intellectual curiosity : excited and
innovative
Driving Simulators. a. Games using a virtual table and synthetic objects
Ship Simulators. b. Advertisement in a Football game
Flight Simulators. • More vivid
Tank Simulators • Move exciting
Applications of AR: Medicine • More attractive
Enhancing medicine and healthcare towards Applications of AR Engineering Design
more safety and efficiency 3D prototyping of Engineering Design
• Practice Performing Surgery. Design augmented with a computer-generated
• Perform surgery on a remote patient. image of the current design built from the CAD
• Teach new skills in a safe, and controlled files describing it
environment. Manufacturing, Maintenance, and Repair
Ultrasound, CT (Computed Tomography) and/or The image of the equipment would be
MRI (Magnetic Resonance Imaging) scans augmented with annotations and information
provide the surgeon with the necessary view of pertinent to the repair.
the internal anatomy ✓ Makes much easier than consulting a lot of
AR tools may also aid to detect the signs of repair manuals
depression and other mental illnesses by reading Boing made an experimental system, where the
from facial expressions, voice tones, and technicians are guided by the augmented
physical gestures display that shows the routing of the cables on
a generic frame used for all harnesses
Collaborative AR
AR addresses two major issues with
collaboration:
Describing symptoms: accurate diagnosis • seamless integration with existing tools and
Nursing care: successful finding of the vein practices, and
(Accuvien) • enhancing practice by supporting remote and co
Surgery: Three-dimensional reconstructions of -located activities that would otherwise be
organs (Agumedics) impossible
Diabetes Management : real-time tracking of E.g. Collaborative AR systems using see -through
blood sugar levels displays include both those that use see -through
Navigation: the nearest hospitals handheld displays and see -through head -worn
Applications of AR: Entertainment displays
AR can be used in music, movies, live shows, CHAPTER 6
games ETHICS AND PROFESSIONALISM OF
AR in games: for increasing physical
EMERGING TECHNOLOGIES
activity Outline
AR in music : providing complete
❖Technology and Ethics
information on the track or its performer ❖New Ethical Questions
AR on TV: adding supplementary
❖Digital Privacy
information ❖Accountability and Trust
AR in eSports : online gaming
❖Threats and Challenges
AR in the theater : accessibility (eg. 6.1 Technology and Ethics
Subtitles ) As Technology grows
Allowing the creation of new tools and new
ways for people to interact
It has created new concerns about privacy
It has been vulnerable by spam and viruses
It threatens to cut off people who lack access to
it
So that, Technology can serve to promote or
restrict human rights
Ethics: use of emerging technologies in such a
General Ethical Principles
way as to maximize the benefits that they
Common ethical rules that must be applied in all
provide while minimizing the harms.
technologies
Establishing the proper legal or regulatory
▪ Contribute to society and to human well-being
system is important to reduce the effect of
▪ Avoid harm.
abusing technology rather than sharing
▪ Be honest and trustworthy
technological benefits.
▪ Be fair and take action not to discriminate
Technology and Ethics
▪ Respect the work required to produce new ideas,
A code for professional ethics based on five
inventions, creative works, and computing artifacts
basic principles:
▪ Respect privacy
Integrity:- truthfulness, trust
▪ Honor confidentiality
Objectivity: impartiality, fairness
New Ethical Questions
Competence: capability
Professional Responsibilities
Confidentiality: privacy
Ethical principles related to professional
Professional behavior
responsibility
However, the emergence of new technologies
Strive to achieve high quality in both the processes
raises some new challenges for the profession to
and products
address.
Maintain high standards of professional
New Ethical Question
competence, conduct, and ethical practice
The increasing use of big data, algorithmic
Know and respect existing rules pertaining to
decision-making, and artificial intelligence can
professional work
enable evidence-based and accurate judgments
Accept and provide appropriate professional review
more quickly and efficiently
Give comprehensive and thorough evaluations of
The ethical use of these fairly new technologies
computer systems and their impacts, including
are questioned (build in errors or systemic biases
analysis of possible risk
data)
Perform work only in areas of competence
Role of Human Judgment: humans will still be
Foster public awareness and understanding of
involved in decision making so that people can
computing, related technologies, and their
be held accountable
consequences
▪ explain the reasons behind a decision
Access computing and communication resources
Discrimination: personalization, and the impact
only when authorized
of tailoring decisions very specifically to
Design and implement systems that are robustly and
individuals, based on preferences, activities and
usably secure
other features.
Professional Leadership Principles
A central problem of the ethics of technology is
Ensure that the public good is the central concern
that it tends to arrive too late in technology
Encourage acceptance and evaluate fulfillment of
design and development
your social responsibilities
▪ desirable to have ethical input at the earlier
Manage personnel and resources to enhance the
stages
quality of working life
▪ Ethics has traditionally not been well equipped
Articulate, apply, and support policies and
to deal with issues of future uncertainty
processes that reflect the principles of the Code
Create opportunities for members of the If individuals can't exist digitally without
organization or group to grow as professionals interruption from unwanted information; thus their
Recognize and take special care of systems that individual privacy has been infringed upon.
become integrated into the infrastructure of Digital Privacy Principles
society Data Minimization: collect the minimal amount of
Digital Privacy information necessary from individuals and
Digital Privacy is the protection of businesses
personally/business identifiable information that Transparency: the purpose of the collection and
is collected from respondents through use of identifiable information will be provided in a
information collection activities clear manner , not be used for any other purpose
It has three sub-related categories; information unless authorized or mandated by law
privacy, communication privacy, and individual Accuracy: Information collected will be maintained
privacy in a sufficiently accurate, timely, and complete
Information Privacy manner to ensure that the interests of the individuals
It is the notion that individuals should have the and businesses are protected
freedom to determine their digital information, Security: Adequate physical and IT security
mainly that pertaining to personally identifiable measures will be implemented to ensure that the
information, is collected and used collection, use, and maintenance of identifiable
Every country has various laws that dictate how information are properly safeguarded
information may be collected and used by Accountability and trust
companies/individuals Often legal and regulatory frameworks haven’t kept
Communication Privacy pace with digital transformation, and organizations
It is the notion that individuals should have the are seeking guidance.
right to communicate information digitally in Emerging technologies can provide improved
secure way. accuracy, better quality and cost efficiencies for
Messages and communications will only be businesses in every sector
accessible to the sender's original intended ▪ It can enhance trust in the organization’s
recipient. operations and financial processes, which is crucial
However, Communications possibly intercepted for sustainable success
by various hacking methods. When emerging technology creates far-reaching and
▪ eg. Without reading companies privacy policy, rapid change, it can also bring new risks
lack transparency of company, potential hackers ▪ Use of technology will degrade people’s
Discussion of communication privacy willingness to judge and intervene ➔ less
necessarily requires consideration of personally connected to consumers
✓technological methods of protecting The expected obligation of an individual or
information & communication in digital organization
mediums, ▪ To account for their activities,
✓the effectiveness, & ineffectiveness of such ▪ Accept responsibility, and
methods /systems, and ▪ To disclose the results in a transparent manner
✓the development/advancement of new and Threats & Challenges
current technology Ethical and regulatory challenges
Individual Privacy Security challenge: prominent solution increase
It is the notion that individuals have a right to Cyber & Data Security professionals.
exist freely on the internet, Emerging technologies are making an impact
They can choose what types of information they include
are exposed to, and unwanted information should ➢Counter-terrorism and law enforcement
not interrupt them informatics ➔ predictive and AI
eg receiving unwanted ads and emails/spam, or a ➢Real-time horizon scanning and data mining for
computer virus threats and information sharing
➢Automated cybersecurity and information Driverless car: while a compelling option for
assurance future fleer cars, ➔ bodily injury and property
➢Enhanced Surveillance (sensors, cameras, damage
drones, facial recognition) Wearables: Google glass, Fitbit ➔ privacy
➢Simulation and augmented reality invasion, general liability or personal injury
technologies for training and modeling claims that weren’t foreseen
➢Safety and security equipment Drones: Turbulence is in the offing for
➢Advanced forensics enabled by computing : manufacturers and organizations ➔ property
quantum computing damage and bodily injury
➢Situational awareness capabilities via GPS and Internet of things: The propagation of sensors
crisis responses cenarios and cross-platform integration creates potential
➢Biometrics: assured identity security exposure from privacy invasion, bodily injury
➢Robotic Policing and property damage that may connect an
Ethical & Regulatory Challenges organization to huge liabilities.
Challenges in using Artificial Intelligence 3D printing: Use of trade secrets, patents or
▪ AI is only as good as the data it is exposed to: other protected materials can create intellectual
▪ How a business teaches and develops its AI property liability.
▪ Potential to replace human workers: more Telemedicine: As a projected lack of primary
“intelligent” machines could begin to replace physicians drives increased adoption, an
experts in higher-level jobs unhealthy mix of crossover claims may result
Challenges in using Robotics in from medical consultations, software,
manufacturing hardware, facilities, health insurance, and
▪ Automation and robotics moving from personal data via ISP
production lines out into other areas of work: QUIZ (5%)
greater productivity 1. Why do you need ethics in new emerging
▪ Humans losing jobs ➔ raises ethical and technologies? 2. Describe the 3
cybersecurity concerns categories of digital privacy? 3. List
▪ Automation Technologies advancing digital privacy principles? 4. Mention
▪ greater capability take over more and more the threats and risks of emerging
complex jobs technologies?
▪ Robots teaching each other
▪ Challenges in using the Internet of Things Chapter 7
▪ The amount of data being generated is Other Emerging Technologies
increasing
Contents
▪ plan carefully how this will affect the
Introduction
customerfacing application
Nanotechnology
▪ how to best utilize the masses of data being
Biotechnology
produced.
Blockchain Technology
▪ Severe security implications of mass
Cloud and Quantum Computing
connectivity
Autonomic Computing
Challenges in Big Data
Computer Vision
▪ Data can be incredibly useful for spotting
Embedded System
trends and analyzing impacts,
Cyber Security
▪ Analyzing and understand of daily huge data is
Introduction
challenging task
From time to time, existing technologies are always
▪ AI could play a role here
improved and new technologies are invented.
Threats
Presently, there are lots of new technologies under
Some risks of emerging technology
development including the IoT, AI, AR and Big
Data which are presented in the previous chapters’
of this course
This chapter will cover additional emerging Development of new medicine, genetically
technologies which will have prominent impact modified plants, production of chemicals, paper,
in the world or in human life. textiles, and food
Nanotechnology Applications of Biotechnology
Science, engineering, and technology conducted Medicine – formation of genetically modified
at the nanoscale, which is about 1 to 100 insulin known as humulin
nanometers. Agriculture –Genetically Modified Organisms such
Nanoscience and nanotechnology as Crops, Animals, Plants, Fungi, Bacteria,
– are the study and application of extremely Aquaculture Fisheries – helps in improving the
small things quality and quantity of fishes
– can be used across all the other science fields, Environment –waste treatment and pollution
such as chemistry, biology, physics, materials prevention
science, and engineering Industries –production of chemicals, paper, textiles,
– involve the ability to see and to control and food
individual atoms and molecules. Blockchain Technology
Everything on Earth is made up of atoms A list of ledgers or records (blocks) which store
– the food we eat, the clothes we wear, the data permanently & publicly in a secure,
buildings and houses we live in, and our own chronological, and immutable way.
bodies –Secured using cryptography, not controlled by a
–Atoms are the building blocks for all matter in central authority, access to anyone in the network,
our universe. everyone has copy of the data.
Applications of Nanotechnology –Blocks are made up of digital pieces of
Medicine: customized nanoparticles the size of information and have three parts which store
molecules that can deliver drugs directly to information:
diseased cells in your body • about transactions like date, time, and amount.
Electronic: to reduce their weight and power • about who is participating in transactions.
consumption • that distinguishes them from other blocks
Food: from how food is grown to how it is Blockchain Technology
packaged In order for a block to be added to the blockchain,
Agriculture: from generation to preservation, four things must happen:
handling, bundling, transportation, and even – A transaction must occur.
waste treatment. – That transaction must be verified
Vehicle manufacturers: lighter and stronger – That transaction must be stored in a block
materials will be valuable for making vehicles – That block must be given a hash
that are both quicker and more secure By design, a blockchain is resistant to modification
Applications of the data
Biotechnology The blockchain network has no central authority; it
Technology based on biology is the very definition of a democratized system.
It harnesses cellular and biomolecular processes The first blockchain was conceptualized by a person
to develop technologies and products (or group of people) known as Satoshi Nakamoto in
– help improve our lives and the health of our 2008.
planet. A blockchain carries no transaction cost.
One example of modern biotechnology is genetic simple yet ingenious way of passing information
engineering. from A to B in a fully automated and safe manner.
– the process of transferring individual genes One party to a transaction initiates the process by
between organisms or modifying the genes in an creating a block
organism to remove or add a desired trait or Blockchain Technology (The three
characteristic. Pillars/properties)
1. Decentralization –The information is not stored
by one single entity
2. Transparency –A person’s identity is hidden The next generation of computing using quantum
via complex cryptography and represented only physics.
by their public address. – Quantum computers are big machines, need deep-
3. Immutability –In the context of the freezing
blockchain, means that once something has been Currently, the only organization which provides a
entered into the blockchain, it cannot be quantum computer in the cloud is IBM.
tampered with. –They allow free access to anyone who wishes to
Blockchain technology has become popular use their 5qubit machine
because of the following. Google provided the fastest quantum computer with
53qubits and speed of 200 seconds computation
while the supercomputer took 10000 years.
– Qubit is short for a sequence of quantum bits
(1, 0, or some value between).
Advantages of Quantum Computing
For scientists to crunch very long numbers
Help in the discovery of new drugs, by
unlocking the complex structure of chemical
molecules.
Other uses include
– financial trading
Applications of Blockchain Technology – risk management
The sharing economy – supply chain optimization
Crowd funding Data transferred over the internet with much
Governance safer encryption
Supply chain auditing Autonomic Computing (AC)
File storage Self-managing computing model named after, and
– Banking, Finance, Government, Healthcare, patterned on, the human body's autonomic nervous
Insurance, Media and Entertainment, Retail. system.
applications AC systems would control the functioning of
Cloud Computing computer applications and systems without input
Delivery of on demand computing services from from the user
application to storage and processing power over Its goals is to create systems that run themselves,
the internet on a pay-asyou-go basis. capable of high-level functioning while keeping the
Means of networking remote servers that are system's complexity invisible to the user.
hosted on the Internet. Refers to the self-managing characteristics of
Deployment models distributed resources, adapting to unpredictable
–Public, Private, Community, Hybrid changes while hiding intrinsic complexity to
Types operators and users.
–Software as a service (SaaS), Platform as a Characteristics of Autonomic Computing (AC)
service (PaaS), Infrastructure as a service (IaaS) Self-Awareness:“knows itself”.
Advantages of Cloud Computing Self-Configuring: configure and reconfigure itself
Cost saving Self Optimizing: detect suboptimal behaviors and
High Speed and accessibility optimize itself to improve its execution.
Back-up and restore data Self-Healing: detect and recover from potential
Automatic Software Integration problems and continue to function smoothly.
Reliability Self-Protecting: detecting and protecting its
Mobility resources from attacks.
Unlimited storage capacity Context-Aware: aware of its execution environment
Quantum Computing and be able to react to changes in the environment.
Open: must function in a heterogeneous world
Anticipatory: manage itself proactively Modern ESs are often based on microcontrollers,
Computer Vision but ordinary microprocessors are also common,
It is an interdisciplinary scientific field that deals especially in more complex systems.
with how computers can be made to gain a high A common standard class of dedicated processors is
level understanding of digital images or videos. the digital signal processor (DSP).
From the perspective of engineering, it seeks to Advantages & Disadvantages of Embedded
automate tasks that the human visual system can Systems
do. Advantages
Computer vision tasks include methods for –Easily Customizable
acquiring, processing, analyzing and –Low power consumption
understanding digital images, and extraction of –Low cost
highdimensional data from the real world in –Enhanced performance
order to produce numerical or symbolic Disadvantages
information. –High development effort
Computer vision is building algorithms that can –Larger time to market
understand the content of images and use it for Basic Structure EmbeddedSystems
other applications➔ application perspective
How does Computer Vision work?
Acquiring an image➔ Processing the image➔
Understanding the image
There are many types of computer vision that are
used in different ways:
– Image segmentation
– Object detection
– Facial recognition
– Edge detection
– Pattern detection . Cyber Security
– Image classification groups images into Protection of computer systems from the theft of or
different categories. damage to their hardware, software, or electronic
– Feature matching data, as well as from the disruption or misdirection
Applications of Computer Vision of the services they provide.
– Optical character recognition (OCR) Cyber crime an unlawful activity in which computer
–Machine inspection or computing devices are used as a tool or/and
–Retail target of criminal activity
–Medical imaging –committed by the people of destructive and
–Automotive safety criminal mindset either for
– Surveillance • Revenge
– Fingerprint recognition and biometrics • greed or adventure
Embedded Systems (ESs) Measures of Cyber Security
It is a controller with a dedicated function within • Staff awareness training
a larger mechanical or electrical system, often • Application security
with real-time computing constraints. • Network security
It is embedded as part of a complete device often • Leadership commitment
including hardware and mechanical parts. • Password management
Embedded systems control many devices in Types of Threat in Cyber Security
common use today. Ransomware: designed to extort money by
89% of all microprocessors manufactured are blocking access to files or the computer system
used in ESs. until the ransom is paid.
Malware:- designed to gain unauthorized
access or to cause damage in to a computer
Social engineering: a tactic that adversaries
use to trick you into revealing sensitive
information.
– it is the practice of sending fraudulent emails
that resemble emails from reputable sources.
– The aim is to steal sensitive data like credit
card numbers and login information.
– It’s the most common type of cyber-attacks
Benefits & Vendors of Cyber Security
Business protection against malware,
ransomware, phishing, and social engineering.
Protection for data and networks. • Prevention of
unauthorized users.
Improves recovery time after a breach.
Protection for end-users.
Improved confidence in the product for both
developers and customers.
– Vendors use endpoint, network and advanced
threat protection security as well as data loss
prevention
–Known venders ➔ Cisco, McAfee, andTrend
Micro
Additive Manufacturing (3D Printing)
The construction of a three-dimensional object
from a CAD model or a digital 3D model.
Additive manufacturing (AM) describes types of
advanced manufacturing that are used to
–Create three-dimensional structures out of
plastics, metals, polymers and other materials
that can be sprayed through a nozzle or
aggregated in a vat.
These constructs are added layer by layer in real
time based on digital design.
The simplicity and low cost of AM machines,
combined with the scope of their potential
creations,
–could profoundly alter global and local
economies and affect international security.
What is the difference between additive
manufacturing and 3D printing?
3D printing refers to smaller-scale, at-home
printing operations, while additive
manufacturing has been used to refer to large-
scale or industrial manufacturing. This means
context is important when you're differentiating
between the two terms.