0% found this document useful (0 votes)
24 views

Magzin PDF

Uploaded by

ssdco226008
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

Magzin PDF

Uploaded by

ssdco226008
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

Government Polytechnic, Aurangabad

(An Autonomous Institute of Govt. of Maharashtra-Estd. In 1955)

B
Government Polytechnic, Osmanpura, Aurangabad – 431005, Maharashtra State, India

its &
ytes

Computer Engineering
Department presents

TECHNICAL
MAGAZINE

2022 - 2023
Presented by
VOLUME 1 - ISSUE 2
Computer Department
Computer Department

Vision
A center of excellence in the domain of Computer Science & Engineering to
cultivate "digital artifacts" for society.

Mission
To impart education in computer hardware and software required for industry
and business.
Developing skills resembling problem solving, interpersonal skill, high order
thinking skill and logical reasoning for entrepreneurship and employment.
Developing values and ethics for lifelong learning in the system environment.

Editorial Team
Smt. Shwetal S. Jaiswal Shri. Gajanan U. Jadhav
(HOD) (Lecturer)
Computer Department Computer Department

Vedanti Vitthal Yerawar Dakshayani Jagdish Vaishnav


(Editor-in-Chief) (Editor-in-Chief)

Sneha Abhijeet Bhalerao Siddhi Rajendra Khandarkar


(Editor) (Editor)
ZIGBEE TECHNOLOGY
A B S T R A C T

In this present communication world,


there are numerous high data rate
communication standards that are
available, but none of these meet the
sensors’ and control devices’
communication standards. These
highdata-rate communication standards
require low-latency and low-energy
consumption even at lower bandwidths.
The available proprietary wireless systems’
Zigbee technology is low-cost and low-
power consumption and its excellent and
superb characteristics make this Zigbee is a low-cost and low-powered
communication best suited for several mesh network widely deployed for controlling
embedded applications, industrial control, and monitoring applications where it covers
and home automation, and so on. 10-100 meters within the range. This
communication system is less expensive and
INTRODUCTION simpler than the other proprietary short-range
wireless sensor networks as Bluetooth and Wi-
Zigbee communication is specially built Fi. Zigbee supports different network
for control and sensor networks on IEEE configurations for the master to master or
802.15.4 standard for wireless personal master to slave communications. And also, it
area networks (WPANs), and it is the can be operated in different modes as a result
product from Zigbee alliance. This the battery power is conserved. Zigbee
communication standard defines physical networks are extendable with the use of
and Media Access Control (MAC) layers to routers and allow many nodes to interconnect
handle many devices at low-data rates. with each other for building a wider area
These Zigbee’s WPANs operate at 868 network. ZigBee Network supports many types
MHz, 902-928MHz, and 2.4 GHz of topologies, the popular one being – star and
frequencies. The data rate of 250 kbps is peer to peer topologies. Each network
best suited for periodic as well as topology consists of three types of nodes –
intermediate two-way transmission of data ZigBee Coordinator, ZigBee Router and
between sensors and Controllers. ZigBee is ZigBee End Device. The Coordinator performs
an open, global, packet-based protocol the task of allocating unique address to each
designed to provide an easy-to-use device in the network, initiates and transfers
architecture for secure, reliable, low power messages in the network and selects a unique
wireless networks. Flow or process control identifier for the network. ZigBee devices are
equipment can be place anywhere and still of two types –Full Function Device (FFD) and
communicate with the rest of the system. Reduced Function Device (RFD)
HISTORY OF ZIGBEE
TECHNOLOGY

In the year 1990, the digital radio


networks with self-organizing ad hoc were
implemented. The Zigbee specification like
IEEE 802.15.4-2003 was approved in the
year 2004, on December 14. The
Specification 1.0 was announced by Zigbee
Alliance in the year 2005, on June 13, called
the Specification of ZigBee 2004.

CLUSTER LIBRARY
In the year 2006, September, the
Specification of Zigbee 2006 was
announced by replacing the 2004 stack. So
this specification mainly replaces the pair
structure of key-value as well as message
utilized within the 2004 stack through a
cluster library. A library includes a set of
consistent commands, planned beneath
groups called clusters with names like A P P L I C A T I O N S
Home Automation, Smart Energy & Light O F Z I G B E E T E C H
Link of ZigBee. In the year 2017, the library N O L O G Y
was renamed with Dotdot by Zigbee Industrial Automation: In manufacturing
Alliance and announced as a new protocol. and production industries, a communication link
So, this Dotdot has worked for continually monitors various parameters and
approximately all Zigbee devices as the critical equipment. Hence Zigbee considerably
default application layer. reduces this communication cost as well as
optimizes the control process for greater
ZIGBEE PRO reliability. Home Automation: Zigbee is perfectly
In the year 2007, Zigbee Pro like suited for controlling home appliances remotely
Zigbee 2007 was finalized. It is one kind of as a lighting system control, appliance control,
device which operates on a legacy Zigbee heating, and cooling system control, safety
network. Because of the disparities within equipment operations and control, surveillance,
the options of routing, these devices should and so on. Smart Metering: Zigbee remote
turn into non-routing ZEDs or Zigbee end operations in smart metering include energy
devices (ZEDs) on a legacy Zigbee network. consumption response, pricing support, security
The legacy Zigbee devices have to turn into over power theft, etc. Smart Grid monitoring:
Zigbee end devices on a network of Zigbee Zigbee operations in this smart grid involve
Pro. It functions through the 2.4 GHz ISM remote temperature monitoring, fault locating,
band as well as includes a sub-GHz band. reactive power management, and so on. It can
Zigbee supports several network topologies; also be moved, since the network doesn’t care
however, the most commonly used about the physical location of a sensor, pump
configurations are star, mesh, and cluster or valve. In Zigbee, the data transfer speed is
tree topologies. It is very less as compared less as compared with WiFi, so it’s the highest
with the less speed of WiFi. speed is simply 250kbps.
This is all about a brief description
of Zigbee technology’s architecture,
operations modes, configurations, and
applications. We hope that we have given
you enough content on this title, for you to
understand it better. Thus, this is all about
an overview of Zigbee technology and it is
based on IEEE 802.15.4 network. The
designing of this technology can be done
extremely strong so it operates in all kinds
of environments. It provides flexibility as
well as security for different environments.
Zigbee technology has gained so much
popularity in the market because it provides
consistent mesh networking by enabling a
network to control over an extensive region,
and also it provides low-power C O N C L U S I O N
communications. So this is a perfect IoT ZigBee is a wireless technology which
technology. Zigbee system structure uses a mesh network to interconnect various
consists of three different types of devices devices. The main feature of ZigBee which led
as Zigbee Coordinator, Router, and End to its development is its design for low power
device. Every Zigbee network must consist and short distance devices. The architecture of
of at least one coordinator which acts as a ZigBee includes network layer, application layer,
root and bridge of the network. The application sub-layer, media access control, and
coordinator is responsible for handling and physical layer and the service access entry
storing the information while performing point interconnects these layers. ZigBee
receiving and transmitting data operations. communication includes three main devices
which are ZigBee Coordinator, ZigBee Router
and ZigBee End Device. One of the many
advantages of ZigBee is its strong
authentication and security services which
makes it the preferred wireless technology. It is
widely used in Home Automation and IoT
devices.

Author:
1. Purti Dinesh Patil
2. Dhanshree Laxmikant Borde
3. Revati Sunil Upadhye
4. Mansi Santosh Khandre
CYBER SECURITY
I N T R O D U C T I O N

Cyber security is the practice of protecting


systems, networks, and programs from digital
attacks. These cyber attacks are usually
aimed at accessing, changing, or destroying
sensitive information; extorting money from
users; or interrupting normal business
processes. Implementing effective cyber
security measures is particularly challenging
today because there are more devices than
people, and attackers are becoming more
innovative.

Cybersecurity is the practice of protecting


critical systems and sensitive information
from digital attacks. Also known as
information technology (IT) security,
I M P A C T
cybersecurity measures are designed to
combat threats against networked All the cyber security principles are grouped
systems and applications, whether those under governing, detecting, protecting, and
threats originate from inside or outside of responding to activity, and these principles
an organization. are:
Cyber security is the practice of 1.It secure configuration
protecting systems, networks, and 2.Provide network security
programs from digital attacks. 3.Manage user privileges
Cyber attacks are usually aimed at 4.User education and awareness
accessing, changing, or destroying
sensitive information; extorting money
from users; or interrupting normal A security breach is any incident that
business processes. results in unauthorized access to computer
Implementing effective cyber security data, applications, networks or devices
measures is particularly challenging today It results in information being accessed
because there are more devices than without authorization. Typically, it occurs
people, and attackers are becoming more when an intruder is able to bypass security
innovative. mechanisms. Technically, there's a
distinction between a security breach and a
data breach
A P P L I C A T I O N S

Protects against malware,


ransomware, phishing, and social
engineering in business.
Cybersecurity protects the data and
networks.
Digital assets are protected by
preventing unauthorized users from
accessing them.
Cyber Security provides protection
for end-users and their personal
information.
The recovery time after a breach is
improved. L E V E L S O F S E C U R I T Y
Cyber Security provides protection
for end-users and their personal Network security is the practice of securing a
information. computer network from intruders, whether
Confidence is improved in the targeted attackers or opportunistic malware.
organization because of
cybersecurity. Application security focuses on keeping
Web Firewall software and devices free of threats. A
compromised application could provide
What are the career opportunities access to the data its designed to protect.
in cybersecurity?
· Information security protects the integrity and
IT professionals and other computer privacy of data, both in storage and in transit
specialists are needed in security roles, .
such as: Operational security includes the processes
Chief information security officer (CISO) and decisions for handling and protecting
Chief security office (CSO) data assets. The permissions users have
Security engineers when accessing a network and the
Security architects procedures that determine how and where
data may be stored or shared all fall under
this umbrella.
D I S A D V A N T A G E S
Difficult To Set Up : A cyber security
system is difficult to set up for an average
user. It requires professional technical
knowledge and a professional to
implement them and make them work.
Thus, random installation of cyber security
by regular people is not possible which
makes it harder for the system to reach the
masses.
Constant Need To Update The
Security : Technology advances every
minute and so does the security
system. The user has to keep in mind
to update his security system regularly
to keep his device safe. Any missed
update can put the whole system at a
huge risk and compromise it.
Expense Of Setting Up The Whole
System : Cyber security systems
might be convenient to set up for the
big farms, companies, and
organizations, but not for individuals
who might possess sensitive data that
needs to be protected. The hindrance
is the huge expense that is associated
with it.
Security Patches May Back-Fire :
When your content management C O N C L U S I O N
system releases a new security update There are no magic solutions or even
or patch, hackers can compare the
combinations of solutions (cybersecurity
patched and unpatched files to know
applications) that will "fix the issue"
the weaknesses that are mended in
permanently since none of these variables is
the patched file. Then they can attack
anticipated to alter shortly.
the files that are unpatched. Hence,
the security patches may backfire on
the very system it was meant to
Innovation creates new IT applications.
secure. However, it also creates new opportunities
Incorrectly Configured System for criminals, terrorists, and other
Blocks Firewall : If the firewall is adversaries to operate. As a result,
configured incorrectly, it blocks certain improving a system's cybersecurity posture
services and actions of the user. This must be seen as a continuous effort rather
stays until the firewall is configured than something that can be completed once
correctly, which requires the and then ignored.
intervention of a professional, thus
making it hard to work with a person Author:
who is not familiar with the technology. 1.Vishal Berad
Makes The System Slower :Better 2.Sushil Bharudkar
security is synonymous with a greater
3.Krishna Choundiye
number of passwords and more and
more checking of the files by the
security system, all of which takes time
and thus slows down both the system
and the productivity of the person
working.
LIGHT FIDELITY (LI-FI)
TECHNOLOGY
A B S T R A C T
H I S T O R Y A N D F U T U R E
During this Pandemic time a day O F L I - F I
without Internet is unimaginable. At present
the most widely used non-cellular wireless The technology underpinning Li-Fi was
technology is Wi-Fi (Wireless Fidelity). It is pioneered by German Physicist Harald Hass,
based on radio wireless local area currently based at university of Edinburgh in
networking of devices based on IEEE UK. Haas coined the term Li-Fi(Light Fidelity) in
802.11 standards operating at the frequency 2011 in the context of a talk presenting the new
range of 2.4GHz (12cm) UHF (Ultra High technology at the TED (Technology
Frequency) and 5.8GHz (5cm) SHF (Super Entertainment and Design) Global conference.
High Frequency) is probably the most
popular used non-cellular wireless
technology. Now imagine a world where
each LED Light in and around Hospitals can
connect us to high speed wireless internet
with a simple flickering of light which is Li-Fi
or Light Fidelity which is a new way of
sending data wireless.

INTRODUCTION

"Li-Fi stands for Light Fidelity or Wireless


Optical Communication or Visual Light
Communication, first coined by German Scientist The Li-Fi technology can be used for
Professor Harald Haas on july2011". Li-Fi is a
various purposes, it matters the data
wireless optical networking technology that uses
light between 400 and 800 terahertz(THz)from Light
transmission through LEDs thus all the screens
Emitting Diodes(LEDs) rather than Radio which illuminate light can be served as a platform
frequencies to transmit data.. for data communication. The screen of the
mobile phone, television, bulbs can act as a
Upto100Gbps or higher can even be transmitted source of light. On the other hand, the receiving
via Li-Fi, but this involves a transition in lighting platform, the photo detector can be replaced by a
technologies. Recent tests have proven Li-Fi to be
camera in mobile phone for scanning and
100 times faster than Wi- Fi.
retrieving data. Its other applications are Li-fi for
As the speed of light is very high so the desktops, smartcard Li-fi, Li-fi for schools,
data transmission speed via the light is also hospitals, Li-fi in cities, smart guides, museums,
high. Transfer of data from one place to hotels, fairgrounds, events indoor and
another is one of the most important day -to- LBS(Location-based Services), access control
day activities and identification crisis, malls, airport and
dangerous environments like thermal power
plants.
WORKING PRINCIPAL OF Utilization: Li-Fi can be used in places
L I-F I where Wi-Fi cannot be used or barred such
as under water, aircraft cabins and nuclear
The Li-Fi operating theory is very simple: If power plant.
the LED is ON, a digital signal 1 is
transmitted, if its OFF, a digital signal 0 is APPLICATION OFLI-FI
transmitted. A light emitter (LED) is present Smart homes
on the transmitter side and a photo detector LI-FI in schools
(light sensor) is present on the receiver side.It Enterprise Wireless solution
is this photo detector that records binary 1 LI-FI in hospital
and 0 by clicking ON and OFF Lights.With this LI-FI in pharmacies and the
technology, each and every LED light source pharmaceutical industry
will serve as a hub for data transmission LI-FI and industries
LI-FI at navy
Road Safety and Traffic Management

CONCLUSION

Li-Fi is an emerging technology and it


has vast application. On implementing this
B E N E F I T S O F L I - F I
technology it is possible to use every bulb as
a hotspot to transmit wireless data. In this
Efficiency: Due to the existence of LED bulbs
data can be transmitted via through light.
that are always available everywhere, Li-Fi Instead of using this hazardous radio waves,
holds the potential to be more energy efficient we can co- ordinate using light. This
and cheaper technique will help to create the cleaner,
safer, greener and a resplendent future.. Li-Fi
Speed and Bandwidth: Li-Fi has the capacity is the future technology of data transmission.
to deliver multiple Gbps speeds in mobile Since it is easy to generate light waves, it is
devices. As the light spectrum is about 10,000 very advantageous and easily implementable
times wider than the spectrum covered by in various fields. Hence the future application
radio waves, light waves have the potential to can be extended to the various fields like
hold more information . Traffic

Security: In case of Li-Fi, invisible artefacts


block illumination, making Li-Fi safer than any AUTHOR
other technology. 1.Aditi Sudhakar Patil
2.Harshada Arjun Sawai
AUGMENTED REALITY
INTRODUCTION

Augmented reality or AR is a
technology that allows a live view of the real-
world elements that are being augmented by
the computer or a piece of software. Many
consider augmented reality to be a part of a
wider general concept called computer-
mediated reality in which the live view is
modified using different technologies of
pieces of software. Unlike virtual reality or
VR, augmented reality enhances the
perception of reality. Virtual reality, on the
other hand, creates a completely new reality.
Even though augmented reality has been
present as a concept for quite a lot, only AR has caused a lot of people to open
recently it has gained a lot of attention with their minds to new things and who wouldn’t
the introduction of Pokemon Go app that when while wearing Google Glasses for
took the world by storm. Currently, example and upon meeting a friend, you will
companies all over the world are using AR to have all information about that person including
do things that previously demanded a lot of phone number, e-mail, profiles on social
work hours and a lot of devotion. For networks available to you in a blink of an eye
example, the car industry is currently using without having to look on your phone or other
AR in order to design new cars and AR has devices.
made that process much easier and much Augmented reality is largely synonymous
faster than before. with mixed reality. There is also overlap in
In the past, companies like Google have terminology with extended reality and
attempted to introduce this technology to the computer-mediated reality.
market with the Google Glass but that was The primary value of augmented reality is the
not a successful attempt. It seems that all the manner in which components of the digital
major technology companies are ready to world blend into a person's perception of the
give a second chance as Google and Apple real world, not as a simple display of data, but
have announced the return of augmented through the integration of immersive
reality. sensations, which are perceived as natural
Both, augmented and virtual reality have first parts of an environment. With the help of
come with the entertainment purpose but advanced AR technologies (e.g. adding
since then, AR and VR have spread their use computer vision, incorporating AR cameras into
on many different fields. Many believe that smartphone applications, and object
augmented reality will become a shortcut recognition) the information about the
between the human brain and other surrounding real world of the user becomes
technologies. interactive and digitally manipulated.
ASURVEY OF THE
RESEARCH & PROGRESS IN A
UGMENTED
REALITY
TECH NOLOGY

re In rcent years, there has been a strong


atmosphere in the research of augmented
reality technology at home and abroad. The
number of relevant seminars is increasing.
presenting new ideas or reports. With both AR
and VR, the information about the real world At present, academic institutions engaged
become interactive as well as manipulative as in augmented reality technology research
a person will have access to those pieces of include the University of North Carolina,
information all the time. Massachusetts Institute of Technology,
The development of AR and VR has caused a Columbia University, Boeing company and
revolution in the way we perceive the world. SONY computer science laboratory. Foreign
Now, it is not only enough to be aware of the universities and research institutions that focus
reality that surrounds you but a person must on AR technology generally focus on the
have access to all kinds of information in a algorithms, human-computer interaction
blink of an eye. Because of that, AR, as well methods, software and hardware infrastructure
as VR, have found their use in the everyday platforms in the core of technology. Among
life. Having all information available to you by them, the well-known Human Interface
only wearing high-tech glasses and being able Technology Lab of the University of Washington
to activate and command it using only voice is in Seattle, USA, supports the research
something that we have seen only in science- ARToolKit open source project is the industry's
fiction movies. However, with the development first mature AR engine based on rectangular
of AR and VR, that science-fiction became identification mark for 3D space registration [2].
reality very quickly. First attempt to bring There are few universities and research
these technologies to wider population might institutions involved in AR technology in China,
have failed but it is just matter of time when A
VR and especially AR will become a part of
everyday life. Pokemon GO has done a great KEY TECHNOLOGIES OF
thing in bringing this technology closer to AUGMENTED REALITY
common people and with different studies INTELLIGENT DISPLAY
indicating how these technologies can benefit T ECHNOLOGY
different fields, it is expected that augmented
and virtual reality will become a part of the
3D registration technology and
everyday life in a very short period of time.
intelligent interaction technology constitute the
Academic journals and international
core technology circle of AR and play an
conferences provide researchers with a full
important role in the development of AR.
space for communication. Its research focus
from simple system framework, hardware
tracking technology, to the current interactive
performance evaluation.
1. Intelligent display technology 2. 3D registration technology

According to relevant data, more than As one of the most critical technologies in
65% of the information acquired by human the augmented reality system, 3d registration
beings comes from their own vision, which has technology enables virtual images to be
become the most intuitive way for human superimposed accurately in the real environment.
beings to interact with the real environment. The main flow of 3d registration technology has
With the development of intelligent display two steps. First, determine the relationship
technology, augmented reality becomes a between the virtual image, the model and the
possibility, which is pushed to a new height by direction and position information of the camera
the various kinds of display devices generated or display device. Second, the virtual rendered
based on intelligent display technology. image and model are accurately projected into
Specifically, there are three main categories of the real environment, so the virtual image and
display devices that occupy an important IOP Conf. Series: Journal of Physics: Conf.
position in the field of AR technology today. Series 1237 (2019) 022082 IOP Publishing
First, helmet display (HMD) was born in 1968. doi:10.1088/17426596/1237/2/022082 3 model
The optical perspective helmet display can be merged with the real environment. There
developed by professor Ivan Sutherland are various ways of 3d registration, such as the
makes it possible to superimpose simple registration technology based on hardware
graphics constructed by computers on real tracker, the 3d registration technology based on
scenes in real time. In the later development, computer vision, the 3d registration technology
optical perspective helmet-mounted display based on wireless network and the mixed
and video perspective helmet-mounted display registration technology, among which the former
constitute the backbone of helmet-mounted two are the most popular.
display. Second, handheld device display,
relying on the augmented reality technology of C O N C L U S I O N
handheld display, handheld device display is
Virtual reality and Augmented reality
very light, small, especially the popularity of
are inverse reflections of one in another,
smart phones, through video perspective to
regarding what each technology wants to
the use of augmented reality technology to
accomplish. Augmented reality overlays virtual
present. Third, other display devices, such as
elements in the real world, while virtual reality
PC desktop displays, match the real-world
digitally recreates a real-life setting.
scene information captured by the camera to a
Both Virtual Reality and Augmented Reality are
three-dimensional virtual model generated by
going to become mainstream soon. Things are
the computer and are ultimately displayed by
already changing, and before we know it, we
the desktop display.
are going to be living in a world more virtual,
than real.

Author

1. Shraddha Vikas Sabde


2. Shreya Bhanudas Kakad
3. Shreya Yogesh Kulkarni
4. Vaishnavi Santosh Joshi
ABILITIES OF LARGE AI
MODELS

A B S T R A C T :

What movie do these emojis describe?

That prompt was one of 204 tasks


chosen last year to test the ability of
various large language models (LLMs) —
the computational engines behind AI
chatbots such as ChatGPT. The simplest
LLMs produced surreal responses. “The
movie is a movie about a man who is a
man who is a man,” one began. Medium-
complexity models came closer, guessing
The Emoji Movie. But the most complex
model nailed it in one guess: Finding
Nemo.
“Despite trying to expect surprises, I’m “That language models can do these sort
surprised at the things these models can of things was never discussed in any literature
do,” said Ethan Dyer, a computer scientist that I’m aware of,” said Rishi Bommasani, a
at Google. Computer scientists anticipated computer scientist at Stanford University. Last
that scaling up would boost performance year, he helped compile a list of dozens of
on known tasks, but they didn’t expect the emergent behaviors, including several
models to suddenly handle so many new, identified in Dyer’s project. That list continues
unpredictable ones. to grow. Now, researchers are racing not only
Recent investigations like the one Dyer to identify additional emergent abilities but also
worked on have revealed that LLMs can to figure out why and how they occur at all —
produce hundreds of “emergent” abilities in essence, to try to predict unpredictability.
— tasks that big models can complete that Understanding emergence could reveal
smaller models can’t, many of which seem answers to deep questions around AI and
to have little to do with analyzing text. machine learning in general, like whether
They range from multiplication to complex models are truly doing something new
generating executable computer code to, or just getting really good at statistics.
apparently, decoding movies based on “We don’t know how to tell in which sort of
emojis. New analyses suggest that for application is the capability of harm going to
some tasks and some models, there’s a arise, either smoothly or unpredictably,” said
threshold of complexity beyond which the Deep Ganguli, a computer scientist at the AI
functionality of the model skyrockets. startup Anthropic.
T H E E M E R G E N C E O F
E M E R G E N C E

Biologists, physicists, ecologists and


other scientists use the term “emergent” to
describe self-organizing, collective
behaviors that appear when a large
collection of things acts as one.
Combinations of lifeless atoms give rise to
living cells; water molecules create waves;
murmurations of starlings swoop through
the sky in changing but identifiable
patterns; cells make muscles move and
hearts beat.
Critically, emergent abilities show up
in systems that involve lots of individual
parts. But researchers have only recently These essentially take a string of text and
been able to document these abilities in predict what the next word will be. What makes
LLMs as those models have grown to a model “recurrent” is that it learns from its own
enormous sizes. output: Its predictions feed back into the
Language models have been around network to improve future performance.
for decades. Until about five years ago, In 2017, researchers at Google Brain
the most powerful were based on what’s introduced a new kind of architecture called a
called a recurrent neural network. transformer. While a recurrent network
As with the movie emoji task, analyzes a sentence word by word, the
researchers had no reason to think that a transformer processes all the words at the
language model built to predict text would same time.
convincingly imitate a computer terminal. Transformers enabled a rapid scaling up of
the complexity of language models by
increasing the number of parameters in the
model, as well as other factors. The
parameters can be thought of as connections
between words, and models improve by
adjusting these connections as they churn
through text during training. As expected, a
2020 analysis by OpenAI researchers found
that models improve in accuracy and ability as
they scale up , which describes an LLM’s
ability to solve problems it has never — or
rarely — seen before. This has been a long-
time goal in artificial intelligence research,
Ganguli said.
B E Y O N D I M I T A T I O N

In 2020, Dyer and others at Google


Research predicted that LLMs would have
transformative effects — but what those
effects would be remained an open
question. So they asked the research
community to provide examples of difficult
and diverse tasks to chart the outer limits
of what an LLM could do. This effort was
called the Beyond the Imitation Game
Benchmark (BIG-bench) project, riffing on
the name of Alan Turing’s “imitation
game,” a test for whether a computer
could respond to questions in a
convincingly human way. (This would later
become known as the Turing test.)
The group was especially interested in
examples where LLMs suddenly attained C O N C L U S I O N
new abilities that had been completely Emegence reveals both surprising potential
absent before. and unpredictable risk. Applications of these
large LLMs are already proliferating, so a
better understanding of that interplay will help
harness the diversity of abilities of language
models.

Author:
1. Sneha Narendra Alwane
2. Dhanshree Ramesh Shelke
C H A T G P T
A B O U T C H A T G P T
ChatGPT, developed by OpenAI, is a
powerful language model that enables
conversational interactions with human-like
text responses. It is built upon the GPT-3.5
architecture, which is a state-of-the-art deep
learning model trained on vast amounts of
diverse data to umder manner . One of the
key capabilities of ChatGPT is its contextual
understanding, allowing it to generate
responses that are relevant to the given
conversation. It can interpret and respond to
user inputs, follow the conversation flow, and
provide coherent and meaningful responses.
This makes ChatGPT well-suited for various
conversational applications, such as
customer support, virtual assistants, and
chatbots, where it can engage in dynamic F U T U R E O F C H A T G P T
interactions with us. It can generate
responses in different voices, personalities, The future of ChatGPT is promising, as it
and languages, making it a versatile tool for continues to evolve and advance in the field of
creating engaging and interactive conversational AI. Here are some potential
conversational experiences. This adaptability directions for the future of ChatGPT:
allows ChatGPT to be customized. 1.Improved Contextual Understanding:
ChatGPT can further enhance its contextual
Despite its advanced capabilities, understanding capabilities, allowing it to better
ethical considerations are crucial when using comprehend the nuances of conversations, infer
ChatGPT. Bias in generated content is one user intents accurately, and generate more
concern, as the model can inadvertently contextually relevant responses.
reflect existing biases present in the data it 2.Customization and Personalization:
was trained on. Privacy is another concern, ChatGPT can be further customized and
as conversations may contain sensitive personalized to suit specific domains,
information. OpenAI has implemented industries, or user preferences. This can
prompt engineering techniques, robustness involve training ChatGPT on domain-specific
testing, and responsible AI practices to mitihe data to make it more specialized in certain
notable features of ChatGPT is its ability to areas, or allowing users to personalize . so this
engage in conversations in a dynamic and can be the personalisation and utilization.
interactive manner. OpenAI has made efforts
to address ethical considerations with
ChatGPT.
C H A T G P T W O R K I N G

ChatGPT works by leveraging its


deep learning architecture and extensive
training data to process and generate text-
based responses in a conversational
manner. Here's an overview of how
ChatGPT typically works:
1. input Prompt: ChatGPT receives a
text-based input prompt from a user, which
serves as the starting point for the
conversation. The prompt can be a
question, statement, or any other text-
based input that provides context for the
conversation.
2.Contextual Understanding:
ChatGPT uses its transformer-based C H A T G P T I N P O P U L A R
architecture to analyze the input prompt and C U L T U R E
understand the context of the conversation. ChatGPT, as a cutting-edge conversational
This involves interpreting the meaning of AI technology, has garnered significant attention
the prompt, identifying relevant keywords, and has been featured in various popular culture
and considering the context of previous mediums. Here are some examples.
messages in the conversation, if any. 1. Media Appearances: ChatGPT has
3.Response Generation: Based on the been featured in popular media outlets, such as
contextual understanding, ChatGPT Forbes, Wired, and The Verge, among others.
generates a text-based response that is Articles, news segments, and interviews
coherent and contextually relevant to the discussing the capabilities, potential impact, and
input prompt. The response can be in the implications of ChatGPT have been widely
form of an answer, recommendation, or any covered in popular culture
other relevant information. 2. Social Media: ChatGPT has gained
popularity on social media platforms, with users
sharing their experiences, interactions, and even
humorous or creative exchanges with ChatGPT.
Users often showcase the responses generated
by ChatGPT, creating memes, jokes, and other
creative content related to the technology.
One example of GPT being referenced in
popular culture is in the 2019 film "Ad Astra". In
the movie, the main character uses an AI
language model called the "GPT-19" to
communicate with his father who is lost in space.
While the name is slightly different, it's clear that
this is a reference to the GPT-2 language model
developed by OpenAI. This demonstrates how
GPT and other language models are starting to
become more well-known and integrated into
popular culture
C H A T G P T I M P O R T A N C E
ChatGPT holds significant importance
in several key are the include,Enhanced User
Experience: ChatGPT can provide a more
interactive, personalized, and user-friendly
experience in various applications, such as
customer support, virtual assistants, and
interactive storytelling. It can understand and
respond to user inquiries and provide relevant
information, recommendations, and solutions,
leading to improved user satisfaction and
engagement.
1.utomation and Efficiency: ChatGPT
can automate routine tasks and streamline
processes in industries such as customer
service, e-commerce, and content creation. It
can handle repetitive tasks, answer frequently C O N C L U S I O N
asked questions, and generate content,
freeing up human resources to focus on more ChatGPT is a cutting-edge conversational
complex and creative tasks. AI technology that has the potential to
2.Access to Information: ChatGPT can revolutionize various aspects of our society. Its
provide access to information and knowledge advanced capabilities in understanding and
in real-time, helping users find answers to generating human-like responses have
their questions, learn new things, and stay opened up new opportunities in customer
informed. This can be particularly valuable in service, virtual assistance, content creation,
educational, research, and information- education, and many other fields. ChatGPT
seeking contexts, where ChatGPT can assist has gained popularity in popular culture
users in obtaining accurate and relevant through media coverage, social media
information. interactions, entertainment applications,
3.One important aspect of ChatGPT is influencer collaborations, and futuristic
its ability to process natural language and depictions, showcasing its impact and
generate human-like responses, which makes potential.
it a valuable tool for improving customer ChatGPT is a powerful language model
experience, increasing efficiency in that utilizes the GPT-3.5 architecture to
communication, and facilitating seamless understand and respond to human language in
interactions between humans and machines a natural and intuitive way, making it a
in various industries.The big question a lot of valuable tool for a wide range of applications,
people have about ChatGPT is why does it including customer service, language
matter? We’ve already seen the huge wave of translation, and content creation.
AI image generators and heard everything
from glowing praise to doom and gloom. How
Author:
does ChatGPT fit into the narrative around
AI? ,It’s safe to say ChatGPT will have more 1.Sanjivani dobhal
of an impact on the average person . 2.Sneha magre
COGNITIVE COMPUTING
A B S T R A C T

Cognitive computing represents self-


learning systems that utilize machine learning
models to mimic the way the brain works.
Eventually this technology will facilitate the
creation of automated IT models which are
capable of solving problems without human
assistance. The Cognitive computing is the
imitation of the thought process of the human
beings using a sophisticated computerized
model. Many aspects of Cognitive computing
and its applications are discussed in this
article.

I NTRODUCTION H O W D O E S C O G N I T I V E
In general, the term cognitive computing C O M P U T I N G A C T U A L
has been used to refer to hardware and/or W O R K ?
software that mimics the functioning of the
human brain and helps to improve human Systems used in the cognitive sciences
decision-making. combine data from various sources while
Let’s examine the above definition by weighing context and conflicting evidence to
considering the situation of an intelligent suggest the best possible answers. To
robot. You own this robot, and the purpose of achieve this, cognitive systems include self-
this robot is to give you the best advice, so learning technologies that use data mining,
that you can make your decisions faster. pattern recognition and NLP to mimic human
Currently we make most of our decisions on intelligence. Using computer systems to
the basis of past experiences and gut- solve the types of problems that humans are
feelings. Now, imagine the power the above- typically tasked with requires vast amounts
mentioned robot can add to your decision of structured and unstructured data fed to
making, provided that the robot will be able to machine learning algorithms. Over time,
traverse through thousands or perhaps cognitive systems are able to refine the way
millions of individual experiences and their they identify patterns and the way they
results. Conducting an analysis of all this process data. They become capable of
data, this robot will give you the best advice anticipating new problems and modeling
that a human can give. The decision will still solutions. For example, by storing thousands
be yours, but now your decisions will be solid, of pictures of dogs in a database, an AI
accurate and based on facts. system can be taught how to identify
pictures of dogs. The more data a system is
exposed to, the more it is able to learn and
the more accurate it becomes over time.
C O G N I T I V E C O M P U T I N G

The term "cognitive system" also applies to


any artificial construct able to perform a
cognitive process where a cognitive process is
the transformation of data, information,
knowledge, or wisdom to a new level in the
DIKW Pyramid. While many cognitive systems
employ techniques having their origination in
artificial intelligence research, cognitive
systems, themselves, may not be artificially
intelligent. For example, a neural network
trained to recognize cancer on an MRI scan
may achieve a higher success rate than a
At present, there is no widely agreed upon human doctor. This system is certainly a
definition for cognitive computing in either cognitive system but is not artificially
academia or industry. intelligent.
In general, the term cognitive computing has
been used to refer to new hardware and/or Cognitive systems may be engineered to feed
software that mimics the functioning of the on dynamic data in real-time, or near real-time,
human brain and helps to improve human and may draw on multiple sources of
decision-making. In this sense, cognitive information, including both structured and
computing is a new type of computing with unstructured digital information, as well as
the goal of more accurate models of how sensory inputs (visual, gestural, auditory, or
the human brain/mind senses, reasons, and sensor-provided).
responds to stimulus. Cognitive computing
applications link data analysis and adaptive
page displays (AUI) to adjust content for a
particular type of audience. As such,
cognitive computing hardware and
applications strive to be more affective and
more influential by design.

Basic scheme of a cognitive system. With


sensors, such as keyboards, touchscreens,
cameras, microphones or temperature
sensors, signals from the real world
environment can be detected. For
perception, these signals are recognised by
the cognition of the cognitive system and
converted into digital information. This
information can be documented and is
processed. The result of deliberation can
also be documented and is used to control
and execute an action in the real world
environment with the help of actuators, such
as engines, loudspeakers,
displays or air conditioners for example.
A P P L I C A T I O N S
While a student is in class with their personalized
H E A L T H C A R E assistant, this assistant can develop various
techniques, like creating lesson plans, to tailor
Numerous tech companies are in the process and aid the student and their needs.
of developing technology that involves
cognitive computing that can be used in the
medical field. The ability to classify and
identify is one of the main goals of these
cognitive devices.[17] This trait can be very
helpful in the study of identifying carcinogens.
This cognitive system that can detect would
be able to assist the examiner in interpreting
countless numbers of documents in a lesser
amount of time than if they did not use
Cognitive Computer technology. This
technology can also evaluate information
about the patient, looking through every
medical record in depth, searching for
indications that can be the source of their
problems.
C O N C L U S I O N
E D U C A T I O N Cognitive Computing, as by name,
simulates human cognition, allowing humans to
Even if cognitive computing can not take make the best use of experiences, history,
the place of teachers, it can still be a heavy evidences, facts and figures to make confident
driving force in the education of students. and accurate decisions. Unlike Artificial
Cognitive computing being used in the Intelligence, which tends to replace human
classroom is applied by essentially having effort in many areas.
an assistant that is personalized for each Cognitive Computing has a goal to help
individual student. This cognitive assistant humans in their everyday tasks and decision
can relieve the stress that teachers face making without actually replacing human effort.
while teaching students, while also You can think of a complete cognitive
enhancing the student’s learning experience computing system as a Superhuman, who is
over all.[15] Teachers may not be able to intelligent, smart, aware, understanding,
pay each and every student individual accurate, helpful and emphatic. Welcome to
attention, this being the place that cognitive the future of awesomeness!
computers fill the gap. Some students may
need a little more help with a particular
subject. For many students, Human
interaction between student and teacher
Authors :
can cause anxiety and can be
uncomfortable. With the help of Cognitive 1. Manodnya Medhe
Computer tutors, students will not have to 2.Rutuja Kale
face their uneasiness and can gain the 3.Shubhangi Dhating
confidence to learn and do well in the
classroom.
INTERNET OF THINGS
A B S T R A C T

IoT (Internet of Things) is a network of


physical devices, vehicles, homes, and other
objects that are embedded with sensors,
software, and connectivity to enable them to
collect and exchange data. The data generated
by IoT devices can be analyzed to provide
insights and enable decision-making in various
industries such as healthcare, manufacturing,
transportation, and smart cities.

I N T R O D U C T I O N

IoT stands for the Internet of Things, which


refers to the connection of physical objects or H I S T O R Y O F I O T
devices to the internet, allowing them to collect
and exchange data with other devices and The concept of the Internet of Things (IoT)
systems. IoT has the potential to transform has been around for several decades, but it
industries and change the way we live and work, wasn't until the 1990s that it began to take
as it allows for more efficient and smarter shape as a real-world application. Here is a
decision-making based on real-time data. brief history of IoT:
The basic components of IoT include sensors 1982: A Coke machine at Carnegie Mellon
or devices that collect data, connectivity University is connected to the internet,
technologies that transmit data over the internet becoming one of the first IoT devices.
or other networks, data processing and storage 1990: John Romkey develops a toaster that
systems that analyze and store the data, and can be turned on and off over the internet.
applications or services that enable users to 1999: Kevin Ashton, a British technologist,
interact with and make decisions based on the coins the term "Internet of Things" while
data. working for Proctor & Gamble.
IoT applications are wide-ranging and include 2000s: The development of wireless
smart homes, smart cities, industrial automation, networking technologies such as Wi-Fi,
healthcare, agriculture, transportation, and many Bluetooth, and RFID enabled more devices to
more. The growth of IoT has also led to become connected to the internet.
concerns about data privacy and security, as the 2010s: The rise of cloud computing, big
large amounts of data generated by IoT devices data, and machine learning technologies
can be vulnerable to hacking and misuse. furthered the development of IoT, allowing for
According to Cisco, 500 billion devices are data to be analyzed and used to optimize
expected to be connected to the internet by processes. Today, IoT is a rapidly growing
2030 industry.
The Internet of Things (IoT) is a system of
interconnected devices, objects, and machines
that can communicate with each other and
with the internet. IoT works through a
combination of hardware, software, and
network technologies.
Here's a general overview of how IoT works:

1. Devices: IoT devices can be anything from


sensors, wearables, appliances, vehicles,
and more. They are embedded with
sensors, processors, and communication
technologies that allow them to interact
with the environment. I O T A P P L I C A T I O N S
2. Connectivity: IoT devices communicate 1. Smart Home: IoT devices like smart
with each other and with the internet thermostats, security cameras, and smart
through various wireless and wired appliances allow homeowners to control and
connectivity options, such as Wi-Fi, monitor their homes remotely.
Bluetooth, cellular networks, and more. 2. Healthcare: IoT devices can be used for
3. Data: IoT devices generate and transmit remote patient monitoring, wearables to track
data, which can include environmental fitness and health, and medication
data, biometric data, or other types of data, management systems. They can help doctors
depending on the device and its purpose. and caregivers provide better patient care
4. Cloud Computing: The data generated by while reducing hospital visits and improving
IoT devices is often stored and processed patient outcomes.
in the cloud.. 3. Industrial Automation: IoT is being used in
factories to optimize production, reduce
downtime, and improve product quality. IoT
sensors can monitor machines, track
inventory, and adjust production processes in
real-time, reducing waste and improving
efficiency.
4. Transportation: IoT devices can be used for
vehicle tracking, traffic monitoring, and smart
parking. IoT sensors can be placed on roads
and traffic signals to help manage traffic flow,
reduce congestion, and improve road safety.
5. Agriculture: IoT can help farmers monitor
crops, soil conditions, and weather patterns.
IoT sensors can collect data on soil moisture,
temperature, and humidity, helping farmers
make data-driven decisions to optimize crop
yields.
I O T A D V A N T A G E S

1)Increased efficiency and productivity: IoT


can enable the automation of various
processes, reducing the need for human
intervention and increasing efficiency and
productivity.
2) Cost savings: By optimizing processes and
reducing waste, IoT can lead to significant
cost savings for businesses.
3) Improved decision-making: IoT can provide
real-time data and insights, allowing for better
decision-making and faster responses to
changing conditions. C O N C L U S I O N
4)Enhanced customer experiences:IOT can
The Internet of Things (IoT) has the potential
enable personalized and more efficient
to revolutionize the way we live and work. IoT is
customer experiences.
the network of physical devices, vehicles, home
5)Remote monitoring and control
appliances, and other items embedded with
I O T D I S A D V A N T A G E S electronics, software, sensors, and network
connectivity, allowing them to collect and
1)Security and privacy concerns: With a large exchange data.IOT has numerous applications
number of devices connected to the internet, across various industries, including smart homes,
there is a risk of data breaches and privacy healthcare.
violations. IoT devices can also be vulnerable However, the deployment of IoT devices also
to hacking and cyber attacks. presents some challenges, including security
2)Interoperability issues: As IoT devices are risks, privacy concerns, and the need for
developed by different manufacturers, there interoperability standards.
can be interoperability issues between Overall, the future of IoT looks promising, and we
different devices and systems, making can expect to see more innovative uses of this
integration and maintenance complex. technology in the years to come. As the
3)Dependence on technology: As more technology advances, it will be essential to
processes and systems become automated, address the challenges and risks associated with
there is a risk of over-dependence on IoT to ensure its safe and responsible
technology, leading to potential disruptions deployment.
and failures.
Authors :
1. Shruti Dapkekar
2. Akanksha Khadap
3. Pratik Shinde
R E F R E N C E S

https://www.elprocus.com/what-is-zigbee-
technology-architecture-and-its-applications/ https://www.toptal.com/designers/ui/augment
ed-reality-vs-virtual-reality-vs-mixed-reality
https://zigbeealliance.org/wp-
content/uploads/2019/12/07-5123-06-zigbee- https://en.wikipedia.org/wiki/Cognitive_compu
cluster-library-specification.pdf ting

https://www.techtarget.com/searchsecurity/de
finition/cybersecurity

https://www.checkpoint.com/cyber-hub/cyber-
security/what-is-cybersecurity/

https://www.javatpoint.com/what-is-cyber-
security

https://ieeexplore.ieee.org/document/940468
0

https://www.lifitn.com/blog/2021/2/13/top-30-
li-fi-applications-updated-list-including-
potential-applications

https://scimag.com/augmented-and-virtual-
reality/

https://www.linkedin.com/pulse/augmented-
reality-karthikeyan-d

https://www.quantamagazine.org/the-
unpredictable-abilities-emerging-from-large-
ai-models-20230316/

https://marutitech.com/cognitive-computing-
features-scope-limitations/

https://www.linkedin.com/pulse/what-every-
cio-needs-know-openai-chatgpt-sunil-thakur
B its &
ytes

TECHNICAL
MAGAZINE
2022 - 2023 ISSUE - 2

B its &
ytes
Presented by
Computer Department

You might also like