0% found this document useful (0 votes)
15 views

UNIT 4(class notes

Class notes

Uploaded by

shaheerztech
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

UNIT 4(class notes

Class notes

Uploaded by

shaheerztech
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

UNIT 4

Emerging Technologies & their applications

4.1 Overview of Cloud Computing:


Cloud computing is a computing model, where a large group of systems are
connected in private or public networks, to deliver dynamically scalable
infrastructure for application, data and file storage. With the initiation of this
technology the cost of computation, application hosting, content storage and
delivery is cheap significantly.
Cloud computing is a real-world approach to experience direct cost benefits and
it has the prospective to transform a data center from a capital-intensive set up to
a variable priced environment The difference that cloud computing brings
compared to traditional concepts of “Grid Computing”, “Distributed
Computing”, “Utility Computing”, or “automatic computing” is to broaden
horizons across organizational boundaries.
Cloud Providers provides services that can be clustered into three categories:
1. Software as a Service (SaaS): In this model, a complete application is
accessible to the customer, as a service on demand. A single instance of the
service runs on the cloud computing Server & multiple clients are serviced.
We have varieties of companies that provides SaaS such as Google,
Salesforce, Microsoft, Zoho, etc.
2. Platform as a Service (PaaS): Platform as a service (PaaS) is a complete
development and deployment environment in the cloud, with resources that
enable you to deliver everything from simple cloud-based apps to
sophisticated, cloud-enabled enterprise applications. PaaS includes
infrastructure: servers, storage, and networking but also middleware,
development tools, business intelligence services, database management
systems, and more.
Advantages of PaaS
 Cut coding time: PaaS development tools can cut the time it takes
to code new apps with pre-coded application components built into
the platform, such as workflow, directory services, security features,
search, and so on.
 Develop for multiple platforms-including mobile-more easily:
Some service providers give you development options for multiple
platforms, such as computers, mobile devices, and browsers making
cross-platform apps quicker and easier to develop.
 Use sophisticated tools affordably: A pay-as-you-go model makes
it easy and cheap for every individuals to use development software
and analytics tools that they could not afford to purchase complete
package.
 Support geographically distributed development teams.:
Development teams can work together on projects even when team
member are in remote locations due to accessibility of Internet
everywhere.
 Efficiently manage the application lifecycle: PaaS provides all of
the capabilities that you need to support the complete web
application lifecycle: building, testing, deploying, managing, and
updating within the same integrated environment.

3. Infrastructure as a Service: It is a type of cloud computing service that


deals with essential compute, storage, and networking resources on
demand, on a pay-as-you-go basis. IaaS is one of the types of cloud services
provided by the cloud service provider You can reduce maintenance cost
of your organization’s by migrating to an Infrastructure as a Service. IaaS
provides flexibility to scale up and down your IT resources on demand.

Advantages of laaS:
 Shared Infrastructure: IaaS allows multiple users to share the
same physical infrastructure.
 Web access to the resources: IaaS allows IT users to access
resources over the Internet.
 Pay-as-per-use Model: IaaS providers provide services based on
the pay-as-per-use basis. The user’s needs to pay only for what they
have used.
 Focus on the core business: IaaS providers focus on the
organization’s core business rather than on It infrastructure.
 On-demand scalability: On-demand scalability is one of the
biggest advantages of IaaS. IaaS users need not to worry about to
scale up and down of software and troubleshooting issues related to
hardware components.
Figure 1: Cloud Models

4.2 Big Data


Big Data refers to complex and large data sets that have to be processed
and analysed to uncover valuable information that can benefit businesses and
organizations. Big Data is becoming one of the most talked about technology
trends nowadays. The real challenge with the big organization is to get maximum
out of the data already available and predict what kind of data to collect in the
future.

Types of Big Data


1. Structured: Structured is one of the types of big data and by structured
data, we mean data that can be processed, stored, and retrieved in a fixed
format. It refers to highly organized information that can be readily and
seamlessly stored and accessed from a database by simple search engine
algorithms. For instance, the employee table in a company database will be
structured as the employee details, their job positions, their salaries, etc.,
will be present in an organized manner.
2. Unstructured: Unstructured data refers to the data that lacks any
specific form or structure whatsoever. This makes it very difficult and time-
consuming to process and analyze unstructured data. Email is an example
of unstructured data. Structured and unstructured are two important types
of big data.
3. Semi-Structured: Semi structured is the third type of big data. Semi-
structured data pertains to the data containing both the formats mentioned
above, that is, structured and unstructured data. To be precise, it refers to
the data that although has not been classified under a particular repository
(database), yet contains vital information or tags that segregate individual
elements within the data. Thus we come to the end of types of data.

Figure 2: Big Data – Transactions, Interactions, Observations

Big Data Characteristics:


 VOLUME: The exponential growth in the data storage as the data is
now more than text data. The data can be found in the format of videos,
music’s and large images on our social media channels. It is very
common to have Terabytes and Petabytes of the storage system for
enterprises. The big volume indeed represents Big Data.
 VELOCITY: The data growth and social media explosion have
changed how we look at the data. There was a time when we used to
believe that data of yesterday is recent. The matter of the fact
newspapers is still following that logic. However, news channels and
radios have changed how fast we receive the news. This high velocity
data represent Big Data.
 VARIETY: Data can be stored in multiple format. For example
database, excel, csv, access or for the matter of the fact, it can be stored
in a simple text file. Sometimes the data is not even in the traditional
format as we assume, it may be in the form of video, SMS, pdf or
something we might have not thought about it. It is the need of the
organization to arrange it and make it meaningful.

Figure 3: Three V’s of Big Data

Importants of Big Data


1. Cost Savings: Some tools of Big Data like Hadoop and Cloud-Based
Analytics can bring cost advantages to business when large amounts of data
are to be stored and these tools also help in identifying more efficient ways
of doing business.
2. Time Reductions: The high speed of tools like Hadoop and in-memory
analytics can easily identify new sources of data which helps businesses
analysing data immediately and make quick decisions based on the
learning.
3. Understand the market conditions: By analysing big data you can
get a better understanding of current market conditions. For example, by
analysing customers’ purchasing behaviours, a company can find out the
products that are sold the most and produce products according to this
trend. By this, it can get ahead of its competitors.
4. Control online reputation: Big data tools can do sentiment analysis.
Therefore, you can get feedback about who is saying what about your
company. If you want to monitor and improve the online presence of your
business, then, big data tools can help in all this.
5. Using Big Data Analytics to Boost Customer Acquisition and
Retention: The customer is the most important asset any business
depends on. There is no single business that can claim success without first
having to establish a solid customer base. However, even with a customer
base, a business cannot afford to disregard the high competition it faces.

4.3 INTERNET OF THINGS (IOT)


Internet ofthings (IoT) is a network of physical objects. The internet isnot only a
network of computers, but it has evolved into anetwork of device of all type and
sizes, vehicles, smartphones, home appliances, toys, cameras, medical
instrumentsand industrial systems, animals, people, buildings, all connected,all
communicating & sharing information based onstipulated protocols in order to
achieve smart reorganizations.
We define IOT into three categories as below:
Internet of things is an internet of three things: (1). People topeople, (2) People
to machine /things, (3) Things /machine tothings /machine, Interacting through
internet.

Figure 4: Internet of Things

Characteristics:
The fundamental characteristics of the IoT are as follows:
 Interconnectivity: With regard to the IoT, anything can be
interconnected with the global information and communication
infrastructure.
 Things-related services: The IoT is capable of providing thing-related
services within the constraints of things, such as privacy protection and
semantic consistency between physical things and their associated virtual
things. In order to provide thing-related services within the constraints of
things, both the technologies in physical world and information world will
change.
 Heterogeneity: The devices in the IoT are heterogeneous as based on
different hardware platforms and networks. They can interact with other
devices or service platforms through different networks.
 Dynamic changes: The state of devices change dynamically, e.g.,
sleeping and waking up, connected and/or disconnected as well as the
context of devices including location and speed. Moreover, the number of
devices can change dynamically.
 Enormous scale: The number of devices that need to be managed and
that communicate with each other will be at least an order of magnitude
larger than the devices connected to the current Internet.
 Safety: As we gain benefits from the IoT, we must not forget about safety.
As both the creators and recipients of the IoT, we must design for safety.
This includes the safety of our personal data and the safety of our physical
well-being.
 Connectivity: Connectivity enables network accessibility and
compatibility. Accessibility is getting on a network while compatibility
provides the common ability to consume and produce data.

IoT Architecture
IoT architecture consists of different layers of technologies supporting IoT. The
functionality of each layer is described below:
Figure 5: IoT Layer Architecture

1. Smart Device / Sensor Layer:


The lowest layer is made up of smart objects integrated with sensors. The
sensors enable the interconnection of the physical and digital worlds
allowing real-time information to be collected and processed. There are
various types of sensors for different purposes. The sensors have the
capacity to take measurements such as temperature, air quality, speed,
humidity, pressure, flow, movement and electricity etc.
2. Gateways and Networks:
Massive volume of data will be produced by these tiny sensors and this
requires a robust and high performance wired or wireless network
infrastructure as a transport medium. Current networks, often tied with
very different protocols, have been used to support machine-to-machine
(M2M) networks and their applications. With demand needed to serve a
wider range of IOT services and applications such as high speed
transactional services, context-aware applications, etc, multiple networks
with various technologies and access protocols are needed to work with
each other in a heterogeneous configuration.
3. Management Service Layer:
The management service renders the processing of information possible
through analytics, security controls, process modelling and management of
devices.
One of the important features of the management service layer is the
business and process rule engines. IOT brings connection and interaction
of objects and systems together providing information in the form of events
or contextual data such as temperature of goods, current location and traffic
data. The rule engines support the formulation of decision logics and
trigger interactive and automated processes to enable a more responsive
IOT system.

4. Application Layer:
The IoT application covers “smart” environments/spaces in domains such
as: Transportation, Building, City, Lifestyle, Retail, Agriculture, Factory,
Supply chain, Emergency, Healthcare, User interaction, Culture and
tourism, Environment and Energy.
4.4 VIRTUAL REALITY
Virtual reality is the use of computer technology to create simulated
environments. Virtual reality places the user inside a three-dimensional
experience. Instead of viewing a screen in front of them, users are immersed in
and interact with 3D worlds.
Simulation of human senses (all five of them) transforms a computer into a
vehicle into new worlds. The only limitation to a superb VR experience is
computing power and content availability.

Types of Virtual Reality


1. Non-Immersive Virtual Reality: This category is often overlooked
as VR simply because it’s so common. Non-immersive VR technology
features a computer-generated virtual environment where the user
simultaneously remains aware and controlled by their physical
environment. Video games are a prime example of non-immersive VR.
2. Semi-Immersive Virtual Reality: This type of VR provides an
experience partially based in a virtual environment. This type of VR makes
sense for educational and training purposes with graphical computing and
large projector systems, such as flight simulators for pilot trainees.
3. Fully Immersive Virtual Reality: Right now, there are no
completely immersive VR technologies, but advances are so swift that they
may be right around the corner. This type of VR generates the most realistic
simulation experience, from sight to sound to sometimes even olfactory
sensations. Car racing games are an example of immersive virtual reality
that gives the user the sensation of speed and driving skills.

Technology used by Virtual Reality


1. Hardware:
Virtual reality hardware includes sensory accessories such as controllers,
as well as headsets, hand trackers, treadmills and, for creators, 3D cameras.
 VR Headsets: A VR headset is a head-mounted device,
such as goggles. A VR headset is a visual screen or display.
Headsets often include state-of-the-art sound, eye or head
motion-tracking sensors or cameras.
There are three main types of headsets:
 PC-Based VR Headsets: PC headsets tend to be the
highest-priced devices because they offer the
most immersive experiences. These headsets are
usually cable-tethered from the headset and
powered by external hardware.
 Standalone VR Headsets: All-in-one or standalone VR
headsets are wireless, integrated pieces of hardware,
such as tablets or phones. Wireless VR headsets are not
always standalone.
 Mobile Headsets: These shell devices use lenses that
cover a smartphone. The lenses separate the screen to
create a stereoscopic image that transforms a smartphone
into a VR device. Mobile headsets are relatively
inexpensive.
 VR Accessories
VR accessories are hardware products that facilitate VR technology.
New devices are always in development to improve the immersive
experience. Today’s accessories include the 3D mouse, optical
trackers, wired gloves, motion controllers, bodysuits, treadmills, and
even smelling devices.
These are some of the accessories used today in VR:
 3D Mouse: A 3D mouse is a control and pointing device
designed for movement in virtual 3D spaces. 3D mice
employ several methods to control 3D movement and
2D pointing, including accelerometers, multi-axis
sensors, IR sensors and lights.
 Optical Trackers: Visual devices monitors the user’s
position. The most common method for VR systems is
to use one or multiple fixed video cameras to follow the
tracked object or person.
 Wired Gloves: This type of device, worn on the hands,
is also known as cyber gloves or data gloves. Various
sensor technologies capture physical movement data.
 Motion Controllers: These accessories allow users to
act in mixed reality. Controllers allow for fine-grained
interaction with digital objects because they have a
precise position in space.
 Omnidirectional Treadmills (ODTs): This accessory
machine gives users the ability to move in any direction
physically. ODTs allow users to move freely for a fully
immersive experience in VR environments.
 Smelling Devices: Smell devices are one of the newer
accessories in the VR world. Vaqso, a Tokyo-based
company, offers a headset attachment that emits odors
to convey the size and shape of a candy bar. The fan-
equipped device holds several different smells that can
change intensity based on the screen action.
2. Software
Developers use various software to build VR. They include VR software
development kits, visualization software, content management, game
engines, social platforms, and training simulators

 VR Content Management Systems Software: Companies use this


workplace tool to collect, store and analyze VR content in a
centralized location.
 VR Game Engine Software: Developers use the tools to create a
VR video game experience.
 VR Software Development Kit (SDK): SDKs offer a base to
design, build and test VR experiences.
 VR Social Platforms Software: Users collaborate from remote
locations in VR with these tools.
 VR Training Simulator Software: This software works for almost
any industry for employee training in immersive environments.
 VR Visualization Software: Users experience aggregated data in a
virtual environment. to fully understand what data means.

How Virtual Reality Applications Are Used Today:


 Training: One of the most obvious is the use of VR in employee training.
While this currently requires the use of a headset, it can also be done onsite
or at home. The ability to put an employee in other people’s shoes (whether
those of a coworker or customer) delivers a unique experience that isn’t
feasible otherwise.
 Travel: Hotels can take you inside their property, so you know what to
expect. VR can be beneficial for high-end travel (e.g., honeymoons or
luxury resorts). For the user, they’d see (and feel) the location from their
perspective instead of watching an online video or looking at 2D photos.
 Real Estate: Developers can move beyond 3D models to simulate life
inside their new development. VR would work both for homes and
commercial spaces. Also, co-working spaces can use VR to put the
prospective tenant inside the space before you join.
 Healthcare: There are many uses for healthcare practitioners, researchers
and patients. Imagine using VR to help patients with disorders such as
anxiety or anorexia.
 Retail: Retailers can help potential consumers put themselves in situations
where they can “try on” clothes or objects and get a sense of how they
interact with an environment.
 Military: VR is already a valuable tool in simulations for combat,
confrontations nd the like. It can replace expensive and sometimes
dangerous real-life exercises. The ability to change scenarios makes it
attractive for all branches of the military and the defense industry.
 Entertainment: The ability to provide immersive experiences will
transform entertainment. Gaming and Hollywood will increasingly provide
users and viewers with the ability to go from passive to active.
 Architecture: VR can render different levels of detail that are important in
earlystage design. Architects can create an immersive experience to
visualize massing and spatial relationships. Other uses can show how light
will affect the proposed space, based on window placement.
 Art: VR as a tool for fine art is a staple for artists who aim to push limits.
Multimedia artists all over the world are already deeply involved in
immersive experiential art forms. Laurie Anderson, a pioneer since the
1970s, was awarded the 74th Venice International Film Festival for her
work, The Chalkroom.
 Aviation: Realistic cockpits with VR technology are used to train
commercial pilots in training programs incorporating live instruction with
virtual flight. Data Visualization: Engineering and scientific data
visualization have profited for years from VR.
 Education: The use of traditional instruction mediums and textbooks is
often ineffective for students with special needs. With the introduction of
VR, students have become more responsive and engaged.
 Sports: VR is a training aid in many sports such as cycling, skiing, golf
and gymnastics. At least three college programs—Auburn University,
Vanderbilt University and the University of Arkansas—and multiple NFL
teams use virtual reality systems

Benefits of Virtual Reality


VR benefits many industries with its user engagement. VR is an excellent vehicle
for training, conferencing, convenience, and communication.
Here are some of the benefits of VR:
 Practical Training: VR is a safe way to simulate dangerous situations for
training purposes. Fire-fighters, pilots, astronauts and police can learn in a
controlled environment before going into the field. Immersive experience
narrows timeframes so trainees can more quickly become professionals.
 Engagement and Connection: VR is an engaging and entertaining
experience for its users.
 Convenient Conferences: Virtual meetings save time and money, yet help
maintain a sense of collegiality.
 “Tryout” Capability: Shoppers’s remorse may become a thing of the past
with VR. You can use virtual reality to furnish your home, test-drive a car
or try on wedding bands without leaving home.

Challenges of Virtual Reality


 Addiction: Some people become addicted to the VR experience in gaming
and social media applications. People can assume different identifies,
which can be addictive and cause social, psychological and biological
issues.
 Health Problems: Extensive use of VR can create a loss of spatial
awareness, nausea, dizziness, disorientation and nausea, also known as
simulator sickness.
 Screen Door Effect: When you use a headset, the display is within inches
of your eyes. That means you see pixels or the spaces between them, no
matter how excellent the display resolution may be. This mesh-like effect
can irritate some users. Newer headsets have improved but not eliminated
the issue.
 Loss of Human Connections: When you rely on virtual connections rather
than real-life social interactions, trouble may result. Over-reliance on VR
can lead to disassociation or depression.
 Training Doesn’t Translate in the Real World: People trained in virtual
reality may do well in the app or platform but can’t perform to the
necessary standard in real-world situations.
 Expense: While prices are coming down, VR systems are not affordable
for everyone.

4.5 Block chain and cryptocurrency


A blockchain is essentially a distributed database of records or public
ledger of alltransactions ordigital events that have been executed and
shared among participating parties. Each transaction in thepublic ledger is
verified by consensus of a majority of the participants in the system. And,
once entered,information can never be erased. The blockchain contains a
certain and verifiable record of everysingle transaction ever made. To use
a basic analogy, it is easy to steal a cookie from a cookie jar, keptin a
secluded place than stealing the cookie from a cookie jar kept in a market
place, being observed bythousands of people.

Bitcoin is the most popular example that is intrinsically tied to blockchain


technology. It is also themost controversial one since it helps to enable a
multibillion-dollar global market of anonymoustransactions without any
governmental control. Hence it has to deal with a number of
regulatoryissues involving national governments and financial institutions.

Block Chain Technology


History of Bitcoin

In year 2008, an individual or group writing under the name of Satoshi Nakamoto
published a paper entitled “Bitcoin: A Peer-To-Peer Electronic Cash System”.
This paper described a peer-to-peer version of the electronic cash that would
allow online payments to be sent directly from one party to another without going
through a financial institution. Bitcoin was the first realization of this concept.
Now word cryptocurrencies is the label that is used to describe all networks and
mediums of exchange that uses cryptography to secure transactions-as against
those systems where the transactions are channeled through a centralized trusted
entity.

The author of the first paper wanted to remain anonymous and hence no one
knows Satoshi Nakamoto to this day. A few months later, an open source program
implementing the new protocol was released that began with the Genesis block
of 50 coins. Anyone can install this open source program and become part of the
bitcoin peer-to-peer network. It has grown in popularity since then.

2008
August 18: Domain name “bitcoin.org” registered
October 31: Bitcoin design paper published
November 09: Bitcoin project registered at SourceForge.net

2009
January 3: Genesis block established at 18:15:05 GMT
January 9: Bitcoin v0.1 released and announced on the cryptography mailing
list
January 12: First Bitcoin transaction, in block 170 from Satoshi to Hal Finney the
popularity of the Bitcoin has never ceased to increase since then. The underlying
Blockchain technology is now finding new range of applications beyond finance.

Blockchain Technology: How does it work?


We explain the concept of the blockchain by explaining how Bitcoin works since
it is intrinsically linked to the Bitcoin. However, the blockchain technology is
applicable to any digital asset transaction exchanged online.
Internet commerce is exclusively tied to the financial institutions serving as the
trusted third party who process and mediate any electronic transaction. The role
of trusted third party is to validate, safeguard and preserve transactions. A certain
percentage of fraud is unavoidable online transactions and that needs mediation
by financial transactions. This results in high transaction costs.
Bitcoin uses cryptographic proof instead of the trust in the third party for two
willing parties to execute an online transaction over the Internet. Each transaction
is protected through a digital signature. Each transaction is sent to the “public
key” of the receiver digitally signed using the “private key” of the sender. In order
to spend money, owner of the cryptocurrency needs to prove the ownership of the
“private key”. The entity receiving the digital currency verifies the digital
signature –thus ownership of corresponding “private key”—on the transaction
using the “public key” of the sender. Each transaction is broadcast to every node
in the Bitcoin network and is then recorded in a public ledger after verification.
Every single transaction needs to be verified for validity before it is recorded in
the public ledger. Verifying node needs to ensure two things before recording any
transaction:
1. Spender owns the cryptocurrency—digital signature verification on the
transaction.
2. Spender has sufficient cryptocurrency in his/her account: checking every
transaction against spender’s account (“public key”) in the ledger to make
surethat he/she has sufficient balance in his/her account.
Applications of Block chain technology
1. Financial Application
 Private securities: Companies are now issuing shares directly using
blockchain, leaving behind the traditional public offerings. NASDAQ’s
private equity exchange projects like Medici, Coinsetter, and Bitshares aim
to streamline equity exchanges using block chain and smart contracts.
 Insurance: Block chain can register valuable assets like real estate or any
other valuable things which in future helps to verify the ownership of an
aaset and also helps in tracing transaction history.

2. Non-financial Application
 Notary Public: Blockchain can be used to verify the authenticity,
ownership, and integrity of a document without the need for a
centralized authority. Companies like Stampery and Proof of
Existence utilize the blockchain for notarization.
 Music Industry: Blockchain has the potential to create a public
ledger for music rights and royalties to ensure transparency for
artists and songwriters.
 Decentralized Storage: Platforms such as Storj are using
blockchain to provide secure, decentralized cloud storage
solutions, removing the need for third party providers.
 Decentralized IoT: Blockchain can be used to facilitate secure
device-to-device communication and coordination. Projects like
IBM’s ADEPT use decentralized ledgers to build IoT systems.
 Anti-Counterfeit Solutions: In industries such as pharmaceuticals
and electronics, blockchain can improve product authenticity.
Several companies like BlockVerify are offering solutions.
 Internet Applications: There are blockchain based technologies
like Namecoin which is a decentralised DNS service and Keyless
Security Infrastructure (KSI) that provides alternatives to
traditional public key infrastructures (PKI).

4.6 Robotics
Most people think of robots in humanlike terms: communicating and doing
things like people would. But this specific subset of robots is actually not
very common. A robot can be defined as a mechanical device that is
capable of performing a variety of tasks on command or according to
instructions programmed in advance. Engineers design robots to perform
complex tasks more easily and with greater accuracy. Some everyday
examples of robots include:
· Automatic car washes
· Vending machines
· Automatic doors
· Robotic arms used in manufacturing
· Remote control cars and trucks
“A reprogrammable, multifunctional manipulator designed to move
material, parts, tools, or specialized devices through various programmed
motions for the performance of a variety of tasks.”

History of Robots
 270BC - An ancient Greek engineer named Ctesibus made organs
and water
 clocks with movable figures.
 1818 - Mary Shelley wrote “Frankenstein” which was about a
frightening artificial
 lifeform created by Dr. Frankenstein.
 1921 - The term “robot” was first used in a play called “R.U.R.” or
“Rossum’s
 Universal Robots” by the Czech writer Karel Capek. The plot was
simple: man
 makes robot then robot kills man!
 1941 - Science fiction writer Isaac Asimov first used the word
“robotics” to
 describe the technology of robots and predicted the rise of a
powerful robot
 industry.
 1942 - Asimov wrote “Runaround,” a story about robots which
contained the
 “Three Laws of Robotics:”
o A robot may not injure a human, or, through inaction, allow a
human being to
 come to harm.
 A robot must obey the orders given to it by human beings except
where such
 orders would conflict with the First Law.
 A robot must protect its own existence as long as such protection
does not
 conflict with the First or Second Law
 1948 - “Cybernetics,” an influence on artificial intelligence research,
was published
 by Norbert Wiener.
 1956 - George Devol and Joseph Engelberger formed the world’s
first robot
 company in Ewing Township, New Jersey.
 1959 - Computer-assisted manufacturing was demonstrated at the
 Servomechanisms Lab at Massachusetts Institute of Technology
(MIT).
 1961 - The first industrial robot was activated on the assembly line
in a General
 Motors automobile factory in New Jersey. It was called Unimate.
 1963 - The first artificial robotic arm to be controlled by a computer
was designed
 by researchers at Rancho Los Amigos Hospital in Downey,
California. The Rancho
 Arm was designed as a tool for the handicapped and it’s six joints
gave it the
 flexibility of a human arm.
 1965 - Dendral was the first expert system or program designed to
execute the
 accumulated knowledge of subject experts. It was done at Stanford
University by
 Edward Feigenbaum, Bruce Buchanan, Joshua Lederberg, and Carl
Djerassi,
 along with a team of highly creative research associates and
students.
 1968 - The octopus-like Tentacle Arm was developed by Marvin
Minsky.
 1969 - The Stanford Arm was the first electrically-powered,
computer-controlled
 robot arm developed by Victor Scheinman at Stanford University in
California.
 1970 - Shakey was introduced as the first mobile robot controlled by
artificial
 intelligence. It was produced by Stanford Research Institute (SRI)
International.
 1974 - A robotic arm (the Silver Arm) that performed small-parts
assembly using
 feedback from touch and pressure sensors was designed by David
Silver from
 MIT.
 1979 - The Stanford Cart, rebuilt by Hans Moravec from Stanford
University,
 crossed a chair-filled room without human assistance. The cart had
a television
 camera mounted on a rail which took pictures from multiple angles
and relayed
 them to a computer. The computer analyzed the distance between the
cart and
 the obstacles.
 Since 1979, robots and robotics have rapidly evolved and have
rapidly become an almost invisible presence in our society. We have
employed robots in everything from manufacturing to military to the
space program. Robotics is used at the International Space Station
and is becoming more and more integrated into our daily world.

Uses of Robots
 In earlier times the use of robots was limited to imagination and
entertainment in books and plays.
 Today, we have robotic pets, lawn mowers and vacuum cleaners
available for our daily use.
 Sony developed QRIO, a humanoid entertainment robot.
Honda's Asimo welcomes customers in Japan, Toshiba created
a volleyball playing robot, and Fujitsu’s HOAP-2 does martial
arts like Sumo wrestling and Taijiquan.
 Rapid advancements in areas of robotic control systems,
artificial intelligence (AI), neural networks and miniaturized
sensor technologies have given rise to a new generation of
robots possessing extraordinary capabili- ties. Robots are being
deployed in the industrial sectors – food, clothing, nuclear,
healthcare, agriculture, transportation and mining industries and
also in defence and space sector.
 Career prospects in the robotics industry are wide and varied.
Robots have the potential to play a role in solving many of the
world's big challenges, from environmental issues to
humanitarian needs.

4.6 Artificial Intelligence


Artificial intelligence (AI) is the ability of machines to replicate or
enhance human intellect, such as reasoning and learning from
experience. Artificial intelligence has been used in computer
programs for years, but it is now applied to many other products
and services. For example, some digital cameras can determine
what objects are present in an image using artificial intelligence
software. In addition, experts predict many more innovative uses
for artificial intelligence in the future, including smart electric
grids.
AI uses techniques from probability theory, economics, and
algorithm design to solve practical problems. In addition, the AI
field draws upon computer science, mathematics, psychology, and
linguistics. Computer science provides tools for designing and
building algorithms, while mathematics offers tools for modeling
and solving the resulting optimization problems.

To understand the idea behind AI, you should think about what
distinguishes human intelligence from that of other creatures – our
ability to learn from experiences and apply these lessons to new
situations. We can do this because of our advanced brainpower; we
have more neurons than any animal species.

Today’s computers don’t match the human biological neural


network – not even close. But they have one significant advantage
over us: their ability to analyze vast amounts of data and
experiences much faster than humans could ever hope.

AI lets you focus on the most critical tasks and make better
decisions based on acquired data related to a use case. It can be
used for complex tasks, such as predicting maintenance
requirements, detecting credit card fraud, and finding the best route
for a delivery truck. In other words, AI can automate many
business processes leaving you to concentrate on your core
business.

Different Fields Under Artificial Intelligence


Artificial Intelligence (AI) is the general term for being able to
make computers do things that require intelligence if done by
humans. AI can be broken down into two major fields, Machine
Learning (ML) and Neural Networks (NN). Both are subfields
under Artificial Intelligence, and each one has its methods and
algorithms to help solve problems.

1. Machine Learning

Machine Learning (ML) makes computers learn from data and


experience to improve their performance on some tasks or
decision-making processes. ML uses statistics and probability
theory for this purpose. Machine learning uses algorithms to parse
data, learn from it, and make determinations without explicit
programming. Machine learning algorithms are often categorized
as supervised or unsupervised. Supervised algorithms can apply
what has been learned in the past to new data sets; unsupervised
algorithms can draw inferences from datasets. Machine learning
algorithms are designed to strive to establish linear and non-linear
relationships in a given set of data. This feat is achieved by
statistical methods used to train the algorithm to classify or predict
from a dataset.

2. Deep Learning

Deep learning is a subset of machine learning that uses multi-


layered artificial neural networks to deliver state-of-the-art
accuracy in object detection, speech recognition and language
translation. Deep learning is a crucial technology behind driverless
cars and enables the machine analysis of large amounts of complex
data — for example, recognizing the faces of people who appear in
an image or video.

3. Neural Networks

Neural networks are inspired by biological neurons in the human


brain and are composed of layers of connected nodes called
“neurons” that contain mathematical functions to process incoming
data and predict an output value. Artificial neural network learns
by example, similarly to how humans learn from our parents,
teachers, and peers. They consist of at least three layers: an input
layer, hidden layers, and an output layer. Each layer contains nodes
(also known as neurons) which have weighted inputs that compute
the output.
Artificial Intelligence in Different Industries
 self-driving cars: Tesla is the first company to make a car
with all of the sensors, cameras, and software needed for a
computer to drive itself from start to finish. Trucks may be
the next primary target for autonomy: self-driving trucks will
enormously impact road safety and infrastructure and save
companies money by reducing labor costs.
 Finance: AI helps with forecasting and supports hedge-fund
investment decisions. Predictive analytics (or forecasting)
applies artificial intelligence using machine learning and
statistical techniques to make predictions about future events
based on previous data. For example, you can use forecasting
to predict product sales, customer demand, or even stock
prices. One popular example of predictive analytics is
Amazon’s product recommendations engine (also known as
“Customers who bought this item also bought”). It uses past
purchase data from millions of customers to recommend
products based on the users’ preferences.
 Healthcare: AI is helping doctors to diagnose diseases by
gathering data from health records, scanning reports, and
medical images. This helps doctors to make faster diagnoses
and guide the patient for further tests or prescribe
medications. In addition, AI can be used in the treatment
process by monitoring patients and alerting their doctors
when something goes wrong. According to Forbes, AI will
save over 7 million lives in 2035.
 Retail: AI does everything from stock management to
customer service chatbots. As a result, many businesses are
taking advantage of AI to improve productivity, efficiency,
and accuracy. In addition, companies find new ways to use
AI to make life easier for their customers and employees,
from product design to customer service.

The Current State of AI-Based Software Systems

 Generative Adversarial Networks (GANs): The recent advancements in


AI have led to the emergence of a new type of system called Generative
Adversarial Networks (GANs), which generate realistic images, text, or
audio.
 GPT3: The GPT3 model is an NLP model based on a deep learning
algorithm called transformers. It was trained on a corpus of text from
Common Crawl and published in 2020. GPT3 uses a large dataset trained
in the English language to produce outputs based on the inputted
information. The model can be trained to perform any task imaginable,
from generating text to solving math problems. Also, we can use GPT3 to
generate text, translate between languages, answer questions about images,
and more.

 DALL.E: The DALL.E model is an image generator based on a deep


learning algorithm called variational autoencoders (VAEs). Similarly,
DALL.E can be trained using an image dataset to produce images based on
the inputted text descriptions. It was trained on datasets such as ImageNet
and published in 2021. We can use DALL.E to generate images that match
captions or URLs given by users.

 AlphaGo: DeepMind created AlphaGo as a program that would play the


ancient game Go without anyone’s help. The game is similar to chess but
much more complex due to its simple rules and many possible moves per
turn. AlphaGo used reinforcement learning to learn how to play the game
better over time by playing against itself repeatedly until it mastered every
possible situation that could occur in a game of Go with 100% accuracy.

 RoBERTa: is an algorithm from Facebook AI Research (FAIR) that uses


deep learning techniques to solve problems in natural language processing
(NLP), such as sentence classification or machine translation.

The Future of AI
Artificial Intelligence (AI) has already made substantial progress and is set
to make further advancements in the near future. Even though Artificial
General Intelligence AGI, which can perform any intellectual task a human
can, is still in the making, AI is already changing many industries. More and
more AI, on the other hand, will take over more assignments even replacing
jobs than the human brain, the constitutive work of computing systems will
do.
AI is disrupting the business world by deploying technologies such as cloud
computing, the Internet of Things (IoT), and Big Data Analytics, which are
driving drastic changes in the military, healthcare, and infrastructure
sectors. The technology are responsible for the fact that business has become
more speedy and innovative the world over.
Besides that, the AI technology participates in the building of metaverse
environments. It brings about life-like visualizations of the real world and
physically engages users enabling them to interact with the environment,
which makes such virtual experiences more engaging.

4.7 3DPRINTING
A method of manufacturing known as ‘Additive manufacturing’, due to the
fact that instead of removing material to create a part, the process adds
material in successive patterns to create the desired shape. Main areas of use:
• Prototyping
• Specialized parts – aerospace, military, biomedical engineering, dental
• Hobbies and home use
• Future applications– medical (body parts), buildings and cars
• 3D Printing uses software that slices the 3D model into layers (0.01mm thick
or
less in most cases). Each layer is then traced onto the build plate by the printer,
once the pattern is completed, the build plate is lowered and the next layer is
added on top of the previous one.

Types of 3D Printing

1. FDM (Fused Deposition Modeling)


Fused Deposition Modeling, is an additive manufacturing technology
commonly used for modeling, prototyping, and production applications.
FDM works on an “additive” principle by laying down material in layers. A
plastic filament or metal wire is unwound from a coil and supplies material to
an extrusion nozzle which can turn the flow on and off. The nozzle is heated
to melt the material and can be moved in both horizontal and vertical
directions by a numerically controlled mechanism,
directly controlled by a computer-aided manufacturing (CAM) software
package. The model or part is produced by extruding small beads of
thermoplastic material to form layers as the material hardens immediately
after extrusion from the nozzle. Stepper motors or servo motors are typically
employed to move the extrusion head.
FDM, a prominent form of rapid prototyping, is used for prototyping and rapid
manufacturing. Rapid prototyping facilitates iterative testing, and for very
short runs, rapid manufacturing can be a relatively inexpensive alternative.

2.SLA (Stereolithography)
Stereolithography is an additive manufacturing process which employs a vat
of liquid ultraviolet curable photopolymer “resin” and an ultraviolet laser to
build parts’ layers one at a time. For each layer, the laser beam traces a cross-
section of the part pattern on the surface of the liquid resin. Exposure to the
ultraviolet laser light cures and solidifies the pattern traced on the resin and
joins it to the layer below.
After the pattern has been traced, the SLA’s elevator platform descends by a
distance equal to the thickness of a single layer, typically 0.05 mm to 0.15 mm
(0.002" to 0.006"). Then, a resin-filled blade sweeps across the cross section
of the part, re-coating it with fresh material. On this new liquid surface, the
subsequent layer pattern is traced, joining the previous layer. A complete 3-D
part is formed by this process. After being built, parts are immersed in a
chemical bath in order to be cleaned of excess resin and are subsequently cured
in an ultraviolet oven.

3. SLS (Selective laser sintering)


Selective laser sintering is an additive manufacturing technique that uses a
high-power laser (for example, a carbon dioxide laser) to fuse small particles
of plastic, metal (direct metal laser sintering), ceramic, or glass powders into
a mass that has a desired three-dimensional shape. The laser selectively fuses
powdered material by scanning crosssections generated from a 3-D digital
description of the part (for example from a CAD file or scan data) on the
surface of a powder bed. After each cross-section is scanned, the powder bed
is lowered by one layer thickness, a new layer of material is applied on top,
and the process is repeated until the part is completed.
Because finished part density depends on peak laser power, rather than laser
duration, a SLS machine typically uses a pulsed laser. The SLS machine
preheats the bulk powder material in the powder bed somewhat below its
melting point, to make it easier for the laser to raise the temperature of the
selected regions the rest of the way to the melting point.

Limitations of 3DPrinting
1. Limited Material Choices: While 3D printing technology has advanced,
it still can't print with every type of material. Most consumer-grade 3D
printers primarily use plastics (like PLA or ABS), and there are limitations
when it comes to printing metals, ceramics, or composite materials.
2. Print Size Constraints: Many 3D printers have size limitations on what
they can print in a single piece. Large objects may need to be printed in
smaller parts and then assembled, which can affect the structural integrity
or the aesthetic quality of the final product.
3. Surface Finish and Precision: The layers in 3D printing can lead to rough
surfaces and visible lines on the object, especially with lower resolution
settings. Post-processing, like sanding or polishing, is often needed to
improve the surface finish.
4. Slow Production Speed: 3D printing is generally slower than traditional
manufacturing methods, especially when creating large or complex
objects. It can take several hours or even days to print a single object, which
is not ideal for mass production.
5. Cost of Materials and Equipment: While 3D printing is accessible for
hobbyists, high-quality 3D printers and the specialized materials needed
for more advanced applications (like metal or biocompatible materials) can
be quite expensive, making it cost-prohibitive for some users or industries.

Future of Digital Technology


Against the backdrop of the coronavirus pandemic, the world was forced to adopt
a digital transformation plan, tools, and technologies to keep the industrial sectors
afloat. Even though this accelerated integration of digitalization in the traditional
operative structure seemingly seemed successful, it still requires certain changes
and improvements that can later elevate the industrial working pattern in the
digital sector. One of the most crucial trends in this digital integration has been
the performance of industrial and business operations from remote locations.
While the concept of remote operation was available to organizations before the
pandemic, the strict health guidelines converted this concept into a practical
reality. The future of Digital Transformation consists of some crucial aspects.

These aspects can be categorized into the following: -


· The access to remote operations is expected to be enhanced.
· The concept of employee well-being is expected to become an organisational
priority.
· Digital twin computing capacity may enable predictive analytics.
· No code platforms may develop to help anyone in creating business applications
with ease.
· Quantum and edge computing is expected to ring in a new era in digital
transformation.
· All photonics networks are expected to make the end-to-end transmission of
information possible. This transmission between the terminal and server will help
in creating a technologically sustainable environment.

Current trends influencing Digital Transformation


The pandemic proved to be devastating for several organizations as their business
collapsed. But, on the other hand, the crisis also accelerated the adoption of
technology within various industries across the globe. The major integration of
technology into the traditional business structures has led to the rise of certain
trends that have the potential of dictating the future of Digital Transformation.
These trends can be enumerated in the following manner:-

 5G becoming the reality


In the post-pandemic world, work in the digital platform has become the
new normal, and organizations are increasingly attempting to operate their
business from remote environments. While the concept of 5G had been in
discussion in the past year itself, it isexpected to become a technological
prominence. As this network is expected to provide unprecedented speed
and connectivity to the users, it is capable of providing a reliable
connection. The mainstreaming of 5G connectivity can enhance the user
experience and improve the process of Digital collaboration which
subsequently will accelerate the digital transformation.

 Blockchain development
The rapid technological advancement in the wake of COVID-19 has
brought the concept of blockchain to the limelight. While the concept has
emerged from the understanding of cryptocurrency, it is increasingly being
adopted and implemented in several other industries especially into the
structure of financial institutions. The capabilities of the Blockchain are
continually being contemplated by organizations all over the world. It is
expected that Blockchain might play a crucial role in cybersecurity and
might be increasingly used in industries in the future.

 Prioritization of Cybersecurity
The pandemic led to a major shift of business from the traditional forms of
business into the digital platform. This resulted in the increased use of
vulnerable data among organizations. In addition to this, consistent cyber-
attacks on organizations across the globe have brought the concept of cyber
security into the limelight. It is becoming a very crucial issue for companies
across the globe. The increasing investment in cyber security is a future
trend within Digital Transformation.

 Transformation to Digital Banking


The finance and banking sector’s digital transformation was the most
affected among the industries during the pandemic. The strict government
guidelines forced the banking sector to provide most of its important
services through the digital platform. The increasing adoption of Digital
Transformation can be expected within this sector to improve the digital
banking processes and enhance customer experiences.

 Growth of the multi-cloud system


In the post-pandemic world, organizations are increasingly moving to the
clou..d platform. This will inadvertently lead to the growth of the multi-
cloud system. As the system has the potential to remove the common issues
faced by providers and the vendor lock-ins, multi-cloud systems can be
expected to flourish increasingly shortly and shape the process of Digital
Transformation.

You might also like