0% found this document useful (0 votes)
4 views46 pages

Chapter 7 Lecture

Chapter 7 discusses various emerging technologies including nanotechnology, biotechnology, blockchain, cloud computing, quantum computing, autonomic computing, computer vision, embedded systems, and cybersecurity. Each technology is explored in terms of its principles, applications, and advantages, highlighting their potential impact across multiple industries. The chapter emphasizes the importance of these technologies in advancing fields such as medicine, agriculture, and data management.

Uploaded by

ah4710519
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views46 pages

Chapter 7 Lecture

Chapter 7 discusses various emerging technologies including nanotechnology, biotechnology, blockchain, cloud computing, quantum computing, autonomic computing, computer vision, embedded systems, and cybersecurity. Each technology is explored in terms of its principles, applications, and advantages, highlighting their potential impact across multiple industries. The chapter emphasizes the importance of these technologies in advancing fields such as medicine, agriculture, and data management.

Uploaded by

ah4710519
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 46

Chapter- 7

Other Emerging
Technologies

1
Nanotechnology
Nanotechnology is science, engineering, and technology
conducted at the nanoscale, which is about 1 to 100
nanometers.
Nanoscience and Nanotechnology are the study and
application of extremely Small Things and can be used
across all the other science fields, such as chemistry,
biology, physics, materials science, and engineering.
Nanoscience and nanotechnology involves the ability to see
and to control individual atoms and molecules.
Nanoscience as the study of phenomena and manipulation of
materials at atomic, molecular and macromolecular scales. 2
Applications of Nanotechnology
 Medicine: Customized
nanoparticles the size of
molecules that can deliver drugs
directly to diseased cells in
your body.

➢ Electronics: It has some answers


for how we might increase the
capabilities of electronics devices
while we reduce their weight and
power consumption. 3
Cont’
d
➢ Food: It has an impact on several
aspects of food science, from how
food is grown to how it is packaged.
 Companies are developing
nanomaterials that will make a
difference not only in the taste of food
but also in food safety and the health
benefits thatNanotechnology
Agriculture: food delivery. can possibly
change the whole agriculture part and
nourishment industry anchor from generation
to preservation, handling, bundling,
4
Cont’
d
 Vehicle Manufacturers: Much
like aviation, lighter and stronger
materials will be valuable for
making vehicles that are both
quicker and more secure.
 In Space Technology:
Reduction in Rocket Fuel.
Larger material strength.

5
Biotechnolo
“Biotechnology is technology based on Biology.”

gy and bimolecular processes to


Biotechnology harnesses cellular
develop technologies and products.
 Genetic Engineering is the process of transferring individual
genes between organisms or modifying the genes in an
organism to remove or add a desired trait or characteristic.
New technologies and products are developed every year within
the different areas:
 Medicine (development of new medicines and therapies),
Agriculture (development of genetically modified plants,
biofuels, biological treatment) or Industrial biotechnology
6
Application of
Biotechnology
 Agriculture (Green Biotechnology): Biotechnology had
contributed a lot to modify the genes of the organism known
as Genetically Modified Organisms such as Crops,
Animals, Plants, Fungi, Bacteria, etc.
 Genetically modified crops are formed by the manipulation
of DNA to introduce a new trait into the crops.
Medicine (Medicinal Biotechnology): This helps in the
formation of genetically modified insulin known as humulin.
This helps in the treatment of a large number of diabetes
patients.
7
Blockchain
 BlockchainTechnology
is a growing list of records, called blocks, that are
linked using cryptography.
“Blocks” on the blockchain are made up of digital pieces of
information.
 Each block contains a cryptography hash of the previous
block, a timestamp, and transaction data.
 A Blockchain is a time-stamped series of immutable records
of data that is managed by a cluster of computers not owned
by any single entity.
 Blockchain is a chain of blocks which contain information and
each of these blocks of data is secured.
8
Cont’
d

9
The three Pillars of Blockchain
Technology
The three main properties of Blockchain Technology are:
1. Decentralization
➢ An information is not stored by one single entity.
 Everyone in the network owns the information.
➢ If you wanted to interact with your friend then you can
do so directly without going through a third party. That
was the main ideology behind Bitcoins.
2.
Transparency
Person’s real identity is secure, and all the
transactions that were done by their public address
10
3.
o
Immutability
Once something has been entered into the blockchain, it
cannot be tampered with.
o The reason why the blockchain gets this property is that of
the cryptographic hash function.
o Crypto currencies like bitcoin, the transactions are
taken as input and run through a hashing algorithm
(Bitcoin uses SHA-256) which gives an output of a fixed
length.

11
Cont’
d

 The reason why the blockchain has gained so


much admiration is that:
 It is not owned by a single entity, hence it is
decentralized.
 The data is cryptographically stored inside.
 The blockchain is immutable, so no one can
tamper with the data that is inside the blockchain
 The blockchain is transparent so one can track the
data if they want to. 12
Application of Blockchain
A. The Sharing Economy
➢ Companies like Uber and Airbnb flourishing, the sharing economy is
already a proven success.
B. Crowd Funding
➢ Crowd funding initiatives like Kick starter and Go Fund Me are doing
the advance work for the emerging peer-to-peer economy.
C. Governance
 By making the results fully transparent and publicly accessible,
distributed database technology could bring full transparency to
elections or any other kind of poll taking.
D. Supply Chain Auditing
➢ Consumers increasingly want to know that the ethical claims
companies make about their products are real.
13
Cloud
Computing
 Cloud computing is a means of networking remote
servers that are hosted on the Internet.

Service
cloud Models 14
Cont’d
Three types of cloud:
1. Public Cloud: A third-party provider manages
the servers, applications, and storage much
like a public utility.
2. Private cloud: Hosted on organizations onsite
datacenter.
3. Hybrid Cloud. The private clouds are connected
to public clouds, allowing data and applications
to be shared between them. 15
Cont’d
Cloud computing services can focus on
infrastructure, web development or a cloud-based app.
Infrastructure as a Service (IaaS) gives you
management of the whole deal: servers, web
development tools, applications.
Example : WWW

User: IT
16
Cont’d
Platform as a Service (PaaS) offers a complete
web development environment, without the
worry of the hardware that runs it.

User: software 17
Cont’
d
 Software as a Service (SaaS) allows access to
cloud-based apps, usually through a web browser
interface. SaaS is the top of the stack.
IBM, Amazon, and Google have offered commercially
viable, high-capacity networks.

User: End 18
Advantages of Cloud
 Cloud Computing
providers have vast resources of computing power at
their fingertips.
 Cloud providers source on a global scale.
 They can deliver the precise bandwidth, storage and power
business needs when it needs it.
 The cloud allows you and multiple users to access your data
from any location.
 Smartphone, laptop, desktop, wherever you are, you can
access the data you need at any time.
 With cloud computing a business processes its data more
efficiently, increasing productivity.
19
Quantum
 Quantum Computing
computers truly do represent the next
generation of computing.
 Give clients access to a quantum computer over the
internet.
 Currently, the only organization which provides a quantum
computer in the cloud is IBM.
 With a quantum computer, the data is stored in qubits.

20
Cont’
d
 Qubit stands sequence of quantum bits. Quantum
computers are big machines.
 With a classic computer, data is stored in tiny
transistors that hold a single bit of information, either
the binary value of 1 or 0.
 Thanks to the mechanics of quantum physics, where
subatomic particles obey their own laws, a qubit can
exist in two states at the same time.
 This phenomenon is called superposition.
A qubit can have a value of 1, 0, or some value
21
between.
Advantages of Quantum
 Getting a quantum computer to function usefully is an exciting
Computing
prospect for scientists.
Gargantuan computing power would allow them to crunch very
long numbers.
 They would be able to make complex calculations that would
only overwhelm classic computers.
Accessing a cloud-based quantum computer combines the
benefits of both technologies exponentially.
Quantum computing could help in the discovery of new drugs,
by unlocking the complex structure of chemical molecules.
With its ability to handle more complex numbers, data could 22be
Autonomic Computing (AC)
AC is an approach to address the complexity and evolution
problems in software systems.
It is a self-managing computing model.
Control the functioning of computer applications and
systems without input from the user.
The goal of autonomic computing is to create systems that run
themselves, capable of high-level functioning while keeping the
system's complexity invisible to the user.
It refers to the self-managing characteristics of distributed
resources, adapting to unpredictable changes while hiding
intrinsic complexity to operators and users.
23
Characteristics of Autonomic
Systems
 An autonomic system:
o Self-configure at runtime to meet changing operating
environments
o Self -tune to optimize its performance
o Self-heal when it encounters unexpected obstacles during
its operation, & of particular current interest.
o Protect itself from malicious attacks.
o Self-manage anything including a single property or multiple
properties.

24
Cont’d
➢ Self-Awareness: An autonomic application/system
“knows itself” and is aware of its state and its behaviors.
➢ Self-Configuring: An autonomic application/system
should be able to configure and reconfigure itself under
varying and unpredictable conditions.
➢ Self-Optimizing: An autonomic application/system
should be able to detect suboptimal behaviors and
optimize itself to improve its execution.
➢ Self-Healing: An autonomic application/system should
be able to detect and recover from potential problems
and continue to function smoothly. 25
Cont’d

Self-Protecting: An autonomic application/system should be


capable of detecting and protecting its resources from both
internal and external attacks and maintaining overall system
security and integrity.
Context-Aware: An autonomic application/system should be
aware of its execution environment and be able to react to
changes in the environment.
Open: An autonomic application/system must function in a
heterogeneous world and should be portable across multiple
hardware and software architectures.
➢Anticipatory: An autonomic application/system should26be
Computer Vision
 It is an interdisciplinary scientific field that deals with how
computers can be made to gain a high- level understanding
of digital images or videos.
 Computer vision tasks include methods for acquiring,
processing, analyzing and understanding digital images,
and extraction of high-dimensional data from the real world in
order to produce numerical or symbolic information. e.g. in the
forms of decisions.
 This image understanding can be seen as the disentangling
of symbolic information from image data using models
constructed with the aid of geometry, physics, statistics,
27
How Computer Vision Works
1.Acquiring an Image: Images, even large sets,
can be acquired in real-time through video,
photos or 3D technology for analysis.
2. Processing an Image: Deep learning models
automate much of this process, but the models
are often trained by first being fed thousands of
labeled or pre-identified images.
3.Understanding an Image: The final step is the
interpretative step, where an object is identified
28
Cont’d

There are many types of computer vision that are used in


different ways:

➢ Image segmentation partitions an image into


multiple regions or pieces to be examined separately.
➢ Object detection identifies a specific object in an
image.
Advanced object detection recognizes many objects in a
single image: a football field, an offensive player, a
defensive player, a ball and so on.
Facial Recognition is an advanced type of object
29
Cont’d
 Edge detection is a technique used to identify the
outside edge of an object or landscape to better identify
what is in the image.
Pattern detection is a process of recognizing repeated
shapes, colors and other visual indicators in images.
➢ Image classification groups images into different
categories.
➢ Feature matching is a type of pattern detection that
matches similarities in images to help classify them.
 Simple applications of computer vision may only use one
of these techniques, but more advanced users, like
30
Applications of Computer Vision

Computer vision is being used today in a wide variety of real-


world applications, which include:
➢Optical Character Recognition (OCR): reading handwritten
postal codes on letters (Figure 7.5a) and automatic number
plate recognition (ANPR);
➢Machine Inspection: rapid parts inspection for quality
assurance using stereo vision with specialized illumination to
measure tolerances on aircraft wings or auto body parts
(Figure 7.5b) or looking for defects in steel castings using X-
ray vision;
31
Cont’d
➢Medical imaging: registering pre-operative and intra-
operative imagery (Figure 7.5d) or performing long-term
studies of people’s brain morphology as they age;
➢Automotive safety: detecting unexpected obstacles such as
pedestrians on the street, under conditions where active
vision techniques such as radar or lidar do not work well
(Figure 7.5e).
➢Surveillance: monitoring for intruders, analyzing highway
traffic (Figure 7.5f), and monitoring pools for drowning
victims;
➢ Fingerprint Recognition and Biometrics: for automatic
32
Cont’d

33
Embedded
Systems
 It is a controller with a dedicated
function within a larger
mechanical or electrical system,
often with real-time computing
constraints.
 It is embedded as part of a
complete device often including
hardware and mechanical parts.
 Modern embedded systems are
(i.e. microprocessors with integrated memory and peripheral
often based on
interfaces), but ordinary microprocessors 34
Cont’d
(using external chips for memory
and peripheral interface circuits)
are also common, especially in
more complex systems.
A common standard class of
dedicated processors is the
Digital Signal Processor (DSP).
A combination of hardware and
software which together form a
component
Note: 98%ofof
a all
larger machine
microprocessors manufactured are used in
embedded systems. 35
Advantages and Disadvantages of
Embedded System
Advantages of Embedded
➢ Easily Customizable .
➢ Low power consumption .
➢ Low cost.
➢ Enhanced performance.
 Disadvantages of Embedded systems
➢ High development effort.
➢ Larger time to market .
36
Basic Structure of an Embedded
System

➢ Sensor−It measures the physical quantity and converts it to an


electrical signal which can be read by an observer or by any
electronic instrument like an A2D converter.
 A sensor stores the measured quantity to the memory.
37
Cont‘d

A2D Converter−An analog-to-digital converter


converts the analog signal sent by the sensor into a
digital signal.
➢ Processor & ASICs−Processors process the data to
measure the output and store it to the memory.
D-A Converter −a D-A converter converts the digital
data fed by the processor to analog data.
➢Actuator−An actuator compares the output given by
the D-A Converter to the actual (expected) output
stored in it and stores the approved output. 38
Cybersecurit
o It is the protection of computer systems from the theft of or

y
damage to their hardware, software, or electronic data, as
well as from the disruption or misdirection of the services
they provide.
o The field is becoming more important due to increased
reliance on computer systems,
 The Internet and wireless network standards such as
Bluetooth and Wi-Fi, and due to the growth of smart devices,
including smartphones, televisions, and the various devices
that constitute the IoTs.
Due to its complexity, both in terms of politics and
39
Cont’
d
Cyber security is often confused with information
security but it focuses on protecting computer systems
from unauthorized access or being otherwise damaged
or made inaccessible.
Information Security is a broader category that looks to
protect all information assets, whether in hard copy or in
digital form.
The term cybercrime is used to describe an unlawful
activity in which computer or computing devices such as
smartphones, tablets, Personal Digital Assistants (PDAs),
40
Cyber Security
The following
Measures
are some security measures to be taken to prevent
cybercrimes:
➢Staff Awareness Training:-Human error is the leading cause of
data breaches, so you need to equip staff with the knowledge to deal
with the threats they face.
➢Application Security:-Web application vulnerabilities are a
common point of intrusion for cybercriminals.
➢Network Security:-It is the process of protecting the usability and
integrity of your network and data.
➢Leadership Commitment:-It is the key to cyber resilience.
➢Password Management:-Almost half of the UK population uses
41
Types Of Cyber Security
➢Ransomware: - It is a typeThreats
of malicious software. It is designed to
extort money by blocking access to files or the computer system until
the ransom /money is paid..
 Malware:- it is a type of software designed to gain unauthorized
access or to cause damage to a computer.
➢Social Engineering: - it is a tactic that adversaries use to trick you
into revealing sensitive information.
o It can be combined with any of the threats listed above to make you
more likely to click on links, download malware, or trust a malicious
source.
➢Phishing: - it is the practice of sending fraudulent emails that
resemble emails from reputable sources. 42
Benefits of Cyber
The Security
following are the benefits of utilizing cyber security
include:
➢ Business protection against malware, ransomware,
phishing, and social engineering.
➢ Protection for data and networks.
➢ Prevention of unauthorized users.
➢ Improves recovery time after a breach.
➢ Protection for end-users.
➢ Improved confidence in the product for both
developers and customers
43
Cyber Security Vendors
 Vendors in cyber security fields will typically use endpoint, network
and advanced threat protection security as well as data loss
prevention. Three commonly known cyber security vendors include
Cisco,
McAfee, and
Trend Micro.

Additive Manufacturing (3D Printing)


IT is also known as 3D printing, uses computer-aided design to build
objects layer by layer.” said American Society for Testing and Materials
ASTM.
Author Deve Turbide puts it simply suggesting that AM is “the
44
industrial version of 3D printing .
3D Printing: It is all about the
Printer. a bytes-to-parts supply
Additive Manufacturing(AM):
chain.
AM is a big-picture term more at home in the boardroom
than the factory floor or garage.
AM describes types of advanced manufacturing that are
used to create three-dimensional structures out of
plastics, metals, polymers and other materials that
can be sprayed through a nozzle or aggregated in a vat.
45
46

You might also like