0% found this document useful (0 votes)
24 views

Emerging Note (C7) @NoteHeroBot

Uploaded by

themonster01111
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

Emerging Note (C7) @NoteHeroBot

Uploaded by

themonster01111
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

CLICK HERE 🎠 GET PREMIUM

Contents










Objectives








Introduction
• From time to time, existing technologies are always
improved and new technologies are invented.
• Presently, there are lots of new technologies under
development including the IoT, AI, AR and Big Data
which are presented in the previous chapters’ of this
course
• This chapter will cover additional emerging
technologies which will have prominent impact in the
world or in human life.
Nanotechnology Overview
• Science, engineering, and technology conducted at the nanoscale, which
is about 1 to 100 nanometers.
• Nanoscience and nanotechnology
– are the study and application of extremely small things
– can be used across all the other science fields, such as chemistry, biology,
physics, materials science, and engineering
– involve the ability to see and to control individual atoms and
molecules.
• Everything on Earth is made up of atoms
– the food we eat, the clothes we wear, the buildings and houses we live in,
and our own bodies
– Atoms are the building blocks for all matter in our universe.
Nanotechnology Applications

• Medicine: customized nanoparticles the size of molecules that


can deliver drugs directly to diseased cells in your body
• Electronic: to reduce their weight and power consumption
• Food: from how food is grown to how it is packaged
• Agriculture: from generation to preservation, handling,
bundling, transportation, and even waste treatment.
• Vehicle manufacturers: lighter and stronger materials will be
valuable for making vehicles that are both quicker and more
secure
Biotechnology Overview

• Technology based on biology


• It harnesses cellular and biomolecular processes to develop technologies
and products
– help improve our lives and the health of our planet.
• One example of modern biotechnology is genetic engineering.
– the process of transferring individual genes between organisms or
modifying the genes in an organism to remove or add a desired trait
or characteristic.
• Development of new medicine, genetically modified plants,
production of chemicals, paper, textiles, and food
Biotechnology Applications
• Medicine
– formation of genetically modified insulin known as humulin
• Agriculture
– Genetically Modified Organisms such as Crops, Animals, Plants, Fungi,
Bacteria,
• Aquaculture Fisheries
– helps in improving the quality and quantity of fishes
• Environment
–waste treatment and pollution prevention
• Industries
–production of chemicals, paper, textiles, and food
Blockchain Technology Overview
• A list of ledgers or records (blocks) which store data
permanently & publicly in a secure, chronological, and
immutable way.
– Secured using cryptography, not controlled by a central
authority, access to anyone in the network, everyone has copy of
the data.
– Blocks are made up of digital pieces of information and have
three parts which store information:
• about transactions like date, time, and amount.
• about who is participating in transactions.
• that distinguishes them from other blocks
Blockchain Technology Overview…..
• In order for a block to be added to the blockchain, four things must happen:
– A transaction must occur.
– That transaction must be verified
– That transaction must be stored in a block
– That block must be given a hash
• By design, a blockchain is resistant to modification of the data
• The blockchain network has no central authority; it is the very definition of a
democratized system.
• The first blockchain was conceptualized by a person (or group of people) known as
Satoshi Nakamoto in 2008.
• A blockchain carries no transaction cost.
• simple yet ingenious way of passing information from A to B in a fully automated
and safe manner. One party to a transaction initiates the process by creating a block
Blockchain Technology The three Pillars/properties

1. Decentralization
– The information is not stored by one single entity
2. Transparency
– A person’s identity is hidden via complex cryptography and
represented only by their public address.
3. Immutability
– In the context of the blockchain, means that once something has
been entered into the blockchain, it cannot be tampered with.
Blockchain Technology Why?

• Blockchain technology has become popular because of the


following.
Blockchain Technology applications

• The sharing economy


• Crowd funding
• Governance
• Supply chain auditing
• File storage
– Banking, Finance, Government, Healthcare, Insurance, Media
and Entertainment, Retail.
Cloud Computing Overview

• Delivery of on demand computing services from application to


storage and processing power over the internet on a pay-as-
you-go basis.
• Means of networking remote servers that are hosted on the
Internet.
• Deployment models
– Public, Private, Community, Hybrid
• Types
– Software as a service (SaaS), Platform as a service (PaaS),
Infrastructure as a service (IaaS)
Cloud Computing Advantages

• Cost saving
• High Speed and accessibility
• Back-up and restore data
• Automatic Software Integration
• Reliability
• Mobility
• Unlimited storage capacity
Quantum Computing Overview
• The next generation of computing using quantum physics.
– Quantum computers are big machines, need deep-freezing
• Currently, the only organization which provides a quantum computer in
the cloud is IBM.
– They allow free access to anyone who wishes to use their 5qubit
machine
• Google provided the fastest quantum computer with 53qubits and speed
of 200 seconds computation while the supercomputer took 10000
years.
– Qubit is short for a sequence of quantum bits (1, 0, or some value
between).
Quantum Computing Advantages
• For scientists to crunch very long numbers
• Help in the discovery of new drugs, by unlocking the complex structure
of chemical molecules.
• Other uses include
– financial trading
– risk management
– supply chain optimization
• Data transferred over the internet with much safer encryption
Autonomic Computing (AC) Overview

• Self-managing computing model named after, and patterned on,


the human body's autonomic nervous system.
• AC systems would control the functioning of computer
applications and systems without input from the user
• Its goals is to create systems that run themselves, capable of
high-level functioning while keeping the system's complexity
invisible to the user.
• Refers to the self-managing characteristics of distributed
resources, adapting to unpredictable changes while hiding
intrinsic complexity to operators and users.
Autonomic Computing (AC) Characteristics
• Self-Awareness:“knows itself”.
• Self-Configuring: configure and reconfigure itself
• Self-Optimizing: detect suboptimal behaviors and optimize itself to
improve its execution.
• Self-Healing: detect and recover from potential problems and continue
to function smoothly.
• Self-Protecting: detecting and protecting its resources from attacks.
• Context-Aware: aware of its execution environment and be able to
react to changes in the environment.
• Open: must function in a heterogeneous world
• Anticipatory: manage itself proactively
Computer Vision Overview
• It is an interdisciplinary scientific field that deals with how computers
can be made to gain a high level understanding of digital images or
videos.
• From the perspective of engineering, it seeks to automate tasks that the
human visual system can do.
• Computer vision tasks include methods for acquiring, processing,
analyzing and understanding digital images, and extraction of high-
dimensional data from the real world in order to produce numerical or
symbolic information.
• Computer vision is building algorithms that can understand the content
of images and use it for other applications➔ application perspective
Computer Vision How it works?
• Acquiring an image➔ Processing the image➔ Understanding
the image
• There are many types of computer vision that are used in different
ways:
– Image segmentation
– Object detection
– Facial recognition
– Edge detection
– Pattern detection .
– Image classification groups images into different categories.
– Feature matching
Computer Vision Applications
– Optical character recognition (OCR)
– Machine inspection
– Retail
– Medical imaging
– Automotive safety
– Surveillance
– Fingerprint recognition and biometrics
Embedded Systems (ESs) Overview
• It is a controller with a dedicated function within a larger mechanical or
electrical system, often with real-time computing constraints.
• It is embedded as part of a complete device often including hardware and
mechanical parts.
• Embedded systems control many devices in common use today.
• 89% of all microprocessors manufactured are used in ESs.
• Modern ESs are often based on microcontrollers, but ordinary
microprocessors are also common, especially in more complex
systems.
• A common standard class of dedicated processors is the digital signal
processor (DSP).
Embedded Systems Advantages & Disadvantages

• Advantages
– Easily Customizable
– Low power consumption
– Low cost
– Enhanced performance
• Disadvantages
– High development effort
– Larger time to market
Embedded Systems Basic Structure
Cyber Security Overview
• Protection of computer systems from the theft of or damage
to their hardware, software, or electronic data, as well as from
the disruption or misdirection of the services they provide.
• Cyber crime an unlawful activity in which computer or
computing devices are used as a tool or/and target of criminal
activity
–committed by the people of destructive and criminal
mindset either for
• Revenge
• greed or adventure
Cyber Security Measures
• Staff awareness training
• Application security
• Network security
• Leadership commitment
• Password management
Cyber Security Types of Threats
• Ransomware: designed to extort money by blocking access to files or
the computer system until the ransom is paid.
• Malware:- designed to gain unauthorized access or to cause damage in
to a computer
• Social engineering: a tactic that adversaries use to trick you into
revealing sensitive information.
– it is the practice of sending fraudulent emails that resemble emails from
reputable sources.
– The aim is to steal sensitive data like credit card numbers and login information.
– It’s the most common type of cyber-attack
Cyber Security Benefits & Vendors
• Business protection against malware, ransomware, phishing, and
social engineering.
• Protection for data and networks.
• Prevention of unauthorized users.
• Improves recovery time after a breach.
• Protection for end-users.
• Improved confidence in the product for both developers and
customers.
– Vendors use endpoint, network and advanced threat protection
security as well as data loss prevention
– Known venders ➔ Cisco, McAfee, and Trend Micro
Additive Manufacturing Overview
(3D Printing)
• The construction of a three-dimensional object from a CAD
model or a digital 3D model.
• Additive manufacturing (AM) describes types of advanced
manufacturing that are used to
– Create three-dimensional structures out of plastics, metals,
polymers and other materials that can be sprayed through a
nozzle or aggregated in a vat.
Additive Manufacturing Overview…..
(3D Printing)
• These constructs are added layer by layer in real time based on
digital design.
• The simplicity and low cost of AM machines, combined with the
scope of their potential creations,
– could profoundly alter global and local economies and affect
international security.

Reading Assignment
What is the difference between additive manufacturing and 3D printing
?

33

You might also like