SlideShare a Scribd company logo
1 of 70
Chapter 7
Other emerging technologies
1
Introduction
• We have seen emerging technologies like data science,
artificial intelligence, the internet of things and
augmented reality and their ethical issues.
• In this chapter, we are going to discuss other emerging
technologies like nanotechnology, biotechnology,
block-chain technology, cloud and quantum
computing, autonomic computing, computer vision,
embedded systems, cybersecurity, and 3D printing
2
1. Nanotechnology
• Nanotechnology is a field of applied sciences , engineering and
technologies involving the control of matter on conducted at the
nanoscale, which is about 1 to 1000 nanometers
• The control of matter on the atomic and molecular scale
• Nanotechnology are the study and application of extremely small
things
• Nanomaterials may exhibit different physical and chemical
properties compared with the same substances at normal scale,
such as increased chemical reactivity due to greater surface area.
3
Nanotechnology
• Nano + Technology
• A Nanometer is a unit of length in the metric system, equal to one
billionth of a meter(10-9).
• There are 25,400,000 nanometers in an inch
• A sheet of newspaper is about 100,000 nanometers thick
• Technology is the making, usage, and knowledge of tools,
machines and techniques, in order to solve a problem or perform a
specific function
• Most revolve around the study and control of phenomena and
materials at length scales below 100 nm and quite often they
make a comparison with a human hair, which is about 80,000
nm wide
4
How it started
• The ideas and concepts behind nanoscience and nanotechnology
started with a talk entitled “there’s plenty of room at the bottom” by
physicist Richard Feynman at an American Physical Society meeting
at the California Institute of Technology (Caltech) on December 29,
1959, long before the term nanotechnology was used.
• In his talk, Feynman described a process in which scientists would be
able to manipulate and control individual atoms and molecules.
• Over a decade later, in his explorations of ultraprecision machining,
Professor Norio Taniguchi coined the term nanotechnology. It wasn’t
until 1981, with the development of the scanning tunneling
microscope that could “see” individual atoms, that modern
nanotechnology
5
Example: nanotechnology
• Nanotube: Bulletproof business suit made from carbon
nanotube
• Nanofiber: Stimulus the body to regenerate lost or damaged
cell
• nanotech-coated treatments will guide drugs to harmful
cancer cells, while ignoring healthy cells
• Gray Goo: the Nano robots would consume all matter on
earth as they self-replicated, causing an apocalypse
• Damascus steel: blades made from it, could supposedly cut
through stone or metal; how to make it remains unknown
6
2. Biotechnology
• Biotechnology
• Bio: living organisms and Technology: is a use of techniques and science
to make products or modified processes
• Biotechnology is the study and manipulation of living things or their
component molecules, cells, tissues, or organs for the benefit of
humans (or other animals).
• This term has been used since the 1970’s to reflect the application of
exciting new technologies to the research and development of products
from plant and animal cells. Biotech Bio Byte Biotech Bio Byte
• The domain areas in Biotechnology can be simplified into eight
different concentrations such as Microbial, Agricultural, Animal,
Forensic, Bioremediation, Aquatic, Medical, and Regulatory.
7
The domain areas in Biotechnology
• Microbial Biotechnology: The manipulation of
microorganisms such as yeast and bacteria. Example:
Fermentation
• Agricultural Biotechnology: The genetic engineering of plants in
hopes of giving the plant pest resistance
• Producing foods with a higher protein or vitamin content
• Developing drugs that can be grown and isolated in plant products
8
The domain areas in Biotechnology
• Animal Biotechnology: This branch includes
• Using animals as a source of medically valuable proteins
• Antibodies : Using animals as an important model in basic
research
• Gene “knockout” experiments (where genes have been turned
off) •
• Designs and testing of drugs and genetic therapies
• Animal cloning
• Source of transgenic organs (animal organs that can be
transplanted into humans without fear of rejection).
9
The domain areas in Biotechnology
• Forensic Biotechnology: DNA fingerprinting Inclusion or exclusion
of a person from suspicion Paternity cases Identification of human
remains Endangered species Tracking and confirmation of the spread
of disease Bioremediation.
• Aquatic Biotechnology : Aquaculture – raising finfish or shellfish in
controlled conditions for use as food sources 30% of all fish consumed
by humans worldwide Genetic engineering Disease-resistant strains of
oysters Vaccines against viruses that infect salmon and other finfish
Rich and valuable sources of new genes, proteins and metabolic
processes with important applications for human benefits Marine
plankton and snails found to be rich sources of anti-tumor and
anticancer molecules
10
The domain areas in Biotechnology
• Medical Biotechnology: Involved with the whole spectrum
of human medicine Preventive medicine
• Diagnosis of health and illness
• Treatment of human diseases
• New information from Human Genome Project Gene therapy Stem
cell technologies
• Regulatory Biotechnology
• Quality Assurance (QA) : All activities involved in regulating the
final quality of a product Quality Control (QC) Part of QA process
that involves lab testing and monitoring of processes and
applications to ensure consistent product standards
11
History
• Biotechnology starts in early societies who collected seeds of wild
plants and domesticated some species of wild animals
• Biotechnology began 10 000 years ago when humans changed from
nomadic hunter – gatherers to farmers
• Occurred in a few sites at around the same time – South East Asia,
the “Fertile crescent” of the Middle East and in south central
Mexico
• Selected varieties of seeds that produced better quantity and quality of
crops and cultivated them
• Domesticated wild animals – kept certain species close to their homes
and allowed them to interbreed
12
History of biotechnology
• Early ancestors took advantage of microorganisms and used
fermentation to make breads, cheeses, yogurts, and alcoholic
beverages such as beer and wine.
• Fermentation is when strains of yeast decompose sugars to derive
energy, and in the process they produce ethanol (alcohol) and carbon
dioxide as a waste product
• When bread dough is being made, added yeast ferments sugar
releasing carbon dioxide, which causes the dough to rise and creates
holes in the bread. The alcohol produced by the yeast evaporates when
the bread is cooked.
13
Biotechnology
• Two important technique which enable development of
modern biotechnology:
1. Alteration of chemistry of DNA & RNA to introduce into host
organism to change phenotype of host- Genetic engineering
2. Maintenance of sterile ambience to enable growth of desired
microbe/ eukaryotic cell in large quantities for manufacture of
biotechnological products like vaccine, enzymes, beverages,
drugs etc.- Chemical engineering
14
3. Blockchain technology
• Block chain technology is an emerging technology that changes
the way applications and users interact with the internet.
• It is a distributed database that maintains a chain(i.e.
chronologically ordered) of blocks(i.e. records).
• Block chain technology is a structure that stores transactional
records, also known as the block, of the public in several
databases, known as the “chain,” in a network connected through
peer-to-peer nodes. Typically, this storage is referred to as a
‘digital ledger.’
• Every transaction in this ledger is authorized by the digital
signature of the owner, which authenticates the transaction and
safeguards it from tampering. Hence, the information the digital
ledger contains is highly secure.
15
History : Block chain technology
• Noble Prize-winning economist Milton Friedman said in 1999, “The
one thing that is missing is a reliable e-cash, whereby on the internet
you can transfer funds from A to B without A knowing B or B
knowing A. It would be one of the major forces for reducing the role
of government.”
• 10 years later, The block chain was invented by a person (or group of
people) using the name Satoshi Nakamoto in 2008 to serve as the
public transaction ledger of the cryptocurrency bitcoin.
• There is no information about the developer of this projects. The
project is bitcoin.
16
17
Block chain Explained
• When we say the words “block” and “chain” in this context,
we are actually talking about digital information (the “block”)
stored in a public database (the “chain”).
• “Blocks” on the blockchain are made up of digital pieces of
information. Specifically, they have three parts:
• Blocks store information about transactions like the date, time, and
dollar amount of your most recent purchase from Amazon.
• Blocks store information about who is participating in transactions.
• Blocks store information that distinguishes them from other blocks.
Much like a unique code called a “hash” that allows us to tell it
apart from every other block. Hashes are cryptographic codes
created by special algorithms.
18
Characteristics
• Openness
• Database is open, in
principle, to anyone.
• Based on open source
software technology.
• Decentralization
• Decentralized ledger
• Distributed Networking
• Security
• Encryption using Public Key
Cryptography.
• Hash function.
• Resilience
• Archiving information
• Database replication
• And many more:
Immutability, consensus,
traceability…
19
How Block chain Works
• When a block stores new data it is added to the block chain.
In order for a block to be added to the block chain, four
things must happen:
• A transaction must occur.
• That transaction must be verified. After making that purchase, your
transaction must be verified. With other public records of
information, like the Securities Exchange Commission or your
local library, there’s someone in charge of vetting new data entries.
• That transaction must be stored in a block. After your transaction
has been verified as accurate, it gets the green light.
• That block must be given a hash. once all of a block’s transactions
have been verified, it must be given a unique, identifying code
called a hash.
20
Why do people use the peer-to-peer network?
• The primary goal of peer-to-peer networks is to share
resources and help computers and devices work
collaboratively, provide specific services, or execute specific
tasks.
• As mentioned earlier, P2P is used to share all kinds of
computing resources such as processing
power, network bandwidth, or disk storage space.
21
Application of block chain
• Numerous Blockchain applications and platforms are widely
known, starting with Bitcoin, followed by Ethereum, which
act as a platform for building decentralized applications using
smart contracts and inspired a whole new concept of “token
economy.”
• Emerging applications in voting, digital identity, banking, and
health
22
4. Cloud and quantum computing
• A quantum computer is a machine that performs calculations based on
the laws of quantum mechanics, which is the behavior of particles at
the sub-atomic level.
• Cloud computing is a way of accessing compute and storage systems
without actually owning and doing active management of the
resources.
• Cloud computing is a model for enabling convenient, on-demand
network access to a shared pool of configurable computing resources
(e.g., networks, servers, storage, applications, and services) that can be
rapidly provisioned and released with minimal management effort or
service provider interaction.”
23
Advantages of cloud computing
• Benefits of Cloud Computing On-demand self-service Broad
network access Resource pooling Rapid elasticity Measured
service Lower costs Ease of utilization Quality of Service
Reliability Outsourced IT management Simplified
maintenance and upgrade Low barrier to entry
• Cloud computing permits you to access data outside from
your computing environment.
• Cloud computing gives you the opportunity to set up a virtual
office and get connected to your business anywhere.
24
Advantages of cloud computing
• With web-enabled devices like smart phones and tablets that
are ultimately provide ease to access data.
• There are 4 cloud computing models with respect to
security and business needs. These four are:
• Private Cloud
• Community Cloud
• Public Cloud
• Hybrid Cloud
25
Advantages of cloud computing
1. Cost Proficient
2. More Security
3. More Flexible
4. More Scalability
5. Automatic Software
Integration
6. Infinite Storage
7. Rapid Development
1. Higher Economical Graph
2. Globalization of Work &
Streamline Workflow
3. Effective Monitoring
4. Lower Personal Training Cost
5. Disaster Recovery
6. Document Control
7. Document Control
26
Cons of Cloud Computing
• As made obvious from above, Cloud Computing offers
immense advantages to the adopters. On the other hand, it
also comes with some problems and we can say
disadvantages.
• Technical Limitations
• Higher Vulnerability Issues
• Security & Privacy Concerns
• Implicit Dependency on Providers
• Cloud Computing Services & Solution are Tricky
27
5. Quantum computing
• The word "quantum", in quantum computer, originates from
"quantum mechanics," a basic theory in physics.
• The scale of atoms and molecules, matter behaves in a quantum
manner
• A quantum computer is a machine that performs calculations
based on the laws of quantum mechanics, which is the
behavior of particles at the sub-atomic level.
• In existing computers, all information is expressed in terms of
0s and 1s, and the entity that carries such information is
called a "bit.“
28
Quantum Computers Vs Computers
• A bit can be in either a 0 or 1 state at any one moment in time
• A quantum computer, on the other hand, uses a “quantum bit”
or "qubit" instead of a bit.
• A qubit also makes use of two states (0 and 1) to hold
information, but in contrast to a bit,
• In this state, a qubit can take on the properties of 0 and 1
simultaneously at any one moment.
• Accordingly, two qubits in this state can express the four
values of 00, 01, 10, and 11 all at one time
29
Quantum computing
• IBM scientists have built a quantum processor that any user
can access through the first quantum computing platform
available in the cloud
• IBM Quantum Experience, allows users to execute
algorithms and experiments on a real quantum processor
• IBM Q: IBM announces the building of a quantum computer
of 50 qubits and that will offer services of quantum
computation in the cloud
30
Google
• In October 2019, Google made a big announcement. It
announced its 53-qubit quantum computer named
Sycamore had achieved ‘quantum supremacy.’ That’s
when quantum computers can complete tasks
exponentially more quickly than their classical
counterparts.
• In this case, Google said its quantum machine
completed a task in 200 seconds that would have taken
the world’s most powerful computer 10,000 years to
complete.
31
Features of a Quantum Computer
• Superposition
• Entanglement
• Keeps the Coherence
• It has Quantum Bits a.k.a. Qubits: is the quantum concept of a bit.
It’s a logical concept that can be implemented on a wide range of
different systems with quantum behavior.
• As a bit, a single qubit can represent two states 0 and 1
• New algorithms and communication
• Maximum exploitation
32
Application of quantum computing
• Healthcare: improve the quality of healthcare and assist in
medical research as well. It could collect and sort through all
the possible gene variants simultaneously and discover the
most effective treatments and drugs for diseases caused by
genomics mismatches.
• Finance: Quantum computing could be used to develop
futuristic financial modeling tools and algorithms for
assisting the areas of financial services, investment, and risk
management.
• Cybersecurity: Another area where this technology could
help is cybersecurity as it has the potential to secure data
through powerful post-quantum cryptography solutions.
33
Application of quantum computing
• Energy: The energy sector could leverage quantum
computing solutions for managing resources from diverse
sources and addressing the challenges related to energy
optimization where classical computers have limitations.
• Agriculture: Another industry that could benefit from
quantum computing is agriculture as the technology could
enable the creation of high-quality fertilizers through novel
catalytic combinations in replacement of the conventional
ammonia-based fertilizers.
34
Advantages of quantum computing
• It may be possible to solve a problem on a quantum system much
faster (i.e., using fewer steps) than on a classical computer
• Factorization and searching are examples of problems where
quantum algorithms are known and are faster than any classical
ones
• Implications for cryptography, information security
• Study of quantum algorithms and quantum computation is
important in order to make assumptions about adversary’s
algorithmic and computational capabilities
• Leading to an understanding of the computational power of
quantum vs classical systems
35
Advantages of quantum computing
• Could process massive amount of complex data.
• Ability to solve scientific and commercial problems.
• Process data in a much faster speed.
• Capability to convey more accurate answers.
• More can be computed in less time.
• These are used to protect secure Web pages, encrypted email,
and many other types of data.
36
Dis Advantages of quantum computing
• Hard to control quantum particles
• Lots of heat
• Expensive
• Difficult to build
• Not suitable for word processing and email.
• Problem of it need of a noise free & Cool Environment.
• Complex hardware schemes like superconductors
37
5. Autonomic computing (AC)
• Autonomic computing is a computer's ability to manage itself
automatically through adaptive technologies that further
computing capabilities and cut down on the time required by
computer professionals to resolve system difficulties and other
maintenance such as software updates.
• The move toward autonomic computing is driven by a desire for
cost reduction and the need to lift the obstacles presented by
computer system complexities to allow for more advanced
computing technology
• It is one of the building blocks of pervasive computing, an
anticipated future computing model in which tiny - even invisible
- computers will be all around us, communicating through
increasingly interconnected networks leading to the concept of
The Internet of Everything (IoE).
38
Autonomic computing (AC)
• IBM has defined the four areas of automatic computing
• Self-Configuration
• Self-Healing (error correction)
• Self-Optimization (automatic resource control for optimal
functioning)
• Self-Protection (identification and protection from attacks in a
proactive manner)
• Knows itself, adapt itself, open itself
• Characteristics that every autonomic computing system
should have include automation, adaptivity and awareness.
39
Autonomic computing (AC)
• AC was designed to mimic the human body’s nervous system-in that
the autonomic nervous system acts and reacts to stimuli independent
of the individual’s conscious input-an autonomic computing
environment functions with a high level of artificial intelligence while
remaining invisible to the users.
• Just as the human body acts and responds without the individual
controlling functions (e.g., internal temperature rises and falls,
breathing rate fluctuates, glands secrete hormones in response to
stimulus), the autonomic computing environment operates organically
in response to the input it collects.
40
IBM has set conditions that define an AC
1. The system must know itself in terms of what resources it has access
to, what its capabilities and limitations are and how and why it is
connected to other systems
2. The system must be able to automatically configure and reconfigure
itself depending on the changing computing environment.
3. The system must be able to optimize its performance to ensure the
most efficient computing process.
4. The system must be able to work around encountered problems by
either repairing itself or routing functions away from the trouble.
41
IBM has set conditions that define an AC
1. The system must detect, identify and protect itself against various
types of attacks to maintain overall system security and integrity.
2. The system must be able to adapt to its environment as it changes,
interacting with neighboring systems and establishing
communication protocols.
3. The system must rely on open standards and cannot exist in a
proprietary environment.
4. The system must anticipate the demand on its resources while
keeping transparent to users.
42
Benefits
• Reducing maintenance costs.
• Fewer personnel will be required to manage the systems.
• Reduced deployment and maintenance cost , time and increased
stability of IT systems through automation
• Allowing companies to better manage their business through IT
systems that are able to adopt and implement directives based on
business policy, and are able to make modifications based on changing
environments.”
• Another benefit of this technology is that it provides server
consolidation to maximize system availability, and minimizes cost and
human effort to manage large server farms
43
6. Computer vision
• Computer vision is a field that includes methods for acquiring,
processing, analyzing, and understanding images
• Computer vision spans all tasks performed by biological vision
systems, including "seeing" or sensing a visual stimulus,
understanding what is being seen, and extracting complex information
into a form that can be used in other processes.
• Computer vision is the science and technology of machines that see.
Concerned with the theory for building artificial systems that obtain
information from images. The image data can take many forms, such
as a video sequence, depth images, views from multiple cameras, or
multi-dimensional data from a medical scanner
44
45
46
History : Computer vision
• 1966: Minsky assigns computer vision as an undergrad summer
project
• 1960’s: interpretation of synthetic worlds
• 1970’s: some progress on interpreting selected images
• 1980’s: ANNs come and go; shift toward geometry and increased
mathematical rigor
• 1990’s: face recognition; statistical analysis in vogue
• 2000’s: broader recognition; large annotated datasets available; video
processing starts; vision & graphis; vision for HCI; internet vision, etc.
Guzman ‘68 Ohta Kanade ‘78 Turk and Pentland ‘91
47
48
How computer vision works
• Computer vision is all about pattern recognition
• When a computer sees an image, it only sees an array of
numbers that represent intensities and colors of the image, but
not the image itself.
• There’s no context, and that’s what’s needed to get algorithms
to comprehend an image the same way a human does
• By feeding a Machine Learning model enough data, we can
make it highly accurate.
49
Applications of computer vision
• Below are examples of computer vision:
• Autonomous Vehicles - Self-driving cars need to gather information about
their surroundings to decide how to behave.
• Facial Recognition - Businesses and personal electronics use facial
recognition technology to "see" who is trying to gain access to something. It
has become a powerful security tool.
• Image Search and Object Recognition - Many applications use data vision
theory to identify objects within images, search through catalogues of images,
and extract information out of images.
• Robotics - Most robotic machines, often in manufacturing, need to see their
surroundings to perform the task at hand. In manufacturing machines may be
used to inspect assembly tolerances by "looking at" them.
50
7. Embedded systems
• It is a micro-controller based system that is designed to
control a function or a range of function, and is not
meant to be programmed by end user.
• The user can con not make modification to the software
• The user may make a choice concerning the functionality
but can not change them
• Computers are embedded with in other devices
51
7. Embedded systems
• Other devices : camera, vehicle, refrigerator, printer, air plane, air
conditioner, VCD Player, DVD player, printer, fax machine,
mobile phone
• Each of these appliances will have a processor with the embedded
software to meet the specific requirement of the application.
• Also defined as a computing device that does a specific focused
job.
• An embedded system is a combination of hardware and software,
which can be embed in another larger system
• The embedded software is also called ‘firmware’.
52
Embedded systems feature
• They are special-purpose or single functioned
• Execute a single program, possibly with input from
• They must react to events in real time
• Respond to input from the systems environment
• Must compute certain results in real time with out delay
• Applications
• Consumer(e.g. refrigerator, camera, microwave) , office automation
(e.g. printer), automobile(e.g. engine control, air bag),
communication, home appliances
53
8. Cybersecurity : Definition
• Cyber security refers to the protection of internet connected
systems including hardware, software, or data from the cyber
attack or cyber criminals.
• Cyber: computer system, network, or program
• Security: system security, network security, data or program
security
• Illegal access, Interception, System Interference, Data
Interference, Misuse of devices, or Fraud
54
Cybersecurity measures
• Cyber security is the practice of defending computers, servers,
mobile devices, electronic systems, networks, and data from
malicious attacks.
• The term applies in a variety of contexts, from business to mobile
computing, and can be divided into a few common categories.
• Network security
• Application security
• Information security
• Disaster recovery and business continuity
• End-user education
• Operational security
55
Types of cybersecurity threats
• The threats countered by cyber-security are three-fold:
1. Cybercrime includes single actors or groups targeting systems for financial
gain or to cause disruption.
2. Cyber-attack often involves politically motivated information gathering.
3. Cyberterrorism is intended to undermine electronic systems to cause panic or
fear.
• So, how do malicious actors gain control of computer systems? Here
are some common methods used to threaten cyber-security:
• Malware, Spyware, virus, trojan hose, Ransomware, Botnets, adware
• SQL injection, Phishing, Denial-of-service attack, Man-in-the-middle
attack
56
Benefits of cybersecurity
• Defend us from critical attacks.
• To browse the various websites securely.
• To protect sensitive data, protect private data , protect
financial data
• To protect intellectual property
• To protect national security
• To protect global economy
57
Cybersecurity components
• Confidentiality
• Integrity
• Authenticating
• Availability
• Access control
58
Cybersecurity vendors
• Vendors in cybersecurity fields typically use endpoint, network and
advanced threat protection security as well as data loss prevention. Top
Cybersecurity Companies in 2020
• Splunk. Splunk Inc. ...
• Cyren. Cyren (NASDAQ: CYRN) provides more than 1.3 billion users around
the world with cloud security solutions to protect them against cyber-
attacks every day.
• Proofpoint. Proofpoint, Inc. ...
• NortonLifeLock. NortonLifeLock Inc. ...
• Rapid7, Radware, Mimecast., CrowdStrike.
• Cisco, McAfee and Trend Micro.
59
9. Additive manufacturing (3D Printing)
• Manufacturing is a process in which raw materials are
transformed into finished goods
• Additive Manufacturing refers to a process by which 3D design
data is used to build up a component in layers by depositing
materials.
• It eliminates many constraints imposed by conventional
manufacturing
• The term 3D printing is increasingly used as a synonymous for
AM. However, the better is more accurate in that it describes a
professional production technique which is clearly distinguishes
from conventional methods of material removal.
60
Additive manufacturing (3D Printing)
• The process of joining materials to make objects from three
dimensional (3D) model data, usually layer by layer
• 3D printing provides manufacturers with the ability to compete by
creating, and the opportunity to turn product development into a core
strength”
• Additive manufacturing enables cost-effective, less wasteful, rapid
manufacturing of parts or components that can be customized based
• It becomes possible to develop an agile manufacturing which will
reduce the lead time from conception to the production
61
3D Printing: It's All About the Printer
• Design
• A digital model of the object is issued and converted into a
STL. File
• Print
• 3D Printer slices file into numerous digital cross-sectional,
and builds the model by joining together successive layers
• Finish
• Final 3D printed model is cleaned to remove overhung
material and is polished/painted and made ready for use
62
Functional principle
• The system starts by applying a thin layer of the powder
material to the building platform.
• A powerful laser beam then fuses the powder at exactly the
points defined by the computer-generated component design
data.
• Platform is then lowered and another layer of powder is
applied.
• Once again the material is fused so as to bond with the layer
below at the predefined points.
63
Functional principle
• A method of manufacturing known as ‘Additive
manufacturing’, due to the fact that instead of removing
material to create a part, the process adds material in
successive patterns to create the desired shape.
• Main areas of use:
• Prototyping
• Specialized parts – aerospace, military, biomedical engineering,
dental
• Hobbies and home use
• Future applications – medical (body parts), buildings and cars
64
Functional principle
• The process of joining materials to make objects from three
dimensional (3D) model data, usually layer by layer
• Traditional subtractive machining techniques rely on the
removal of material by methods such as cutting or milling
• Manufacturing metal components with virtually no geometric
limitations or tools offers new ways to increase product
performance or establish new processes and revenue streams
65
AM processes are classified into seven categories
1. Vat Photopolymerization/Stereolithography: Material is cured by
light activated polymerization
2. Material Jetting: droplet of building material are jetted to form
an object
3. Binder jetting: liquid bonding agent is jetted to join powder
material
4. Material extrusion: material is selectively dispensed through a
nozzle and solidifies
5. Powder bed fusion: energy (laser or electron beam)is used to
selectively fuse region of a powder bed
6. Sheet lamination: sheet are bonded to form an object
7. Directed energy deposition: focused thermal energy is used to
fuse materials by melting as deposition occur
66
Current and future applications of 3D Printing
• Biomedical Engineering
• Aerospace and Automobile Manufacturing
• Construction and Architecture
• Product Prototyping
• Automotive
• Aerospace
• Biomedical
• Consumer goods and many others
67
ADVANTAGES vs DISADVANTAGES
• ADVANTAGES
• Freedom of design
• Complexity for free
• Potential elimination of tooling
• Lightweight design
• Elimination of production steps
• DISADVANTAGES
• Slow build rates
• High production costs
• Considerable effort required for application design
• Discontinuous production process
• Limited component size.
68
Quiz: Review questions
1. What is emerging technology
2. Define the following terms
i. Data Science
ii. IoT
iii. Embedded Technology
iv. Virtual Reality
v. Artificial Intelligence
vi. Cyber security
vii. Professional ethics
viii.Block chain
3. Give at least 5 applications of emerging technology for education
69
THEND
70

More Related Content

What's hot

Web 3.0 - A Detailed Guide
Web 3.0 - A Detailed GuideWeb 3.0 - A Detailed Guide
Web 3.0 - A Detailed Guide
101 Blockchains
 
6 Key Blockchain Features You Need to Know Now
6 Key Blockchain Features You Need to Know Now6 Key Blockchain Features You Need to Know Now
6 Key Blockchain Features You Need to Know Now
101 Blockchains
 

What's hot (20)

Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging Technologies
 
edge computing.pptx
edge computing.pptxedge computing.pptx
edge computing.pptx
 
Deep web and dark web
Deep web and dark webDeep web and dark web
Deep web and dark web
 
Web 3.0 - A Detailed Guide
Web 3.0 - A Detailed GuideWeb 3.0 - A Detailed Guide
Web 3.0 - A Detailed Guide
 
Basic Concepts of information security.ppt
Basic Concepts of information security.pptBasic Concepts of information security.ppt
Basic Concepts of information security.ppt
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Dark Web Presentation.pptx
Dark Web Presentation.pptxDark Web Presentation.pptx
Dark Web Presentation.pptx
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurityFrom machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Emerging chapter 4.pptx
Emerging chapter 4.pptxEmerging chapter 4.pptx
Emerging chapter 4.pptx
 
6 Key Blockchain Features You Need to Know Now
6 Key Blockchain Features You Need to Know Now6 Key Blockchain Features You Need to Know Now
6 Key Blockchain Features You Need to Know Now
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
 
The IoT Advantage
The IoT AdvantageThe IoT Advantage
The IoT Advantage
 
Biomatric
BiomatricBiomatric
Biomatric
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 

Similar to Chapter 7 Other emerging technologies.pptx

nanorobots and its applications in medicine
nanorobots and its applications in medicine nanorobots and its applications in medicine
nanorobots and its applications in medicine
Poojith Chowdhary
 
Chapter 7 Other Emerging Technologies.pptx
Chapter 7  Other Emerging Technologies.pptxChapter 7  Other Emerging Technologies.pptx
Chapter 7 Other Emerging Technologies.pptx
AmanuelZewdie4
 
nanotechnology-and-its-applications-in-crop-improvement
 nanotechnology-and-its-applications-in-crop-improvement nanotechnology-and-its-applications-in-crop-improvement
nanotechnology-and-its-applications-in-crop-improvement
Kantinath Banerjee
 

Similar to Chapter 7 Other emerging technologies.pptx (20)

Biochip (Bioinformatics & Biotechnology)
Biochip  (Bioinformatics & Biotechnology)Biochip  (Bioinformatics & Biotechnology)
Biochip (Bioinformatics & Biotechnology)
 
nanorobots and its applications in medicine
nanorobots and its applications in medicine nanorobots and its applications in medicine
nanorobots and its applications in medicine
 
Emerging Branches Of Science
Emerging Branches Of ScienceEmerging Branches Of Science
Emerging Branches Of Science
 
Nanotechnology
NanotechnologyNanotechnology
Nanotechnology
 
Biotech
BiotechBiotech
Biotech
 
The Biochip Technology
The Biochip TechnologyThe Biochip Technology
The Biochip Technology
 
Concept of biotechnology
Concept of biotechnologyConcept of biotechnology
Concept of biotechnology
 
U8 L2 Biotechnology
U8 L2 BiotechnologyU8 L2 Biotechnology
U8 L2 Biotechnology
 
U8 L2 Biotechnology
U8 L2 BiotechnologyU8 L2 Biotechnology
U8 L2 Biotechnology
 
Biochips seminar report
Biochips seminar reportBiochips seminar report
Biochips seminar report
 
Biotechnology power point.pptx
Biotechnology power point.pptxBiotechnology power point.pptx
Biotechnology power point.pptx
 
Chapter 7 Other Emerging Technologies.pptx
Chapter 7  Other Emerging Technologies.pptxChapter 7  Other Emerging Technologies.pptx
Chapter 7 Other Emerging Technologies.pptx
 
Biochips
BiochipsBiochips
Biochips
 
nanotechnology-and-its-applications-in-crop-improvement
 nanotechnology-and-its-applications-in-crop-improvement nanotechnology-and-its-applications-in-crop-improvement
nanotechnology-and-its-applications-in-crop-improvement
 
Credit seminar 1
Credit seminar 1Credit seminar 1
Credit seminar 1
 
The nano world
The nano world The nano world
The nano world
 
Biorobots
BiorobotsBiorobots
Biorobots
 
Nanotechnology And its Application in various field.
Nanotechnology And its Application in various field.Nanotechnology And its Application in various field.
Nanotechnology And its Application in various field.
 
Biochips
BiochipsBiochips
Biochips
 
Nanotechnology
Nanotechnology Nanotechnology
Nanotechnology
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Chapter 7 Other emerging technologies.pptx

  • 1. Chapter 7 Other emerging technologies 1
  • 2. Introduction • We have seen emerging technologies like data science, artificial intelligence, the internet of things and augmented reality and their ethical issues. • In this chapter, we are going to discuss other emerging technologies like nanotechnology, biotechnology, block-chain technology, cloud and quantum computing, autonomic computing, computer vision, embedded systems, cybersecurity, and 3D printing 2
  • 3. 1. Nanotechnology • Nanotechnology is a field of applied sciences , engineering and technologies involving the control of matter on conducted at the nanoscale, which is about 1 to 1000 nanometers • The control of matter on the atomic and molecular scale • Nanotechnology are the study and application of extremely small things • Nanomaterials may exhibit different physical and chemical properties compared with the same substances at normal scale, such as increased chemical reactivity due to greater surface area. 3
  • 4. Nanotechnology • Nano + Technology • A Nanometer is a unit of length in the metric system, equal to one billionth of a meter(10-9). • There are 25,400,000 nanometers in an inch • A sheet of newspaper is about 100,000 nanometers thick • Technology is the making, usage, and knowledge of tools, machines and techniques, in order to solve a problem or perform a specific function • Most revolve around the study and control of phenomena and materials at length scales below 100 nm and quite often they make a comparison with a human hair, which is about 80,000 nm wide 4
  • 5. How it started • The ideas and concepts behind nanoscience and nanotechnology started with a talk entitled “there’s plenty of room at the bottom” by physicist Richard Feynman at an American Physical Society meeting at the California Institute of Technology (Caltech) on December 29, 1959, long before the term nanotechnology was used. • In his talk, Feynman described a process in which scientists would be able to manipulate and control individual atoms and molecules. • Over a decade later, in his explorations of ultraprecision machining, Professor Norio Taniguchi coined the term nanotechnology. It wasn’t until 1981, with the development of the scanning tunneling microscope that could “see” individual atoms, that modern nanotechnology 5
  • 6. Example: nanotechnology • Nanotube: Bulletproof business suit made from carbon nanotube • Nanofiber: Stimulus the body to regenerate lost or damaged cell • nanotech-coated treatments will guide drugs to harmful cancer cells, while ignoring healthy cells • Gray Goo: the Nano robots would consume all matter on earth as they self-replicated, causing an apocalypse • Damascus steel: blades made from it, could supposedly cut through stone or metal; how to make it remains unknown 6
  • 7. 2. Biotechnology • Biotechnology • Bio: living organisms and Technology: is a use of techniques and science to make products or modified processes • Biotechnology is the study and manipulation of living things or their component molecules, cells, tissues, or organs for the benefit of humans (or other animals). • This term has been used since the 1970’s to reflect the application of exciting new technologies to the research and development of products from plant and animal cells. Biotech Bio Byte Biotech Bio Byte • The domain areas in Biotechnology can be simplified into eight different concentrations such as Microbial, Agricultural, Animal, Forensic, Bioremediation, Aquatic, Medical, and Regulatory. 7
  • 8. The domain areas in Biotechnology • Microbial Biotechnology: The manipulation of microorganisms such as yeast and bacteria. Example: Fermentation • Agricultural Biotechnology: The genetic engineering of plants in hopes of giving the plant pest resistance • Producing foods with a higher protein or vitamin content • Developing drugs that can be grown and isolated in plant products 8
  • 9. The domain areas in Biotechnology • Animal Biotechnology: This branch includes • Using animals as a source of medically valuable proteins • Antibodies : Using animals as an important model in basic research • Gene “knockout” experiments (where genes have been turned off) • • Designs and testing of drugs and genetic therapies • Animal cloning • Source of transgenic organs (animal organs that can be transplanted into humans without fear of rejection). 9
  • 10. The domain areas in Biotechnology • Forensic Biotechnology: DNA fingerprinting Inclusion or exclusion of a person from suspicion Paternity cases Identification of human remains Endangered species Tracking and confirmation of the spread of disease Bioremediation. • Aquatic Biotechnology : Aquaculture – raising finfish or shellfish in controlled conditions for use as food sources 30% of all fish consumed by humans worldwide Genetic engineering Disease-resistant strains of oysters Vaccines against viruses that infect salmon and other finfish Rich and valuable sources of new genes, proteins and metabolic processes with important applications for human benefits Marine plankton and snails found to be rich sources of anti-tumor and anticancer molecules 10
  • 11. The domain areas in Biotechnology • Medical Biotechnology: Involved with the whole spectrum of human medicine Preventive medicine • Diagnosis of health and illness • Treatment of human diseases • New information from Human Genome Project Gene therapy Stem cell technologies • Regulatory Biotechnology • Quality Assurance (QA) : All activities involved in regulating the final quality of a product Quality Control (QC) Part of QA process that involves lab testing and monitoring of processes and applications to ensure consistent product standards 11
  • 12. History • Biotechnology starts in early societies who collected seeds of wild plants and domesticated some species of wild animals • Biotechnology began 10 000 years ago when humans changed from nomadic hunter – gatherers to farmers • Occurred in a few sites at around the same time – South East Asia, the “Fertile crescent” of the Middle East and in south central Mexico • Selected varieties of seeds that produced better quantity and quality of crops and cultivated them • Domesticated wild animals – kept certain species close to their homes and allowed them to interbreed 12
  • 13. History of biotechnology • Early ancestors took advantage of microorganisms and used fermentation to make breads, cheeses, yogurts, and alcoholic beverages such as beer and wine. • Fermentation is when strains of yeast decompose sugars to derive energy, and in the process they produce ethanol (alcohol) and carbon dioxide as a waste product • When bread dough is being made, added yeast ferments sugar releasing carbon dioxide, which causes the dough to rise and creates holes in the bread. The alcohol produced by the yeast evaporates when the bread is cooked. 13
  • 14. Biotechnology • Two important technique which enable development of modern biotechnology: 1. Alteration of chemistry of DNA & RNA to introduce into host organism to change phenotype of host- Genetic engineering 2. Maintenance of sterile ambience to enable growth of desired microbe/ eukaryotic cell in large quantities for manufacture of biotechnological products like vaccine, enzymes, beverages, drugs etc.- Chemical engineering 14
  • 15. 3. Blockchain technology • Block chain technology is an emerging technology that changes the way applications and users interact with the internet. • It is a distributed database that maintains a chain(i.e. chronologically ordered) of blocks(i.e. records). • Block chain technology is a structure that stores transactional records, also known as the block, of the public in several databases, known as the “chain,” in a network connected through peer-to-peer nodes. Typically, this storage is referred to as a ‘digital ledger.’ • Every transaction in this ledger is authorized by the digital signature of the owner, which authenticates the transaction and safeguards it from tampering. Hence, the information the digital ledger contains is highly secure. 15
  • 16. History : Block chain technology • Noble Prize-winning economist Milton Friedman said in 1999, “The one thing that is missing is a reliable e-cash, whereby on the internet you can transfer funds from A to B without A knowing B or B knowing A. It would be one of the major forces for reducing the role of government.” • 10 years later, The block chain was invented by a person (or group of people) using the name Satoshi Nakamoto in 2008 to serve as the public transaction ledger of the cryptocurrency bitcoin. • There is no information about the developer of this projects. The project is bitcoin. 16
  • 17. 17
  • 18. Block chain Explained • When we say the words “block” and “chain” in this context, we are actually talking about digital information (the “block”) stored in a public database (the “chain”). • “Blocks” on the blockchain are made up of digital pieces of information. Specifically, they have three parts: • Blocks store information about transactions like the date, time, and dollar amount of your most recent purchase from Amazon. • Blocks store information about who is participating in transactions. • Blocks store information that distinguishes them from other blocks. Much like a unique code called a “hash” that allows us to tell it apart from every other block. Hashes are cryptographic codes created by special algorithms. 18
  • 19. Characteristics • Openness • Database is open, in principle, to anyone. • Based on open source software technology. • Decentralization • Decentralized ledger • Distributed Networking • Security • Encryption using Public Key Cryptography. • Hash function. • Resilience • Archiving information • Database replication • And many more: Immutability, consensus, traceability… 19
  • 20. How Block chain Works • When a block stores new data it is added to the block chain. In order for a block to be added to the block chain, four things must happen: • A transaction must occur. • That transaction must be verified. After making that purchase, your transaction must be verified. With other public records of information, like the Securities Exchange Commission or your local library, there’s someone in charge of vetting new data entries. • That transaction must be stored in a block. After your transaction has been verified as accurate, it gets the green light. • That block must be given a hash. once all of a block’s transactions have been verified, it must be given a unique, identifying code called a hash. 20
  • 21. Why do people use the peer-to-peer network? • The primary goal of peer-to-peer networks is to share resources and help computers and devices work collaboratively, provide specific services, or execute specific tasks. • As mentioned earlier, P2P is used to share all kinds of computing resources such as processing power, network bandwidth, or disk storage space. 21
  • 22. Application of block chain • Numerous Blockchain applications and platforms are widely known, starting with Bitcoin, followed by Ethereum, which act as a platform for building decentralized applications using smart contracts and inspired a whole new concept of “token economy.” • Emerging applications in voting, digital identity, banking, and health 22
  • 23. 4. Cloud and quantum computing • A quantum computer is a machine that performs calculations based on the laws of quantum mechanics, which is the behavior of particles at the sub-atomic level. • Cloud computing is a way of accessing compute and storage systems without actually owning and doing active management of the resources. • Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” 23
  • 24. Advantages of cloud computing • Benefits of Cloud Computing On-demand self-service Broad network access Resource pooling Rapid elasticity Measured service Lower costs Ease of utilization Quality of Service Reliability Outsourced IT management Simplified maintenance and upgrade Low barrier to entry • Cloud computing permits you to access data outside from your computing environment. • Cloud computing gives you the opportunity to set up a virtual office and get connected to your business anywhere. 24
  • 25. Advantages of cloud computing • With web-enabled devices like smart phones and tablets that are ultimately provide ease to access data. • There are 4 cloud computing models with respect to security and business needs. These four are: • Private Cloud • Community Cloud • Public Cloud • Hybrid Cloud 25
  • 26. Advantages of cloud computing 1. Cost Proficient 2. More Security 3. More Flexible 4. More Scalability 5. Automatic Software Integration 6. Infinite Storage 7. Rapid Development 1. Higher Economical Graph 2. Globalization of Work & Streamline Workflow 3. Effective Monitoring 4. Lower Personal Training Cost 5. Disaster Recovery 6. Document Control 7. Document Control 26
  • 27. Cons of Cloud Computing • As made obvious from above, Cloud Computing offers immense advantages to the adopters. On the other hand, it also comes with some problems and we can say disadvantages. • Technical Limitations • Higher Vulnerability Issues • Security & Privacy Concerns • Implicit Dependency on Providers • Cloud Computing Services & Solution are Tricky 27
  • 28. 5. Quantum computing • The word "quantum", in quantum computer, originates from "quantum mechanics," a basic theory in physics. • The scale of atoms and molecules, matter behaves in a quantum manner • A quantum computer is a machine that performs calculations based on the laws of quantum mechanics, which is the behavior of particles at the sub-atomic level. • In existing computers, all information is expressed in terms of 0s and 1s, and the entity that carries such information is called a "bit.“ 28
  • 29. Quantum Computers Vs Computers • A bit can be in either a 0 or 1 state at any one moment in time • A quantum computer, on the other hand, uses a “quantum bit” or "qubit" instead of a bit. • A qubit also makes use of two states (0 and 1) to hold information, but in contrast to a bit, • In this state, a qubit can take on the properties of 0 and 1 simultaneously at any one moment. • Accordingly, two qubits in this state can express the four values of 00, 01, 10, and 11 all at one time 29
  • 30. Quantum computing • IBM scientists have built a quantum processor that any user can access through the first quantum computing platform available in the cloud • IBM Quantum Experience, allows users to execute algorithms and experiments on a real quantum processor • IBM Q: IBM announces the building of a quantum computer of 50 qubits and that will offer services of quantum computation in the cloud 30
  • 31. Google • In October 2019, Google made a big announcement. It announced its 53-qubit quantum computer named Sycamore had achieved ‘quantum supremacy.’ That’s when quantum computers can complete tasks exponentially more quickly than their classical counterparts. • In this case, Google said its quantum machine completed a task in 200 seconds that would have taken the world’s most powerful computer 10,000 years to complete. 31
  • 32. Features of a Quantum Computer • Superposition • Entanglement • Keeps the Coherence • It has Quantum Bits a.k.a. Qubits: is the quantum concept of a bit. It’s a logical concept that can be implemented on a wide range of different systems with quantum behavior. • As a bit, a single qubit can represent two states 0 and 1 • New algorithms and communication • Maximum exploitation 32
  • 33. Application of quantum computing • Healthcare: improve the quality of healthcare and assist in medical research as well. It could collect and sort through all the possible gene variants simultaneously and discover the most effective treatments and drugs for diseases caused by genomics mismatches. • Finance: Quantum computing could be used to develop futuristic financial modeling tools and algorithms for assisting the areas of financial services, investment, and risk management. • Cybersecurity: Another area where this technology could help is cybersecurity as it has the potential to secure data through powerful post-quantum cryptography solutions. 33
  • 34. Application of quantum computing • Energy: The energy sector could leverage quantum computing solutions for managing resources from diverse sources and addressing the challenges related to energy optimization where classical computers have limitations. • Agriculture: Another industry that could benefit from quantum computing is agriculture as the technology could enable the creation of high-quality fertilizers through novel catalytic combinations in replacement of the conventional ammonia-based fertilizers. 34
  • 35. Advantages of quantum computing • It may be possible to solve a problem on a quantum system much faster (i.e., using fewer steps) than on a classical computer • Factorization and searching are examples of problems where quantum algorithms are known and are faster than any classical ones • Implications for cryptography, information security • Study of quantum algorithms and quantum computation is important in order to make assumptions about adversary’s algorithmic and computational capabilities • Leading to an understanding of the computational power of quantum vs classical systems 35
  • 36. Advantages of quantum computing • Could process massive amount of complex data. • Ability to solve scientific and commercial problems. • Process data in a much faster speed. • Capability to convey more accurate answers. • More can be computed in less time. • These are used to protect secure Web pages, encrypted email, and many other types of data. 36
  • 37. Dis Advantages of quantum computing • Hard to control quantum particles • Lots of heat • Expensive • Difficult to build • Not suitable for word processing and email. • Problem of it need of a noise free & Cool Environment. • Complex hardware schemes like superconductors 37
  • 38. 5. Autonomic computing (AC) • Autonomic computing is a computer's ability to manage itself automatically through adaptive technologies that further computing capabilities and cut down on the time required by computer professionals to resolve system difficulties and other maintenance such as software updates. • The move toward autonomic computing is driven by a desire for cost reduction and the need to lift the obstacles presented by computer system complexities to allow for more advanced computing technology • It is one of the building blocks of pervasive computing, an anticipated future computing model in which tiny - even invisible - computers will be all around us, communicating through increasingly interconnected networks leading to the concept of The Internet of Everything (IoE). 38
  • 39. Autonomic computing (AC) • IBM has defined the four areas of automatic computing • Self-Configuration • Self-Healing (error correction) • Self-Optimization (automatic resource control for optimal functioning) • Self-Protection (identification and protection from attacks in a proactive manner) • Knows itself, adapt itself, open itself • Characteristics that every autonomic computing system should have include automation, adaptivity and awareness. 39
  • 40. Autonomic computing (AC) • AC was designed to mimic the human body’s nervous system-in that the autonomic nervous system acts and reacts to stimuli independent of the individual’s conscious input-an autonomic computing environment functions with a high level of artificial intelligence while remaining invisible to the users. • Just as the human body acts and responds without the individual controlling functions (e.g., internal temperature rises and falls, breathing rate fluctuates, glands secrete hormones in response to stimulus), the autonomic computing environment operates organically in response to the input it collects. 40
  • 41. IBM has set conditions that define an AC 1. The system must know itself in terms of what resources it has access to, what its capabilities and limitations are and how and why it is connected to other systems 2. The system must be able to automatically configure and reconfigure itself depending on the changing computing environment. 3. The system must be able to optimize its performance to ensure the most efficient computing process. 4. The system must be able to work around encountered problems by either repairing itself or routing functions away from the trouble. 41
  • 42. IBM has set conditions that define an AC 1. The system must detect, identify and protect itself against various types of attacks to maintain overall system security and integrity. 2. The system must be able to adapt to its environment as it changes, interacting with neighboring systems and establishing communication protocols. 3. The system must rely on open standards and cannot exist in a proprietary environment. 4. The system must anticipate the demand on its resources while keeping transparent to users. 42
  • 43. Benefits • Reducing maintenance costs. • Fewer personnel will be required to manage the systems. • Reduced deployment and maintenance cost , time and increased stability of IT systems through automation • Allowing companies to better manage their business through IT systems that are able to adopt and implement directives based on business policy, and are able to make modifications based on changing environments.” • Another benefit of this technology is that it provides server consolidation to maximize system availability, and minimizes cost and human effort to manage large server farms 43
  • 44. 6. Computer vision • Computer vision is a field that includes methods for acquiring, processing, analyzing, and understanding images • Computer vision spans all tasks performed by biological vision systems, including "seeing" or sensing a visual stimulus, understanding what is being seen, and extracting complex information into a form that can be used in other processes. • Computer vision is the science and technology of machines that see. Concerned with the theory for building artificial systems that obtain information from images. The image data can take many forms, such as a video sequence, depth images, views from multiple cameras, or multi-dimensional data from a medical scanner 44
  • 45. 45
  • 46. 46
  • 47. History : Computer vision • 1966: Minsky assigns computer vision as an undergrad summer project • 1960’s: interpretation of synthetic worlds • 1970’s: some progress on interpreting selected images • 1980’s: ANNs come and go; shift toward geometry and increased mathematical rigor • 1990’s: face recognition; statistical analysis in vogue • 2000’s: broader recognition; large annotated datasets available; video processing starts; vision & graphis; vision for HCI; internet vision, etc. Guzman ‘68 Ohta Kanade ‘78 Turk and Pentland ‘91 47
  • 48. 48
  • 49. How computer vision works • Computer vision is all about pattern recognition • When a computer sees an image, it only sees an array of numbers that represent intensities and colors of the image, but not the image itself. • There’s no context, and that’s what’s needed to get algorithms to comprehend an image the same way a human does • By feeding a Machine Learning model enough data, we can make it highly accurate. 49
  • 50. Applications of computer vision • Below are examples of computer vision: • Autonomous Vehicles - Self-driving cars need to gather information about their surroundings to decide how to behave. • Facial Recognition - Businesses and personal electronics use facial recognition technology to "see" who is trying to gain access to something. It has become a powerful security tool. • Image Search and Object Recognition - Many applications use data vision theory to identify objects within images, search through catalogues of images, and extract information out of images. • Robotics - Most robotic machines, often in manufacturing, need to see their surroundings to perform the task at hand. In manufacturing machines may be used to inspect assembly tolerances by "looking at" them. 50
  • 51. 7. Embedded systems • It is a micro-controller based system that is designed to control a function or a range of function, and is not meant to be programmed by end user. • The user can con not make modification to the software • The user may make a choice concerning the functionality but can not change them • Computers are embedded with in other devices 51
  • 52. 7. Embedded systems • Other devices : camera, vehicle, refrigerator, printer, air plane, air conditioner, VCD Player, DVD player, printer, fax machine, mobile phone • Each of these appliances will have a processor with the embedded software to meet the specific requirement of the application. • Also defined as a computing device that does a specific focused job. • An embedded system is a combination of hardware and software, which can be embed in another larger system • The embedded software is also called ‘firmware’. 52
  • 53. Embedded systems feature • They are special-purpose or single functioned • Execute a single program, possibly with input from • They must react to events in real time • Respond to input from the systems environment • Must compute certain results in real time with out delay • Applications • Consumer(e.g. refrigerator, camera, microwave) , office automation (e.g. printer), automobile(e.g. engine control, air bag), communication, home appliances 53
  • 54. 8. Cybersecurity : Definition • Cyber security refers to the protection of internet connected systems including hardware, software, or data from the cyber attack or cyber criminals. • Cyber: computer system, network, or program • Security: system security, network security, data or program security • Illegal access, Interception, System Interference, Data Interference, Misuse of devices, or Fraud 54
  • 55. Cybersecurity measures • Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. • The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories. • Network security • Application security • Information security • Disaster recovery and business continuity • End-user education • Operational security 55
  • 56. Types of cybersecurity threats • The threats countered by cyber-security are three-fold: 1. Cybercrime includes single actors or groups targeting systems for financial gain or to cause disruption. 2. Cyber-attack often involves politically motivated information gathering. 3. Cyberterrorism is intended to undermine electronic systems to cause panic or fear. • So, how do malicious actors gain control of computer systems? Here are some common methods used to threaten cyber-security: • Malware, Spyware, virus, trojan hose, Ransomware, Botnets, adware • SQL injection, Phishing, Denial-of-service attack, Man-in-the-middle attack 56
  • 57. Benefits of cybersecurity • Defend us from critical attacks. • To browse the various websites securely. • To protect sensitive data, protect private data , protect financial data • To protect intellectual property • To protect national security • To protect global economy 57
  • 58. Cybersecurity components • Confidentiality • Integrity • Authenticating • Availability • Access control 58
  • 59. Cybersecurity vendors • Vendors in cybersecurity fields typically use endpoint, network and advanced threat protection security as well as data loss prevention. Top Cybersecurity Companies in 2020 • Splunk. Splunk Inc. ... • Cyren. Cyren (NASDAQ: CYRN) provides more than 1.3 billion users around the world with cloud security solutions to protect them against cyber- attacks every day. • Proofpoint. Proofpoint, Inc. ... • NortonLifeLock. NortonLifeLock Inc. ... • Rapid7, Radware, Mimecast., CrowdStrike. • Cisco, McAfee and Trend Micro. 59
  • 60. 9. Additive manufacturing (3D Printing) • Manufacturing is a process in which raw materials are transformed into finished goods • Additive Manufacturing refers to a process by which 3D design data is used to build up a component in layers by depositing materials. • It eliminates many constraints imposed by conventional manufacturing • The term 3D printing is increasingly used as a synonymous for AM. However, the better is more accurate in that it describes a professional production technique which is clearly distinguishes from conventional methods of material removal. 60
  • 61. Additive manufacturing (3D Printing) • The process of joining materials to make objects from three dimensional (3D) model data, usually layer by layer • 3D printing provides manufacturers with the ability to compete by creating, and the opportunity to turn product development into a core strength” • Additive manufacturing enables cost-effective, less wasteful, rapid manufacturing of parts or components that can be customized based • It becomes possible to develop an agile manufacturing which will reduce the lead time from conception to the production 61
  • 62. 3D Printing: It's All About the Printer • Design • A digital model of the object is issued and converted into a STL. File • Print • 3D Printer slices file into numerous digital cross-sectional, and builds the model by joining together successive layers • Finish • Final 3D printed model is cleaned to remove overhung material and is polished/painted and made ready for use 62
  • 63. Functional principle • The system starts by applying a thin layer of the powder material to the building platform. • A powerful laser beam then fuses the powder at exactly the points defined by the computer-generated component design data. • Platform is then lowered and another layer of powder is applied. • Once again the material is fused so as to bond with the layer below at the predefined points. 63
  • 64. Functional principle • A method of manufacturing known as ‘Additive manufacturing’, due to the fact that instead of removing material to create a part, the process adds material in successive patterns to create the desired shape. • Main areas of use: • Prototyping • Specialized parts – aerospace, military, biomedical engineering, dental • Hobbies and home use • Future applications – medical (body parts), buildings and cars 64
  • 65. Functional principle • The process of joining materials to make objects from three dimensional (3D) model data, usually layer by layer • Traditional subtractive machining techniques rely on the removal of material by methods such as cutting or milling • Manufacturing metal components with virtually no geometric limitations or tools offers new ways to increase product performance or establish new processes and revenue streams 65
  • 66. AM processes are classified into seven categories 1. Vat Photopolymerization/Stereolithography: Material is cured by light activated polymerization 2. Material Jetting: droplet of building material are jetted to form an object 3. Binder jetting: liquid bonding agent is jetted to join powder material 4. Material extrusion: material is selectively dispensed through a nozzle and solidifies 5. Powder bed fusion: energy (laser or electron beam)is used to selectively fuse region of a powder bed 6. Sheet lamination: sheet are bonded to form an object 7. Directed energy deposition: focused thermal energy is used to fuse materials by melting as deposition occur 66
  • 67. Current and future applications of 3D Printing • Biomedical Engineering • Aerospace and Automobile Manufacturing • Construction and Architecture • Product Prototyping • Automotive • Aerospace • Biomedical • Consumer goods and many others 67
  • 68. ADVANTAGES vs DISADVANTAGES • ADVANTAGES • Freedom of design • Complexity for free • Potential elimination of tooling • Lightweight design • Elimination of production steps • DISADVANTAGES • Slow build rates • High production costs • Considerable effort required for application design • Discontinuous production process • Limited component size. 68
  • 69. Quiz: Review questions 1. What is emerging technology 2. Define the following terms i. Data Science ii. IoT iii. Embedded Technology iv. Virtual Reality v. Artificial Intelligence vi. Cyber security vii. Professional ethics viii.Block chain 3. Give at least 5 applications of emerging technology for education 69