Emerging Tech Lecture Notes 7 (Chapters 4–6)
Emerging Tech Lecture Notes 7 (Chapters 4–6)
of Things(IoTs)
Everything
that
has
the
ability
to
communicate
1. Overview of IoT
2. How does it work?
3. IoT Tools and Platforms
4. Applications of IoT
1. Overview of IoT
Internet of Things (IoT) is a network of devices which can sense, accumulate and transfer data over the internet
without any human intervention.
Internet Engineering Task Force (IETF): The networking of smart objects in which
smart objects have some constraints such as limited bandwidth, power, and processing
accessibility for achieving interoperability among smart objects
IoT Definition from International Bodies
contd…
IEEE Communications: A framework of all things that have a representation in the presence
of the internet in such a way that new applications and services enable the interaction in the
physical and virtual world in the form of Machine-to-Machine (M2M) communication in the
cloud
According to the Gartner report, by 2020 connected devices across all technologies will reach 20.6 billion.
Executive Summary
Projections for the impact of IoT on the Internet and economy are impressive, with some anticipating as many as 100
billion connected IoT devices and a global economic impact of more than $11 trillion by 2025.
History of IoT
The Internet, itself a significant component of the IoT, started out as part of DARPA (Defense
Advanced Research Projects Agency) in 1962 and evolved into ARPANET in 1969. In the 1980s,
commercial service providers began supporting public use of ARPANET, allowing it to evolve
into our modern Internet. Global Positioning Satellites (GPS) became a reality in early 1993.
The term “The Internet of Things” (IoT) was coined by Kevin Ashton in a presentation to
Proctor & Gamble in 1999.
He pioneered (Radio Frequency Identification) RFID (used in bar code detector) for the
supply-chain management domain.
History of IoT
The first internet appliance, for example, was a Coke vending
machine at Carnegie Mellon University in the early 1980s.
wireless technologies,
microservices and
the Internet.
Human neighborhoods are now becoming part of the interconnected community called the
Internet of Things.
Characteristics of IoT
Challenges of IoT
Security − IoT creates an ecosystem of constantly connected devices communicating over networks.
The system offers little control despite any security measures. This leaves users exposed to various
kinds of attackers.
Privacy − The sophistication of IoT provides substantial personal data in extreme detail without the
user’s active participation.
Complexity − Some find IoT systems complicated in terms of design, deployment, and maintenance
given their use of multiple technologies and a large set of new enabling technologies.
Flexibility − Many are concerned about the flexibility of an IoT system to integrate easily with
another. They worry about finding themselves with several conflicting or locking systems.
Compliance − IoT, like any other technology in the realm of business, must comply with regulations.
Its complexity makes the issue of compliance seem incredibly challenging when many consider
standard software compliance a battle.
Pros and Cons of IoT
Advantages
Increased Security Concern( more devices and more info created and shared)
The higher chance of system corruption (if there is a bug in any part of the system)
22
Introduction to Emerging Technologies -Chapter 4 - IoT 5/18/2023
How does IoT Works?
Stage 1 (Sensors/Actuators) : A thing in the context of “Internet of Things”, should be
equipped with sensors and actuators thus giving the ability to emit, accept and process
signals
Stage 2 (Data Acquisition Systems): The data from the sensors starts in analogue form
which needs to be aggregated and converted into digital streams for further processing.
Data that needs more in-depth processing gets forwarded to physical data centers or cloud-
based systems.
IoT – Type of Systems
▪ IoT includes many different systems, including
o Internet-connected cars
o wearable devices including health and fitness monitoring devices, watches, and even human
implanted devices;
o smartphones that are increasingly being used to measure the world around them; and
o wireless sensor networks that measure weather, flood defenses, tides and more
25
Introduction to Emerging Technologies -Chapter 4 - IoT 5/18/2023
IoT Enablers
The IoT four key technological enablers are: -
The local network (this can include a gateway, which translates proprietary
communication protocols to Internet Protocol).
28
Introduction to Emerging Technologies -Chapter 4 - IoT 5/18/2023
IoT Communication Mechanisms
Communication between devices and the Internet or to a gateway includes many different models
➢ High reliability
Provides businesses with a real-time look into how their companies’ systems really
work
Connected sensors are even used in farming to help monitor crop and cattle
yields and predict growth patterns
IoT Across Application Domains
There are numerous real-world applications of the internet of things
43
Introduction to Emerging Technologies -Chapter 4 - IoT 5/18/2023
Smart Home Applications
IoT Tools and Application Development Platforms
o SAP
o Salesforce IoT
47
Introduction to Emerging Technologies -Chapter 4 - IoT 5/18/2023
IoT Development Platforms
Top-class IoT development tools that can be employed by both developers and for all those
who wish to pursue IoT include
• Tessel 2
• Eclipse IoT
• Arduino
• PlatformIO
• Kimono Create
• IBM Watson
• Raspbian (Raspberry Pi)
• OpenSCADA
• Node-RED
• Device Hive
IoT hardware platforms - So many IoT Chips
49
Introduction to Emerging Technologies -Chapter 4 - IoT 5/18/2023
An Exiting Future!
Thanks! Questions Plz…End of Chapter-4 IoT
Chapter Four Review Questions
▪ 1. What are the main parts of the IoT system?
▪ 2. What are the security concerns related to IoT?
▪ 3. Explain IoT Protocol stack?
▪ 4. What is meant by a smart city regarding the IoT?
▪ 5. Give examples of the impact of IoT on our lives?
▪ 6. What influence will the IoT have on monetary growth?
▪ 7. Why will be the IoT successful in the coming years?
▪ 8. What impact will the IoT have on the health care sector?
▪ 9. What are the main social and cultural impacts of IoT?
▪ 10. What the main challenges of an IoT?
▪ 11. What role does the network play in the IoT of everything?
▪ 12. How wireless communication might affect the development and implementations
of IoT?
Chapter 5
IET
Augmented Reality (AR)
Chapter-5 AR Learning Outcomes
After completing this lesson you should be able to
VR is fully immersive, which tricks your senses into thinking you’re in a different
environment or world apart from the real world. Using a head-mounted display (HMD)
or headset, you’ll experience a computer-generated world of imagery and sounds in
which you can manipulate objects and move around using haptic controllers while
tethered to a console or PC. It is also called a computer-simulated reality.
It refers to computer technologies using reality headsets to generate realistic sounds,
images and other sensations that replicate a real environment or create an imaginary
world. Advanced VR environment will engage all five senses (taste, sight, smell, touch,
sound), but it is important to say that this is not always possible.
VR Introduction Contd….
• Using VR devices such as HTC Vive, Oculus Rift or Google Cardboard, users
can be transported into a number of real-world and imagined environments.
The most advanced VR experiences even provide freedom of movement – users can
move in a digital environment and hear sounds. Moreover, special
hand controllers can be used to enhance VR experiences.
• Most VR headsets are connected to a computer (Oculus Rift) or a gaming console
(PlayStation VR) but there are standalone devices (Google Cardboard is among
the most popular) as well. Most standalone VR headsets work in combination with
smartphones – you insert a smartphone, wear a headset, and immerse in the
virtual reality.
Augmented Reality
(AR) Introduction
In augmented reality, users see and interact with the real world while digital content is added to
it.
If you own a modern smartphone, you can easily download an AR app and try this technology.
There’s a different way to experience augmented reality, though – with special AR headsets,
such as Google Glass, where digital content is displayed on a tiny screen in front of a user’s
eye.
AR adds digital elements to a live view often by using the camera on a smartphone. Examples
of augmented reality experiences include Snapchat lenses and the game Pokemon Go.
Augmented Reality (AR) is a live, direct or indirect view of a physical, real-world
environment whose elements are augmented (or supplemented) by computer-generated
sensory input such as sound, video, graphics or GPS data
Introduction To
Mixed Reality
(MR)
Mixed Reality (MR), sometimes referred to as hybrid reality, is the merging of real and virtual
worlds to produce new environments and visualizations where physical and digital objects co-exist and
interact in real-time. It means placing new imagery within a real space in such a way that the new
imagery is able to interact, to an extent, with what is real in the physical world we know.
For example, with MR, you can play a virtual video game, grab your real-world water bottle, and smack
an imaginary character from the game with the bottle. Imagination and reality have never been so
intermingled.
The key characteristic of MR is that the synthetic content and the real-world content are able to react to
each other in real-time.
MR Introduction Contd…
In mixed reality, you interact with and manipulate both physical and virtual items and
environments, using next-generation sensing and imaging technologies. MR allows you
to see and immerse yourself in the world around you even as you interact with a virtual
environment using your own hands—all without ever removing your headset.
Comparison…
• Virtual Reality: VR is content which is 100% digital and can be enjoyed in a fully
immersive environment.
• Augmented Reality: AR overlays digital content on top of the real-world.
• Mixed Reality: MR is a digital overlay that allows interactive virtual elements to
integrate and interact with the real-world environment.
DIFFERENCES…
• AR is a variation of the more known concept of Virtual Reality Technology (VR), which is often defined as
“the use of real-time digital computers and other special hardware and software to generate a simulation of an
alternate world or environment, which is believable as real or true by the users”.
• VR technology creates an environment in which the user feels and seems to be moving inside a computer-created
virtual world in the same way people move inside the natural environment; while immersed in the virtual world,
the user cannot perceive the real one which still surrounds him.
• On the contrary, AR allows the user to see the real world, augmenting it with superimposed virtual objects.
• In other words, while VR replaces reality, AR supplements it, creating an environment in which real and virtual
objects harmonically coexist.
• AR exploits users’ perceptual-motor skills in the real world, creating a special type of human-machine interaction
Relation between AR and Telepresence
• Presentation
• Business Processing
• Data Storage
AR System clients
• Optical SeeThrough,
• Virtual Retinal Systems,
• Video See-Through,
• Monitor Based AR and
• Projector Based AR
Optical See-Through HMD
Video See-Through HMD
Application of AR systems
• Education,
• Medical,
• Assistance, Retail
• Entertainment
• AR on TV
• AR in eSports
• AR in games
• AR in music
• AR in the theater
• Ultrasounds
• Diabetes management
• Nursing care
• Surgery
• Describing symptoms
AR-Applications(Medical Training)
AR-Applications (Interior Design and Modeling)
AR-Applications (Classrooms for Education)
AR-Applications (Entertainment)
Thank You! End of Chapter 5 (AR)-
Questions
1. What are the three blocks/components of the AR system architecture?
2. Describe the functions of the Infrastructure Tracking Unit, the Processing Unit,
and the Visual Unit?
3. What is the difference between Video-see through and Optical-see through
visualization technologies?
4. Differentiate between AR/VR/MR ➢ Describe the applications of AR in
education?
➢ What are the reasons to apply AR in education?
➢ List some of the applications of AR in medicine?
➢ Describe the benefits of AR to patients and healthcare workers.
➢ How AR can be used in Entertainment?
Review Questions of Chapter-5 AR
• What is augmented, virtual and mixed reality and its application?
• What are good examples of augmented, virtual and mixed reality?
• What is the difference between augmented, virtual and mixed reality?
• How is augmented, virtual and mixed reality achieved?
• What is the benefit of augmented, virtual and mixed reality?
• How Can AR, VR, and MR improve engineering instructions?
• Can VR be a substitute for Real Life Experience?
• What is the impact of VR on Educational Learning rather than games?
• What is the most technical challenge for MR?
Chapter-6
Chapter Six
Objectives
1. What do you think the need for ethics in data science? Is it really important to
include ethical rules when dealing with big data? If your answer is yes, why?
The increasing use of big data, algorithmic decision-making, and artificial
intelligence can enable more consistent, evidence-based and accurate judgments
or decisions, often more quickly and efficiently. However, these strengths can
potentially have a darker side too, throwing up questions
around the ethical use of these fairly new technologies.
2. As we discussed in chapter three, AI is all about making a machine learn and decide as humans do. Do you think
that it is necessary to rely on machines and give all the opportunity to decide? Why?
Additionally, questions are being asked regarding the interaction between computers and humans.
How much reliance can we place on data and models, and what is the role of human judgment, as well
as how do we ensure that we understand the decision-making process? Whatever the power of the
machine, humans will still need to be involved, so that people can be held accountable, or explain the
reasons behind a decision.
New ethical questions cont…
3. Do you think that integrating ethical rules with emerging technologies is
important? If your answer is yes, why? What are the challenges of integrating
ethical rules with the new technologies?
A central problem of the ethics of technology is that it tends to arrive too late. In many cases, ethical
issues are only recognized when the technology is already on the market and problems arise during its
widespread use. Ethics can then become a tool to clean up a mess that might have been avoidable. It is
probably not contentious to say it would be desirable to have ethical input at the earlier stages of
technology design and development. Indeed, there are ethical theories and approaches that explicitly
aim at an early integration of ethics into the technology life cycle. One central problem of this type of
approach is that the future is unknown. Ethics has traditionally not been well equipped to deal with
issues of uncertainty and, in particular, future uncertainty.
From your civic and ethical education course, what do you understand about the word ethics?
1. Ensure that the public good is the central concern during all
professional computing work.
2. Articulate, encourage acceptance of and evaluate fulfillment of social
responsibilities by members of the organization or group.
3. Manage personnel and resources to enhance the quality of working
life.
4. Articulate, apply, and support policies and processes that reflect the
principles of the Code.
Professional leadership principles
○Information privacy
○Communication privacy
○Individual privacy
Contd..
● Information privacy : The notion that individuals should have the
freedom, or right, to determine how their digital information, mainly that
pertaining to personally identifiable information, is collected and used.
● Communication privacy :The notion that individuals should have the
freedom, or right, to communicate information digitally with the
expectation that their communications are secure.
● Individual privacy: The notion that individuals have a right to
● exist freely on the internet, in that they can choose what types of
information they are exposed to, and more importantly that
● unwanted information should not interrupt them.
Some digital privacy principles
● Data Minimization: collect the minimal amount of
information from individuals and businesses consistent with legal
requirements.
● Transparency: Collection and use of identifiable information will be provided
in a clear manner and mandated by law.
● Accuracy: Information collected will be maintained in a sufficiently accurate,
timely, and complete manner.
● Security: Adequate physical and IT security measures will be implemented to
ensure that the collection, use, and maintenance of identifiable information.
Accountability and Trust
• The challenge is exacerbated by the speed at which technological change is
occurring and the breadth of its adoption – which is introducing new risks that
demand new responses.