Abdulhadi-Elhabroush-Chapter7anoter Emerginh
Abdulhadi-Elhabroush-Chapter7anoter Emerginh
Abdulhadi-Elhabroush-Chapter7anoter Emerginh
Student Name: ABDULHADI ELHABROUSH
Student Registration, NO:210100414
Under the supervision prof: ALBAHLUL AL-FGEE
Chapter 7: Other emerging technologies
01 Nanotechnology.
02 Biotechnology
03 Blockchain technology.
04 Cloud and quantum computing.
06 Computer vision.
07 Embedded systems
08 Cybersecurity
09 Additive manufacturing (3D Printing)
1.Nanotechnology
Medicine: customized nanoparticles the size of molecules that can deliver drugs
directly to diseased cells in your body.
Electronics: it has some answers for how we might increase the capabilities of
electronics devices while we reduce their weight and power consumption.
Food: it has an impact on several aspects of food science, from how food is grown
to how it is packaged. Companies are developing nanomaterials that will make a
difference not only in the taste of food but also in food safety and the health
benefits that food delivery.
Agriculture: nanotechnology can possibly change the whole agriculture part and nourishment
industry anchor from generation to preservation, handling, bundling, transportation, and even
waste treatment.
Vehicle manufacturers: Much like aviation, lighter and stronger materials will be
valuable for making vehicles that are both quicker and more secure. Burning motors will
likewise profit from parts that are all the more hardwearing and higher temperature
safe.
2.Biotechnology
It is the broad area of biology involving living systems and
organisms to develop or make products, or "any technological
application that uses biological systems, living organisms, or
derivatives thereof, to make or modify products or processes for
specific use".
1-Agriculture (Green Biotechnology): Biotechnology had contributed a lot to modify the genes
of the organism known as Genetically Modified Organisms such as Crops, Animals, Plants, Fungi,
Bacteria, etc. Genetically modified crops are formed by the manipulation of DNA to introduce a
new trait into the crops. These manipulations are done to introduce traits such as pest
resistance, insect resistance, weed resistance, etc.
3-Aquaculture Fisheries: It helps in improving the quality and quantity of fishes. Through
biotechnology, fishes are induced to breed via gonadotropin-releasing hormone.
Application of biotechnology
Each of these blocks of data (i.e. block) is secured and bound to each other
using cryptographic principles (i.e. chain). “Blocks” on the blockchain are
made up of digital pieces of information. Specifically, they have three parts:
Parts of blockchain
In 1992, Bayer, Haber, and Stornetta incorporated Merkle trees to the design, which
improved its efficiency by allowing several document certificates to be collected into
one block.
The first blockchain was conceptualized by a person (or group of people) known as
Satoshi Nakamoto in 2008.
Nakamoto improved the design in an important way using the Hash cash like the method to add
blocks to the chain without requiring them to be signed by a trusted party. The design was
implemented the following year by Nakamoto as a core component of the cryptocurrency bitcoin,
where it serves as the public ledger for all transactions on the network.
Blockchain Explained
A blockchain carries no transaction cost. (An infrastructure cost yes, but no transaction cost.) The blockchain is a
simple yet ingenious way of passing information from A to B in a fully automated and safe manner. One party to a
transaction initiates the process by creating a block. This block is verified by thousands, perhaps millions of
computers distributed around the net. The verified block is added to a chain, which is stored across the net, creating
not just a unique record, but a unique record with a unique history. Falsifying a single record would mean falsifying
the entire chain in millions of instances. That is virtually impossible. Bitcoin uses this model for monetary
transactions, but it can be deployed in many other ways.
4.Cloud and quantum computing.
No hardware required
Their gargantuan computing power would allow them to crunch very long
numbers.
They would be able to make complex calculations that would only
overwhelm classic computers.
Accessing a cloud-based quantum computer combines the benefits of
both technologies exponentially.
Quantum computing could help in the discovery of new drugs, by
unlocking the complex structure of chemical molecules.
Other uses include financial trading, risk management, and supply chain
optimization
5.Autonomic computing (AC)
Autonomic computing (AC) is an approach to address the complexity and evolution problems in
software systems. It is a self-managing computing model named after, and patterned on, the
human body's autonomic nervous system. An autonomic computing system would control the
functioning of computer applications and systems without input from the user, in the same way,
that the autonomic nervous system regulates body systems without conscious input from the
individual. The goal of autonomic computing is to create systems that run themselves, capable of
high-level functioning while keeping the system's complexity invisible to the user.
Characteristics of Autonomic Systems
Self-Awareness: An autonomic application/system “knows itself” and is aware of its state and its
behaviors.
Computer vision tasks include methods for acquiring, processing, analyzing and
understanding digital images, and extraction of high-dimensional data from the real
world in order to produce numerical or symbolic information, e.g. in the forms of
decisions.
The origins of computer vision go back to an MIT undergraduate summer project in 1966. It was
believed at the time that computer vision could be solved in one summer, but we now have a 50-year
old scientific field that is still far from being solved.
Early experiments in computer vision took place in the 1950s, using some of the first neural networks
to detect the edges of an object and to sort simple objects into categories like circles and squares. In
the 1970s, the first commercial use of computer vision interpreted typed or handwritten text using
optical character recognition. This advancement was used to interpret written text for the blind. As
the internet matured in the 1990s, making large sets of images available online for analysis, facial
recognition programs flourished. These growing data sets helped make it possible for machines to
identify specific people in photos and videos.
How computer vision works
2. Processing the image: Deep learning models automate much of this process,
but the models are often trained by first being fed thousands of labeled or pre-
identified images.
Pattern detection is a process of recognizing repeated shapes, colors and other visual
indicators in images.
Advantages of Embedded
➢ Easily Customizable
➢ Low power consumption
➢ Low cost
➢ Enhanced performance
Sensor − It measures the physical quantity and converts it to an electrical signal which can be
read by an observer or by any electronic instrument like an A2D converter. A sensor stores the
measured quantity to the memory.
A-D Converter − An analog-to-digital converter converts the analog signal sent by the sensor into a
digital signal.
Processor & ASICs − Processors process the data to measure the output and store it to the memory.
D-A Converter − A digital-to-analog converter converts the digital data fed by the processor to
analog data.
Actuator − An actuator compares the output given by the D-A Converter to the
actual (expected) output stored in it and stores the approved output.
8.Cybersecurity
Network security: - Network security is the process of protecting the usability and
integrity of your network and data. This is achieved by conducting a network
penetration test, which scans your network for vulnerabilities and security issues.
Leadership commitment: - Leadership commitment is the key to cyber
resilience. Without it, it is very difficult to establish or enforce effective
processes. Top management must be prepared to invest in appropriate
cybersecurity resources, such as awareness training.
Cybersecurity vendors
Vendors in cybersecurity fields will typically use endpoint, network, and advanced threat protection security as
well as data loss prevention. Three commonly known cybersecurity vendors include Cisco, McAfee, and Trend
Micro.
9. Additive manufacturing (3D Printing)
Additive manufacturing (AM) describes types of advanced manufacturing that are used to
create three-dimensional structures out of plastics, metals, polymers and other materials
that can be sprayed through a nozzle or aggregated in a vat. These constructs are added
layer by layer in real-time based on digital design. The simplicity and low cost of AM
machines, combined with the scope of their potential creations, could profoundly alter
global and local economies and affect international security.