Emerging Technologies
Emerging Technologies
Emerging Technologies
Chapter one
Introduction to Emerging Technologies
Introduction
An Industrial Revolution at its core occurs when a society shifts from using tools to
make products to use new sources of energy, such as coal, to power machines in
factories.
Such as to make labor more efficient and productive with series of innovations.
the following industrial revolutions fundamentally changed and transfer the world
around us into modern society.
Data is regarded as the new oil and strategic asset since we are living in the age of
big data, and drives or even determines the future of science, technology, the
economy, and possibly everything in our world today and tomorrow.
Data have not only triggered tremendous hype and buzz but more
importantly, presents enormous challenges that in turn bring incredible
innovation and economic opportunities.
This reshaping and paradigm-shifting are driven not just by data itself but all other
aspects that could be created, transformed, and/or adjusted by understanding,
exploring, and utilizing data.
Enabling devices and network (Programmable devices)
In the world of digital electronic systems, there are four basic kinds of
devices: memory, microprocessors, logic, and networks.
Memory devices store random information such as the contents of a spreadsheet or
database.
Microprocessors execute software instructions to perform a wide variety of tasks such as
running a word processing program or video game.
Logic devices provide specific functions, including device-to-device interfacing, data
communication, signal processing, data display, timing and control operations, and almost
every other function a system must perform.
The network is a collection of computers, servers, main frames, network devices,
peripherals, or other devices connected to one another to allow the sharing of data.
Human to Machine Interaction
The user interacts directly with hardware for the human input and output such
as displays, e.g. through a graphical user interface.
The user interacts with the computer over this software interface using the given
input and output (I/O) hardware.
Human to Machine Interaction…
The goal of HCI is to improve the interaction between users and computers by
making computers more user-friendly and accessible to the user's needs.
The main advantages of HCI are simplicity, ease of deployment & operations and cost
savings for smaller set-ups. They also reduce solution design time and integration
complexity.
Disciplines Contributing to Human-Computer Interaction (HCI)
Cognitive psychology
Computer science
Linguistics.
Engineering and design.
Artificial intelligence.
Human factors.
Future Trends in Emerging Technologies
Emerging technology trends in 2019)
a data type is simply an attribute of data that tells the compiler or interpreter
how the programmer intends to use the data.
Data types can be described from diverse perspectives.
Data types from Computer programming perspective
From a data analytics point of view, it is important to understand that there are three
common types of data types:
Structures Data: Structured data is data that follows to a pre-defined data model and is
therefore straightforward to analyze.
Semi-structured Data: Semi-structured data is a form of structured data that does not
conform with the formal structure of data models associated with relational databases or
other forms of data tables, but nonetheless, contains tags or other markers to separate
semantic elements and enforce hierarchies of records and fields within the data.
Unstructured data: Unstructured data is information that either does not have a
predefined data model or is not organized in a pre-defined manner .
What is Meta Data
Metadata is "data that provides information about other data". In other words, it is "data about data."
Data value Chain
The data value chain describes the process of data creation and use from first
identifying a need for data to its final use and possible reuse.
The Data Value Chain is introduced to describe the information flow within a big data system as
a series of steps needed to generate value and useful insights from data.
The Big Data Value Chain identifies the following key high-level activities: curation
Basic concepts of big data
What Is Big Data?
Big data is the term for a collection of data sets so large and complex that it becomes
difficult to process using on-hand database management tools or traditional data
processing applications.
Big data is characterized by 3V and more:
Volume: large amounts of data Zeta bytes/Massive datasets
Velocity: Data is live streaming or in motion
Variety: data comes in many different forms from diverse sources
Veracity: can we trust the data? How accurate is it? etc.
Clustered Computing and Hadoop Ecosystem
Clustered Computing
Because of the qualities of big data, individual computers are often inadequate for
handling the data at most stages.
To better address the high storage and computational needs of big data,
computer clusters are a better fit.
Big data clustering software combines the resources of many smaller machines,
seeking to provide a number of benefits. Such as: Resource Pooling, High
Availability, and Easy Scalability of the machines.
Using clusters requires a solution for managing cluster membership, coordinating
resource sharing, and scheduling actual work on individual nodes.
Cluster membership and resource allocation can be handled by software like Hadoop’s
YARN (which stands for Yet Another Resource Negotiator)
Clustered Computing and Hadoop Ecosystem …
Hadoop and its Ecosystem
Hadoop is an open-source framework intended to make interaction with big data easier.
It is a framework that allows for the distributed processing of large datasets across clusters
of computers using simple programming models.
The four key characteristics of Hadoop are: such as :l
Its systems are highly economical for data processing
It is reliable as it stores copies of the data on different machines and is resistant to
hardware failure.
It is easily scalable both, horizontally and vertically.
It is flexible and you can store as much structured and unstructured data as you need to
and decide to use them later.
Clustered Computing and Hadoop Ecosystem …
Assignment 10%
One of the key features that distinguishes us, humans, from everything else in the
world is intelligence. This ability to understand, apply knowledge and improve skills
has played a significant role in our evolution and establishing human civilization.
Following are some Disadvantages of Artificial Intelligence:
High Cost: Increase dependence on machines
Can't think out of the box No Original Creativity
No feelings and emotions
Types of AI
there are mainly two types of the main categorization which are based on
capabilities and based on functionally of AI, as shown in figure below.
Types of AI Based on Capabilities
1. Weak AI or Narrow AI:
2. General AI:)
General AI is a type of intelligence that could perform any intellectual task with
efficiency like a human.
3. Super A
1. Reactive Machines
Reactive machines are basic in that they do not store 'memories' or use past experiences to
determine future actions. They simply perceive the world and react to it.
These machines only focus on current scenarios and react on it as per possible best action
2. Limited Memory
Limited memory machines can store past experiences or some data for a short
period of time.
Self-driving cars are one of the best examples of Limited Memory systems. These cars
can store the recent speed of nearby cars, the distance of other cars, speed
limits, and other information to navigate the road
Types of AI Based on the functionality…
3. Theory of Mind
Theory of Mind AI should understand human emotions, people, beliefs, and be able to
interact socially like humans.
4. Self-Awareness
Self-awareness AI is the future of Artificial Intelligence. These machines will be super
intelligent and will have their own consciousness, sentiments, and self-awareness.
These machines will be smarter than the human mind.
Self-Awareness AI does not exist in reality still and it is a hypothetical concept.
How humans think
How does a human being think? Intelligence or the cognitive process is composed of
three main stages:
Observe and input the information or data in the brain.
Interpret and evaluate the input that is received from the surrounding environment.
Make decisions as a reaction towards what you received as input and
interpreted and evaluated.
Mapping human thinking to artificial intelligence components
Is it possible to map the way of human thinking to artificial intelligence components? If
your answer is yes, why?
Because AI is the science of simulating human thinking, it is possible to map the human
thinking stages to the layers or components of AI systems.
In the first stage, humans acquire information from their surrounding environments through
human senses, such as sight, hearing, smell, taste, and touch, through human organs, such as
eyes, ears, and other sensing organs, for example, the hand
The second stage is related to interpreting and evaluating the input data. In AI, this
stage is represented by the interpretation layer, that is, reasoning and thinking about the
gathered input that is acquired by the sensing layer.
The third stage is related to taking action or making decisions. After evaluating the input
data, the interacting layer performs the necessary tasks. Robotic movement control and
speech generation are examples of functions that are implemented in the interacting layer.
Influencers of artificial intelligence
Some of the influential factors that accelerate the rise of AI are:
Big data: Structured data versus unstructured data
Advancements in computer processing speed and new chip architectures
Cloud computing and APIs
The emergence of data science
Applications of AI
Following are some sectors which have the application of Artificial Intelligence:
Artificial intelligence (AI) platforms provide users a tool kit to build intelligent
applications.
AI has developed a large number of tools to solve the most difficult problems in computer
science, such as:- Search and optimization, Logic, Probabilistic methods for uncertain
reasoning, Classifiers and statistical learning methods, Neural networks, Control theory,
Languages.
The most common artificial intelligence platforms include Microsoft AZURE Machine
Learning, Google Cloud Prediction API, IBM Watson, TensorFlow, Infosys Nia, Wipro
HOLMES, API.AI, Premonition, Rainbird, Ayasdi, MindMeld, and Meya.
Chapter Four
Internet of Things (IoT)
What is IoT?
Generally, The Internet of Things (IoT) is the network of physical objects or "things"
embedded with electronics, software, sensors, and network connectivity, which
enables these objects to collect and exchange data.
IoT is a network of devices that can sense, accumulate and transfer data over
the internet without any human intervention.
What is IoT…
The internet of things (IoT) has found its application in several areas such as connected
industry, smart-city, smart-home, smart-energy, connected car, smart agriculture,
connected building and campus, health care, logistics, among other domains
IoT systems allow users to achieve deeper automation, analysis, and integration
within a system. They improve the reach of these areas and their accuracy.
IoT − Advantages
Security Flexibility
Privacy Compliance
Complexity
How does it work?
An IoT ecosystem consists of web-enabled smart devices that use embedded
processors, sensors and communication hardware to collect, send and act on
data they acquire from their environments.
IoT devices share the sensor data they collect by connecting to an IoT gateway
or another edge device where data is either sent to the cloud to be analyzed or analyzed
locally.
The connectivity, networking and communication protocols used with these web-
enabled devices largely depend on the specific IoT applications deployed.
Architecture of IoT
Connected devices are part of a scenario in which every device talks to other related
devices in an environment to automate home and industrial tasks, and to
communicate usable sensor data to users, businesses and other interested parties.
IoT devices are meant to work in concert for people at home, in industry or in the
enterprise. As such, the devices can be categorized into three main groups: consumer,
enterprise and industrial.
Consumer connected devices include smart TVs, smart speakers, toys,
wearables, and smart appliances.
Smart meters, commercial security systems and smart city technologies such as
those used to monitor traffic and weather conditions are examples of
industrial and enterprise IoT devices.
Devices and Networks…
IoT network typically includes a number of devices with constrained resources (power,
processing, memory, among others) and some of those devices may be massively
deployed over large areas like smart cities, industrial plants, whereas others may be
deployed in hard-to-reach areas like pipelines hazardous zones, or even in hostile
environments like war zones.
Therefore, the efficient management of IoT networks requires considering both the
constraints of low power IoT devices and the deployment complexity of the underlying
communication infrastructure.
To ensure the correct functioning of those connected devices, they must be remotely
accessed to configure, monitoring their status, and so forth.
IoT Tools and Platforms
IoT Platform Key features
KAA Manage an unlimited number of connected devices
Set up cross-device interoperability
Perform real-time device monitoring
Perform remote device provisioning and configuration
Smart Home initiative allows subscribers to remotely manage and monitor different
home devices from any where via smartphones or over the web with no physical
distance limitations.
These “smart” devices have the potential to share information with each other
given the permanent availability to access the broadband internet connection. Such
as:
Remote Control Appliances Safety Monitoring
Displays outdoor weather conditions Intrusion Detection Systems
Smart Home Appliances Energy and Water Use
IoT Based Smart City
In cities, the development of smart grids, data analytics, and autonomous vehicles will
provide an intelligent platform to deliver innovations:
In energy management, traffic management, and security, sharing the benefits
of this technology throughout society.
Chapter Five
Augmented Reality (AR)
Overview of augmented reality
VR is fully immersive, which tricks your senses into thinking you’re in a different
environment or world apart from the real world.
It is also called a computer-simulated reality.
Augmented Reality (AR)
Augmented Reality (AR) as a real-time direct or indirect view of a physical real-world
environment that has been enhanced/augmented by adding virtual computer-generated
information to it.
Mixed Reality (MR)
Mixed Reality (MR), sometimes referred to as hybrid reality, is the merging of
real and virtual worlds to produce new environments and visualizations where
physical and digital objects co-exist and interact in real-time.
The key characteristic of MR is that the synthetic content and the real-world
content are able to react to each other in real-time.
The architecture of AR Systems
The first Augmented Reality Systems (ARS) were usually designed with a basis
on three main blocks, as is illustrated in Figure below: (1) Infrastructure Tracker Unit,
(2) Processing Unit, and (3) Visual Unit.
The Infrastructure Tracker Unit was responsible for collecting data from the
real world, sending them to the Processing Unit, which mixed the virtual content
with the real content and sent the result to the Video Out module of the Visual
Unit.
Some designs used a Video In, to acquire required data for the Infrastructure
Tracker Unit.
The architecture of AR Systems
Applications of AR Systems
The increasing use of big data, algorithmic decision-making, and artificial intelligence can
enable more consistent, evidence-based and accurate judgments or decisions, often
more quickly and efficiently.
However, these strengths can potentially have a darker side too, throwing up questions
around the ethical use of these fairly new technologies.
Questions are being asked regarding the interaction between computers and humans.
How much reliance can we place on data and models, and what is the role of human
judgment, as well as how do we ensure that we understand the decision-making process?
Whatever the power of the machine, humans will still need to be involved, so that people
can be held accountable, or explain the reasons behind a decision .
Do you think that integrating ethical rules with emerging technologies is important? If
your answer is yes, why? What are the challenges of integrating ethical rules with the
new technologies?
General ethical principles
The most common ethical rules that must be applied in all technologies are:-
Contribute to society and to human well-being, acknowledging that all people
are stakeholders in computing.
.Avoid harm.
.Be honest and trustworthy.
Be fair and take action not to discriminate
.Respect the work required to produce new ideas, inventions, creative works,
and computing artifacts.
.Respect privacy.
.Honor confidentiality
Professional leadership principles.
The most common ethical principles related to professional leadership are:-
Ensure that the public good is the central concern during all professional computing work.
Articulate, encourage acceptance of and evaluate fulfillment of social responsibilities by
members of the organization or group.
Manage personnel and resources to enhance the quality of working life.
Articulate, apply, and support policies and processes that reflect the principles of the
Code.
Create opportunities for members of the organization or group to grow as professionals.
Use care when modifying or retiring systems. Interface changes, the removal of features,
and even software updates have an impact on the productivity of users and the quality of
their work.
Recognize and take special care of systems that become integrated into the infrastructure
of society.
Professional responsibilities.
The most common ethical principles related to professional responsibility are:-
Strive to achieve high quality in both the processes and products of professional
work.
Maintain high standards of professional competence, conduct, and ethical practice.
Know and respect existing rules pertaining to professional work.
Accept and provide appropriate professional review.
Give comprehensive and thorough evaluations of computer systems and their
impacts, including analysis of possible risks.
Perform work only in areas of competence.
Foster public awareness and understanding of computing, related technologies, and
their consequences.
Access computing and communication resources only when authorized or when
compelled by the public good.
Digital privacy
Digital Privacy is the protection of personally identifiable or business identifiable
information that is collected from respondents through information collection
activities or from other sources.
It is a collective definition that encompasses three sub-related categories;
information privacy,
communication privacy, and
individual privacy
In addition to that some of the digital privacy principles that must be need to follow are like:
Data minimizing, Transparency, accuracy, and security of the digital elements.
Accountability and trust
Emerging technology can creates far-reaching and rapid change. They can provide
improved accuracy, better quality and cost efficiencies for businesses in every
sector.
They can enhance trust in the organization’s operations and financial processes,
which is crucial for sustainable success. But, it can also bring new risks.
As a result there should be regulation so that obligation of an individual or
organization to account for its activities, accept responsibility for them, and to
disclose the results in a transparent manner.
Treats and challenges
Reading Assignment on :-
What are the challenges of using technologies like AI, IoT, and
big data?
Write down some risks in emerging technologies like driverless
cars, drones, and IoT?
Chapter Seven
OTHER EMERGING TECHNOLOGIES
Nanotechnology
Nanotechnology is science, engineering, and technology conducted at the nanoscale,
which is about 1 to 100 nanometers.
Nanoscience and nanotechnology are the study and application of extremely small
things and can be used across all the other science fields, such as chemistry,
biology, physics, materials science, and engineering
Applications of Nanotechnology
Medicine Agriculture
Electronics Vehicle manufactures
Food
Biotechnology
Itis the broad area of biology involving living systems and organisms to develop or
make products, or "any technological application that uses biological systems,
living organisms, or derivatives thereof, to make or modify products or processes
for specific use".
One example of modern biotechnology is genetic engineering. Genetic engineering
is the process of transferring individual genes between organisms or modifying
the genes in an organism to remove or add a desired trait or characteristic.
Applications of Nanotechnology
Agriculture(Green Biotechnology)
Medicine(Medicinal Biotechnology)
Aquaculture Fisheries
Environment (Environmental biotechnology)
Block chain technology
Originally block chain is a growing list of records, called blocks, that
are linked using cryptography.
Each block contains a cryptography hash of the previous block, a time stamp, and
transaction data (generally represented as a Merkle tree).
A block chain is, in the simplest of terms, a time-stamped series of immutable
records of data that is managed by a cluster of computers not owned by any single
entity.
Each of these blocks of data (i.e. block) is secured and bound to each other using
cryptographic principles (i.e. chain).
Block chain technology…
“Blocks” on the block chain are made up of digital pieces of information.
Specifically, they have three parts:
Blocks store information about transactions like the date, time, and
dollar amount of your most recent purchase from one business
organization.
Blocks store information about who is participating in transactions.
Blocks store information that distinguishes them from other blocks.
When a block stores new data it is added to the block chain.
Block chain, as its name suggests, consists of multiple blocks strung
together. In order for a block to be added to the block chain, however,
four things must happen:
Block chain technology…
Block chain, as its name suggests, consists of multiple blocks strung together.
In order for a block to be added to the block chain, however, four things
must happen:
1. A transaction must occur.
2. That transaction must be verified
3. That transaction must be stored in a block.
4. That block must be given a hash
The Three Pillars of Block chain Technology
2. What is the role of data science on your specific profession? And why do we
study a data science hear.
4. What does IoT play in the day-to-day lives of people and in organizations?
5. Write the difference b/n AR, VR, and MR with their brief examples.
6. What do you think the need for ethics in data science, AI, and other future trends
of emerging Technologies?
82