Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
18 views82 pages

Emerging Technologies

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1/ 82

Lecutre Noets on Emerging Technology

Chapter one
Introduction to Emerging Technologies
 Introduction

 Emerging technology is a term generally used to describe a new technology,


but it may also refer to the continuing development of an existing technology;
 It can have slightly different meaning when used in different areas, such as
media, business, science, or education.

 The term commonly refers to technologies that are currently developing, or


that are expected to be available within the next five to ten years, and is usually
reserved for technologies that are creating, or are expected to create, significant
social or economic effects.
Evolution of Technologies

 What is the root word of technology and evolution?


 Technology is the set of knowledge, skills, experience and techniques through which humans
change, transform and use our environment in order to create tools, machines, products and services
that meet our needs and desires
 Evolution: evolution means the process of developing by gradual changes.

 Technological evolution is a theory of radical transformation of society through technological


development.
 List of some currently available emerged technologies
 Artificial Intelligence
 Augmented Reality and Virtual Reality
 Cloud Computing
 Big Data
Introduction to the Industrial Revolution (IR)

 An Industrial Revolution at its core occurs when a society shifts from using tools to
make products to use new sources of energy, such as coal, to power machines in
factories.
 Such as to make labor more efficient and productive with series of innovations.
 the following industrial revolutions fundamentally changed and transfer the world
around us into modern society.

 The steam engine,


 The age of science and mass production, and
 The rise of digital technology
 Smart and autonomous systems fueled by data and machine learning.
 The most Important Inventions of the Industrial Revolution are: transportation,
communication and industry.
Historical Background (IR 1.0, IR 2.0, IR 3.0)
 The industrial revolution began in Great Britain in the late 1770s before spreading to the
rest of Europe.
 The first European countries to be industrialized after England were Belgium, France, and
the German states.
 The four types of industries are:
 The primary industry involves getting raw materials e.g. mining, farming,
and fishing.
 The secondary industry involves manufacturing e.g. making cars and
steel.
 Tertiary industries provide a service e.g. teaching and nursing.
 The quaternary industry involves research and development industries
e.g. IT.
Role of Data for Emerging Technologies

 Data is regarded as the new oil and strategic asset since we are living in the age of
big data, and drives or even determines the future of science, technology, the
economy, and possibly everything in our world today and tomorrow.
 Data have not only triggered tremendous hype and buzz but more
importantly, presents enormous challenges that in turn bring incredible
innovation and economic opportunities.
 This reshaping and paradigm-shifting are driven not just by data itself but all other
aspects that could be created, transformed, and/or adjusted by understanding,
exploring, and utilizing data.
Enabling devices and network (Programmable devices)

 In the world of digital electronic systems, there are four basic kinds of
devices: memory, microprocessors, logic, and networks.
 Memory devices store random information such as the contents of a spreadsheet or
database.
 Microprocessors execute software instructions to perform a wide variety of tasks such as
running a word processing program or video game.
 Logic devices provide specific functions, including device-to-device interfacing, data
communication, signal processing, data display, timing and control operations, and almost
every other function a system must perform.
 The network is a collection of computers, servers, main frames, network devices,
peripherals, or other devices connected to one another to allow the sharing of data.
Human to Machine Interaction

 Human-machine interaction(HMI) refers to the communication and interaction


between a human and a machine via a user interface.
 HCI(human-computer interaction) is the study of how people interact with computers
and to what extent computers are or are not developed for successful interaction
with human beings.
 As its name implies, HCI consists of three parts: the user, the computer itself, and
the ways they work together.
 How do users interact with computers?

 The user interacts directly with hardware for the human input and output such
as displays, e.g. through a graphical user interface.
 The user interacts with the computer over this software interface using the given
input and output (I/O) hardware.
Human to Machine Interaction…

 The goal of HCI is to improve the interaction between users and computers by
making computers more user-friendly and accessible to the user's needs.
 The main advantages of HCI are simplicity, ease of deployment & operations and cost
savings for smaller set-ups. They also reduce solution design time and integration
complexity.
 Disciplines Contributing to Human-Computer Interaction (HCI)

 Cognitive psychology
 Computer science
 Linguistics.
 Engineering and design.
 Artificial intelligence.
 Human factors.
Future Trends in Emerging Technologies
 Emerging technology trends in 2019)

 5G Networks  Augmented Analytics


 Artificial Intelligence (AI)  Digital Twins
 Autonomous Devices  Enhanced Edge Computing and
 Block chain  Immersive Experiences in Smart Spaces
Chapter Two
 Introduction Data Science
 Data science is a multi-disciplinary field that uses scientific methods, processes, algorithms, and
systems to extract knowledge and insights from structured, semi-structured and unstructured data.

 What are data and information?


 Data can be defined as any type of representation of an object or an event. Representation could
be in the form of, number, text symbols, and voice, static or dynamic image and so on.
 Information can be defined as a processed or summarized data for a particular analysis or
decision making.
 The major difference between data and information is that data is raw material that is to be
processed and information is the processed data.
 Data is the input language for a computer and information is the output language for
human.
 Data is unprocessed facts and figures without any added interpretation or analysis.
 Data does not depend on information but information depends on data and without it,
information cannot be processed
Data Processing Cycle

 Data processing is the re-structuring or re-ordering of data by people or machines to


increase their usefulness and add values for a particular purpose.
 Data processing consists of the following basic steps -input, processing, and output.
 These three steps constitute the data processing cycle.

Fig: Data processing cycle


Data types and their representation

 a data type is simply an attribute of data that tells the compiler or interpreter
how the programmer intends to use the data.
 Data types can be described from diverse perspectives.
 Data types from Computer programming perspective

 Common data types include:


 Integers (int)-is used to store whole numbers, mathematically known as integers
 Booleans(bool)-is used to represent restricted to one of two values: true or false
 Characters(char)-is used to store a single character
 Floating-point numbers(float)-is used to store real numbers
 Alphanumeric strings(string)-used to store a combination of characters and numbers
 This data type defines the operations that can be done on the data, the meaning of the data, and
the way values of that type can be stored.
Data types and their representation…
 Data types from Data Analytics perspective

 From a data analytics point of view, it is important to understand that there are three
common types of data types:
 Structures Data: Structured data is data that follows to a pre-defined data model and is
therefore straightforward to analyze.

 Semi-structured Data: Semi-structured data is a form of structured data that does not
conform with the formal structure of data models associated with relational databases or
other forms of data tables, but nonetheless, contains tags or other markers to separate
semantic elements and enforce hierarchies of records and fields within the data.

 Unstructured data: Unstructured data is information that either does not have a
predefined data model or is not organized in a pre-defined manner .
 What is Meta Data
 Metadata is "data that provides information about other data". In other words, it is "data about data."
Data value Chain
 The data value chain describes the process of data creation and use from first
identifying a need for data to its final use and possible reuse.
 The Data Value Chain is introduced to describe the information flow within a big data system as
a series of steps needed to generate value and useful insights from data.
 The Big Data Value Chain identifies the following key high-level activities: curation
Basic concepts of big data
 What Is Big Data?

 Big data is the term for a collection of data sets so large and complex that it becomes
difficult to process using on-hand database management tools or traditional data
processing applications.
 Big data is characterized by 3V and more:
 Volume: large amounts of data Zeta bytes/Massive datasets
 Velocity: Data is live streaming or in motion
 Variety: data comes in many different forms from diverse sources
 Veracity: can we trust the data? How accurate is it? etc.
Clustered Computing and Hadoop Ecosystem
 Clustered Computing

 Because of the qualities of big data, individual computers are often inadequate for
handling the data at most stages.
 To better address the high storage and computational needs of big data,
computer clusters are a better fit.
 Big data clustering software combines the resources of many smaller machines,
seeking to provide a number of benefits. Such as: Resource Pooling, High
Availability, and Easy Scalability of the machines.
 Using clusters requires a solution for managing cluster membership, coordinating
resource sharing, and scheduling actual work on individual nodes.
 Cluster membership and resource allocation can be handled by software like Hadoop’s
YARN (which stands for Yet Another Resource Negotiator)
Clustered Computing and Hadoop Ecosystem …
 Hadoop and its Ecosystem

 Hadoop is an open-source framework intended to make interaction with big data easier.
 It is a framework that allows for the distributed processing of large datasets across clusters
of computers using simple programming models.
 The four key characteristics of Hadoop are: such as :l
 Its systems are highly economical for data processing
 It is reliable as it stores copies of the data on different machines and is resistant to
hardware failure.
 It is easily scalable both, horizontally and vertically.
 It is flexible and you can store as much structured and unstructured data as you need to
and decide to use them later.
Clustered Computing and Hadoop Ecosystem …
 Assignment 10%

 Students in a group shall discuss the purpose of each Hadoop Ecosystem


components?
Chapter Three
Artificial Intelligence (AI)
 What is Artificial Intelligence (AI)
 Artificial Intelligence is composed of two words Artificial and Intelligence
 Artificial defines "man-made," and intelligence defines "thinking power", or “the ability to
learn and solve problems” hence Artificial Intelligence means "a man-made thinking
power.“
 Artificial Intelligence (AI) is the branch of computer science by which we can create intelligent
machines which can behave like a human, think like humans, and able to make decisions.
 Artificial Intelligence exists when a machine can have human-based skills such as
learning, reasoning, and solving problems with Artificial Intelligence you do not need to
preprogram a machine to do some work, despite that you can create a machine with
programmed algorithms which can work with own intelligence.
 Intelligence is composed of: Reasoning, learning, problem solving, perception, and linguistic
intelligence.
Conn…

 An AI system is composed of an agent and its environment.


 An agent (e.g., human or robot) is anything that can perceive its environment through
sensors and acts upon that environment through effectors.

Human beings Agents

Sensors Eyes, Ears, Nose Cameras, Scanners, Mic, infrared


range finders

Effectors Hands, Legs, Mouth Various Motors (artificial hand,


artificial leg), Speakers, Radio
Examples of agents in different types of applications
Agent type Percepts Actions Goals Environment

Medical Symptoms, Questions, tests, Healthy Patient,


diagnosis patient's treatments patients, hospital
system answers minimize costs
Maximize
Interactive Typed words, Write exercises, student's Set of
English tutor questions, suggestions, score on students,
suggestions corrections exams materials
Conveyor
Part-picking Pixels of Pick up parts and Place parts in belts with
robot varying sort into bins correct bins parts
intensity
Satellite image Pixels Print a Correct Images from
analysis system intensity, categorization of categorization orbiting
color scene satellite

Refinery Temperature, Open, close Maximize Refinery


controller pressure valves; adjust purity, yield,
readings temperature safety
22
Need for Artificial Intelligence
 The need of AI at this time is:
 To create expert systems that exhibit intelligent behavior with the capability to
learn, demonstrate, explain and advice its users.
 Helping machines find solutions to complex problems like humans do and applying
them as algorithms in a computer-friendly manner
 IT’s Goals are:
 Replicate human intelligence
 Solve Knowledge-intensive tasks
 An intelligent connection of perception and action.
 Building a machine which can perform tasks that requires human intelligence
 Creating some system which can exhibit intelligent behavior, learn new things by
itself, demonstrate, explain, and can advise to its user.
What Comprises to Artificial Intelligence?
 Artificial Intelligence is not just a part of computer science even it's so vast and requires
lots of other factors that can contribute to it.
 Artificial intelligence is a science and technology based on disciplines such as
Computer Science, Biology, Psychology, Linguistics, Mathematics, and Engineering.
 A major thrust of AI is in the development of computer functions associated with
human intelligence, such as reasoning, learning, and problem solving.
Advantages of Artificial Intelligence
 Following are some main advantages of Artificial Intelligence:
 High Accuracy with fewer errors:  Useful for risky areas
 High-Speed:  Digital Assistant:
 High reliability:  Useful as a public utility
 Disadvantages of Artificial Intelligence (AI)

 One of the key features that distinguishes us, humans, from everything else in the
world is intelligence. This ability to understand, apply knowledge and improve skills
has played a significant role in our evolution and establishing human civilization.
 Following are some Disadvantages of Artificial Intelligence:
 High Cost:  Increase dependence on machines
 Can't think out of the box  No Original Creativity
 No feelings and emotions
Types of AI

 there are mainly two types of the main categorization which are based on
capabilities and based on functionally of AI, as shown in figure below.
Types of AI Based on Capabilities
1. Weak AI or Narrow AI:

 Narrow AI is a type of AI which is able to perform a dedicated task with


intelligence.

2. General AI:)

 General AI is a type of intelligence that could perform any intellectual task with
efficiency like a human.

3. Super A

 Super AI is a level of Intelligence of Systems at which machines could surpass


human intelligence, and can perform any task better than a human with cognitive
properties.
Types of AI Based on the functionality

1. Reactive Machines

 Reactive machines are basic in that they do not store 'memories' or use past experiences to
determine future actions. They simply perceive the world and react to it.
 These machines only focus on current scenarios and react on it as per possible best action

2. Limited Memory

 Limited memory machines can store past experiences or some data for a short
period of time.
 Self-driving cars are one of the best examples of Limited Memory systems. These cars
can store the recent speed of nearby cars, the distance of other cars, speed
limits, and other information to navigate the road
Types of AI Based on the functionality…
3. Theory of Mind
 Theory of Mind AI should understand human emotions, people, beliefs, and be able to
interact socially like humans.
4. Self-Awareness
 Self-awareness AI is the future of Artificial Intelligence. These machines will be super
intelligent and will have their own consciousness, sentiments, and self-awareness.
 These machines will be smarter than the human mind.
 Self-Awareness AI does not exist in reality still and it is a hypothetical concept.
 How humans think

 How does a human being think? Intelligence or the cognitive process is composed of
three main stages:
 Observe and input the information or data in the brain.
 Interpret and evaluate the input that is received from the surrounding environment.
 Make decisions as a reaction towards what you received as input and
interpreted and evaluated.
Mapping human thinking to artificial intelligence components
 Is it possible to map the way of human thinking to artificial intelligence components? If
your answer is yes, why?

 Because AI is the science of simulating human thinking, it is possible to map the human
thinking stages to the layers or components of AI systems.
 In the first stage, humans acquire information from their surrounding environments through
human senses, such as sight, hearing, smell, taste, and touch, through human organs, such as
eyes, ears, and other sensing organs, for example, the hand
 The second stage is related to interpreting and evaluating the input data. In AI, this
stage is represented by the interpretation layer, that is, reasoning and thinking about the
gathered input that is acquired by the sensing layer.
 The third stage is related to taking action or making decisions. After evaluating the input
data, the interacting layer performs the necessary tasks. Robotic movement control and
speech generation are examples of functions that are implemented in the interacting layer.
Influencers of artificial intelligence
 Some of the influential factors that accelerate the rise of AI are:
 Big data: Structured data versus unstructured data
 Advancements in computer processing speed and new chip architectures
 Cloud computing and APIs
 The emergence of data science
Applications of AI

 Following are some sectors which have the application of Artificial Intelligence:

 AI in agriculture  AI in Social Media


 AI in Healthcare  AI in Travel &Transport
 AI in education  AI in the Automotive Industry
 AI in Finance and E-commerce  AI in Robotics
 AI in Gaming  AI in Entertainment
 AI in Data Security
AI tools and platforms

 AI platforms are defined as some sort of hardware architecture or software framework


(including application frameworks), that allows the software to run.
 It involves the use of machines to perform the tasks that are performed by human beings.
 The platform simulates the cognitive function that human minds perform such as problem-
solving, learning, reasoning, social intelligence as well as general intelligence.

 Artificial intelligence (AI) platforms provide users a tool kit to build intelligent
applications.
 AI has developed a large number of tools to solve the most difficult problems in computer
science, such as:- Search and optimization, Logic, Probabilistic methods for uncertain
reasoning, Classifiers and statistical learning methods, Neural networks, Control theory,
Languages.
 The most common artificial intelligence platforms include Microsoft AZURE Machine
Learning, Google Cloud Prediction API, IBM Watson, TensorFlow, Infosys Nia, Wipro
HOLMES, API.AI, Premonition, Rainbird, Ayasdi, MindMeld, and Meya.
Chapter Four
Internet of Things (IoT)
 What is IoT?

 The most important features of IoT include artificial intelligence, connectivity,


sensors, active engagement, and small device use.
 Def:-
 According to the Internet Architecture Board’s (IAB) definition, IoT is the
networking of smart objects, meaning a huge number of devices intelligently
communicating in the presence of internet protocol that cannot be directly
operated by human beings but exist as components in buildings, vehicles or the
environment.
 According to the Internet Engineering Task Force (IETF) organization’s definition,
IoT is the networking of smart objects in which smart objects have some
constraints such as limited bandwidth, power, and processing accessibility for
achieving interoperability among smart objects.
What is IoT…

 According to the Oxford dictionary’s definition, IoT is the interaction of everyday


object’s computing devices through the Internet that enables the sending and
receiving of useful data.
 The term Internet of Things (IoT) according to the 2020 conceptual framework is
expressed through a simple formula such as:
 IoT= Service + Data + Networks + Sensors

 Generally, The Internet of Things (IoT) is the network of physical objects or "things"
embedded with electronics, software, sensors, and network connectivity, which
enables these objects to collect and exchange data.
 IoT is a network of devices that can sense, accumulate and transfer data over
the internet without any human intervention.
What is IoT…

 The internet of things (IoT) has found its application in several areas such as connected
industry, smart-city, smart-home, smart-energy, connected car, smart agriculture,
connected building and campus, health care, logistics, among other domains

 IoT systems allow users to achieve deeper automation, analysis, and integration
within a system. They improve the reach of these areas and their accuracy.
IoT − Advantages

 Improved Customer Engagement.  Reduced Waste.


Technology Optimization  Enhanced Data Collection
 What is IoT?
 As the number of connected devices increases and more information is shared
between devices, the potential that a hacker could steal confidential information also
increases.
 If there’s a bug in the system, it’s likely that every connected device will become
corrupted.
 Since there’s no international standard of compatibility for IoT, it’s difficult for devices
from different manufacturers to communicate with each other.
 Enterprises may eventually have to deal with massive numbers maybe even millions of
IoT devices and collecting and managing the data from all those devices will be
challenging.
Challenges of IoT

 Security  Flexibility
 Privacy  Compliance
 Complexity
 How does it work?
 An IoT ecosystem consists of web-enabled smart devices that use embedded
processors, sensors and communication hardware to collect, send and act on
data they acquire from their environments.
 IoT devices share the sensor data they collect by connecting to an IoT gateway
or another edge device where data is either sent to the cloud to be analyzed or analyzed
locally.
 The connectivity, networking and communication protocols used with these web-
enabled devices largely depend on the specific IoT applications deployed.
Architecture of IoT

 In general, an IoT device can be explained as a network of things that consists


of hardware, software, network connectivity, and sensors.
 Hence, the architecture of IoT devices comprises four major components: sensing,
network, data processing, and application layers (as depicted in Figure below).

 A detailed description of these layers is given on the next slide.


Architecture of IoT

 Sensing Layer-The main purpose of the sensing layer is to identify any


phenomena in the devices’ peripheral and obtain data from the real world.
 Network Layer-The network layer acts as a communication channel to transfer data,
collected in the sensing layer, to other connected devices.
 In IoT devices, the network layer is implemented by using diverse
communication technologies (e.g., Wi-Fi, Bluetooth, Zigbee, Z-Wave, LoRa,
cellular network, etc.) to allow data flow between other devices within the same
network.
 Data Processing Layer-The data processing layer consists of the main data processing
unit of IoT devices.
 The data processing layer takes data collected in the sensing layer and analyses the
data to make decisions based on the result.
 Application Layer-The application layer implements and presents the results of
the data processing layer to accomplish disparate applications of IoT devices.
Devices and Networks

 Connected devices are part of a scenario in which every device talks to other related
devices in an environment to automate home and industrial tasks, and to
communicate usable sensor data to users, businesses and other interested parties.
 IoT devices are meant to work in concert for people at home, in industry or in the
enterprise. As such, the devices can be categorized into three main groups: consumer,
enterprise and industrial.
 Consumer connected devices include smart TVs, smart speakers, toys,
wearables, and smart appliances.
 Smart meters, commercial security systems and smart city technologies such as
those used to monitor traffic and weather conditions are examples of
industrial and enterprise IoT devices.
Devices and Networks…

 IoT network typically includes a number of devices with constrained resources (power,
processing, memory, among others) and some of those devices may be massively
deployed over large areas like smart cities, industrial plants, whereas others may be
deployed in hard-to-reach areas like pipelines hazardous zones, or even in hostile
environments like war zones.
 Therefore, the efficient management of IoT networks requires considering both the
constraints of low power IoT devices and the deployment complexity of the underlying
communication infrastructure.
 To ensure the correct functioning of those connected devices, they must be remotely
accessed to configure, monitoring their status, and so forth.
IoT Tools and Platforms
IoT Platform Key features
KAA  Manage an unlimited number of connected devices
 Set up cross-device interoperability
 Perform real-time device monitoring
 Perform remote device provisioning and configuration

SiteWhere  Run any number of IoT applications on a single SiteWhere instance


 Spring delivers the core configuration framework
ThingSpeak  Collect data in private channels
 Share data with public channels
 MATLAB analytics and visualizations

DeviceHive  Directly integrate with Alexa


 Visualization dashboard of your choice
 It supports Big data solutions such as Elastic Search, Apache Spark,
Cassandra and Kafka for real-time and batch processing.
 Connect any device
ThingBoard  Real-time data visualization and remote device control
 Customizable rules, plugins, widgets and transport implementations
 Allows monitoring client-side and provision server-side device attributes.
Applications of IoT

 Some of the applications of IoT are listed below:

 For Agriculture Purposes  For manufacturing and industrial automation


 For consumer uses  For Online and in-store shopping sales figure
 For healthcare purposes  For Transportation
 For insurance Industries  For Utilities
IoT Based Smart Home

 Smart Home initiative allows subscribers to remotely manage and monitor different
home devices from any where via smartphones or over the web with no physical
distance limitations.
 These “smart” devices have the potential to share information with each other
given the permanent availability to access the broadband internet connection. Such
as:
 Remote Control Appliances  Safety Monitoring
 Displays outdoor weather conditions  Intrusion Detection Systems
 Smart Home Appliances  Energy and Water Use
IoT Based Smart City

 In cities, the development of smart grids, data analytics, and autonomous vehicles will
provide an intelligent platform to deliver innovations:
 In energy management, traffic management, and security, sharing the benefits
of this technology throughout society.
Chapter Five
Augmented Reality (AR)
 Overview of augmented reality

 The fundamental idea of AR is to combine, or mix, the view of the real


environment with additional, virtual content that is presented through computer
graphics.
 Augmented reality (AR) refers to a live view of a physical real-world environment
whose elements are merged with augmented computer-generated images creating a
mixed reality.
 The augmentation is typically done in real-time and in semantic context with
environmental elements.
 By using the latest AR techniques and technologies, the information about the
surrounding real world becomes interactive and digitally usable.
Overview of augmented reality…

 Augmented Reality (AR) as a real-time direct or indirect view of a physical real-world


environment that has been enhanced/augmented by adding virtual computer-generated
information to it.
 Augmented reality is the integration of digital information with the user's environment
in real- time.
 Unlike virtual reality, which creates a totally artificial environment, augmented reality
uses the existing environment and overlays new information on top of it.
 A live direct or indirect view of a physical, real-world environment whose elements are
augmented by computer-generated sensory input such as sound, video, graphics or
GPS data.
Virtual reality (VR), Augmented Reality (AR) vs Mixed reality (MR)

 Virtual Reality (VR)

 VR is fully immersive, which tricks your senses into thinking you’re in a different
environment or world apart from the real world.
 It is also called a computer-simulated reality.
 Augmented Reality (AR)
 Augmented Reality (AR) as a real-time direct or indirect view of a physical real-world
environment that has been enhanced/augmented by adding virtual computer-generated
information to it.
 Mixed Reality (MR)
 Mixed Reality (MR), sometimes referred to as hybrid reality, is the merging of
real and virtual worlds to produce new environments and visualizations where
physical and digital objects co-exist and interact in real-time.
 The key characteristic of MR is that the synthetic content and the real-world
content are able to react to each other in real-time.
The architecture of AR Systems

 The first Augmented Reality Systems (ARS) were usually designed with a basis
on three main blocks, as is illustrated in Figure below: (1) Infrastructure Tracker Unit,
(2) Processing Unit, and (3) Visual Unit.
 The Infrastructure Tracker Unit was responsible for collecting data from the
real world, sending them to the Processing Unit, which mixed the virtual content
with the real content and sent the result to the Video Out module of the Visual
Unit.
 Some designs used a Video In, to acquire required data for the Infrastructure
Tracker Unit.
The architecture of AR Systems
Applications of AR Systems

 Technology is ever-changing and ever-growing. One of the newest developing


technologies is augmented reality (AR), which can be applied to many different
disciplines such as on education, medicine, entertainment, military, etc.
Chapter Six
ETHICS AND PROFESSIONALISM OF EMERGING TECHNOLOGIES
 Technology and ethics
 The Internet boom has provided many benefits for society, allowing the creation of new
tools and new ways for people to interact.
 As with many technological advances, however, the Internet has not been without negative
aspects.
 For example, it has created new concerns about privacy, and it has been hampered
by spam and viruses. Moreover, even as it serves as a medium for
communication across the globe, it threatens to cut off people who lack access to it.
 Ethics is particularly important for the accountancy profession, with a code for
professional ethics based on five basic principles –integrity, objectivity, competence and
due care, confidentiality, and professional behavior. However, the emergence of new
technologies raises some new challenges for the profession to address
New ethical questions

 The increasing use of big data, algorithmic decision-making, and artificial intelligence can
enable more consistent, evidence-based and accurate judgments or decisions, often
more quickly and efficiently.
 However, these strengths can potentially have a darker side too, throwing up questions
around the ethical use of these fairly new technologies.
 Questions are being asked regarding the interaction between computers and humans.
 How much reliance can we place on data and models, and what is the role of human
judgment, as well as how do we ensure that we understand the decision-making process?
Whatever the power of the machine, humans will still need to be involved, so that people
can be held accountable, or explain the reasons behind a decision .
 Do you think that integrating ethical rules with emerging technologies is important? If
your answer is yes, why? What are the challenges of integrating ethical rules with the
new technologies?
General ethical principles

 The most common ethical rules that must be applied in all technologies are:-
 Contribute to society and to human well-being, acknowledging that all people
are stakeholders in computing.
 .Avoid harm.
 .Be honest and trustworthy.
 Be fair and take action not to discriminate
 .Respect the work required to produce new ideas, inventions, creative works,
and computing artifacts.
 .Respect privacy.
 .Honor confidentiality
Professional leadership principles.
 The most common ethical principles related to professional leadership are:-
 Ensure that the public good is the central concern during all professional computing work.
 Articulate, encourage acceptance of and evaluate fulfillment of social responsibilities by
members of the organization or group.
 Manage personnel and resources to enhance the quality of working life.
 Articulate, apply, and support policies and processes that reflect the principles of the
Code.
 Create opportunities for members of the organization or group to grow as professionals.
 Use care when modifying or retiring systems. Interface changes, the removal of features,
and even software updates have an impact on the productivity of users and the quality of
their work.
 Recognize and take special care of systems that become integrated into the infrastructure
of society.
Professional responsibilities.
 The most common ethical principles related to professional responsibility are:-
 Strive to achieve high quality in both the processes and products of professional
work.
 Maintain high standards of professional competence, conduct, and ethical practice.
 Know and respect existing rules pertaining to professional work.
 Accept and provide appropriate professional review.
 Give comprehensive and thorough evaluations of computer systems and their
impacts, including analysis of possible risks.
 Perform work only in areas of competence.
 Foster public awareness and understanding of computing, related technologies, and
their consequences.
 Access computing and communication resources only when authorized or when
compelled by the public good.
Digital privacy
 Digital Privacy is the protection of personally identifiable or business identifiable
information that is collected from respondents through information collection
activities or from other sources.
 It is a collective definition that encompasses three sub-related categories;
 information privacy,
 communication privacy, and
 individual privacy
 In addition to that some of the digital privacy principles that must be need to follow are like:
Data minimizing, Transparency, accuracy, and security of the digital elements.
Accountability and trust
 Emerging technology can creates far-reaching and rapid change. They can provide
improved accuracy, better quality and cost efficiencies for businesses in every
sector.
 They can enhance trust in the organization’s operations and financial processes,
which is crucial for sustainable success. But, it can also bring new risks.
 As a result there should be regulation so that obligation of an individual or
organization to account for its activities, accept responsibility for them, and to
disclose the results in a transparent manner.
Treats and challenges

 Reading Assignment on :-
 What are the challenges of using technologies like AI, IoT, and
big data?
 Write down some risks in emerging technologies like driverless
cars, drones, and IoT?
Chapter Seven
OTHER EMERGING TECHNOLOGIES
 Nanotechnology
 Nanotechnology is science, engineering, and technology conducted at the nanoscale,
which is about 1 to 100 nanometers.
 Nanoscience and nanotechnology are the study and application of extremely small
things and can be used across all the other science fields, such as chemistry,
biology, physics, materials science, and engineering

 Applications of Nanotechnology
 Medicine  Agriculture
 Electronics  Vehicle manufactures
 Food
Biotechnology
 Itis the broad area of biology involving living systems and organisms to develop or
make products, or "any technological application that uses biological systems,
living organisms, or derivatives thereof, to make or modify products or processes
for specific use".
 One example of modern biotechnology is genetic engineering. Genetic engineering
is the process of transferring individual genes between organisms or modifying
the genes in an organism to remove or add a desired trait or characteristic.
 Applications of Nanotechnology
 Agriculture(Green Biotechnology)
 Medicine(Medicinal Biotechnology)
 Aquaculture Fisheries
 Environment (Environmental biotechnology)
Block chain technology
 Originally block chain is a growing list of records, called blocks, that
are linked using cryptography.
 Each block contains a cryptography hash of the previous block, a time stamp, and
transaction data (generally represented as a Merkle tree).
 A block chain is, in the simplest of terms, a time-stamped series of immutable
records of data that is managed by a cluster of computers not owned by any single
entity.
 Each of these blocks of data (i.e. block) is secured and bound to each other using
cryptographic principles (i.e. chain).
Block chain technology…
 “Blocks” on the block chain are made up of digital pieces of information.
Specifically, they have three parts:
 Blocks store information about transactions like the date, time, and
dollar amount of your most recent purchase from one business
organization.
 Blocks store information about who is participating in transactions.
 Blocks store information that distinguishes them from other blocks.
 When a block stores new data it is added to the block chain.
 Block chain, as its name suggests, consists of multiple blocks strung
together. In order for a block to be added to the block chain, however,
four things must happen:
Block chain technology…
 Block chain, as its name suggests, consists of multiple blocks strung together.
 In order for a block to be added to the block chain, however, four things
must happen:
1. A transaction must occur.
2. That transaction must be verified
3. That transaction must be stored in a block.
4. That block must be given a hash
The Three Pillars of Block chain Technology

 The three main properties of Block chain Technology are:


1. Decentralization
 In a decentralized network(see Figure 7.2), if you wanted to interact with
your friend then you can do so directly without going through a third
party. That was the main ideology behind Bitcoins.
2. Transparency
 A person’s identity is hidden via complex cryptography and represented
only by their public address
3. Immutability
 Immutability, in the context of the block chain, means that once something
has been entered into the block chain, it cannot be tampered with.
Block chain Technology…
 The reason why the block chain has gained so much admiration is that:
 It is not owned by a single entity, hence it is decentralized
 The data is cryptographically stored inside
 The block chain is immutable, so no one can tamper with the data that
is inside the block chain
 The block chain is transparent so one can track the data if they want to
 Why do people use the peer-to-peer network?
 In a peer-to-peer system, there is no central authority, and hence if even one of the
peers in the network goes out of the race, you still have more peers to
download from. Plus, it is not subject to the idealistic standards of a central
system.
 One of the main uses of the peer-to-peer network is file sharing, also called
torrenting.
Application of blockchain

 Some the application of Block chain are:


 The sharing economy  Supply chain auditing
 Crowd funding  File storage
 Governance
Cloud computing
 Cloud computing is the on-demand availability of computer system resources, especially
data storage and computing power, without direct active management by the user.
 The term is generally used to describe data centers available to many users over the
Interne
 Rather than storing and processing data on a local server, or a PC's hard drive, one of the
following three types of cloud infrastructure is used
 The first type is a public cloud. Here a third-party provider manages the servers,
applications, and storage much like a public utility. Anyone can subscribe to the
provider’s cloud service, which is usually operated through their own data center.
 The second type is privet cloud. This might be hosted on their on-site data center,
although some companies host through a third-party provider instead.
 The third option is a hybrid cloud. Here private clouds are connected to public
clouds, allowing data and applications to be shared between them
Advantages Cloud computing
 Some of the advantages of cloud computing's are:-
 To save substantial capital cost as it does not need any physical hardware
investments.
 It helps you to access the latest and applications any time without spending your
time and money on installations.
 Allows you to deploy your service quickly in fewer clicks and to get the resources
required for your system within fewer minutes.
 Once the data is stored in a Cloud, it is easier to get the back-up and recovery of that,
which is otherwise very time taking process on premise.
 You can always get instantly updated about the changes.
 The cloud offers almost limitless storage capacity. At any time you can quickly
expand your storage capacity with very nominal monthly fees.
 The cloud computing platform helps employees who are located in different
geographies to collaborate in a highly convenient and secure manner.
Quantum computing
 Quantum computing is the use of quantum-mechanical phenomena such as superposition
and entanglement to perform computation.
 A quantum computer is used to perform such computation, which can be implemented
theoretically or physically.
 Advantages of quantum computing
 Quantum computing could help in the discovery of new drugs, by unlocking the
complex structure of chemical molecules.
 Other uses include financial trading, risk management, and supply chain optimization.
 With its ability to handle more complex numbers, data could be transferred over the
internet with much safer encryption.
Autonomic computing (AC)
 Autonomic computing (AC) is an approach to address the complexity and
evolution problems in software systems.
 It is a self-managing computing model named after, and patterned on, the human
body's autonomic nervous system.
 An autonomic computing system would control the functioning of computer
applications and systems without input from the user, in the same way, that
the autonomic nervous system regulates body systems without conscious input
from the individual.
 The goal of autonomic computing is to create systems that run themselves, capable
of high-level functioning while keeping the system's complexity invisible to the
user.
Autonomic computing (AC)
 Autonomic computing (AC) is an approach to address the complexity and
evolution problems in software systems.
 It is a self-managing computing model named after, and patterned on, the human
body's autonomic nervous system.
 An autonomic computing system would control the functioning of computer
applications and systems without input from the user, in the same way, that
the autonomic nervous system regulates body systems without conscious input
from the individual.
 The goal of autonomic computing is to create systems that run themselves, capable
of high-level functioning while keeping the system's complexity invisible to the
user.
Computer vision
 Computer vision is a field of computer science that works on enabling computers to see,
identify and process images in the same way that human vision does, and then provide
appropriate output.
 How computer vision works
 Acquiring an image: Images, even large sets, can be acquired in real-time through video,
photos or 3D technology for analysis.
 Processing the image: Deep learning models automate much of this process, but
the models are often trained by first being fed thousands of labeled or pre-identified
images.
 Understanding the image: The final step is the interpretative step, where an object
is identified or classified.
Computer vision…
 There are many types of computer vision that are used in different ways.
 Image segmentation partitions an image into multiple regions or pieces to be
examined separately.
 Object detection identifies a specific object in an image. Advanced object
detection recognizes many objects in a single image: a football field, an offensive
player, a defensive player, a ball and so on. These models use an X, Y coordinate to
create bounding box and identify everything inside the box.
 Facial recognition is an advanced type of object detection that not only recognizes a
human face in an image but identifies a specific individual.
 Edge detection is a technique used to identify the outside edge of an object or
landscape to better identify what is in the image.
 Pattern detection is a process of recognizing repeated shapes, colors and other
visual indicators in images.
 Image classification groups images into different categories.
Applications of computer vision
 Computer vision is being used today in a wide variety of real-world applications, which
include:-
 Optical character recognition (OCR): reading handwritten postal codes on letters and
automatic number plate recognition (ANPR);
 Machine inspection: rapid parts inspection for quality assurance using stereo vision with
specialized illumination to measure tolerances on aircraft wings or auto body parts or looking
for defects in steel castings using X-ray vision;
 Retail: object recognition for automated checkout lanes
 Medical imaging: registering pre-operative and intra-operative imagery or performing
long-term studies of people’s brain morphology as they age;
 Automotive safety: detecting unexpected obstacles such as pedestrians on the street, under
conditions where active vision techniques such as radar or LIDAR do not work well.
 Fingerprint recognition and biometrics: for automatic access authentication as well
as forensic applications
Embedded systems
 An embedded system can be thought of as a computer hardware system having
software embedded in it.
 An embedded system can be an independent system or it can be a part of a large
system.
 An embedded system is a microcontroller or microprocessor based system which is
designed to perform a specific task.
 For example, a fire alarm is an embedded system; it will sense only smoke.
 An embedded system has three components −
 It has hardware.
 It has application software.
 It has Real Time Operating system (RTOS) that supervises the application software
and provide mechanism to let the processor run a process as per scheduling by
following a plan to control the latencies. RTOS defines the way the system works
Advantages and disadvantages of embedded system

 Basic Structure of an Embedded System


Cybersecurity
 It is the protection of computer systems from the theft of or damage to their hardware,
software, or electronic data, as well as from the disruption or misdirection of the
services they provide
 Cybersecurity measures
 The following are some security measures to be taken to prevent cybercrimes:
 Staff awareness training  Leadership commitment
 Application security  Password management
 Network security  Ransomware
 Benefits of cybersecurity
 Business protection against malware, ransomware, phishing, and social
engineering.  Improves recovery time
 Protection for data and networks. after a breach.
 Prevention of unauthorized users.  Protection for end-users.
 Improved confidence in the product for both developers and customers
Additive manufacturing (3D Printing)

 READING ASSIGNMENT ON ADDITIVE


MANUFACTURING (3D PRINTING)
 REVIEW QUESTIONS THAT MUST BE DO AS AN
ASSIGNMENT OUT OF 30%
1. Why we learn emerging technology course? And you have to explain the reason
in terms of your field.

2. What is the role of data science on your specific profession? And why do we
study a data science hear.

3. Give brief justification an AI is applicable on your profession?

4. What does IoT play in the day-to-day lives of people and in organizations?

5. Write the difference b/n AR, VR, and MR with their brief examples.

6. What do you think the need for ethics in data science, AI, and other future trends
of emerging Technologies?
82

You might also like