Research Paper 2018
Research Paper 2018
[email protected] [email protected]
Introduction:
Fog Computing:
Where cloud computing can be thought of
as fluffy white clouds way up in the sky, fog
computing surrounds us. Fog computing
takes cloud computing and pushes it out to Biometrics:
the edge device, as opposed to keeping it It's high time that we kill off the use of the
in a data center. The idea is that our end dreaded complex password. The
devices will not talk back to a handful of requirements for this type of
cloud providers, where our applications authentication continue to increase in an
and data live. Instead, fog computing attempt to thwart advancements in
creates a wireless mesh at the edge, where password-cracking technologies. But
point-to-point communication with instead of trying to stay one step ahead,
devices in our geographical proximity are many are dramatically shifting focus to
far more prevalent. By creating a potentially more secure and certainly
heterogeneous mesh that all talks much easier to use biometric
together, a fog approach streamlines, authentication methods. Biometrics clearly
optimizes, and improves availability for do have a way to identify users. The key is
mobile device connectivity. to wrap hardware and software around it
to make it foolproof. And while we're not
quite there yet, many are getting close.
Clearly we'll be seeing and using
biometrics more and more on a daily basis.
spectrum. Depending on how these laws
work out, we may be seeing entirely new
spectrum opening up that could reduce
current bottlenecks and open up a new
world of wireless possibilities.
Quantum computing:
Quantum computing is the area of study
focused on developing computer
technology based on the principles
of quantum theory, which explains the
nature and behavior of energy and matter
on the quantum (atomic and subatomic) Severless computing:
level. Development of a quantum
With serverless computing, developers
computer, if practical, would mark a leap
rely on cloud-based servers, infrastructure
forward in computing capability far greater
and operating systems. The fact is, even
than that from the abacus to a modern
though it is called serverless, servers are
day supercomputer, with performance
still involved. But, as a fully managed
gains in the billion-fold realm and beyond.
service, the setup, capacity planning and
The quantum computer, following the laws
server management are invisible to you
of quantum physics, would gain enormous
because they are handled by the cloud
processing power through the ability to be
provider. In a traditional environment,
in multiple states, and to perform tasks
developers must provision and configure
using all possible permutations
servers, install operating systems and
simultaneously. Current centers of
continually manage the infrastructure.
research in quantum computing include
With a serverless architecture, you are free
to create, manage and deploy apps that well. Digital Twins which incorporates Big
scale on demand—without worrying about Data, Artificial Intelligence (AI), Machine
infrastructure. Learning (ML) and Internet of Things are
key in Industry 4.0 and are predominantly
Serverless architectures are event-driven, used in the Industrial Internet of Things,
highly scalable and only use resources engineering, and manufacturing business
when a specific function or event occurs. space. The widespread reach and usage of
You only pay for the resources you use or the Internet of Things have made the
the time your code is running. Developers Digital Twins more cost-effective and
use serverless architectures for many accessible for the business world.
purposes including web and mobile apps,
Internet of Things (IoT) back ends, image
manipulation and processing events from
software as a service (Saas)-based
applications.
Nanotechnology:
Nanotechnology is defined as the study
and use of structures between 1
nanometer and 100 nanometers in size. To
give you an idea of how small that is,
it would take eight hundred 100
Digital twin technology: nanometer particles side by side to match
Digital Twin Technology is one among the the width of a human hair. While this is the
top 10 strategic technology trends named most common definition of
by Gartner Inc. in 2017. Digital Twin nanotechnology researchers with various
concept represents the convergence of the focuses have slightly different definitions.
physical and the virtual world where every Nanotechnology is a scientific field that
industrial product will get a dynamic digital uses system or component development
representation. Throughout the product techniques to build products on highly
development life cycle, right from the granular levels. Nanotechnology works
design phase to the deployment phase, through different approaches to build
organizations can have a complete digital nano materials or products, including
foot print of their products. These bottom-up, top-down and functional
‘connected digital things’ generate data in system development. In a bottom-up
real time, and this helps businesses in approach, a product is designed as it
better analyze and predict the problems in evolves from its tiniest form factor to
advance or give early warnings, prevent larger product. In a top-down approach, a
downtime, develop new opportunities and large product may be reverse engineered
even plan better products for the future at to develop products scaled according to
lower costs by using simulations. All these nanometer. A functional approach deals
will have a greater impact on delivering a with a complete system and may
better customer experience in business as
incorporate bottom-up and top-down today plays an important part in the overall
approaches. Nanotechnology is use of technology. In addition, although
implemented in many different fields and the importance of these advances might be
applications, such as computing, obvious, true comprehension of a
biotechnology, electronics and chemical particular kind of technology lies in the full
engineering. experience of the machine in question.
Advances made in the technology of the
Internet have continued to dazzle its
spectators, obstructing comprehension of
its origin and initial uses. These
phenomena might be due to the rapid
change of technology, and the pace at
which individuals and businesses are
becoming dependent on them. At any rate,
the technological movement will continue
to evolve, and since it is evident that a
complete understanding of technology is
Conclusion: unnecessary for its utilization, only those
The evolution of information technology who lack access will be left behind.
reached a turning point with the
development of the Internet. Once a References:
government project, the Internet was https://ieeexplore.ieee.org/document/98976
created for military purposes. Through the 8
course of its development, researchers
began finding other uses for the network, https://www.informationweek.com/it-
and use of the technology spread life/7-emerging-technologies-it-should-
worldwide. Access to the Internet today by study-now/d/d-
individuals, businesses, and institutions id/1319197?image_number=7
alike has created a global market for
Internet service and has spurned an https://www.youtube.com/watch?v=0XnE
increase in productivity in the ncVDyc0
technological communication field.
https://www.fbh-berlin.de/publikationen-
Unfortunately, in addition to the patente/frequent/08-next-generation-
educational, commercial, personal, and wireless-communications/topic-next-
governmental uses of the Internet, global generation-wireless-communications
use of the Internet also includes Internet
fraud, transmitting of illegal items, and https://en.wikipedia.org/wiki/Human%E2
certain forms of harassment. %80%93robot_interaction
https://www.google.co.in/search?q=quan https://www.youtube.com/watch?v=pdm
tum+computing&source=lnms&tbm=isch yYbdLnkI
&sa=X&ved=0ahUKEwj5stuVktveAhVGvI8
KHTwRB9UQ_AUIDygC&biw=1536&bih=7 https://searchsecurity.techtarget.com/def
23 inition/biometrics
https://azure.microsoft.com/en- https://www.techopedia.com/definition/1
in/overview/what-is-serverless- 0239/biometrics
computing/
https://en.wikipedia.org/wiki/Digital_twin
https://www.google.co.in/search?q=serve
rless+computing&source=lnms&tbm=isch https://www.happiestminds.com/insights
&sa=X&ved=0ahUKEwiX1_yPk9veAhUHSY /digital-twins/
8KHQZ2BUgQ_AUIDygC&biw=1536&bih=7
23 https://www.youtube.com/watch?v=RaO
ejcczPas
https://www.google.co.in/search?q=digita
l+twin&oq=digital+twin&aqs=chrome..69i http://iopscience.iop.org/journal/0957-
57j69i60l2j69i61j69i60j69i59.2624j0j9&so 4484
urceid=chrome&ie=UTF-8
http://www.understandingnano.com/intr
https://www.google.co.in/search?q=hom oduction.html
omorphic+encryption&oq=homomorphic+
encryption&aqs=chrome.0.0l6.5420j0j7&s https://www.youtube.com/watch?v=DAO
ourceid=chrome&ie=UTF-8 Fpgocfrg
https://www.youtube.com/watch?v=1_D https://www.techopedia.com/definition/3
5DD7Z6sQ 151/nanotechnology