CPEELECT3-SA1 (3) - Merged
CPEELECT3-SA1 (3) - Merged
CPEELECT3-SA1 (3) - Merged
(CPE0051)
Module 6
Blockchain Technology
1. Introduce the concept of blockchain technology.
2. Identify the different applications of blockchain technology.
3. Identify the three pillars of blockchain technology.
The Three Pillars of
Blockchain Technology
The three main properties of Blockchain Technology which
have helped it gain widespread acclaim are as follows:
- Decentralization
- Transparency
- Immutability
Pillar #1: Decentralization
You can see why something like this can be very helpful for
the finance industry right?
Pillar #3: Immutability
Immutability, in the context of the blockchain, means that
once something has been entered into the blockchain, it
cannot be tampered with.
Can you imagine how valuable this will be for financial
institutes?
Imagine how many embezzlement cases can be nipped in
the bud if people know that they can’t “work the books” and
fiddle around with company accounts.
The reason why the blockchain gets this property is that of
the cryptographic hash function.
In simple terms, hashing means taking an input string of any
length and giving out an output of a fixed length. In the
context of cryptocurrencies like bitcoin, the transactions are
taken as input and run through a hashing algorithm (Bitcoin
uses SHA-256) which gives an output of a fixed length.
Let’s see how the hashing process works. We are going to
put in certain inputs. For this exercise, we are going to use
the SHA-256 (Secure Hashing Algorithm 256).
As you can see, in the case of SHA-256, no matter how big
or small your input is, the output will always have a fixed 256-
bits length. This becomes critical when you are dealing with a
huge amount of data and transactions. So basically, instead
of remembering the input data which could be huge, you can
just remember the hash and keep track.
A cryptographic hash function is a special class of hash
functions that has various properties making it ideal for
cryptography. There are certain properties that a
cryptographic hash function needs to have in order to be
considered secure. You can read about those in detail in
our guide on hashing.
There is just one property that we want you to focus on today.
It is called the “Avalanche Effect.”
What does that mean?
Even if you make a small change in your input, the changes
that will be reflected in the hash will be huge. Let’s test it out
using SHA-256:
Do you see that? Even though you just changed the case of
the first alphabet of the input, look at how much that has
affected the output hash. Now, let’s go back to our previous
point when we were looking at blockchain architecture. What
we said was:
The blockchain is a linked list that contains data and a hash
pointer that points to its previous block, hence creating the
chain. What is a hash pointer? A hash pointer is similar to a
pointer, but instead of just containing the address of the
previous block it also contains the hash of the data inside the
previous block.
This one small tweak is what makes blockchains so
amazingly reliable and trailblazing.
- Decentralization
- Transparency
- Immutability
Pillar #1: Decentralization
You can see why something like this can be very helpful for
the finance industry right?
Pillar #3: Immutability
Immutability, in the context of the blockchain, means that
once something has been entered into the blockchain, it
cannot be tampered with.
Can you imagine how valuable this will be for financial
institutes?
Imagine how many embezzlement cases can be nipped in
the bud if people know that they can’t “work the books” and
fiddle around with company accounts.
The reason why the blockchain gets this property is that of
the cryptographic hash function.
In simple terms, hashing means taking an input string of any
length and giving out an output of a fixed length. In the
context of cryptocurrencies like bitcoin, the transactions are
taken as input and run through a hashing algorithm (Bitcoin
uses SHA-256) which gives an output of a fixed length.
Let’s see how the hashing process works. We are going to
put in certain inputs. For this exercise, we are going to use
the SHA-256 (Secure Hashing Algorithm 256).
As you can see, in the case of SHA-256, no matter how big
or small your input is, the output will always have a fixed 256-
bits length. This becomes critical when you are dealing with a
huge amount of data and transactions. So basically, instead
of remembering the input data which could be huge, you can
just remember the hash and keep track.
A cryptographic hash function is a special class of hash
functions that has various properties making it ideal for
cryptography. There are certain properties that a
cryptographic hash function needs to have in order to be
considered secure. You can read about those in detail in
our guide on hashing.
There is just one property that we want you to focus on today.
It is called the “Avalanche Effect.”
What does that mean?
Even if you make a small change in your input, the changes
that will be reflected in the hash will be huge. Let’s test it out
using SHA-256:
Do you see that? Even though you just changed the case of
the first alphabet of the input, look at how much that has
affected the output hash. Now, let’s go back to our previous
point when we were looking at blockchain architecture. What
we said was:
The blockchain is a linked list that contains data and a hash
pointer that points to its previous block, hence creating the
chain. What is a hash pointer? A hash pointer is similar to a
pointer, but instead of just containing the address of the
previous block it also contains the hash of the data inside the
previous block.
This one small tweak is what makes blockchains so
amazingly reliable and trailblazing.
Type I Superconductors
A type I superconductor consists of basic conductive
elements that are used in everything from electrical wiring to
computer microchips.
Type II Superconductors
A type II superconductor is composed of metallic compounds
such as copper or lead. They reach a superconductive state
at much higher temperatures when compared to type I
superconductors. The cause of this dramatic increase in
temperature is not fully understood.
http://ffden-
2.phys.uaf.edu/113.web.stuff/travis/what_is.html
https://www.digitaltrends.com/cool-tech/what-is-
graphene/
EMERGING TECHNOLOGIES
(CPE0051)
Module 5
Graphene Technology
1. Introduce the technology and innovation of graphene
material.
2. Introduce the concept of super conductors.
Technological advances drive the course of history. Bronze
and iron were so crucial to the spread of ancient societies
that they have entire epochs named after them. With the rise
of the American steel industry, railroad tracks spread from
Atlantic to Pacific, metal veins that carried the blood of a
nation.
Silicon semiconductors enabled the growth of computers and
the greatest surge in information technology since the
printing press. These materials shaped the development of
society and helped determine which countries dominated
geopolitics.
Today, a new material has the potential to alter the future.
Dubbed a “supermaterial,” graphene has researchers the
world over scrambling to better understand it. Graphene’s
long list of miraculous traits makes it seem almost magical,
but it could have very real and drastic implications for the
future of physics and engineering.
What exactly is graphene?
The simplest way to describe graphene is that it is a single,
thin layer of graphite — the soft, flaky material used in pencil
lead. Graphite is an allotrope of the element carbon, meaning
it possesses the same atoms but they’re arranged in a
different way, giving the material different properties.
For example, both diamond and graphite are forms of carbon,
yet they have wildly different natures. Diamonds are
incredibly strong, while graphite is brittle. Graphene’s atoms
are arranged in a hexagonal arrangement.
Interestingly, when graphene is isolated from graphite it takes
on some miraculous properties. It is a mere one-atom thick,
the first two-dimensional material ever discovered. Despite
this, graphene is also one of the strongest materials in the
known universe. With a tensile strength of 130 GPa
(gigapascals), it is more than 100 times stronger than steel.
Graphene’s incredible strength despite being so thin is
already enough to make it amazing, however, its unique
properties do not end there. It is also flexible, transparent,
highly conductive, and seemingly impermeable to most gases
and liquids. It almost seems as though there is no area in
which graphene does not excel.
The history of graphene: A roll of tape, and a dream
Graphite has been a known quantity for a long time (humans
have been using it since the Neolithic era). Its
atomic structure is well documented, and for a long time,
scientists pondered whether single layers of graphite could
be isolated.
Until recently, however, graphene was merely a theory, as
scientists were unsure if it would ever be possible to slice
graphite down to a single, atom-thin sheet. The first isolated
sample of graphene was discovered in 2004 by Andre Geim
and Konstantin Novoselov at the University of Manchester.
One might expect that they isolated the fabled substance
using some massive, expensive piece of machinery, but the
tool they used was amusingly simple: A roll of scotch tape.
When using tape to polish a large block of graphite, the
researchers noticed exceptionally thin flakes on the tape.
Continuing to peel layer and layer from the flakes of graphite,
they eventually produced a sample as thin as possible. They
had found graphene. The discovery was so bizarre, the
scientific world was skeptical at first. The popular
journal Nature even rejected their paper on the experiment
twice.
Eventually, their research was published, and in 2010 Geim
and Novoselov were awarded the Nobel Prize in Physics for
their discovery.
Potential Applications
If graphene had merely one of its many superlative traits, it
would be the subject of intense research into potential uses.
Being so remarkable in so many ways, graphene has
inspired scientists to think of a wide range of uses for the
material, in fields as varied as consumer tech and
environmental science.
Flexible electronics
Type I Superconductors
A type I superconductor consists of basic conductive
elements that are used in everything from electrical wiring to
computer microchips.
Type II Superconductors
A type II superconductor is composed of metallic compounds
such as copper or lead. They reach a superconductive state
at much higher temperatures when compared to type I
superconductors. The cause of this dramatic increase in
temperature is not fully understood.
http://ffden-
2.phys.uaf.edu/113.web.stuff/travis/what_is.html
https://www.digitaltrends.com/cool-tech/what-is-
graphene/
EMERGING TECHNOLOGIES
(CPE0051)
Module 1
Embedded Systems
1. Orient the students on the concept of embedded system.
2. Identify characteristics of an embedded system.
3. Identify the basic structure of an embedded system.
The System
- It has hardware.
- It has application software.
- It has Real Time Operating system (RTOS)
Real Time Operating system (RTOS) that supervises the
application software and provide mechanism to let the
processor run a process as per scheduling by following a
plan to control the latencies. RTOS defines the way the
system works. It sets the rules during the execution of
application program. A small scale embedded system may
not have RTOS.
So we can define an embedded system as a Microcontroller
based, software driven, reliable, real-time control system.
Characteristics of an
Embedded System
Single-functioned − An embedded system usually performs
a specialized operation and does the same repeatedly. For
example: A pager always functions as a pager.
Tightly constrained − All computing systems have
constraints on design metrics, but those on an embedded
system can be especially tight. Design metrics is a measure
of an implementation's features such as its cost, size, power,
and performance. It must be of a size to fit on a single chip,
must perform fast enough to process data in real time and
consume minimum power to extend battery life.
Reactive and Real time − Many embedded systems must
continually react to changes in the system's environment and
must compute certain results in real time without any delay.
Consider an example of a car cruise controller; it continually
monitors and reacts to speed and brake sensors. It must
compute acceleration or de-accelerations repeatedly within a
limited time; a delayed computation can result in failure to
control of the car.
Microprocessors based − It must be microprocessor or
microcontroller based.