0% found this document useful (0 votes)
173 views64 pages

Emerging Technologies Handout

This document provides an introduction to emerging technologies chapter from a handout. It discusses key topics around emerging technology including definitions of emerging technology, technology, and evolution. It also outlines the major industrial revolutions and important inventions that came out of each revolution such as the steam engine. The document then discusses enabling devices and programmable devices, human to machine interaction, and trends in emerging technologies. Finally, it provides review questions for the chapter.

Uploaded by

Abdu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
173 views64 pages

Emerging Technologies Handout

This document provides an introduction to emerging technologies chapter from a handout. It discusses key topics around emerging technology including definitions of emerging technology, technology, and evolution. It also outlines the major industrial revolutions and important inventions that came out of each revolution such as the steam engine. The document then discusses enabling devices and programmable devices, human to machine interaction, and trends in emerging technologies. Finally, it provides review questions for the chapter.

Uploaded by

Abdu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 64

Adam Science and Technology University

School of Electrical Engineering and Computing


Department of Computer Science and Engineering

Introduction to Emerging Technologies Handout

August 19, 2023


Chapter 1: Introduction to Emerging Technologies
Activities 1.2
 What is Emerging Technology?
 What is Technology?
 What is Evolution?
1.1. Evolution of Technologies
 What is Emerging Technology?
o New technology
o The continuing development of existing technology.
 What is Technology?
o Science of the mechanical and industrial arts.
 What is Evolution?
o The process of developing by gradual changes.
Activities 1.2
 List out at list top five currently available emerged technologies?
List of some currently available emerged technologies
• Artificial Intelligence
• Blockchain
• Augmented Reality and Virtual Reality
• Cloud Computing
• Angular and React
• DevOps
• Internet of Things (IoT)
• Intelligent Apps (I-Apps)
• Big Data Robotic Processor Automation (RPA)
1.1.1 Introduction to the Industrial Revolution (IR)
 A period of major industrialization and innovation (late 1700s and early 1800s. )
 IR is occurred when a society shifts from using tools to make products to use new sources of
energy, such as coal, to power machines in factories (started at England).
 IR was a time when the manufacturing of goods moved from small shops and homes to large
factories.
 American IR is the 2nd IR (between 1820&1870).
The following industrial revolutions fundamentally changed and transfer the world around us
into modern society.
 The steam engine,
 The age of science and mass production, and
 The rise of digital technology
 Smart and autonomous systems fueled by data and machine learning.
Activities 1.3
 What are the most important inventions of industrial revolutions?
1.1.2. What are the Most Important Inventions of the IR?
• Transportation: The Steam Engine, the Railroad, the Diesel Engine, the Airplane.
• Communication: The Telegraph. The Transatlantic Cable. The Phonograph. The
Telephone.
• Industry: The Cotton Gin. The Sewing Machine. Electric Lights.
The four types of Industries
 The primary industry involves getting raw materials e.g. mining, farming, and fishing.
 The secondary industry involves manufacturing e.g. making cars and steel.
 Tertiary industries provide a service e.g. teaching and nursing.
 The quaternary industry involves research and development industries e.g. IT.
1.1.3. Historical Background (IR 1.0, IR 2.0, IR 3.0)
1.1.3.1. IR 1.0-transition to new manufacturing process

Steam Engine

Figure1: The development of machine tools and the rise of the factory system

1.1.3.2. IR 2.0-Technological Revolution


Electricity
transmission

Figure2: New technological systems were introduced, such as electrical power and telephones
1.1.3.3. IR 3.0-Digital Revolution

High Tech Electronics

Figure3: Transition from mechanical and analog electronic technology to digital electronics
1.1.3.4. IR 4.0-Robotics and IoT-Cyber physical system
Figure4: Anybody connected device-Eg. Computer Numerical Control (by Instruction
Notice: A cyber-physical system is a mechanism that is controlled or monitored by computer-
based algorithms, tightly integrated with the Internet and its users-Eg-AI.
1.2. Role of Data for Emerging Technologies
1 Data is regarded as the new oil and strategic asset since we are living in the age of big
data, and
2 Drives or even determines the future of science, technology, the economy, and possibly
everything in our world today and tomorrow.
3 More importantly presents enormous challenges that in turn bring incredible
innovation and economic opportunities by understanding, exploring, and utilizing
data.
1.3. Enabling devices and network (Programmable devices)
 In the world of digital electronic systems, there are four basic kinds of devices:
o Memory
o microprocessors
o Logic and Networks.
 Memory: stores random information such as the contents of a spreadsheet or database.
 Microprocessors: execute software instructions to perform a wide variety of tasks such as
running a word processing program or video game.
 Logic devices: provide specific functions, including device-to-device interfacing, data
communication, signal processing, data display, timing and control operations, and almost
every other function a system must perform.
 Network: is a collection of computers, servers, mainframes, network devices, peripherals, or
other devices connected to one another to allow the sharing of data. Eg. Internet
Why is a computer referred to as a programmable device?
 Because what makes a computer a computer is that it follows a set of instructions.
 Many electronic devices are computers that perform only one operation, but they are still
following instructions that reside permanently in the unit.
1.3.1. List of some Programmable devices
 Achronix Speedster SPD60
 Actel’s
 Altera Stratix IV GT and Arria II GX
 Atmel’s AT91CAP7L
 Cypress Semiconductor’s programmable system-on-chip (PSoC) family
 Lattice Semiconductor’s ECP3
 Lime Microsystems’ LMS6002
 Silicon Blue Technologies
 Xilinx Virtex 6 and Spartan 6 and Xmos Semiconductor L series
 A full range of network-related equipment referred to as Service Enabling Devices
(SEDs), which can include:
 Traditional channel service unit (CSU) and data service unit (DSU)
 Modems
 Routers
 Switches
 Conferencing equipment
 Network appliances (NIDs and SIDs)
 Hosting equipment and servers
1.4. Human to Machine Interaction
 HMI refers to the communication and interaction between a human and a machine via a user
interface.
 Nowadays, natural user interfaces such as gestures have gained increasing attention as they
allow humans to control machines through natural and intuitive behaviors
What is interaction in human-computer interaction?
 HCI is the study of how people interact with computers and to what extent computers are or
are not developed for successful interaction with human beings.
 As its name implies, HCI consists of three parts: the user, the computer itself, and the ways
they work together.
How do users interact with computers?
 The user interacts directly with hardware for the human input and output such as displays,
e.g. through a graphical user interface.
 The user interacts with the computer over this software interface using the given input and
output (I/O) hardware.
How important is human-computer interaction?
 The goal of HCI is to improve the interaction between users and computers by making
computers more user-friendly and receptive to the user's needs.
 The main advantages of HCI are simplicity, ease of deployment & operations and cost
savings for smaller set-ups.
 They also reduce solution design time and integration complexity.
1.4.1. Disciplines Contributing to (HCI)
 Cognitive psychology: Limitations, information processing, performance prediction,
cooperative working, and capabilities.
 Computer science: Including graphics, technology, prototyping tools, user interface
management systems.
 Linguistics.
 Engineering and design.
 Artificial intelligence.
 Human factors.
1.5. Present and Future Trends in Emerging Technologies
 Emerging technology trends:
 5G Networks
 Artificial Intelligence (AI)
 Autonomous Devices
 Blockchain
 Augmented Analytics
 Digital Twins
 Enhanced Edge Computing and
 Immersive Experiences in Smart Spaces
Chapter One Review Questions
1. Where did the Industrial Revolution start and why did it begin there?
2. What does “emerging” mean, emerging technologies and how are they found?
3. What makes “emerging technologies” happen and what impact will they have on
Individuals, Society, and Environment?
4. Discussed the economic and ideological causes of the American, the French, and the
Chinese Revolutions, and to see the larger historical contexts in which these events took
place?
5. Discuss and compare the course of the American, the French, and the Chinese revolutions
and analyze the reasons for and significance of the different outcomes of these three
revolutions?
6. Discuss the successes and the shortcomings of the conservative reaction to the French
Revolution as seen in the actions of the Congress of Vienna and the Holy Alliance?
7. How do recent approaches to “embodied interaction” differ from earlier accounts of the
role of cognition in human-computer interaction?
8. What is the reason for taking care of design a good computer-human interface?
9. Discuss the pros and cons of human-computer interaction technology?

Chapter 2: Data Science


2.1. An Overview of Data Science
Activity 2.1
 What is data science? Can you describe the role of data in emerging technology?
 What are data and information?
 What is big data
What is Data Science?
 Multi-disciplinary field that uses scientific methods, processes, algorithms and systems to
extract knowledge and insights from structured, semi-structured and unstructured data.
 The continuing development of existing technology.
2.1.1. What are Data and Information?
 Data: representation of facts, concepts, or instructions in a formalized manner
 Information: processed data that decisions are based.
2.1.2. Data Processing Cycle

INPUT PROCESSING OUTPUT


Figure 2.1 Data Processing Cycle
Examples:
Input: input data is storage on hard disk, flash disk.
Processing: Interest can be calculated on deposit to a bank.
Output: payroll for employees.
2.2. Data Types and their representation
2.2.1. Data types from Computer programming perspective:
o Integers(int)- is used to store whole numbers, mathematically known as integers
o Booleans(bool)- is used to represent restricted to one of two values: true or false
o Characters(char)- is used to store a single character
o Floating-point numbers(float)- is used to store real numbers
o Alphanumeric strings(string)- used to store a combination of characters and
numbers
 A data type makes the values that expression, such as a variable or a function, might take.
o Variable: a memory location that can hold values of a specific type.
o Function: a group of statements that together performs a task and method or
subroutine or procedure.
 It defines the operations that can be done on the data, the meaning of the data, and the
way values of that type can be stored.

2.2.2. Data types from Data Analytics perspective:


o Structured Data: adheres to a pre-defined data model and is straightforward to
analyze. Eg. Excel files and SQL databases.
o Semi-Structured Data: contains tags or other markers to separate semantic
elements . Eg. JSON and XML .
o Unstructured Data: it is information typically text heavy may contains data such
as dates, numbers and facts . Eg. Audio, Video files or Non SQL database.

Figure 2.2 Data types from a data analytics perspective

Metadata – Data about Data


Activity 2.2
o Discuss data types from programming and analytics perspectives.
o Compare metadata with structured, unstructured and semi-structured data
o Given at least one example of structured, unstructured and semi-structured data types
Metadata is data about data.
 It provides additional information about a specific set of data.
 In a set of photographs, for example, metadata could describe when and where the photos
were taken.
 It then provides fields for dates and locations which, by themselves, can be considered
structured data.
 Because of this reason, metadata is frequently used by Big Data solutions for initial
analysis.
Figure 2.3 Example of Metadata
2.3. Data value Chain
 The Data Value Chain is the information flow within a big data system as a series of steps
needed to generate value and useful insights from data.
 Data Acquisition: the process of gathering, filtering, and cleaning data before it is put in
a data warehouse or any other storage solution .
 Data Analysis: involves exploring, transforming, and modeling data with the goal of
highlighting relevant data, synthesizing and extracting useful hidden information with
high potential from a business point of view. Eg. DM,AI-ML
 Data Curation: categorized in to creation, selection, classification, transformation,
validation, and preservation. It is performed by expert curators that are responsible for
improving the accessibility and quality of data.
 Data Storage: It is the persistence and management of data in a scalable way that
satisfies the needs of applications that require fast access to the data. Eg. RDBMS.
 Data Usage: It covers the data-driven business activities that need access to data, its
analysis, and the tools needed to integrate the data analysis within the business activity.
2.4. Basic concepts of big data
2.4.1. What is Big Data?
 It is the term for a collection of data sets so large and complex that it becomes difficult to
process using on-hand database management tools or traditional data processing applications.
 It is a blanket term for the non-traditional strategies and technologies needed to gather,
organize, process, and gather insights from large datasets.
Big Data is characterized by 3V:
• Volume: large amounts of data Zeta bytes/Massive datasets
• Velocity: Data is live streaming or in motion
• Variety: data comes in many different forms from diverse sources
• Veracity: can we trust the data? How accurate is it? etc.
Figure 2.4 Characteristics of big data
2.4.2. Clustered Computing and Hadoop Ecosystem
2.4.2.1. Clustered Computing
Because of the qualities of big data, individual computers are often inadequate for
handling the data at most stages. To better address the high storage and computational
needs of big data, computer clusters are a better fit. Big data clustering software
combines the resources of many smaller machines, seeking to provide a number of
benefits:
 Resource Pooling: Combining the available storage space to hold data is a clear
benefit, but CPU and memory pooling are also extremely important. Processing
large datasets requires large amounts of all three of these resources.
 High Availability: Clusters can provide varying levels of fault tolerance and
availability guarantees to prevent hardware or software failures from affecting
access to data and processing. This becomes increasingly important as we
continue to emphasize the importance of real-time analytics.
 Easy Scalability: Clusters make it easy to scale horizontally by adding additional
machines to the group. This means the system can react to changes in resource
requirements without expanding the physical resources on a machine.
Cluster membership and resource allocation can be handled by software like Hadoop’s
YARN (which stands for Yet Another Resource Negotiator).
2.4.2.2. Hadoop and Its Ecosystem
 Hadoop is an open-source framework intended to make interaction with big data
easier.
 It is a framework that allows for the distributed processing of large datasets
across clusters of computers using simple programming models.
 It is inspired by a technical document published by Google.
The four key characteristics of Hadoop are:
 Economical: Its systems are highly economical as ordinary computers can be used for
data processing.
 Reliable: It is reliable as it stores copies of the data on different machines and is resistant
to hardware failure.
 Scalable: It is easily scalable both, horizontally and vertically. A few extra nodes help in
scaling up the framework.
 Flexible: It is flexible and you can store as much structured and unstructured data as you
need to and decide to use them later.
 Hadoop has an ecosystem that has evolved from its four core components: data management,
access, processing, and storage.
 It is continuously growing to meet the needs of Big Data.
 It comprises the following components and many others:
o HDFS: Hadoop Distributed File System
o YARN: Yet Another Resource Negotiator
o MapReduce: Programming based Data Processing
o Spark: In-Memory data processing
o PIG, HIVE: Query-based processing of data services
o HBase: NoSQL Database
o Mahout, Spark MLLib: Machine Learning algorithm libraries
o Solar, Lucene: Searching and Indexing
o Zookeeper: Managing cluster
o Oozie: Job Scheduling
Figure 2.5 Hadoop Ecosystem

2.4.3. Big Data Life Cycle with Hadoop


2.4.3.1. Ingesting data into the system
 The first stage of Big Data processing is Ingest.
 The data is ingested or transferred to Hadoop from various sources such
as relational databases, systems, or local files.
 Sqoop transfers data from RDBMS to HDFS, whereas Flume transfers
event data.
2.4.3.2. Processing the data in storage
 The second stage is processing. In this stage, the data is stored and
processed. The data is stored in the distributed file system, HDFS, and
the NoSQL distributed data, HBase. Spark and MapReduce perform data
processing.
2.4.3.3. Computing and analyzing data
 The third stage is to Analyze. Here, the data is analyzed by processing
frameworks such as Pig, Hive, and Impala. Pig converts the data using a
map and reduces and then analyzes it. Hive is also based on the map and
reduces programming and is most suitable for structured data.
2.4.3.4. Visualizing the results
 The fourth stage is Access, which is performed by tools such as Hue and
Cloud era Search. In this stage, the analyzed data can be accessed by
users.

Chapter Two Review Questions


1. Define data science; what are the roles of a data scientist?
2. Discuss data and its types from computer programming and data analytics perspectives?
3. Discuss a series of steps needed to generate value and useful insights from data?
4. What is the principal goal of data science?
5. List out and discuss the characteristics of Big Data?
6. How we ingest streaming data into Hadoop Cluster?
Chapter 3: Artificial Intelligence

3. Artificial Intelligence
3.1 What is Artificial Intelligence?
Artificial Intelligence is composed of two words Artificial and Intelligence. Artificial defines
"man-made," and intelligence defines "thinking power", or “the ability to learn and solve
problems” hence Artificial Intelligence means "a man-made thinking power."
So, we can define Artificial Intelligence (AI) as the branch of computer science by which we can
create intelligent machines which can behave like a human, think like humans, and able to make
decisions.
Intelligence is composed of:
 Reasoning  Perception
 Learning  Linguistic Intelligence
 Problem Solving
An AI system is composed of an agent and its environment. An agent (e.g., human or robot) is
anything that can perceive its environment through sensors and acts upon that environment
through effectors. Intelligent agents must be able to set goals and achieve them. In classical
planning problems, the agent can assume that it is the only system acting in the world, allowing
the agent to be certain of the consequences of its actions. However, if the agent is not the only
actor, then it requires that the agent can reason under uncertainty. This calls for an agent that
cannot only assess its environment and make predictions but also evaluate its predictions and
adapt based on its assessment. Machine perception is the ability to use input from sensors (such
as cameras, microphones, sensors, etc.) to deduce aspects of the world. e.g., Computer Vision.

Figure 3.1 AI System


However, these examples of AI like robots and others can mimic human being; they are created
by programmers by writing blocks of instructions collected from domain knowledge.
The advent of Big Data, driven by the arrival of the internet, smart mobile and social media has
enabled AI algorithms, in particular from Machine Learning and Deep Learning, to leverage Big
Data and perform their tasks more optimally. Machine Learning is an advanced form of AI
where the machine can learn as it goes rather than having every action programmed by humans.
Deep Learning is a sub-field of machine learning concerned with algorithms inspired by the
structure and function of the brain called artificial neural networks.
Artificial
Intellegence

Machine Learning

Deep Learning

Figure 3.12 Artificial Intelligence (AI), Machine Learning (ML) and Deep Learning (DL)
3.1.1 Need for Artificial Intelligence
1. To create expert systems that exhibit intelligent behavior with the capability to learn,
demonstrate, explain, and advice its users.
2. Helping machines find solutions to complex problems like humans do and applying them
as algorithms in a computer-friendly manner.
3.1.2 Goals of Artificial Intelligence
Following are the main goals of Artificial Intelligence:
1. Replicate human intelligence
2. Solve Knowledge-intensive tasks
3. An intelligent connection of perception and action
4. Building a machine which can perform tasks that requires human intelligence such as:
 Proving a theorem  Plan some surgical operation
 Playing chess  Driving a car in traffic
5. Creating some system which can exhibit intelligent behavior, learn new things by itself,
demonstrate, explain, and can advise to its user.
3.1.3 What Comprises to Artificial Intelligence?
To achieve the objective of AI the following things should be comprised:
 Mathematics  Neurons Study
 Biology  Statistics
 Psychology
 Sociology
 Computer Science
Figure 3.3 Artificial Intelligence is multidisciplinary

3.1.4 Advantages and Disadvantages of Artificial Intelligence


Advantages Disadvantages
 High Accuracy with fewer errors  High Cos
 High-Speed  Can't think out of the box
 High reliability  No feelings and emotions
 Useful for risky areas  Increase dependence on machines
 Digital Assistant  No Original Creativity
 Useful as a public utility
Table 1 AI Advantages and Disadvantages
3.2 History of AI
Artificial Intelligence is not a new word and not a new technology for researchers. This
technology is much older than you would imagine. Even there are the myths of Mechanical men
in Ancient Greek and Egyptian Myths. The following listed chronological eras are some
milestones in the history of AI which define the journey from the AI generation to till date
development.
A. Maturation of Artificial Intelligence (1943-1952):- Models of Artificial Neurons,
updating rule for modifying the connection strength between neurons and Computing
Machinery and Intelligence were proposed and demonstrated.
B. The birth of Artificial Intelligence (1952-1956):- First artificial intelligence program
(Logic Theorist) created and AI coined as an academic field.

17
C. The golden years-Early enthusiasm (1956-1974):- algorithms that can solve
mathematical problems are developed and first intelligent humanoid robot was built in
Japan which was named WABOT-1.
D. The first AI winter (1974-1980):- Called the first AI winter duration (a severe shortage
of funding from the government for AI researches.)
E. A boom of AI (1980-1987):- AI came back with "Expert System” and first national
conference of the American Association of Artificial Intelligence was held at Stanford
University.
F. The second AI winter (1987-1993):- Called the second AI Winter duration (Expert
system such as XCON was very cost-effective).
G. The emergence of intelligent agents (1993-2011):- IBM Deep Blue beats world chess
champion, Gary Kasparov, and became the first computer to beat a world chess
champion. AI entered the home in the form of Roomba, a vacuum cleaner and Companies
like Facebook, Twitter, and Netflix also started using AI.
H. Deep learning, big data and artificial general intelligence (2011-present):-
 The year 2011: In the year 2011, IBM's Watson won jeopardy, a quiz show,
where it had to solve complex questions as well as riddles. Watson had proved
that it could understand natural language and can solve tricky questions quickly.
 The year 2012: Google has launched an Android app feature "Google now",
which was able to provide information to the user as a prediction.
 The year 2014: In the year 2014, Chatbot "Eugene Goostman" won a competition
in the infamous "Turing test."
 The year 2018: The "Project Debater" from IBM debated on complex topics with
two master debaters and also performed extremely well.
 Google has demonstrated an AI program "Duplex" which was a virtual assistant
and which had taken hairdresser appointment on call and the lady on the other
side didn't notice that she was talking with the machine.
 Now AI has developed to a remarkable level. The concept of Deep learning, big
data, and data science are now trending like a boom. Nowadays companies like
Google, Facebook, IBM, and Amazon are working with AI and creating amazing

18
devices. The future of Artificial Intelligence is inspiring and will come with high
intelligence.

Figure 3-4 AI History


3.3 Levels of AI
There are seven level of Artificial Intelligence. These are as the following:
Stage 1 – Rule-Based Systems: - The most common uses of AI today fit in this bracket,
covering everything from business software (Robotic Process Automation) and domestic
appliances to aircraft autopilots.
Stage 2 – Context Awareness and Retention: - Algorithms that develop information about the
specific domain they are being applied in. They are trained on the knowledge and experience of
the best humans and their knowledge base can be updated as new situations and queries arise.
Well, known applications of this level are chatbots and “roboadvisors”
Stage 3 – Domain-Specific Expertise: - Going beyond the capability of humans, these systems
build up expertise in a specific context taking in massive volumes of information which they can
use for decision making.

19
Stage 4 – Reasoning Machines: - These algorithms have some ability to attribute mental states
to themselves and others – they have a sense of beliefs, intentions, knowledge, and how their
own logic works. This means they could reason or negotiate with humans and other machines.
Stage 5 – Self Aware Systems / Artificial General Intelligence (AGI):- These systems have
human-like intelligence – the most commonly portrayed AI in media – however, no such use is
in evidence today.
Stage 6 – Artificial Superintelligence (ASI):- AI algorithms can outsmart even the most
intelligent humans in every domain.
Stage 7 – Singularity and Transcendence: - We might go beyond the limits of the human body
and connect to other forms of intelligence on the planet – animals, plants, weather systems, and
the natural environment. Singularity is impossible and human consciousness could never be
digitized.

Figure 3.5 the seven layers of AI maturity


3.4 Types of AI
Based on capabilities and functionality we can categorize AI in two as the following:

Artificial Intellegence

Functionality Capabilities

Limitted
Reactive Theory of Self
Narrow AI General AI Strong AI Memory
Machines Mind Awerness

Figure 3-6 types of Artificial Intelligence (AI)

20
Weak AI or Narrow AI: is able to perform a dedicated task with intelligence, the most
common, and currently available and cannot perform beyond its field or limitations AI. Apple
Siri, IBM's Watson supercomputer, Google translate, playing chess, purchasing suggestions on e-
commerce sites, self-driving cars, speech recognition, and image recognition are some examples
of Narrow AI.
General AI: it could perform any intellectual task with efficiency like a human on its own and
currently, there is no such system exists. General AI is still under research.
Super or Strong AI: is a level of Intelligence of Systems at which machines could surpass
human intelligence, and can perform any task better than a human with cognitive properties.
Some key characteristics of strong AI include capability include the ability to think, to reason
solve the puzzle, make judgments, plan, learn, and communicate on its own. Super AI is still a
hypothetical concept of Artificial Intelligence.
Reactive Machines: the most basic types of AI, do not store memories or past experiences for
future actions, and only focus on current scenarios AI. IBM's Deep Blue system and Google's
AlphaGo are some examples of reactive AI.
Limited Memory: can store past experiences or some data for a short period of time. Self-
deriving care is the best example of limited memory AI.
Theory of Mind: it understands human emotions, beliefs, and be able to interact socially like
humans. It is still not developed, but researchers are making lots of efforts and improvement for
developing such AI machines.
Self-Awareness: is the future of AI. Is smarter than the human mind, does not exist in reality
still and a hypothetical concept.
3.4.1 How humans think?
Intelligence or the cognitive process is composed of three main stages: First observe and input
the information or data in the brain. Second interpret and evaluate the input that is received from
the surrounding environment. Third make decisions as a reaction towards what you received as
input and interpreted and evaluated.
AI researchers are simulating the same stages in building AI systems or models. This process
represents the main three layers or components of AI systems.
3.4.2 Mapping human thinking to artificial intelligence components
Because AI is the science of simulating human thinking, it is possible to map the human thinking
stages to the layers or components of AI systems.
In the first stage, humans acquire information from their surrounding environments through
human senses, such as sight, hearing, smell, taste, and touch, through human organs, such as
eyes, ears, and other sensing organs, for example, the hands.
In AI models, this stage is represented by the sensing layer, which perceives information from
the surrounding environment. This information is specific to the AI application. For example,
there are sensing agents such as voice recognition for sensing voice and visual imaging
recognition for sensing images. Thus, these agents or sensors take the role of the hearing and
sight senses in humans.

21
The second stage is related to interpreting and evaluating the input data. In AI, this stage is
represented by the interpretation layer, that is, reasoning and thinking about the gathered input
that is acquired by the sensing layer.
The third stage is related to taking action or making decisions. After evaluating the input data,
the interacting layer performs the necessary tasks. Robotic movement control and speech
generation are examples of functions that are implemented in the interacting layer.
3.5 Influencers of artificial intelligence
The following influencers of AI are described in this section:
 Big data: Structured data versus unstructured data: Big data refers to huge amounts
of data. Big data requires innovative forms of information processing to draw insights,
automate processes, and help decision making.
 Advancements in computer processing speed and new chip architectures: The
meaning of big data expanded beyond the volume of data after the release of a paper by
Google on MapReduce and the Google File System (GFS), which evolved into the
Apache Hadoop open source project. The Hadoop file system is a distributed file system
that may run on a cluster of commodity machines, where the storage of data is distributed
among the cluster and the processing is distributed too. This approach determines the
speed with which data is processed. This approach 54 includes an element of complexity
with the introduction of new, structured, unstructured, and multi-structured data types.
Large manufacturers of computer chips such as IBM and Intel are prototyping “brain-
like” chips whose architecture is configured to mimic the biological brain’s network of
neurons and the connections between them called synapses.
 Cloud computing and APIs: Cloud computing is a general term that describes the
delivery of on-demand services, usually through the internet, on a pay-per-use basis.
Companies worldwide offer their services to customers over cloud platforms. These
services might be data analysis, social media, video storage, e-commerce, and AI
capabilities that are available through the internet and supported by cloud computing. AI
APIs are usually delivered on an open cloud-based platform on which developers can
infuse AI capabilities into digital applications, products, and operations by using one or
more of the available APIs. All the significant companies in the AI services market
deliver their services and tools on the internet through APIs over cloud platforms, for
example: IBM delivers Watson AI services over IBM Cloud, Amazon AI services are
delivered over Amazon Web Services (AWS), Microsoft AI tools are available over the
MS Azure cloud, Google AI services are available in the Google Cloud Platform. These
services benefit from cloud platform capabilities, such as availability, scalability,
accessibility, rapid deployment, flexible billing options, simpler operations, and
management.
 The emergence of data science: After collection of a large enough volume of data,
patterns emerge. Then, data scientists use learning algorithms on these patterns. Data
science uses machine learning and AI to process big data.

22
3.6 Applications of AI
Artificial Intelligence has various applications in today's society. It is becoming essential for
today's time because it can solve complex problems in an efficient way in multiple industries,
such as, Agriculture Healthcare, Entertainment, Finance, Education, Social Media, Travel
&Transport, Automotive Industry, Robotics, Game, Data Security, Commuting, Email, Social
Networking, Online Shopping, Mobile Use, etc. AI is making our daily life more comfortable
and faster.
3.7 AI tools and platforms
AI platforms are defined as some sort of hardware architecture or software framework (including
application frameworks), that allows the software to run. It involves the use of machines to
perform the tasks that are performed by human beings. The platform simulates the cognitive
function that human minds perform such as problem-solving, learning, reasoning, social
intelligence as well as general intelligence.
Many tools are used in AI, including versions of search and mathematical optimization, logic,
methods based on probability and economics.
AI has developed a large number of tools to solve the most difficult problems in computer
science, like:
 Search and optimization
 Logic
 Probabilistic methods for uncertain reasoning
 Classifiers and statistical learning methods
 Neural networks
 Control theory
 Languages
The most common artificial intelligence platforms include Microsoft AZURE Machine Learning,
Google Cloud Prediction API, IBM Watson, TensorFlow, Infosys Nia, Wipro HOLMES,
API.AI, Premonition, Rainbird, Ayasdi, MindMeld, and Meya.

23
Chapter 4: Internet of Things (IoT)
Introduction

IoT is a network of connected devices that interact and exchange information with each other.
The technology allows connection of two or more devices that connect with each other and
sending and receiving information through the internet. IoT is a system of interrelated
computing devices, mechanical and digital machines, objects, animals or people that are
provided with unique identifiers and the ability to transfer data over a network without
requiring human-to-human or human-to-computer interaction.
Activity 4.1.
o What is Internet of Thing?
o Explain the key features of IOT?
o What does IOTs plays in the day-to-day lives of people and organizations?
Definitions:-
1. The internet of things, or IoT, is a system of interrelated computing devices, mechanical
and digital machines, objects, animals or people that are provided with unique identifiers
(UIDs) and the ability to transfer data over a network without requiring human-to-human
or human-to-computer interaction.
2. IoT is the networking of smart objects in which smart objects have some constraints such
as limited bandwidth, power, and processing accessibility for achieving interoperability
among smart objects.
3. IoT is the interaction of everyday object is computing devices through the Internet
that enables the sending and receiving of useful data.
4. The term Internet of Things (IoT) according to the 2020 conceptual framework is
expressed
through a simple formula such as:

24
IoT= Services+ Data+ Networks + Sensors
A thing in the internet of things can be any natural or man-made object that can be assigned an
Internet Protocol (IP) address and is able to transfer data over a network.

4.1.1. IoT − Key Features


The most important features of IoT include artificial intelligence, connectivity, sensors, active
engagement, and small device use. A brief review of these features is given below –

AI − IoT essentially makes virtually anything “smart”, meaning it enhances every aspect of life
with the power of data collection, artificial intelligence algorithms, and networks. E.g
refrigerator and cabinets to detect when milk and your favorite cereal run low, and to then place
an order with your preferred grocer.

Connectivity − New enabling technologies for networking, and specifically IoT networking,
mean networks are no longer exclusively tied to major providers. IoT creates these small
networks between its system devices.

Sensors − IoT loses its distinction without sensors. They act as defining instruments, which
transform IoT from a standard passive network of devices into an active system capable of real-
world integration.

Active Engagement − Much of today's interaction with connected technology happens through
passive engagement.

Small Devices − Devices, as predicted, have become smaller, cheaper, and more powerful over
time. IoT exploits purpose-built small devices to deliver its precision, scalability, and versatility.

The internet of things (IoT) has found its application in several areas such as connected industry,
smart-city, smart-home, smart-energy, connected car, smart agriculture, connected building and
campus, health care, logistics, among other domains. A device that transfer data over a network
are members of the IoT. Example, Medical devices, such as a heart monitor implant, a biochip
transponder in a farm animal, Ring, a doorbell that links to your smartphone etc.

Application of IOT: - Connected industry, smart-city, smart-home, smart-energy, connected car,


smart agriculture, connected building and campus, health care, logistics.

IoT utilizes existing and emerging technology for sensing, networking, and robotics. Its new and
advanced elements bring major changes in the delivery of products, goods, and services; and the
social, economic, and political impact of those changes.

4.1.2. History of IoT

25
The development of computers began in the 1950s. The Internet, itself a significant component
of the IoT, started out as part of DARPA (Defense Advanced Research Projects Agency) in
1962, and evolved into ARPANET in 1969. In the 1980s, commercial service providers began
supporting public use of ARPANET, allowing it to evolve into our modern Internet. Global
Positioning Satellites (GPS) became a reality in early 1993, with the Department of Defense
providing a stable, highly functional system of 24 satellites. Privately owned, commercial
satellites being placed in orbit quickly followed this. Satellites and landlines provide basic
communications for much of the IoT. One additional and important component in developing a
functional IoT was IPV6’s remarkably intelligent decision to increase address space. Steve
Leibson, of the Computer History Museum, states, “The address space expansion means that we
could assign an IPV6 address to every atom on the surface of the earth, and still have enough
addresses left to do another 100+ earths.” Put another way, we are not going to run out of
internet addresses anytime soon. Kevin Ashton stated that Radio Frequency Identification
(RFID) was a prerequisite for the Internet of Things. He concluded if all devices were “tagged,”
computers could manage, track, and inventory them. To some extent, the tagging of things has
been achieved through technologies such as digital watermarking, barcodes, and QR codes.
Inventory control is one of the more obvious advantages of the Internet of Things.

Activity 4.2
o State the history of internet of thing (IOT)?
o What was the role of Kevin Ashton in the history of IOT?
4.1.3. IoT – Advantages

The advantages of IoT span across every area of lifestyle and business. Here is a list of some of
the advantages that IoT has to offer:
o Improved Customer Engagement - Current analytics suffer from blind-spots and significant
flaws inaccuracy; and as noted, engagement remains passive. IoT completely transforms this
to achieve richer and more effective engagement with audiences.
o Technology Optimization - The same technologies and data, which improve the customer
experience, improve device use, and aid in more potent improvements to technology. IoT
unlocks a world of critical functional and field data. Reduced Waste - IoT makes areas of
improvement clear. Current analytics give us superficial insight, but IoT provides real-world
information leading to the more effective management of resources.
o Enhanced Data Collection - Modern data collection suffers from its limitations and its
design for passive use. IoT breaks it out of those spaces and places it exactly where
humans really want to go to analyze our world. It allows an accurate picture of everything.
Activity 4.3
The use of IOT provides a number of advantages. What are they?
4.1.4. IoT – Disadvantages
Here is a list of some of the disadvantages of IoT. These are:

26
o Poor security and confidentiality
o System corruption
o Interoperability of systems (no international standard of compatibility for IoT)
o Collecting and managing the data from multiple devices will be challenging
Activity 4.4
o Briefly discus the cons IOT related to security and compatibility?
o Briefly discus security requirement at different layer of IOT?
4.1.5. Challenges of IoT
Though IoT delivers an impressive set of advantages, it also presents a significant set of
challenges. Here is a list of some its major issues:

o Security - IoT creates an ecosystem of constantly connected devices communicating over


networks. The system offers little control despite any security measures. This leaves users
exposed to various kinds of attackers.
o Privacy - The sophistication of IoT provides substantial personal data in extreme detail
without the user's active participation.
o Complexity - Some find IoT systems complicated in terms of design, deployment, and
maintenance given their use of multiple technologies and a large set of new enabling
technologies.
o Flexibility - Many are concerned about the flexibility of an IoT system to integrate easily
with another. They worry about finding themselves with several conflicting or locking
systems.
o Compliance - IoT, like any other technology in the realm of business, must comply with
regulations. Its complexity makes the issue of compliance seem incredibly challenging
when many consider standard software compliance a battle.

Activity 4.5
o What are the most frequently raised challenges that of IOT has been facing?
4.2. How does it work?

An IoT ecosystem consists of web-enabled smart devices that use embedded processors, sensors
and communication hardware to collect, send and act on data they acquire from their
environments.

IoT devices share the sensor data they collect by connecting to an IoT gateway. The devices do
most of the work without human intervention, although people can interact with the devices.

4.2.1. Architecture of IoT

27
The architecture of IoT devices comprises four major components: sensing, network, data
processing, and application layers (as depicted in Figure 4.2). A detailed description of these
layers is given below.

1. Sensing Layer - The main purpose of the sensing layer is to identify any phenomena in the
devices’ peripheral and obtain data from the real world. This layer consists of several
sensors. Sensors in IoT devices are usually integrated through sensor hubs. A sensor hub is a
common connection point for multiple sensors that accumulate and forward sensor data to
the processing unit of a device. Actuators can also intervene to change the physical
conditions that generate the data. Sensors in IoT devices can be classified into three broad
categories.
A. Motion Sensors: Motion sensors measure the change in motion as well as the orientation
of the devices. There are two types of motions one can observe in a device: linear and
angular motions.
B. Environmental Sensors: Sensors such as Light sensors, Pressure sensors, etc. are
embedded in IoT devices to sense the change in environmental parameters in the device’s
peripheral. Environment sensors are used in many applications to improve user
experience (e.g., home automation systems, smart locks, smart lights, etc.).
C. Position sensors: Deal with the physical position and location of the device. The most
common position sensors used in IoT devices are magnetic sensors and Global
Positioning System (GPS) sensors. Magnetic sensors are usually used as a digital
compass and help to fix the orientation of the device display. On the other hand, GPS is
used for navigation purposes in IoT devices.
2. Network Layer - Acts as a communication channel to transfer data, collected in the sensing
layer, to other connected devices. Diverse communication technologies (e.g., Wi-Fi,
Bluetooth, Zigbee, ZWave, LoRa, cellular network, etc.) are used to allow data flow between
other devices within the same network.
3. Data Processing Layer:- takes data collected in the sensing layer and analyses the data to
make decisions based on the result. This layer may share the result of data processing with
other connected devices via the network layer.
4. Application Layer- implements and presents the results of the data processing layer to
accomplish disparate applications of IoT devices. A user-centric layer executes various tasks
for the users. There exist diverse IoT applications, which include smart transportation, smart
home, personal care, healthcare, etc.

28
Figure 4.1 Architecture of IoT

Activity 4.6
o There are four components in the IoT architecture. What are they?
o Explain the functions of each layer of IoT.
o What is the difference between the sensors used in IoT devices?
4.2.2. Devices and Networks

IoT devices are meant to work in concert for people at home, in industry or in the enterprise. As
such, the devices can be categorized into three main groups: consumer, enterprise and industrial.

29
Consumer connected devices include smart TVs, smart speakers, toys, wearables, and smart
appliances. smart meters, commercial security systems and smart city technologies such as those
used to monitor traffic and weather conditions are examples of industrial and enterprise IoT
devices. Other technologies, including smart air conditioning, smart thermostats, smart lighting,
and smart security, span home, enterprise, and industrial uses. In the enterprise, smart sensors
located in a conference room can help an employee locate and schedule an available room for a
meeting, ensuring the proper room type, size and features are available.
Efficient and autonomic management of IoT networks is needed. Developing an IoT network
management solution is not an easy task because of the intrinsic constraints of IoT networks
(architecture, technologies, physical layer).
Indeed, it is necessary to take into account several elements such as scalability, interoperability,
energy efficiency, topology control, Quality of Service (QoS), fault tolerance, and security. The
security, context-aware, and the standard model of messages still in an early stage and should be
resolved in a new management platform. Therefore, this work proposes a platform for IoT
networks and devices management, called M4DN.IoT (Management for Device and Network
in the Internet of Things). The structure of the platform is expandable, allowing the addition of
new types of network devices or applications. In addition, the platform provides standard web
services, such as device discovery, data storage, and user authorities, which are basic
requirements for creating IoT applications.
Activity 4.7
o List and discussed at least three examples of IoT devices and their application?
o Dear leaner please make a note about Management for Device and Network in the
Internet of Things (M4DN.IoT) later discussed in the group?

30
4.3. IoT Tools and Platforms

There are many vendors in the industrial IoT platform marketplace, offering remarkably
similar capabilities and methods of deployment, just to name a few.
IoT Platform Key features
KAA  Manage an unlimited number of connected devices
 Set up cross-device interoperability
 Perform real-time device monitoring
 Perform remote device provisioning and configuration
 Collect and analyze sensor data
 Analyze user behavior and deliver targeted notifications
 Create cloud services for smart products
SiteWhere  Run any number of IoT applications on a single SiteWhere instance
 Spring delivers the core configuration framework
 Add devices through self-registration
 Integrates with third-party integration frameworks such as Mule any
point
 Default database storage is MongoDB
 Eclipse Californium for CoAP messaging
 InfluxDB for event data storage
 Grafana to visualize SiteWhere data
ThingSpeak  Collect data in private channels
 Share data with public channels
 MATLAB analytics and visualizations
 Alerts
 Event scheduling
 App integrations
 Worldwide community
DeviceHive  Directly integrate with Alexa
 Visualization dashboard of your choice
 It supports Big data solutions such as ElasticSearch, Apache Spark,
Cassandra and Kafka for real-time and batch processing.
 Connect any device
 It comes with Apache Spark and Spark Streaming support.
 Supports libraries written in various programming languages,
including Android and iOS libraries
 It allows running batch analytics and machine learning on top of your
device data
Zetta  Supports a wide range of hacker boards

31
 Zetta allows you to assemble smartphone apps, device apps, and cloud
apps
ThingsBoard  Real-time data visualization and remote device control
 Customizable rules, plugins, widgets and transport implementations
 Allows monitoring client-side and provision server-side device
attributes.
 Support multi-tenant installations out-of-the-box.
 Supports transport encryption for both MQTT and HTTP(s) protocols.

Activity 4.8
o Briefly discussed some of the IoT development tools that are listed below? • Tessel 2
Eclipse IoT Arduino PlatforIO IBM Watson
Raspbian OpenSCADA Node-RED Kimono Create
Device Hive

4.4. Applications of IoT

4.3.1. IoT Based Smart Home


 Remote Control Appliances: Switching on and off remotely appliances to avoid accidents
and save energy.
 Weather: Displays outdoor weather conditions such as humidity, temperature, pressure,
wind speed and rain levels with the ability to transmit data over long distances.
 Smart Home Appliances: Refrigerators with LCD screen telling what’s inside, food that’s
about to expire, ingredients you need to buy and with all the information available on a
smartphone app. Washing machines allowing you to monitor the laundry remotely, and. The
kitchen ranges with the interface to a Smartphone app allowing remotely adjustable
temperature control and monitoring the oven’s self-cleaning feature.
 Safety Monitoring: cameras, and home alarm systems making people feel safe in their daily
life at home.
 Intrusion Detection Systems: Detection of window and door openings and violations to
prevent intruders.
 Energy and Water Use: Energy and water supply consumption monitoring to obtain advice
on how to save cost and resources, & many more.
4.3.2. IoT Based Smart City
 Structural Health: Monitoring of vibrations and material conditions in buildings, bridges
and historical monuments.
 Lightning: intelligent and weather adaptive lighting in street lights.
 Safety: Digital video monitoring, fire control management, public announcement systems.
 Transportation: Smart Roads and Intelligent High-ways with warning messages and
diversions according to climate conditions and unexpected events like accidents or traffic
jams.

32
 Smart Parking: Real-time monitoring of parking spaces available in the city making
residents able to identify and reserve the closest available spaces,
 Waste Management: Detection of rubbish levels in containers to optimize the trash
collection routes. Garbage cans and recycle bins with RFID tags allow the sanitation staff to
see when garbage has been put out.
4.3.3. IoT Based Smart Farming
 Green Houses: Control micro-climate conditions to maximize the production of fruits and
vegetables and its quality.
 Compost: Control of humidity and temperature levels in alfalfa, hay, straw, etc. to prevent
fungus and other microbial contaminants.
 Animal Farming/Tracking: Location and identification of animals grazing in open pastures
or location in big stables, Study of ventilation and air quality in farms and detection of
harmful gases from excrements.
 Offspring Care: Control of growing conditions of the offspring in animal farms to ensure its
survival and health.
 Field Monitoring: Reducing spoilage and crop waste with better monitoring, accurate
ongoing data obtaining, and management of the agriculture fields, including better control of
fertilizing, electricity and watering.
Activity 4.9
 What is the application of IoT in agriculture?
 What is the application of IoT for the use of consumers?
 What is the application of IoT in healthcare?
 What is the application of IoT in insurance companies?
 What is the application of IoT in manufacturing industries?
 What is the application of IoT in retail industries?
 What is the application of IoT in transportation?
 What is the application of IoT in utilities?

Chapter Four Review Questions


1. What are the main parts of the IoT system?
2. What are the security concerns related to IoT?
3. Explain IoT Protocol stack?
4. What is meant by a smart city regarding the IoT?
5. Give examples of the impact of IoT on our lives?
6. What influence will the IoT have on monetary growth?
7. Why will be the IoT successful in the coming years?
8. What impact will the IoT have on the health care sector?
9. What are the main social and cultural impacts of IoT?
10. What the main challenges of an IoT?
11. What role does the network play in the IoT of everything?
12. How wireless communication might affect the development and implementations of IoT?

33
Chapter 5: Augmented Reality (AR)
After accomplishing this chapter, Students will be able to:
 Explain augmented reality
 Explain the features of augmented reality
 Explain the difference between augmented reality (AR), virtual reality (VR), and mixed
reality (MR)
 Explain the architecture of augmented reality systems
 Describe the application areas of augmented reality
Overview of augmented reality

Augmented reality (AR) is an interactive experience of a real-world environment where the


objects that reside in the real world are enhanced by computer-generated perceptual information,
sometimes across multiple
sensory modalities,including visual, auditory, haptic, somatosensory and olfactory. The fundamental
idea of AR is to combine, or mix, the view of the real environment with additional, virtual content
that is presented through computer graphics. Its convincing effect is achieved by ensuring that the
virtual content is aligned and registered with the real objects. As a person moves in an environment
and their perspective view of real objects changes, the virtual content should also be presented from
the same perspective.

Augmented reality (AR) is a form of emerging technology that allows users to overlay computer-
generated content in the real world. The augmentation is typically done in real-time and in
semantic context with environmental elements.

By using the latest AR techniques and technologies, the information about the surrounding real
world becomes interactive and digitally usable. Through this augmented vision, a user can
digitally interact with and adjust information about their surrounding environment.

Unlike virtual reality, which creates a totally artificial environment, augmented reality uses the
existing environment and overlays new information on top of it. A live direct or indirect view of
a physical, real-world environment whose elements are augmented by computer-generated
sensory input such as sound, video, graphics or GPS data.

Virtual reality (VR), Augmented Reality (AR) vs Mixed reality (MR)

With constant development in computer vision and the exponential advancement of computer
processing power, virtual reality (VR), augmented reality (AR), and mixed reality (MR)
technology is becoming more and more prominent. With some overlap in the applications and
functions of these emerging technologies, sometimes these terms get confused or are used
incorrectly. The main differences between them are explained in the figure below:

34
VR:- is fully immersive, which tricks your senses into thinking you’re in a different environment
or world apart from the real world. It is also called a computer-simulated reality
AR፦ is an enhanced version of reality created by the use of technology to overlay digital
information on an image of something being viewed through a device (such as a Smartphone
camera). In augmented reality, users see and interact with the real world while digital content is
added to it.
MR:- sometimes referred to as hybrid reality, is the merging of real and virtual worlds to
produce new environments and visualizations where physical and digital objects co-exist and
interact in real-time.
One of the most obvious differences among augmented reality, virtual reality, and mixed reality
is the hardware requirements and also VR is content which is 100% digital and can be enjoyed in
a fully immersive environment, AR overlays digital content on top of the real-world and MR is a
digital overlay that allows interactive virtual elements to integrate and interact with the real-
world environment.
The Architecture of AR Systems
The first Augmented Reality Systems (ARS) were usually designed with a basis on three main
blocks, as is illustrated in Figure below:

35
(1) Infrastructure Tracker Unit: The Infrastructure Tracker Unit was responsible for collecting
data from the real world, sending them to the Processing Unit. Some designs used a Video In, to
acquire required data for the Infrastructure Tracker Unit.
(2) Processing Unit: mixed the virtual content with the real content and sent the result to the
Video Out module of the Visual Unit.
(3) Visual Unit: The Visual Unit can be classified into two types of system, depending on the
followed visualization technology:
1. Video see-through: It uses a Head-Mounted Display (HMD) that employs a video-
mixing and displays the merged images on a closed-view HMD.
2. Optical see-through: It uses an HMD that employs optical combiners to merge the
images within an open-view HMD.
Applications of AR Systems
AR can be applied to many different disciplines such as education, medicine, entertainment,
military, etc.

AR In education: AR allows flexibility in use that is attractive to education. AR can be used to


enhance content and instruction within the traditional classroom, supplement instruction in the
special education classroom, extend content into the world outside the classroom, and be
combined with other technologies to enrich their individual applications. The following reasons
for using augmented reality in education:
- Affordable learning materials
- Interactive lessons
- Higher engagement
- Higher retention
- Boost intellectual curiosity
AR In Medicine: has already filled an important place in doctors’ and nurses’ routine, as well as
patients’ lives. It has already made significant changes in the following medical areas:
• surgery (minimally invasive surgery);
• education of future doctors;
• describing symptoms;
• nursing care;
• diagnostics;
• ultrasounds;
• diabetes management;
• detect the signs of depression and other mental illnesses by reading from facial
expressions, voice tones, and physical gestures.
Generally, AR provides the following benefits to patients and healthcare workers:
• Reduce the risks associated with minimally invasive surgery.
• Better informed decisions about the right treatment and illness prevention.
• Make procedures more tolerable.
• Better aftercare

36
• Medical training and education.
• Assistance in medical procedures and routine tasks.
AR In Entertainment: can be used in various “entertainment” industries.
AR in games: were praised for increasing physical activity in people. For example, Pokémon
GO game app.
AR in music: AR can enhance live performances by illustrating the story told by a track or
displaying the way it was created by the band.
AR on TV: One way of integrating augmented reality in television is adding supplementary
information to what is going on the TV screen – such as match scores, betting options, and the
like.
AR in eSports: turns eSports shows into interactive experiences allowing the watchers to
become participants.
AR in the theater: in this sector, augmented reality can serve not only for entertainment
purposes but also for the purposes of accessibility.

37
Chapter 6: ETHICS AND PROFESSIONALISM OF EMERGING TECHNOLOGIES
6.1. Technology and Ethics

6.1. Activity

 From your civic and ethical education course, what do you understand about the word
ethics?
The Internet boom has provided many benefits for society, allowing the creation of new tools
and new ways for people to interact. Technology can serve to promote or restrict human rights.
The Information Society should foster the use of emerging technologies in such a way as to
maximize the benefits that they provide while minimizing the harms. In many cases, this
promotion may be less a matter of technological control than of oversight: establishing the
proper legal or regulatory system to ensure that technology capable of abuse is not in fact
abused and that the benefits of technology are shared among all.
Ethics is particularly important for the accountancy profession, with a code for professional
ethics based on five basic principles – integrity, objectivity, competence and due care,
confidentiality, and professional behaviour. However, the emergence of new technologies
raises some new challenges for the profession to address.

6.2. New Ethical Questions Related Emerging Technology

Activity 6.2

 What do you think the need for ethics in data science? Is it really important to include
ethical rules when dealing with big data? If your answer is yes, why?

The increasing use of big data, algorithmic decision-making, and artificial intelligence can
enable more consistent, evidence-based and accurate judgments or decisions, often more
quickly and efficiently. However, these strengths can potentially have a darker side too,
throwing up questions around the ethical use of these fairly new technologies.
For example, outputs can be based on biased data, which could lead to discriminatory
outcomes. Indeed, where systems learn from real-world data, there is a significant risk that
those systems simply recreate the past and subsequently build in errors or systemic biases.

Activity 6.3

 As we discussed in chapter three, AI is all about making a machine learn and decide as
humans do. Do you think that it is necessary to rely on machines and give them all the
opportunity to decide? Why?

Additionally, questions are being asked regarding the interaction between computers and
humans. How much reliance can we place on data and models, and what is the role of human

38
judgment, as well as how do we ensure that we understand the decision-making process?
Whatever the power of the machine, humans will still need to be involved, so that people can
be held accountable, or explain the reasons behind a decision.

Activity 6.4

 Do you think that integrating ethical rules with emerging technologies is important? If
your answer is yes, why? What are the challenges of integrating ethical rules with new
technologies?
A central problem of the ethics of technology is that it tends to arrive too late. In many cases,
ethical issues are only recognized when the technology is already on the market and problems
arise during its widespread use.
Ethics can then become a tool to clean up a mess that might have been avoidable.
It is probably not contentious to say it would be desirable to have ethical input at the earlier
stages of technology design and development. Indeed, there are ethical theories and approaches
that explicitly aim at an early integration of ethics into the technology life cycle.

6.2.1. General ethical principles

Activity 6.5

 List down common ethical rules that must be applied in all technologies?

1. Contribute to society and to human well-being, acknowledging that all people are
stakeholders in computing.
2. Avoid harm.
3. Be honest and trustworthy.
4. Be fair and take action not to discriminate
5. Respect the work required to produce new ideas, inventions, creative works, and
computing artifacts.
6. Respect privacy.
7. Honor confidentiality

6.2.2. Professional Responsibilities.

Activity 6.6

 List down ethical principles related to professional responsibility?

1. Strive to achieve high quality in both the processes and products of professional work.
2. Maintain high standards of professional competence, conduct, and ethical practice.

39
3. Know and respect existing rules pertaining to professional work.
4. Accept and provide appropriate professional review.
5. Give comprehensive and thorough evaluations of computer systems and their impacts,
including analysis of possible risks.
6. Perform work only in areas of competence.
7. Foster public awareness and understanding of computing, related technologies, and
their consequences.
8. Access computing and communication resources only when authorized or when
compelled by the public good.
9. Design and implement systems that are robustly and usably secure.

6.2.3. Professional leadership principles.

Activity 6.7

 List down ethical principles related to professional leadership?

1. Ensure that the public good is the central concern during all professional computing
work.

2. Articulate, encourage acceptance of and evaluate fulfillment of social responsibilities


by members of the organization or group.

3. Manage personnel and resources to enhance the quality of working life.

4. Articulate, apply, and support policies and processes that reflect the principles of the
Code.

5. Create opportunities for members of the organization or group to grow as professionals.

6. Use care when modifying or retiring systems. Interface changes, the removal of
features, and even software updates have an impact on the productivity of users and the
quality of their work.

7. Recognize and take special care of systems that become integrated into the
infrastructure of society.

Activity 6.8

 Discuss some specific professional ethical principles related to big data, AI and IoT?

40
6.2. Digital privacy

Activity 6.9
 What do you think about privacy in general? Is it really important?
 In this digital world, what do you mean by digital privacy? Give concrete examples?

Digital Privacy is the protection of personally identifiable or business identifiable


information that is collected from respondents through information collection activities or
from other sources.

It is a collective definition that encompasses three sub-related categories; information


privacy, communication privacy, and individual privacy.

It is often used in contexts that promote advocacy on behalf of individual and consumer
privacy rights in digital spheres, and is typically used in opposition to the business
practices of many e-marketers/businesses/companies to collect and use such information
and data.

6.3.1. Information Privacy

Activity 6.10

 What do you think that private information like passwords, PIN numbers, will be
guarded or shared with the public? Why?

In the context of digital privacy, information privacy is the notion that individuals should
have the freedom, or right, to determine how their digital information, mainly that pertaining to
personally identifiable information, is collected and used.

Every country has various laws that dictate how information may be collected and used by
companies.

6.3.2. Communication Privacy

Activity 6.11

 Do you think communication privacy is the only one who is accessing the message will
be the sender’s intended receiver? If your answer is yes, why?

In the context of digital privacy, communication privacy is the notion that individuals should
have the freedom, or right, to communicate information digitally with the expectation that their
communications are secure; meaning that messages and communications will only be
accessible to the sender's original intended recipient. However, communications can be

41
intercepted or delivered to other recipients without the sender's knowledge, in a multitude of
ways. It’s necessarily requires consideration of technological methods of protecting
information/communication in digital mediums, the effectiveness, and ineffectiveness of
such methods/systems, and the development/advancement of new and current technologies.

6.3.3. Individual Privacy

Activity 6.12

 Do you think that it is good to make yourself exposed to every information on the
internet? Why?

Individual privacy is the notion that individuals have a right to exist freely on the internet, in
that they can choose what types of information they are exposed to, and more importantly that
unwanted information should not interrupt them.

An example of a digital breach of individual privacy would be an internet user receiving


unwanted ads and emails/spam, or a computer virus that forces the user to take actions they
otherwise wouldn't.

6.3.4. Some digital privacy principles

Activity 6.13

 Give some examples you have to consider to make your data as well as communication
private?
 Data Minimization
 Transparency
 Accuracy
 Security: Adequate physical and IT security measures will be implemented to ensure that
the collection, use, and maintenance of identifiable information are properly safeguarded
and the information is promptly destroyed in accordance with approved records control
schedules.

6.4. Accountability and Trust

Activity 6.14

 Why are accountability and trust so important in using emerging technologies?

Emerging technologies can provide improved accuracy, better quality and cost efficiencies for
businesses in every sector. They can enhance trust in the organization’s operations and

42
financial processes, which is crucial for sustainable success. But this can produce a paradox:
the very solutions that can be used to better manage risk, increase transparency and build
confidence are often themselves the source of new risks, which may go unnoticed.

6.5. Treats and challenges

6.5.1. Ethical and regulatory challenges

Activity 6.15

 What are the challenges of using technologies like AI, IoT, and big data?

With Technology moving at a fast pace it is always been a challenge for Security. As security
professionals, we need to keep pace with ever-changing technology and be aware of the AI,
IoT, Big Data, Machine Learning, etc.

Activity 6.16

 What role can technologies such as AI, IoT, Machine Learning and Big Data play in
enhancing the security of an organization?

Emerging technologies are already impacting how we live and work. They're also changing
how we approach, plan, and integrate security operations. For security, both physical and
cyber, the equation is the same catalyzing many new potential applications for emerging
technologies.

Emerging technologies are making an impact include:

1. Counter-terrorism and law enforcement informatics via predictive analytics and


artificial intelligence.

2. Real-time horizon scanning and data mining for threats and information sharing

3. Automated cyber security and information assurance

4. Enhanced Surveillance (chemical and bio-detection sensors, cameras, drones, facial


recognition, license plate readers)

5. Simulation and augmented reality technologies for training and modelling

6. Safety and security equipment (including bullet and bomb proof) made with lighter
and stronger materials

43
7. Situational awareness capabilities via GPS for disaster response and crisis response
scenarios

8. Biometrics: assured identity security screening solutions by bio-signature: (every


aspect of your physiology can be used as a bio-signature. Measure unique heart/pulse
rates, electrocardiogram sensor, blood oximetry, skin temperature)

9. Robotic Policing (already happening in Dubai!)

6.5.1.1. Challenges in using Artificial Intelligence

Activity 6.17

 AI has a wide application in health and manufacturing industries. What are the
challenges the world face when implementing the applications of AI in the previously
mentioned industries?

AI is only as good as the data it is exposed to, which is where certain challenges may present
themselves. How a business teaches and develops its AI will be the major factor in its
usefulness. Humans could be the weak link here, as people are unlikely to want to input masses
of data into a system.

6.5.1.2. Challenges in using Robotics in manufacturing

Activity 6.18

 Write down the challenges of using robots in the manufacturing industry? Debate on
the pros and cons of giving jobs to humans or to robots in the manufacturing industry?

With automation and robotics moving from production lines out into other areas of work and
business, the potential for humans losing jobs is great here too. As automation technologies
become more advanced, there will be a greater capability for automation to take over more and
more complex jobs. As robots learn to teach each other and themselves, there is the potential
for much greater productivity but this also raises ethical and cyber security concerns.

6.5.1.3. Challenges in using the Internet of Things

Activity 6.19

 As we discussed in chapter 4, IoT has a vast application in different sectors. Write


down some challenges of using IoT in our daily activities?

44
As more and more connected devices (such as smartwatches and fitness trackers) join the
Internet of Things (IoT) the amount of data being generated is increasing. Companies will have
to plan carefully how this will affect the customer-facing application and how to best utilize
the masses of data being produced. There are also severe security implications of mass
connectivity that need to be addressed.

6.5.1.4. Challenges in Big Data

Almost all the technologies mentioned above have some relation to Big Data. The huge amount
of data being generated on a daily basis has the potential to provide businesses with better
insight into their customers as well as their own business operations. Although data can be
incredibly useful for spotting trends and analyzing impacts, surfacing all this data to humans in
a way that they can understand can be challenging. AI will play a role here.

6.5.2. Treats

Activity 6.20

 Write down some risks in emerging technologies like driverless cars, drones, and IoT?

New and emerging technologies pose significant opportunities for businesses if they utilize
them well and understand their true value early on.
Some risks of emerging technology are:
 Driverless car
 Wearables
 Drones
 Internet of things
Chapter Six Review Questions
1. What is the importance of ethics in emerging technologies?
2. List down some general ethical rules?
3. List down some professional responsibility related to ethical rules
4. What is digital privacy? What is its importance?
5. Briefly explain digital privacy principles
6. Why we need accountability in using emerging technologies?
7. Is the trust necessary to use an emerging technology platform? Why?
8. Briefly explain the challenges in using:
a. AI?
b. Robots?
c. IoT?
9. Briefly explain the risks we face in augmented reality, IoT and AI?
10. Do you think that dealing with big data demands high ethical regulations,
accountability, and responsibility of the person as well as the company? Why?

45
CHAPTER 7: OTHER EMERGING TECHNOLOGIES

Introduction
In this chapter, we are going to discuss other emerging technologies like nanotechnology,
biotechnology, block-chain technology, cloud and quantum computing, autonomic computing,
computer vision, embedded systems, cyber-security, and 3D printing.

7.1 Nanotechnology
Nanotechnology is science, engineering, and technology conducted at the nanoscale, which is
about 1 to 100 nanometres. Nanoscience and nanotechnology are the study and application of
extremely small things and can be used across all the other science fields, such as chemistry,
biology, physics, materials science, and engineering. One nanometer is a billionth of a meter or
10-9 meters. Here are a few illustrative examples:
 There are 25,400,000 nanometers in an inch.
 A sheet of newspaper is about 100,000 nanometers thick.
 On a comparative scale, if a marble were a nanometer, then one meter would be the size
of the Earth.
Nanoscience and nanotechnology involve the ability to see and to control individual atoms and
molecules. Everything on Earth is made up of atoms—the food we eat, the clothes we wear, the
buildings and houses we live in, and our own bodies. But something as small as an atom is
impossible to see with the naked eye.
In fact, it’s impossible to see with the microscopes typically used in high school science classes.
The microscopes needed to see things at the nanoscale were invented relatively recently about 30
years ago. As small as a nanometer is, it's still large compared to the atomic scale. An atom has a
diameter of about 0.1 nm. An atom's nucleus is much smaller about 0.00001 nm. Atoms are the
building blocks for all matter in our universe. You and everything around you are made of atoms.
Nature has perfected the science of manufacturing matter molecularly. For instance, our bodies
are assembled in a specific manner from millions of living cells. Cells are nature's
nanomachines. At the atomic scale, elements are at their most basic level. On the nanoscale, we
can potentially put these atoms together to make almost anything.
We define Nanoscience as the study of phenomena and manipulation of materials at atomic,
molecular and macromolecular scales, where properties differ significantly from those at a larger
scale; and nanotechnologies as the design, characterization, production, and application of
structures, devices, and systems by controlling shape and size at the nanometer scale.

The properties of materials can be different at the nanoscale for two main reasons:
1. Nanomaterials have a relatively larger surface area when compared to the same mass of
material produced in a larger form. This can make materials more chemically reactive (in
some cases materials that are inert in their larger form are reactive when produced in their
nanoscale form), and affect their strength or electrical properties.

46
2. Quantum effects can begin to dominate the behaviour of matter at the nanoscale
particularly at the lower end – affecting the optical, electrical and magnetic behavior of
materials. Materials can be produced that are nanoscale in one dimension (for example,
nanowires, nanorods, and nanotubes), in two dimensions (plate-like shapes like
nanocoating, nanolayers, and graphene) or in all three dimensions (for example,
nanoparticles).

Applications of nanotechnology:-
 Medicine: customized nanoparticles the size of molecules that can deliver drugs directly
to diseased cells in your body. When it's perfected, this method should greatly reduce the
damage treatment such as chemotherapy does to a patient's healthy cells.
 Electronics: it has some answers for how we might increase the capabilities of electronics
devices while we reduce their weight and power consumption.
 Food: it has an impact on several aspects of food science, from how food is grown to how
it is packaged.
 Agriculture: nanotechnology can possibly change the whole agriculture part and
nourishment industry anchor from generation to preservation, handling, bundling,
transportation, and even waste treatment.
 Vehicle manufacturers: Much like aviation, lighter and stronger materials will be
valuable for making vehicles that are both quicker and more secure.

7.2 Biotechnology
Biotechnology is technology based on biology. Biotechnology harnesses cellular and
biomolecular processes to develop technologies and products that help improve our lives and the
health.
We have used the biological processes of microorganisms for more than 6,000 years to make
useful food products, such as bread and cheese, and to preserve dairy products. Brewing and
baking bread are examples of processes that fall within the concept of biotechnology. Such
traditional processes usually utilize the living organisms in their natural form (or further
developed by breeding), while the more modern form of biotechnology will generally involve a
more advanced modification of the biological system or organism.
One example of modern biotechnology is genetic engineering. Genetic engineering is the process
of transferring individual genes between organisms or modifying the genes in an organism to
remove or add a desired trait or characteristic.
Today, biotechnology covers many different disciplines (e.g. genetics, biochemistry, molecular
biology, etc.). New technologies and products are developed every year within the areas of e.g.
medicine (development of new medicines and therapies), agriculture (development of genetically
modified plants, biofuels, and biological treatment) or industrial biotechnology (production of
chemicals, paper, textiles, and food).

47
Application of biotechnology
 Agriculture (Green Biotechnology): Biotechnology had contributed a lot to modify the
genes of the organism known as Genetically Modified Organisms such as Crops,
Animals, Plants, Fungi, Bacteria, etc.
 Medicine (Medicinal Biotechnology): This helps in the formation of genetically modified
insulin known as humulin.
 Aquaculture Fisheries: It helps in improving the quality and quantity of fishes. Through
biotechnology, fishes are induced to breed via gonadotropin-releasing hormone.
 Environment (Environmental biotechnology): is used in waste treatment and pollution
prevention. Environmental biotechnology can more efficiently clean up many wastes than
conventional methods and greatly reduce our dependence on methods for land-based
disposal.

7.3 Blockchain Technology


Originally Blockchain is a growing list of records, called blocks that are linked using
cryptography. Each block contains a cryptography hash of the previous block, a timestamp, and
transaction data.
A Blockchain is a time-stamped series of immutable records of data that is managed by a cluster
of computers not owned by any single entity. Each of these blocks of data (i.e. block) is secured
and bound to each other using cryptographic principles (i.e. chain). “Blocks” on the Blockchain
are made up of digital pieces of information. Specifically, they have three parts:
1. Blocks store information about transactions like the date, time, and dollar amount of your
most recent purchase from Amazon.
2. Blocks store information about who is participating in transactions. A block for your
splurge purchase from Amazon would record your name along with Amazon.com, Inc.
Instead of using your actual name, your purchase is recorded without any identifying
information using a unique “digital signature,” sort of like a username.
3. Blocks store information that distinguishes them from other blocks. Much like you and I
have names to distinguish us from one another, each block stores a unique code called a
“hash” that allows us to tell it apart from every other block.
When a block stores new data it is added to the Blockchain. Blockchain, as its name suggests,
consists of multiple blocks strung together. In order for a block to be added to the Blockchain,
four things must happen:
1. A transaction must occur.
2. That transaction must be verified.
3. That transaction must be stored in a block.
4. That block must be given a hash.
By design, a Blockchain is resistant to modification of the data. It is "an open, distributed ledger
that can record transactions between two parties efficiently and in a verifiable and permanent
way". For use as a distributed ledger, a Blockchain is typically managed by a peer-to-peer
network collectively adhering to a protocol for inter-node communication and validating new

48
blocks. Once recorded, the data in any given block cannot be altered retroactively without the
alteration of all subsequent blocks, which requires the consensus of the network majority.
Although Blockchain records are not unalterable, Blockchain may be considered secure by
design and exemplify a distributed computing system.
The Blockchain network has no central authority; it is the very definition of a democratized
system. Since it is a shared and immutable ledger, the information in it is open for anyone and
everyone to see. Hence, anything that is built on the Blockchain is by its very nature transparent
and everyone involved is accountable for their actions.
A Blockchain carries no transaction cost. (An infrastructure cost yes, but no transaction cost.)
The Blockchain is a simple yet ingenious way of passing information from A to B in a fully
automated and safe manner. One party to a transaction initiates the process by creating a block.
This block is verified by thousands, perhaps millions of computers distributed around the net.
The verified block is added to a chain, which is stored across the net, creating not just a unique
record, but a unique record with a unique history. Falsifying a single record would mean
falsifying the entire chain in millions of instances. That is virtually impossible. Bitcoin uses this
model for monetary transactions, but it can be deployed in many other ways.

The three main properties of Blockchain Technology are:


1. Decentralization
 In a decentralized system the information is not stored by one single entity. In
fact, everyone in the network owns the information.
 In a decentralized network, if you wanted to interact with your friend then you
can do so directly without going through a third party. That was the main
ideology behind Bitcoin. You and only you alone are in charge of your money.
You can send your money to anyone you want without having to go through a
bank.

Fig: comparisons of a centralized and decentralized network

49
2. Transparency
 A person’s identity is hidden via complex cryptography and represented only by
their public address. So, if you were to look up a person’s transaction history, you
will not see. So, while the person’s real identity is secure, you will still see all the
transactions that were done by their public address. This level of transparency has
never existed before within a financial system. It adds that extra, and much
needed level of accountability which is required by some of these biggest
institutions.
3. Immutability
It means that once something has been entered into the Blockchain, it cannot be tampered with.
 The reason why the Blockchain gets this property is that of the cryptographic hash
function. Hashing means taking an input string of any length and giving out an
output of a fixed length. In the context of crypto-currencies like Bitcoin, the
transactions are taken as input and run through a hashing algorithm (Bitcoin uses
SHA-256) which gives an output of a fixed length.
 Let’s see how the hashing process works. We are going to use the SHA-256
(Secure Hashing Algorithm 256).

 As you can see, in the case of SHA-256, no matter how big or small your input is, the
output will always have a fixed 256-bits length. This becomes critical when you are
dealing with a huge amount of data and transactions. So basically, instead of
remembering the input data which could be huge, you can just remember the hash and
keep track.

How Blockchain works


Information held on a Blockchain exists as a shared and continually reconciled database. This is
a way of using the network that has obvious benefits. The Blockchain database isn’t stored in
any single location, meaning the records it keeps are truly public and easily verifiable. No
centralized version of this information exists for a hacker to corrupt. Hosted by millions of
computers simultaneously, its data is accessible to anyone on the internet. The reason why the
Blockchain has gained so much admiration is that:
 It is not owned by a single entity, hence it is decentralized.
 The data is cryptographically stored inside.

50
 The blockchain is immutable, so no one can tamper with the data that is inside the
blockchain
 The blockchain is transparent so one can track the data if they want to.

Application of Blockchain

A. The sharing economy


With companies like Uber and Airbnb flourishing, the sharing economy is already a proven
success. Currently, however, users who want to hail a ride-sharing service have to rely on an
intermediary like Uber. By enabling peer-to-peer payments, the blockchain opens the door to
direct interaction between parties a truly decentralized sharing economy result.
B. Crowdfunding
Crowdfunding initiatives like Kickstarter and GoFundMe are doing the advance work for the
emerging peer-to-peer economy. The popularity of these sites suggests people want to have a
direct say in product development. Blockchains take this interest to the next level, potentially
creating crowd-sourced venture capital funds. In 2016, one such experiment, the Ethereum-based
DAO (Decentralized Autonomous Organization), raised an astonishing $200 million USD in just
over two months. Participants purchased “DAO tokens” allowing them to vote on smart contract
venture capital investments (voting power was proportionate to the number of DAO they were
holding).
C. Governance
By making the results fully transparent and publicly accessible, distributed database technology
could bring full transparency to elections or any other kind of poll taking. Ethereum-based smart
contracts help to automate the process. The app, Boardroom, enables organizational decision-
making to happen on the blockchain. In practice, this means company governance becomes fully
transparent and verifiable when managing digital assets, equity or information.
D. Supply chain auditing
Consumers increasingly want to know that the ethical claims companies make about their
products are real. Distributed ledgers provide an easy way to certify that the backstories of the
things we buy are genuine. Transparency comes with blockchain-based timestamping of a date
and location — on ethical diamonds, for instance — that corresponds to a product number.
The UK-based Provenance offers supply chain auditing for a range of consumer goods. Making
use of the Ethereum blockchain, a Provenance pilot project ensures that fish sold in Sushi
restaurants in Japan have been sustainably harvested by its suppliers in Indonesia.
E. File storage
Decentralizing file storage on the internet brings clear benefits. Distributing data throughout the
network protects files from getting hacked or lost. Interplanetary File System (IPFS) makes it
easy to conceptualize how a distributed web might operate. Similar to the way a BitTorrent
moves data around the internet, IPFS gets rid of the need for centralized client-server
relationships (i.e., the current web). An internet made up of completely decentralized websites

51
has the potential to speed up file transfer and streaming times. Such an improvement is not only
convenient. It’s a necessary upgrade to the web’s currently overloaded content-delivery systems.

7.4. Cloud and Quantum computing

Cloud computing is a means of networking remote servers that are hosted on the Internet. Rather
than storing and processing data on a local server, or a PC's hard drive, one of the following
three types of cloud infrastructure is used.
1. Public cloud. Here a third-party provider manages the servers, applications, and storage
much like a public utility. Anyone can subscribe to the provider’s cloud service, which is
usually operated through their own data center.
2. Private cloud. Hosted on their on-site data center, although some companies host through
a third-party provider instead. Either way, the computing infrastructure exists as a private
network accessible over the Internet.
3. The third option is a hybrid cloud. Here private clouds are connected to public clouds,
allowing data and applications to be shared between them.

Advantages of cloud computing


1. Cheap computing power. Because a cloud provider’s hardware and software are
shared, there’s no need for the initial costly capital investment.
2. It gets better. Cloud providers have vast resources of computing power at their
fingertips. They can allocate these whenever required with just a few mouse clicks.
Cloud providers source on a global scale, so they can deliver the precise bandwidth,
storage and power business needs when it needs it.
3. The cloud allows you and multiple users to access your data from any location.
Smartphone, laptop, desktop, wherever you are, you can access the data you need at
any time.
4. With cloud computing a business processes its data more efficiently, increasing
productivity. Maintenance is much cheaper, often free, so reliability is rarely a worry.
Cloud computing allows CEOs to focus on running their business.

7.4.1 Quantum computing


Quantum computers truly do represent the next generation of computing. Unlike classic
computers, they derive their computing power by harnessing the power of quantum physics. B/c
of the rather nebulous science behind it, a practical, working quantum computer still remains a
flight of fancy.

Currently, the only organization which provides a quantum computer in the cloud is IBM. They
allow free access to anyone who wishes to use their 5-qubit machine. Earlier this year they
installed a 17-qubit machine. So far over 40,000 users have taken advantage of their online

52
service to run experiments. Google provided the fastest quantum computer with 53qubits and
speed of 200 seconds computation while the supercomputer took 10000 years.
Qubit is short for a sequence of quantum bits. With a classic computer, data is stored in tiny
transistors that hold a single bit of information, either the binary value of 1 or 0. With a quantum
computer, the data is stored in qubits. Thanks to the mechanics of quantum physics, where
subatomic particles obey their own laws, a qubit can exist in two states at the same time. This
phenomenon is called superposition. So, a qubit can have a value of 1, 0, or some value
between. Two qubits can hold even more values. Before long, you are building yourself an
exponentially more powerful computer the more qubits you add.
Advantages of quantum computing
1. To make complex calculations that would only overwhelm classic computers.
2. Help in the discovery of new drugs, by unlocking the complex structure of chemical
molecules.
3. For financial trading, risk management, and supply chain optimization.
4. With its ability to handle more complex numbers, data could be transferred over the
internet with much safer encryption.

7.5. Autonomic computing (AC)


Autonomic computing (AC) is an approach to address the complexity and evolution problems in
software systems. It is a self-managing computing model named after, and patterned on, the
human body's autonomic nervous system. An autonomic computing system would control the
functioning of computer applications and systems without input from the user, in the same way,
that the autonomic nervous system regulates body systems without conscious input from the
individual. The goal of autonomic computing is to create systems that run themselves, capable of
high-level functioning while keeping the system's complexity invisible to the user.
It refers to the self-managing characteristics of distributed resources, adapting to unpredictable
changes while hiding intrinsic complexity to operators and users. Initiated by IBM in 2001, this
initiative ultimately aimed to develop computer systems capable of self-management, to
overcome the rapidly growing complexity of computing system management, and to reduce the
barrier that complexity poses to further growth.

Autonomic systems/applications exhibit eight defining characteristics:


 Self-Awareness: An autonomic application/system “knows itself” and is aware of its state
and its behaviours.
 Self-Configuring: An autonomic application/system should be able to configure and
reconfigure itself under varying and unpredictable conditions.
 Self-Optimizing: An autonomic application/system should be able to detect suboptimal
behaviours and optimize itself to improve its execution.
 Self-Healing: An autonomic application/system should be able to detect and recover from
potential problems and continue to function smoothly.

53
 Self-Protecting: An autonomic application/system should be capable of detecting and
protecting its resources from both internal and external attacks and maintaining overall
system security and integrity.
 Context-Aware: An autonomic application/system should be aware of its execution
environment and be able to react to changes in the environment.
 Open: An autonomic application/system must function in a heterogeneous world and
should be portable across multiple hardware and software architectures. Consequently, it
must be built on standard and open protocols and interfaces.
 Anticipatory: An autonomic application/system should be able to anticipate to the extent
possible, its needs and behaviours and those of its context, and be able to manage itself
proactively

7.6 .Computer vision


It is an interdisciplinary scientific field that deals with how computers can be made to gain a
high-level understanding of digital images or videos. From the perspective of engineering, it
seeks to automate tasks that the human visual system can do.
Computer vision tasks include methods for acquiring, processing, analyzing and understanding
digital images, and extraction of high-dimensional data from the real world in order to produce
numerical or symbolic information, e.g. in the forms of decisions.
Computer vision is building algorithms that can understand the content of images and use it for
other applications.

How computer vision works


1. Acquiring an image: Images, even large sets, can be acquired in real-time through video,
photos or 3D technology for analysis.
2. Processing the image: Deep learning models automate much of this process, but the
models are often trained by first being fed thousands of labelled or pre-identified images.
3. Understanding the image: The final step is the interpretative step, where an object is
identified or classified.

There are many types of computer vision that are used in different ways:
 Image segmentation partitions an image into multiple regions or pieces to be examined
separately.
 Object detection identifies a specific object in an image. Advanced object detection
recognizes many objects in a single image: a football field, an offensive player, a
defensive player, a ball and so on. These models use an X, Y coordinate to create a
bounding box and identify everything inside the box.
 Facial recognition is an advanced type of object detection that not only recognizes a
human face in an image but identifies a specific individual.
 Edge detection is a technique used to identify the outside edge of an object or landscape
to better identify what is in the image.

54
 Pattern detection is a process of recognizing repeated shapes, colours and other visual
indicators in images.
 Image classification groups images into different categories.
 Feature matching is a type of pattern detection that matches similarities in images to help
classify them.

Applications of computer vision


 Optical character recognition (OCR): reading handwritten postal codes on letters and
automatic number plate recognition (ANPR);
 Machine inspection: rapid parts inspection for quality assurance using stereo vision with
specialized illumination to measure tolerances on aircraft wings or auto body parts or
looking for defects in steel castings using X-ray vision;
 Retail: object recognition for automated checkout lanes ;
 Medical imaging: registering pre-operative and intra-operative imagery or performing
long-term studies of people’s brain morphology as they age;
 Automotive safety: detecting unexpected obstacles such as pedestrians on the street,
under conditions where active vision techniques such as radar or lidar do not work well
 Surveillance: monitoring for intruders, analyzing highway traffic and monitoring pools
for drowning victims;
 Fingerprint recognition and biometrics: for automatic access authentication as well as
forensic applications

7.7. Embedded systems


It is a controller with a dedicated function within a larger mechanical or electrical system, often
with real-time computing constraints. It is embedded as part of a complete device often including
hardware and mechanical parts. Embedded systems control many devices in common use today.
Ninety-eight percent of all microprocessors manufactured are used in embedded systems.
Modern embedded systems are often based on microcontrollers (i.e. microprocessors with
integrated memory and peripheral interfaces), but ordinary microprocessors (using external chips
for memory and peripheral interface circuits) are also common, especially in more complex
systems. In either case, the processor(s) used may be types ranging from general-purpose to
those specialized in a certain class of computations or even custom designed for the application
at hand. A common standard class of dedicated processors is the digital signal processor (DSP).
Advantages of Embedded system
 Easily Customizable
 Low power consumption
 Low cost
 Enhanced performance
Disadvantages of Embedded systems
 High development effort
 Larger time to market

55
Fig: Basic structure of an embedded system

 Sensor − It measures the physical quantity and converts it to an electrical signal which
can be read by an observer or by any electronic instrument like an A2D converter. A
sensor stores the measured quantity to the memory.
 A-D Converter − An analog-to-digital converter converts the analog signal sent by the
sensor into a digital signal.
 Processor & ASICs − Processors process the data to measure the output and store it to the
memory.
 D-A Converter − A digital-to-analog converter converts the digital data fed by the
processor to analog data.
 Actuator − An actuator compares the output given by the D-A Converter to the actual
(expected) output stored in it and stores the approved output.

7.8. Cyber-security
It is the protection of computer systems from the theft of or damage to their hardware, software,
or electronic data, as well as from the disruption or misdirection of the services they provide.
Cybersecurity is often confused with information security but it focuses on protecting computer
systems from unauthorized access or being otherwise damaged or made inaccessible.
Information security is a broader category that looks to protect all information assets, whether in
hard copy or in digital form. The term cybercrime is used to describe an unlawful activity in
which computer or computing devices such as smartphones, tablets, Personal Digital Assistants
(PDAs), etc. which are stand-alone or a part of a network are used as a tool or/and target of
criminal activity. It is often committed by the people of destructive & criminal mindset either for
revenge, greed or adventure. Combating this is a multi-disciplinary affair that spans hardware &
software through to policy & people all of it aimed at both preventing cybercrimes occurring in
the first place, & minimizing its impact.

Cyber-security measures
The following are some security measures to be taken to prevent cybercrimes:
 Staff awareness training: - Human error is the leading cause of data breaches, so you need
to equip staff with the knowledge to deal with the threats they face. Training courses will
show staff how security threats affect them and help them apply best-practice advice to
real-world situations.

56
 Application security: - Web application vulnerabilities are a common point of intrusion
for cybercriminals. As applications play an increasingly critical role in business, it is vital
to focus on web application security.
 Network security: - Network security is the process of protecting the usability and
integrity of your network and data. This is achieved by conducting a network penetration
test, which scans your network for vulnerabilities and security issues.
 Leadership commitment: - Leadership commitment is the key to cyber resilience.
Without it, it is very difficult to establish or enforce effective processes. Top management
must be prepared to invest in appropriate cybersecurity resources, such as awareness
training.
 Password management: - Almost half of the UK population uses ‘password’, ‘123456’ or
‘qwerty’ as their password. You should implement a password management policy that
provides guidance to ensure staff create strong passwords and keep them secure.

Types of cybersecurity threats


 Ransomware: - It is a type of malicious software. It is designed to extort money by
blocking access to files or the computer system until the ransom is paid. Paying the
ransom does not guarantee that the files will be recovered or the system restored.
 Malware:- itis a type of software designed to gain unauthorized access or to cause
damage to a computer.
 Social engineering: - it is a tactic that adversaries use to trick you into revealing sensitive
information. They can solicit a monetary payment or gain access to your confidential
data. Social engineering can be combined with any of the threats listed above to make
you more likely to click on links, download malware, or trust a malicious source.
 Phishing: - it is the practice of sending fraudulent emails that resemble emails from
reputable sources. The aim is to steal sensitive data like credit card numbers and login
information. It’s the most common type of cyber-attack. You can help protect yourself
through education or a technology solution that filters malicious emails.

Benefits of utilizing cybersecurity include:


 Business protection against malware, ransomware, phishing, and social engineering.
 Protection for data and networks.
 Prevention of unauthorized users.
 Improves recovery time after a breach.
 Protection for end-users.
 Improved confidence in the product for both developers and customers.
Three commonly known cybersecurity vendors include Cisco, McAfee, and Trend Micro.

7.9. Additive manufacturing (3D Printing)


Three-dimensional printing is a process under development at MIT for the rapid and flexible
production of prototype parts, end-use parts, and tools directly from a CAD model. 3D printing”

57
is much broader, but the term is often associated with filament-based plastic printers, which are
the pride and joy of many a hobbyist and self-described maker. But there are also binder jet
printers, laser metal 3D printers, as well as glass and clay 3D printers
Additive manufacturing (AM) describes types of advanced manufacturing that are used to create
three-dimensional structures out of plastics, metals, polymers and other materials that can be
sprayed through a nozzle or aggregated in a vat. These constructs are added layer by layer in
real-time based on digital design. The simplicity and low cost of AM machines, combined with
the scope of their potential creations, could profoundly alter global, local economies and affect
international security.

Review Questions
1. What is nanotechnology? Write down some applications of nanotechnology?
2. Briefly explain biotechnology and its importance in agriculture, medicine, and the
environment?
3. What is Blockchain technology? Briefly explain how it works?
4. Briefly explain cloud and quantum computing?
5. What is autonomic computing? Write down some of its characteristics?
6. What is Computer vision? List down some real-world applications?
7. Briefly explain embed systems and their components?
8. What is cybersecurity? List some cybersecurity treats? Write down the advantages of
cybersecurity?
9. Briefly explain additive manufacturing?

58
Bibliography

E. S. Ruiz and F. M. U. R. Perez, “German carro fernandez, sergio martin gutierrez, elio
sancristobal ruiz, francisco mur perez, and manuel castro gil ©,” no. June, pp. 51–58, 2012.

F. Griffiths and M. Ooi, “The fourth industrial revolution - Industry 4.0 and IoT [Trends in
Future I&M],” IEEE Instrum. Meas. Mag., vol. 21, pp. 29–43.

M. Maier, S. Member, and M. Lévesque, “Dependable Fiber-Wireless ( FiWi ) Access Networks


and Their Role in a Sustainable Third Industrial Revolution Economy,” vol. 63, no. 2, pp. 386–
400, 2014.

S. Product, “Revolution Impact : Technology,” no. April, pp. 51–56, 2017.

J. Y. Park, J. Song, E. Seol, M. Seok, and K. Song, “MON-PO326: Constructing Standardized


Nursing Practice on Korean Nutrition Support Nurses,” Clin. Nutr., vol. 38, no. 2019, pp. S178–
S179.

J. Hoerni, “Semiconductors and the second industrial revolution,” pp. 38–39, 1982.

C. Production, “YEAR 6 : THE INDUSTRIAL REVOLUTION ( 6 lessons ) Lesson 1.


Introduction to the Industrial Revolution.”

J. Wan et al., “Software-Defined Industrial Internet of Things in the Context of Industry 4. 0,”
vol. 16, no. 20, pp. 7373–7380, 2016.

H. Xu, W. Yu, D. Griffith, and N. Golmie, “A Survey on Industrial Internet of Things : A Cyber-
Physical Systems Perspective,” IEEE Access, vol. PP, no. c, p. 1, 2018.

Data Science: A Comprehensive Overview LONGBING CAO, University of Technology


Sydney, Australia 2017

Smith, F.J., Data science as an academic discipline. Data Science Journal, 5, 2006. pp.163–164.

Mike Loukides, “What is Data Science?”, O’Reilly Media, Inc.”2011. pp10-22.

Thomas L. Floyd, “Digital Fundamentals with PLD Programming”, Pearson Prentice Hall, 2006,

Prakash G. Gupta, “Data Communications and Computer Networking”, Prentice-Hall, 2006 139

Martin L. Shoemaker, “Human-Machine Interface”, Independently Published, 2019

“An Introduction to Big Data Concepts and Terminology” [Online]. Available :


https://www.digitalocean.com/community/tutorials/an-introduction-to-big-data-concepts-and-
terminology [Accessed: September 7, 2019]

“Data Types: Structured vs. Unstructured Data” [Online]. Available:


https://www.bigdataframework.org/data-types-structured-vs-unstructured-data/ Accessed
September 7, 2019.

59
“What is Data Science? “https://datascience.berkeley.edu/about/what-is-data-science/ [Online].
Available : [Accessed: September 7, 2019]

“The Data Value Chain”https://opendatawatch.com/reference/the-data-value-chain-executive-


summary/ [Online]. Available : [Accessed: September 7, 2019]

“Big Data Analytics – Data Scientist”


https://www.tutorialspoint.com/big_data_analytics/data_scientist.htm [Online]. Available :
[Accessed: September 7, 2019]

“Introduction of Artificial Intelligence - Javatpoint,” www.javatpoint.com. [Online]. Available:


https://www.javatpoint.com/introduction-to-artificial-intelligence. [Accessed: 07-Nov-2019].

“Artificial Intelligence | An Introduction,” GeeksforGeeks, 08-Sep-2017.

“An introduction to Artificial Intelligence.” [Online]. Available:


https://hackernoon.com/understanding-understanding-an-intro-to-artificial-intelligence-
be76c5ec4d2e. [Accessed: 07-Nov-2019].

“AI Overview,” Snips. [Online]. Available: https://snips.ai/content/intro-to-ai/#device-metrics.


[Accessed: 07-Nov-2019].

“History of Artificial Intelligence - Javatpoint,” www.javatpoint.com. [Online]. Available:


https://www.javatpoint.com/history-of-artificial-intelligence. [Accessed: 08-Nov-2019].

“Top 15 Artificial Intelligence Platforms - Compare Reviews, Features, Pricing in 2019,” PAT
RESEARCH: B2B Reviews, Buying Guides & Best Practices, 15-Jul-2019. [Online]. Available:
140

https://www.predictiveanalyticstoday.com/artificial-intelligence-platforms/. [Accessed: 08-Nov-


2019].

“Best AI Platforms Software in 2019 | G2.” [Online]. Available:


https://www.g2.com/categories/ai-platforms. [Accessed: 08-Nov-2019].

Brewster, C., Roussaki, I., Kalatzis, N., Doolin, K., & Ellis, K. (2017). IoT in agriculture:
Designing a Europe-wide large-scale pilot. IEEE communications magazine, 55(9), 26-33.

Ramakrishna, G.Kiran Kumar, A.Mallikarjuna Reddy, Pallam Ravi (2018). A Survey on various
IoT Attacks and its Countermeasures. International Journal of Engineering Research in
Computer Science and Engineering (IJERCSE), 5(4), 2394-2320.

Elijah, O., Rahman, T. A., Orikumhi, I., Leow, C. Y., & Hindia, M. N. (2018). An overview of
the Internet of Things (IoT) and data analytics in agriculture: Benefits and challenges. IEEE
Internet of Things Journal, 5(5), 3758-3773.

60
Elijah, O., Rahman, T. A., Orikumhi, I., Leow, C. Y., & Hindia, M. N. (2018). An overview of
the Internet of Things (IoT) and data analytics in agriculture: Benefits and challenges. IEEE
Internet of Things Journal, 5(5), 3758-3773.

Foote, K. D. (2016). A brief history of the internet of things. Data Education for Business and IT
Professionals. Available online: http://www. diversity. net/brief-history-internet-things/
(accessed on 12 November 2018).

Gupta, B. B., & Quamara, M. (2018). An overview of the Internet of Things (IoT): Architectural
aspects, challenges, and protocols. Concurrency and Computation: Practice and Experience,
e4946.

John Terra (2019). Everything You Need to Know About IoT Applications.
https://www.simplilearn.com/iot-applications-article

Mohamed, K. S. (2019). The Era of Internet of Things: Towards a Smart World. In the Era of
Internet of Things (pp. 1-19). Springer, Cham.

Vyas, D. A., Bhatt, D., & Jha, D. (2015). IoT: trends, challenges, and future scope. IJCSC, 7(1),
186-197. 141

Antonioli, M., Blake, C., & Sparks, K. (2014). Augmented reality applications in education. The
Journal of Technology Studies, 96-107.

Chavan, S. R. (2016). Augmented Reality Vs Virtual Reality: Differences and Similarities.


International Journal of Advanced Research in Computer Engineering & Technology
(IJARCET), 5(6).

Håkansson, L. (2018). Virtual and Augmented Reality in Marketing.

Kipper, G., & Rampolla, J. (2012). Augmented Reality: an emerging technologies guide to AR.
Elsevier.

Kirner, C., Cerqueira, C., & Kirner, T. (2012). Using augmented reality artifacts in education and
cognitive rehabilitation. Virtual Reality in Psychological, Medical and Pedagogical Applications
2 Will-be-set-by-IN-TECH, 247-270.

Margetis, G., Papagiannakis, G., & Stephanidis, C. (2019). Realistic Natural Interaction with
Virtual Statues in X-Reality Environments. International Archives of the Photogrammetry,
Remote Sensing and Spatial Information Sciences, 42(2/W11).

Thimbleby, H. (2013). Technology and the future of healthcare. Journal of public health
research, 2(3).

Thomas, B. H. (2012). A survey of visual, mixed, and augmented reality gaming. Computers in
Entertainment (CIE), 10(1), 3.

“Ethics and new technologies.” [Online]. Available:

61
https://www.icaew.com/technical/ethics/ethics-and-new-technologies. [Accessed: 25-Aug-2019].

J. Weckert and R. Lucas, Professionalism in the Information and Communication Technology


Industry. Canberra: ANU Press, 2013.

“Code of Ethics,” PROFESSIONAL CERTIFICATIONS FOR EMERGING TECH. [Online].


Available: http://iccp.org/code-of-ethics.html. [Accessed: 25-Aug-2019].

“IT Privacy Policy, Office of Privacy and Open Government, U.S. Department of Commerce.”
[Online]. Available: http://www.osec.doc.gov/opog/privacy/digital_policy.html. [Accessed: 25-
Aug-2019]. 142

“As technology advances, will accountability be a casualty?” [Online]. Available:


https://www.ey.com/en_gl/banking-capital-markets/as-technology-advances-will-accountability-
be-a-casualty. [Accessed: 02-Sep-2019].

“How can you build trust when emerging technologies bring new risks?” [Online]. Available:
https://www.ey.com/en_gl/digital/how-can-you-build-trust-when-emerging-technologies-bring-
new-risks. [Accessed: 02-Sep-2019].

“What comes after those ellipses?,” BusinessDictionary.com. [Online]. Available:


http://www.businessdictionary.com/definition/accountability.html. [Accessed: 08-Sep-2019].

“‘Emerging Technologies are Already Impacting Security Strategies,’” IFSEC India, 11-Jan-
2019. [Online]. Available: https://www.ifsec.events/india/visit/news-and-updates/emerging-
technologies-are-already-impacting-security-strategies. [Accessed: 02-Sep-2019].

C. Lovatt, “5 Big Technology Challenges For Enterprises In The Future.” [Online]. Available:
https://blog.cutover.com/technology-challenges-enterprises-future. [Accessed: 08-Sep-2019].

“What are the ethical implications of emerging tech?,” World Economic Forum. [Online].
Available: https://www.weforum.org/agenda/2015/03/what-are-the-ethical-implications-of-
emerging-tech/. [Accessed: 25-Aug-2019].

B. Dainow, “Ethics in Emerging Technology,” ITNOW, vol. 56, pp. 16–18, Aug. 2014.

“7 Emerging Technology Risks,” Risk & Insurance, 04-Aug-2014. [Online]. Available:


https://riskandinsurance.com/7-emerging-tech-risks/. [Accessed: 08-Sep-2019].

“12 Examples of Artificial Intelligence: AI Powers Business.” [Online]. Available:


https://www.datamation.com/artificial-intelligence/examples-of-artificial-intelligence.html.
[Accessed: 09-Nov-2019].

“What is Nanotechnology? | Nano.” [Online]. Available: https://www.nano.gov/nanotech-


101/what/definition. [Accessed: 08-Sep-2019].

“How Nanotechnology Works,” HowStuffWorks, 25-Oct-2007. [Online]. Available:


https://science.howstuffworks.com/nanotechnology.htm. [Accessed: 08-Sep-2019]. 143

62
“Nanotechnology - Definition, and Introduction. What is nanotechnology?” Nanowerk. [Online].
Available:
https://www.nanowerk.com/nanotechnology/introduction/introduction_to_nanotechnology_1.ph
p. [Accessed: 08-Sep-2019].

“Nanotechnology Applications | Nanotechnology Uses.” [Online]. Available:


https://www.understandingnano.com/nanotech-applications.html. [Accessed: 08-Sep-2019].

R. M. Divya TN, “Applications of Nanotechnology,” J. Nanomedicine Biotherapeutic Discov.,


vol. 05, no. 01, 2015.

“What is Biotechnology?” BIO. [Online]. Available: https://www.bio.org/what-biotechnology.


[Accessed: 08-Sep-2019].

C. Fossen, “What is Biotechnology? - Department of Biotechnology and Food Science.”


[Online]. Available: https://www.ntnu.edu/ibt/about-us/what-is-biotechnology. [Accessed: 08-
Sep-2019].

“Benefits & Risks of Biotechnology,” Future of Life Institute. [Online]. Available:


https://futureoflife.org/background/benefits-risks-biotechnology/. [Accessed: 08-Sep-2019].

“Biotechnology and its Applications - Study Material for NEET (AIPMT) & Medical Exams |
askIITians.” [Online]. Available: /biology/biotechnology-and-its-applications/. [Accessed: 08-
Sep-2019].

“What is Blockchain Technology? A Step-by-Step Guide for Beginners,” Blockgeeks, 18-Sep-


2016. [Online]. Available: https://blockgeeks.com/guides/what-is-blockchain-technology/.
[Accessed: 23-Nov-2019].

“5 applications for blockchain in your business.” [Online]. Available:


https://execed.economist.com/blog/industry-trends/5-applications-blockchain-your-business.
[Accessed: 08-Sep-2019].

L. Fortney, “Blockchain Explained,” Investopedia. [Online]. Available:


https://www.investopedia.com/terms/b/blockchain.asp. [Accessed: 08-Sep-2019].

“What is Quantum Cloud Computing?” [Online]. Available: http://quantumly.com/quantum-


cloud-computer-computing.html. [Accessed: 08-Sep-2019]. 144

A. Müller, L. O’Brien, M. Klein, and B. Wood, “Autonomic Computing,” p. 61.

“What is autonomic computing? - Definition from WhatIs.com,” WhatIs.com. [Online].


Available: https://whatis.techtarget.com/definition/autonomic-computing. [Accessed: 02-Sep-
2019].

63
M. Parashar and S. Hariri, “Autonomic Computing: An Overview,” in Unconventional
Programming Paradigms, vol. 3566, J.-P. Banâtre, P. Fradet, J.-L. Giavitto, and O. Michel, Eds.
Berlin, Heidelberg: Springer Berlin Heidelberg, 2005, pp. 257–269.

C. R. Krishna, “Computer Vision: Foundations and Applications,” p. 213.

“Computer Vision: What it is and why it matters.” [Online]. Available:


https://www.sas.com/en_us/insights/analytics/computer-vision.html. [Accessed: 02-Sep-2019].

R. Szeliski, “Computer Vision: Algorithms and Applications,” p. 979.

“Embedded Systems - Overview - Tutorialspoint.” [Online]. Available:


https://www.tutorialspoint.com/embedded_systems/es_overview.htm. [Accessed: 02-Sep-2019].

“What is Cyber Security? | IT Governance UK.” [Online]. Available:


https://www.itgovernance.co.uk/what-is-cybersecurity. [Accessed: 02-Sep-2019].

D. J. Pande, “Introduction to Cyber Security,” p. 152.

“Cybersecurity: Threats, Challenges, Opportunities,” p. 72.

“What Is Cybersecurity?” Cisco. [Online]. Available:


https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html. [Accessed: 02-Sep-
2019].

“What is Cybersecurity? - Definition from WhatIs.com,” SearchSecurity. [Online]. Available:


https://searchsecurity.techtarget.com/definition/cybersecurity. [Accessed: 02-Sep-2019].

“3D Printing and Additive Manufacturing – What’s the Difference?” All3DP, 24-Jan-2019.
[Online]. Available: https://all3dp.com/2/3d-printing-and-additive-manufacturing-what-s-the-
difference/. [Accessed: 02-Sep-2019].

T. Johnston, T. Smith, and J. Irwin, Additive Manufacturing in 2040: Powerful Enabler,


Disruptive Threat. RAND Corporation, 2018. 145

B.-H. Lu, H.-B. Lan, H.-Z. Liu, 1State Key Laboratory for Manufacturing System Engineering,
Xi’an Jiao Tong University, Xi’an 710049, China, 2Qingdao Engineering Research Center for
3D Printing, Qingdao University of Technology, Qingdao 266033, China, and
3Nanomanufacturing and Nano-Optoelectronics Lab, Qingdao University of Technology,
Qingdao 266033, China, “Additive manufacturing frontier: 3D printing electronics,” Opto-
Electron. Adv., vol. 1, no. 1, pp. 17000401–17000410, 2018.

64

You might also like