0% found this document useful (0 votes)
59 views23 pages

Support System For Industry4.0

Cyber security is important for Industry 4.0 as it involves protecting computer systems, networks and data from cyber attacks and unauthorized access. Key aspects of Industry 4.0 that rely on strong cyber security include cloud computing, the internet of things (IoT), artificial intelligence, and cyber physical systems which increasingly connect physical infrastructure to networks and the internet. Without proper cyber security measures, these systems could be vulnerable to attacks that access or disrupt sensitive information, operations, and business processes.

Uploaded by

sindhu yamsani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views23 pages

Support System For Industry4.0

Cyber security is important for Industry 4.0 as it involves protecting computer systems, networks and data from cyber attacks and unauthorized access. Key aspects of Industry 4.0 that rely on strong cyber security include cloud computing, the internet of things (IoT), artificial intelligence, and cyber physical systems which increasingly connect physical infrastructure to networks and the internet. Without proper cyber security measures, these systems could be vulnerable to attacks that access or disrupt sensitive information, operations, and business processes.

Uploaded by

sindhu yamsani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 23

Support System for Industry

4.0
Terms and Technologies used in Fourth Industry
Revolution (Industry 4.0)
aspects
• There are hundreds of concepts, terms & technologies that relate to
the Industry 4.0, but the following are some important and
foundational concepts
1. Big Data:
• Big data is a collection of data that is large or very huge in size,
which is fast and complex in nature which is being collected from
various data sources and it has different formats.

• the traditional data-processing application cannot process Big Data


as it deals with data sets which are large and complex,

• Lot of data is being captured through out the world but how to use
this data is important and this data should not go waste, this Big
Data should be analysed so that some valuable information can be
extracted from it, which will be useful for the business and people
for various operations and work.
❖Characteristics of Big Data are:
• Volume
• Velocity
• Variety
• Veracity

Volume
• Volume refers to the size of the data. The size of Big Data is huge
• Huge volumes of data is being generated on a daily basis from
various sources like: Social Media Platforms, Networks, Human
interactions, Business processes
• Such a large amount of data stored in Data Warehouses.
Velocity
• Velocity refers to the speed at which the data is being generated or
created in real-time
• It comprises the rate of change of data, linking of incoming datsets
at varying speeds etc.

Variety
• Variety of Big Data refers to the type of data that is being gathered
from various sources
• The Big Data may be structured, unstructured and semi-structured
data
• In past, data could only be collected from the excel
sheets(spreadsheets) and databases, but today data comes in an
array of forms such as emails, PDF’s, photos, videos, audios,
Social Media posts and much more.
Veracity
• Veracity refers to the quality of the data, how accurate the data is
very important. How trustworthy the data is, is the data from the
right source, type etc.

• Quality of data is important for accurate analysis of data.


Sometimes data may be noisy, abnormal, biased.

• Try to keep the data clean without having any incomplete and
irrelevant and noisy data

• Big data cannot be processed using the traditional databases but it


can be processed using the NO SQL databases.

• No SQL databases can store data in any form like text, images,
logos, other formats such as XML. There several types of NO SQL
databases and tools available to store and process Big Data
2. Cloud Computing:
• Cloud computing is on demand delivery of different services through
the internet from cloud.

• In the simplest terms, cloud computing means storing and accessing


data and programs over the internet instead of your computers hard
drive. (All Hardware and Software services from a provider on the
internet).

• These services include: Storage, databases, networking software,


servers, applications, processing power, hardware services.

• Cloud works on the concept of pay as you use. which helps in


lowering operating costs and runs infrastructure more efficiently and
helps in scale and improve business requirements or needs change.

• These services are provided by Cloud service providers


❖Benefits of the cloud are
• Reduces the cost
• Speed
• Productivity
• Performance
• Reliability
• Global scale
• Security
3. Internet of Things (IoT):
• The Internet of Things (IoT) is the network of physical objects
—“things”—that are embedded with sensors, software, and other
technologies for connecting and exchanging data with other devices and
systems over the internet.

• These devices range from ordinary household objects to sophisticated


industrial tools. With more than 7 billion connected IoT devices today,
experts are expecting this number to grow to 12 billion by 2022 and 22
billion by 2025.

• Interrelated, internet-connected objects that are able to collect and


transfer data over a wireless network without human intervention.

• IoT is made possible with the convergence of Artificial Intelligence (AI),


embedded systems, machine learning, wireless sensor networks,
commodity sensors, real-time analytics, and automation among other
things.
4. Artificial intelligence:
• Artificial intelligence (AI) is wide-ranging branch of computer science.

• Artificial intelligence giving intelligence to machines so that they think


humans and perform tasks .

• artificial intelligence (AI) refers to the simulation of human intelligence


in machines that are programmed to think like humans and mimic their
actions.

• Artificial intelligence enables computers and machines to mimic the


perception, learning, problem-solving, and decision-making capabilities
of the human mind. machines will learn from experience, adjust to new
inputs and perform human-like tasks.
examples:
• chess-playing computers
• self-driving cars
5. Cyber physical systems (cps):
• The Cyber Physical System consists of cyber components and physical
components, so we call it as cyber physical system.

• CPS is based on an information processing computer system, which is


embedded into a product, like a car, plane or other device. These
computer systems are used to perform specific tasks.

• Cyber-physical systems are integrations of sensing, computation,


control ,networking and physical objects and infrastructure,
connecting them to the Internet and to each other and also networks
monitor and control the physical processes.

For Example, in a car an embedded system would be the ABS (Anti-


lock / Anti-Skid Braking System) to control break force. This computer
system interacts with the physical environment by means of Sensors
and Actuators.
• These systems will provide the foundation of our critical infrastructure,
form the basis of emerging and future smart services, and improve our
quality of life in many areas.

❖Examples:
⮚ Personalized health care and medicines
⮚ emergency response,
⮚ traffic flow management
⮚Transportation and energy
⮚CPS are  helping firefighters detect and deter fires
⮚Improving agricultural practices.
⮚ Enabling scientists to mitigate underwater oil spills.

• Advances in cyber-physical systems will enable capability,


adaptability, scalability, resiliency, safety, security and usability that
will far exceed the simple embedded systems of today.
6.Augmented Reality:

• Augmented reality is a combination of a real scene viewed by a user


and a virtual scene generated by a computer that augments the scene
with additional information.

• An Augmented Reality system add the virtual computer generated


objects, audio and other sense enhancements to real world
environment in real time .

• So, Augmented reality can be defined as a system that fulfills the basic
features:
1. combination of real and virtual worlds
2. real time interactions.
3. accurate 3D registration of virtual and real objects.
7. Virtual reality:
• Virtual Reality (VR) is a computer-generated environment with scenes
and objects that appear to be real, making the user feel they are
immersed in their surroundings.

• It is fully immersive and everything we see is part of an environment


artificially constructed through images, sounds, etc.

•  This environment is perceived through a device known as a Virtual


Reality headset or helmet.

• But AR does not create a fully immersive experience. augmented reality


(AR), enhances the real world i.e our own world becomes the
framework within which graphical objects, images or similar are placed. 

• Everything we see is in a real environment and it may not be strictly


necessary to wear a headset.
8. Additive Manufacturing:
• Additive Manufacturing also called 3D- printing.

• It is the process of construction of three dimensional object from


computer aided design(CAD) model or a digital 3D- model.

• This 3D-printing is the ability to produce very complex shapes or


geometries that would be otherwise impossible to construct by hand
,including hollow parts or parts with internal truss structures to reduce
weight.

• Additive Manufacturing uses CAD software or 3D-object scanner which


will direct hardware to deposit material layer upon layer in the precise
geometric shapes.

• Benefits: i) decreases prototyping times and costs.


9.Cyber Security:

• Cyber security can be described as the collective methods,


technologies, and processes to help protect the confidentiality,
integrity, and availability of computer systems, networks and data,
against cyber-attacks or malicious attacks and unauthorized access.

• These cyber attacks are usually aimed at accessing, changing, or


destroying sensitive information; extorting money from users; or
interrupting normal business processes.

You might also like