CH 7
CH 7
Nanotechnology
Biotechnology
Block-chain technology
Computer vision
Embedded systems
• Nanoscience and nanotechnology are the study and application of extremely small
things.
• They can be used across all the other science fields, such as chemistry, biology,
physics, materials science, and engineering.
• The ideas and concepts behind nanoscience and nanotechnology started by physicist
Richard Feynman at an American Physical Society during December 29, 1959, long
before the term nanotechnology was used.
cont. ..
• Over a decade later,the term nanotechnology coined by Professor Norio Taniguchi
while his explorations of ultraprecision machining.
i. Nanomaterials have a relatively larger surface area when compared to the same
mass of material produced in a larger form. Which can make materials more
chemically reactive and affect their strength or electrical properties.
ii. Quantum effects can begin to dominate the behavior of matter at the nanoscale
particularly at the lower end which affecting the optical, electrical and magnetic
behavior of materials.
cont. ..
Biotechnology
• It is technology based on biology - biotechnology harnesses cellular and
biomolecular processes to develop technologies and products that help improve our
lives and the health of our planet.
• Brewing and baking bread are examples of processes that fall within the concept of
biotechnology which is the traditionalone.
Agriculture (Green Biotechnology):- contributed a lot to modify the genes of the organism
known as Genetically Modified Organisms such as Crops, Animals, Plants, Fungi, Bacteria, etc.
Aquaculture Fisheries:- improving the quality and quantity of fishes. They breed them selfs by
gonadotropin-releasing hormone.
• Each block contains a cryptography hash of the previous block, a timestamp, and
transaction data (generally represented as a Merkle tree).
• . Each of these blocks of data (i.e. block) is secured and bound to each other using
cryptographic principles (i.e. chain).
cont. ..
• “Blocks” on the blockchain are made up of digital pieces of information.
Specifically, they have three parts:
i. Blocks store information about transactions like the date, time, and dollar
amount.
iii. Blocks store information that distinguishes them from other blocks.
iv. That block must be given a hash.:- once all of a block’s transactions have been
verified, it must be given a unique, identifying code called a hash. Once hashed,
the block can be added to the blockchain
cont. ..
• By design, a blockchain is resistant to modification of the data.
• It is "an open, distributed ledger that can record transactions between two parties
efficiently and in a verifiable and permanent way".
• The blockchain is a simple yet ingenious way of passing information from A to B in a fully
automated and safe manner. The main activities performed are:-
One party to a transaction initiates the process by creating a block.
Falsifying a single record would mean falsifying the entire chain in millions of
instances.
cont. ..
Three Pillars of Blockchain Technology
i. Decentralization :-
identity is secure, you will still see all the string of any length and giving out an
transactions that were done by their public output of a fixed length by using hashing
address algorithm (Bitcoin uses SHA-256).
cont.
No matter how big or small your input is, the output will always have a fixed 256-bits length. Concider
the following example.
This becomes critical when you are dealing with a huge amount of data and transactions.
So instead of remembering the input data which could be huge, you can just
remember the hash and keep track.
cont. ..
How Blockchain Works
Then imagine that this network is designed to regularly update this spreadsheet and you
have a basic understanding of the blockchain.
The blockchain is immutable, so no one can tamper with the data that is inside
the blockchain
The blockchain is transparent so one can track the data if they want.
cont. ..
Why do people use the peer-to-peer network?
One of the main uses of the peer-to-peer network is file sharing, also called
torrenting.If you are to use a client-server model for downloading, then it is
usually extremely slow and entirely dependent on the health of the server. Plus, as
we said, it is prone to censorship.
In a peer-to-peer system, there is no central authority, and hence if even one of the
peers in the network goes out of the race, you still have more peers to download
from.
Crowdfunding
Governance
File storage
Cloud and quantum computing
• Cloud computing :- is a means of networking remote servers that are hosted on the
Internet. Rather than storing and processing data on a local server, or a PC's hard drive,
one of the following three types of cloud infrastructure is used.
i. public cloud:- Here a third-party provider manages the servers, applications, and
storage much like a public utility. Anyone can subscribe to the provider’s cloud
service, which is usually operated through their own data center.
iii. hybrid cloud:- Here private clouds are connected to public clouds, allowing data and
applications to be shared between them. It includes multiple service providers .
cont. ..
• a hybrid offers a business more flexibility and more computing capacity for a business
application when the need for its spikes.
• Hybrids also enable applications to keep sensitive client data in a private cloud but connect to
end-user software in a public cloud.
• Cloud computing services can focus on infrastructure, web development or a cloud-based app.
• . Infrastructure as a Service (IaaS) gives you management of the whole deal: servers, web
development tools, applications.
• Platform as a Service (PaaS) offers a complete web development environment, without the
worry of the hardware that runs it.
cont. ..
• Finally, Software as a Service (SaaS) allows access to cloud-based apps, usually through a web browser
interface.
• It’s only in the last 10 years ( around since 2000.) that major players like IBM, Amazon, and Google have
offered commercially viable, high-capacity networks.
Allows you and multiple users to access your data from any location
• Unlike classic computers, they derive their computing power by harnessing the power of
quantum physics.
• Give clients access to a quantum computer over the internet, and you have quantum cloud
computing.
• Currently, the only organization which provides a quantum computer in the cloud is
IBM. They allow free access to anyone who wishes to use their 5-qubit machine. Qubit is
short for a sequence of quantum bits.
• Quantum computer theory was first rooted in the 1980s and only now are the first
rudimentary machines being constructed.
• Quantum computing could help in the discovery of new drugs, by unlocking the
complex structure of chemical molecules. Other uses include financial trading, risk
management, and supply chain optimization.
Autonomic computing (AC)
• Autonomic computing (AC) is an approach to address the complexity and evolution
problems in software systems.
• It is a self-managing computing model named after, and patterned on, the human body's
autonomic nervous system.
• The goal of autonomic computing is to create systems that run themselves, capable of
high-level functioning while keeping the system's complexity invisible to the user.
Characteristics of Autonomic Systems
• Self-Awareness: An autonomic application/system “knows itself” and is aware of its state and its
behaviors.
• Self-Healing: An autonomic application/system should be able to detect and recover from potential
problems and continue to function smoothly.
• Computer vision tasks include methods for acquiring, processing, analyzing and
understanding digital images, and extraction of high-dimensional data from the real world
in order to produce numerical or symbolic information, e.g. in the forms of decisions.
• Computer vision is building algorithms that can understand the content of images and
use it for other applications.
How computer vision works
• Easily Customizable
• Low cost
• Enhanced performance
• A-D Converter − An analog-to-digital converter converts the analog signal sent by the sensor into a
digital signal.
• Processor & ASICs − Processors process the data to measure the output and store it to the memory.
• D-A Converter − A digital-to-analog converter converts the digital data fed by the processor to
analog data.
• Actuator − An actuator compares the output given by the D-A Converter to the actual (expected)
output stored in it and stores the approved output.
Cybersecurity
• It is the protection of computer systems from the theft of or damage to their
hardware, software, or electronic data, as well as from the disruption or misdirection
of the services they provide.
• Application security
• Network security
• Leadership commitment.
• Password management
Types of cybersecurity threats
• Ransomware: - It is a type of malicious software. It is designed to extort money by
blocking access to files or the computer system until the ransom is paid. Paying the
ransom does not guarantee that the files will be recovered or the system restored.
• Social engineering: - it is a tactic that adversaries use to trick you into revealing
sensitive information. They can solicit a monetary payment or gain access to your
confidential data.
…cont
• Phishing: - it is the practice of sending fraudulent emails that resemble emails
from reputable sources. The aim is to steal sensitive data like credit card numbers
and login information. It’s the most common type of cyber-attack.
• You can help protect yourself through education or a technology solution that
filters malicious emails.
Benefits of cybersecurity
• Business protection against malware, ransomware, phishing, and social
engineering.
• Cisco
• McAfee
• Wikipedia- “Today, the precision, repeatability, and material range has increased
to the point that 3D printing is considered as industrial production technology,
with the name of additive manufacturing.”
• It is less about the 3D printer itself, and more about the manufacturing process
transformed by 3D printing.