[go: up one dir, main page]

0% found this document useful (0 votes)
84 views13 pages

Chapter 3 Notes

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 13

CHAPTER-3

EMERGING TRENDS
Introduction:
Emerging trends are the state-of-the-art technologies, which
gain popularity and set a new trend among users.
some emerging trends that will make a huge impact (in the
future) on digital economy and interaction in digital societies.
1. Artificial Intelligence (AI):
▪ Artificial Intelligence endeavors to simulate the natural
intelligence of human beings into machines, thus making
them behave intelligently.
▪ An intelligent machine is supposed to imitate some of the
cognitive functions of humans like learning, decision making
and problem solving.
▪ Examples: The intelligent digital personal assistants like Siri,
Google Now, Cortana, Alexa are all powered by AI.

2. What is a Knowledge base:


A knowledge base is a store of information consisting of
facts, assumptions and rules which an AI system can use for
decision making.

Krithika Sivakumar, Department of Computer Science


3. Machine Learning:
▪ Machine Learning is a subsystem of Artificial
Intelligence, wherein computers have the ability to
learn from data.
▪ It comprises algorithms that use data to learn on their
own and make predictions.
▪ These algorithms called models.
▪ These models are first trained and tested using a
training data and testing data, after that they are used
to make predictions about new and unknown data.

4. What is Natural Language Processing (NLP):


▪ It deals with the interaction between human and
computers using human spoken languages, such as
Hindi, English, etc.
▪ An NLP system can perform text-to speech and speech-
to-text conversion.
▪ Machine translation is a rapidly emerging field where
machines are already able to translate texts from one
language to another with fair amount of correctness.
▪ Another emerging application area is automated
customer service where a computer software can
interact with customers to serve their queries or
complaints.

Krithika Sivakumar, Department of Computer Science


5. What is Immersive Experiences?
▪ Immersive experiences allow us to visualize, feel and
react by stimulating our senses.
▪ It enhances our interaction and involvement, making
them more realistic and engaging.
▪ Immersive experiences have been used in the field of
training, such as driving simulators, flight simulator etc.
▪ Immersive experience can be achieved using virtual
reality and augmented reality.

A)What is virtual Reality?


▪ Virtual Reality (VR) is a three-dimensional, computer-
generated situation that simulates the real world.
▪ The user can interact with and explore that environment by
getting immersed in it while interacting with the objects and
other actions of the user.
▪ At present, it is achieved with the help of VR Headsets.
▪ Its application in military training, medical procedures,
entertainment, social science and psychology, engineering
and other areas where simulation is needed for a better
understanding and learning.

b) Augmented Reality:
▪ The superimposition of computer generated perceptual
information over the existing physical surroundings is called
as Augmented Reality (AR).

Krithika Sivakumar, Department of Computer Science


▪ It adds components of the digital world to the physical
world, along with the associated tactile and other sensory
requirements, thereby making the environment interactive
and digitally manipulable.
Note: Unlike Virtual Reality, the Augmented Reality does not
create something new, it just alters or augments the
perception of the underlying physical world through
additional information.

6. Robotics:
Robotics is an interdisciplinary branch of technology
requiring applications of mechanical engineering,
electronics, and computer science, among others. Robotics
is primarily concerned with the design, fabrication,
operation, and application of robots.

7. ROBOT:
▪ A robot is basically a machine capable of carrying out
one or more tasks automatically with accuracy and
precision.
▪ it can follow the instructions given through computer
programs
▪ Sensors are one of the prime components of a robot.
▪ Robot can be of many types, such as wheeled robots,
legged robots, manipulators and humanoids.
▪ Robots that resemble humans are known as
humanoids.

Krithika Sivakumar, Department of Computer Science


8. Application of Robot:
▪ Robots are being used in industries, medical science,
bionics, scientific research, military, etc.
▪ NASA’s Mars Exploration Rover (MER) mission is a robotic
space mission to study about the planet Mars.
▪ Sophia is a humanoid that uses artificial intelligence, visual
data processing, facial recognition and also imitates human
gestures and facial expressions.
▪ A drone is an unmanned aircraft which can be remotely
controlled or can fly autonomously through software-
controlled flight plans in their embedded systems, working
in conjunction with onboard sensors and GPS.

9. BIG DATA:
▪ With technology making an inroad into almost every
sphere of our lives, This results in the generation of
data sets of enormous volume and complexity called
Big Data.
▪ Big Data not only represents voluminous data, it also
involves various challenges like integration, storage,
analysis, searching, processing, transfer, querying and
visualization of such data.
▪ Big data sometimes hold rich information and
knowledge which is of high business value, and
therefore there is a keen effort in developing software
and methods to process and analyses big data.

Krithika Sivakumar, Department of Computer Science


10. Characteristics of Big Data:
Big data exhibits following five characteristics.
A) Volume: The most prominent characteristic of big data is
its enormous size. If a particular dataset is of such large size
that it is difficult to process it with traditional DBMS tools, it
can be termed as big data.

(B) Velocity: It represents the rate at which the data under


consideration are being generated and stored. Big data has
an exponentially higher rate of generation than traditional
data sets.

(C) Variety: It asserts that a dataset has varied data, such as


structured, semi-structured and unstructured data. Some
examples are text, images, videos, web-pages and so on.

(D) Veracity: Veracity refers to the trustworthiness of the


data because processing such incorrect data can give wrong
results or mislead the interpretations.

(E) Value: Big data is not only just a big pile of data, but also
possess to have hidden patterns and useful knowledge
which can be of high business value.

Krithika Sivakumar, Department of Computer Science


11. Data Analytics
Data analytics is the process of examining data sets in order
to draw conclusions about the information they contain,
with the aid of specialized systems and software.”
Uses:
▪ Commercial industries: To enable organizations to
make more informed business decisions.
▪ Science and technology: It can be useful for
researchers to verify or disprove scientific models,
theories and hypotheses.

12. Internet of Things (IoT):


▪ The ‘Internet of Things’ is a network of devices that
have an embedded hardware and software to
communicate (connect and exchange data) with other
devices on the same network.
▪ For example, if a microwave oven, an air conditioner,
door lock, CCTV camera or other such devices are
enabled to connect to the Internet, we can access and
remotely control them on-the-go using our
smartphone.
▪ Internet of Things offers farmers to access detailed
knowledge and valuable information of their soil
condition.
▪ The Internet of things can play an important role in the
management of road traffic in large cities.

Krithika Sivakumar, Department of Computer Science


13. Web of Things(WoT):
Web of Things (WoT) allows use of web services to connect
anything in the physical world, besides human identities on
web. It will pave way for creating smart homes, smart
offices, smart cities and so on.
14. Sensors:
▪ A smart sensor is a device that takes input from the physical
environment and uses built-in computing resources to
perform predefined functions upon detection of specific
input and then process data before passing it on.
▪ This is possible with the help of two sensors, namely
accelerometer and gyroscope (gyro).
▪ The accelerometer sensor in the mobile phones detects the
orientation of the phone. The Gyroscope sensors, tracks
rotation or twist of your hand and add to the information
supplied by the accelerometer.

15. SMART CITIES :

▪ The smart city makes use of computer and communication


technology along with IoT to manage and distribute
resources efficiently.
▪ Every sphere of life in a city like transportation systems,
power plants, water supply networks, waste management,
law enforcement, information systems, schools, libraries,
hospitals and other community, Smart city services work in

Krithika Sivakumar, Department of Computer Science


unison to optimize the efficiency of city operations and
services.
Example:

▪ The buildings of Smart City use sensors to detect


earthquake tremors and then warn nearby buildings so that
they can prepare themselves accordingly.
▪ The bridge of Smart City uses wireless sensors to detect any
loose bolt, cable or crack. It alerts concerned authorities
through SMS.
▪ The smart tunnel also uses wireless sensors to detect any
leakage or congestion in the tunnel.

16. Cloud Computing:

▪ Cloud computing is an emerging trend in the field of


information technology, where computer-based services are
delivered over the Internet or the cloud, and it is accessible
to the user from anywhere using any device.
▪ The services comprise software, hardware (servers),
databases, storage, etc.
▪ These resources are provided by companies called cloud
service providers and usually charge on a pay per use basis,
like the way we pay for electricity usage.
▪ Example: To store our photos and files in google
drive/google photos.

Krithika Sivakumar, Department of Computer Science


Advantages:
▪ cloud computing offers cost-effective, on-demand resources
▪ . A user can avail need-based resources from the cloud at a
very reasonable cost.

17. CLOUD SERVICES :

A “service” corresponds to any facility provided by the cloud.


There are three standard models to categorise different
computing services. These are
a. Infrastructure as a Service (IaaS) : The IaaS providers can offer
different kinds of computing infrastructure, such as servers,
virtual machines (VM), storage and backup facility, network
components, operating systems or any other hardware or
software.

b. Platform as a Service (PaaS) : PaaS provides a platform or


environment to develop, test, and deliver software applications.
To run Python and MySQL online, we can avail a pre-configured
Apache server from cloud having MySQL and Python pre-
installed. In PaaS, the user has complete control over the
deployed application and its configuration.

c. Software as a Service (SaaS) : SaaS provides on-demand


access to application software, usually requiring a licensing or
subscription by the user. While using Google Doc, Microsoft
Office 365, Drop Box, etc., to edit a document online, we use

Krithika Sivakumar, Department of Computer Science


SaaS from cloud. Government of India has embarked upon an
ambitious initiative — “GI Cloud” which has been named as
‘MeghRaj’ (https:// cloud.gov.in).

18. GRID COMPUTING :

A grid is a computer network of geographically dispersed and


heterogeneous computational resources. Unlike cloud, whose
primary focus is to provide services, a grid is more application
specific and creates a sense of a virtual supercomputer with an
enormous processing power and storage. Grid can be of two
types—
1. Data grid : used to manage large and distributed data having
required multi-user access
2. CPU or Processor grid : where processing is moved from one
PC to another as needed or a large task is divided into subtasks.

19. What is the difference between Grid computing and


IaaS cloud service?

In IaaS cloud service, there is a service provider who rents the


required infrastructure to the users.
Whereas in grid computing, multiple computing nodes join
together to solve a common computational problem.

Krithika Sivakumar, Department of Computer Science


20. Differentiate between cloud computing and grid
computing with suitable examples.

Cloud Computing Grid Computing

It follows Client Server It follows Distributed Computing


Architecture Architecture

More flexible Less flexible

User has to pay for the services User does not pay anything after the
he/she is using. setup.

Resources are managed centrally Resources are not managed centrally


in Cloud Computing in Cloud Computing

21. How to Set up a grid?


connecting numerous nodes in terms of data as well as CPU,
a middleware is required to implement the distributed
processor architecture. The Globus toolkit
(http://toolkit.globus.org/toolkit) is one such software
toolkit used for building grids, and it is open source. It
includes software for security, resource management, data
management, communication, fault detection, etc.

. 21. BLOCK CHAINS :


▪ The blockchain technology works on the concept of
decentralized and shared database where each computer
has a copy of the database.

Krithika Sivakumar, Department of Computer Science


▪ A block can be thought as a secured chunk of data or valid
transaction.
▪ Each block has some data called its header, which is visible
to every other node, while only the owner has access to the
private data of the block. Such blocks form a chain called
blockchain.
▪ .

22. Application of Blockchains:


▪ The most popular application of blockchains technology is in
digital currency.
▪ blockchains are being seen as one of the ways to ensure
transparency, accountability and efficiency in business and
as well as governance systems.
▪ in healthcare, better data sharing between healthcare
providers would result in a higher probability of accurate
diagnosis, more effective treatments, and the overall
increased ability of healthcare organizations to deliver cost-
effective care.
▪ land registration records, to avoid various disputes arising
out of land ownership claims and encroachments.
▪ A blockchain-based voting system can solve the problem of
vote alterations and other issues. Since everything gets stored
in the ledger, voting can become more transparent and
authentic.

Krithika Sivakumar, Department of Computer Science

You might also like