ARBA MINCH UNIVERSITY
FACULTY
----------------------------------------------------------------------------------------------------
Course Name: Emerging Technologies
Course Code: EMTE 1011/1012
Course Instructor: Tr. Getachew
Submit Date: 20/4/2015
----------------------------------------------------------------------------------------------------
NAME OF GROUP 5 MEMBERS ID
1. Nahom Desta NSR/2880/14
2. Ruth Haile NSR/1258/14
3. Alazar Hailu NSR/2147/14
4. Abel Mersha NSR/021/14
5. Demise Cherinet NSR/1570/14
6. Tadelu Adamu NSR/2615/14
Table of Contents
1.Explain block-chain technology and its application. .................................................................. 1
1.1 Application of block chain ................................................................................................ 2
2.Explain Cloud, quantum and autonomic computing, their differences, and applications? ......... 3
2.1 Cloud and Quantum Computing ......................................................................................... 3
2.2 Quantum computing ......................................................................................................... 3
2.3 Autonomic computing (AC) .............................................................................................. 3
2.4 The difference between them-----------------------------------------------------------------------------------------4
2.5 Their Application---------------------------------------------------------------------------------------------------------4
3.Explain how computer vision works and its application? ----------------------------------------------------------5
3.1Computer vision------------------------------------------------------------------------------------------------------------6
3.2 Computer vision Tasks--------------------------------------------------------------------------------------------------6
3.3 Computer vision Types--------------------------------------------------------------------------------------------------6
3.4 Applications of computer vision--------------------------------------------------------------------------------------6
4.Distinguish the difference between additive manufacturing and 3D printing? -----------------------------7
4.1 3D Printing: It's All About the Printer-------------------------------------------------------------------------------7
4.2. Additive Manufacturing: A Bytes-to-Parts Supply Chain-------------------------------------------------------7
5.Explain nanotechnology and its application in different sectors? ---------------------------------------------8
5.1Nanotechnology--------------------------------------------------------------------------------------------------------9
5.2 Application of Nanotechnology-------------------------------------------------------------------------------------9
6.Explain biotechnology and its application in different sectors?------------------------------------------------9
6.1Biotechnology-------------------------------------------------------------------------------------------------------------9
6.2 Application of biotechnology------------------------------------------------------------------------------------------10
7.Describe cyber security, types of cyber security treat and its benefits?---------------------------------11
7.1Cybersecurity---------------------------------------------------------------------------------------------------------11
7.2Types of cyber security threats-----------------------------------------------------------------------------------11
7.3 Cybersecurity Benefits----------------------------------------------------------------------------------------------12
1.Identify and explain embedded systems and their Advantages and dis disadvantages?-----------
8.1Embedded systems----------------------------------------------------------------------------------------------------13
8.2 Advantages and disadvantages of embedded system-------------------------------------------------------13
8.2.1 Advantages of Embedded----------------------------------------------------------------------------------------13
8.2.2 Disadvantages of Embedded systems:----------------------------------------------------------------------13
1. Explain block-chain technology and its application.
A block-chain is, in the simplest of terms, a time-stamped series of immutable records
of data that is managed by a cluster of computers not owned by any single entity. Each
of these blocks of data (i.e. block) is secured and bound to each other using
cryptographic principles (i.e. chain).
Specifically, they have three parts:
1. Blocks store information about transactions like the date, time, and dollar amount of
your most recent purchase from Amazon.
2. Blocks store information about who is participating in transactions. A block for your
splurge purchase from Amazon would record your name along with Amazon. Instead of
using your actual name, your purchase is recorded without any identifying information
using a unique “digital signature,” sort of like a username.
3. Blocks store information that distinguishes them from other blocks. Much like you and
I have names to distinguish us from one another, each block stores a unique code
called a “hash” that allows us to tell it apart from every other block.
In order for a block to be added to the Block chain, however, four things must
happen:
1. A transaction must occur.
2. That transaction must be verified.
3. That transaction must be stored in a block.
4. That block must be given a hash.
By design, a block-chain is resistant to modification of the data. It is "an open,
distributed ledger that can record transactions between two parties efficiently and
in a verifiable and permanent way".
Block chain network has no central authority; it is the very definition of a
democratized system. Since it is a shared and immutable ledger, the information
in it is open for anyone and everyone to see
1.
1.1 Application of block chain
A. The sharing economy
With companies like Uber and Airbnb flourishing, the sharing economy is already
a proven success.
B. Crowd funding
Crowd funding initiatives like Kickstarter and Go Fund Me are doing the advance
work for the emerging peer-to-peer economy.
C. Governance
By making the results fully transparent and publicly accessible, distributed
database technology could bring full transparency to elections or any other kind
of poll taking.
D. Supply chain auditing
Consumers increasingly want to know that the ethical claims companies make
about their products are real. Distributed ledgers provide an easy way to certify
that the backstories of the things we buy are genuine.
E. File storage
Decentralizing file storage on the internet brings clear benefits. Distributing data
throughout the network protects files from getting hacked or lost.
Interplanetary File System (IPFS) makes it easy to conceptualize how a
2.
2. Explain Cloud, quantum and autonomic computing, their
differences, and applications?
2.1 Cloud and Quantum Computing
Cloud computing is a means of networking remote servers that are hosted on the
Internet. Rather than storing and processing data on a local server, or a PC's hard drive,
one of the following three types of cloud infrastructure is used.
The first type is a public cloud. Here a third-party provider manages the servers,
applications, and storage much like a public utility.
A business or organization would typically use a private cloud. This might be
hosted on their on-site data center, although some companies host through a
third-party provider instead.
The third option is a hybrid cloud. Here private clouds are connected to public
clouds, allowing data and applications to be shared between them.
2.2 Quantum computing
Quantum computers truly do represent the next generation of computing. Unlike
classic computers, they derive their computing power by harnessing the power of
quantum physics.
Currently, the only organization which provides a quantum computer in the cloud
is IBM (International Business Machine). They allow free access to anyone who
wishes to use their 5-qubit machine. Earlier this year they installed a 17-qubit
machine.
So far over 40,000 users have taken advantage of their online service to run
experiments.
2.3 Autonomic computing (AC)
Autonomic computing (AC) is an approach to address the complexity and
evolution problems in software systems.
It is a self-managing computing model named after, and patterned on, the human
body's autonomic nervous system.
The goal of autonomic computing is to create systems that run themselves,
capable of high-level functioning while keeping the system's complexity invisible
to the user.
3.
2.4 The difference between them
Cloud computing delivers various type of services like data storage, server,
networking and databases through the internet.
Gives good efficiency even for small services.
Quantum cloud computing combines the concept of quantum computing
and cloud computing.
2.5 Their Application
- Teaching:
can be used for teaching purposes.
Quantum physics students can easily understand their concepts and perform
experimentation without having the physics computer in their lab.
- Research: There is a vast scope of development and advancement in this field.
4.
3. Explain how computer vision works and its application?
3.1 Computer vision
Computer vision is an interdisciplinary scientific field that deals with how
computers can be made to gain a high-level understanding of digital images or
videos.
Computer vision tasks include methods for acquiring, processing, analyzing and
understanding digital images, and extraction of high-dimensional data from the
real world in order to produce numerical or symbolic information, e.g. in the forms
of decisions.
3.2 Computer vision Tasks
1. Acquiring an image: Images, even large sets, can be acquired in real-time through
video, photos or 3D technology for analysis.
2. Processing the image: Deep learning models automate much of this process, but
the models are often trained by first being fed thousands of labeled or pre-identified
images.
3. Understanding the image: The final step is the interpretative step, where an object
is identified or classified.
3.3 Computer vision Types
There are many types of computer vision that are used in different ways:
Image segmentation partitions an image into multiple regions or pieces to be
examined separately.
Object detection identifies a specific object in an image. Advanced object
detection recognizes many objects in a single image: a football field, an offensive
player, a defensive player, a ball and so on. These models use an X, Y
coordinate to create a bounding box and identify everything inside the box.
Image classification groups images into different categories.
3.4 Applications of computer vision
Computer vision is being used today in a wide variety of real-world applications,
which include:
Optical character recognition (OCR): reading handwritten postal codes on
letters and automatic number plate recognition (ANPR);
5.
Machine inspection: rapid parts inspection for quality assurance using stereo
vision with specialized illumination to measure tolerances on aircraft wings or
auto body parts or looking for defects in steel castings using X-ray vision;
Retail: object recognition for automated checkout lanes
Medical imaging: registering pre-operative and intra- operative imagery or
performing long-term studies of people’s brain morphology as they age.
Automotive safety: detecting unexpected obstacles such as pedestrians on the
street, under conditions where active vision techniques such as radar or lidar do
not work well.
Surveillance: monitoring for intruders, analyzing highway traffic and monitoring
pools for drowning victims;
Fingerprint recognition and biometrics: for automatic access authentication
as well as forensic applications.
6.
4. Distinguish the difference between additive manufacturing and 3D printing?
4.1 3D Printing: It's All About the Printer
When MIT invented binder jet printing in the 1980s, they wrote: “three-dimensional
printing is a process under development at MIT for the rapid and flexible production of
prototype parts, enduse parts, and tools directly from a CAD model.” Today our concept
of “3D printing” is much broader, but the term is often associated with filament-based
plastic printers, which are the pride and joy of many a hobbyist and self-described
maker. But there are also binder jet printers, laser metal 3D printers, as well as glass
and clay 3D printers[66].
4.2. Additive Manufacturing: A Bytes-to-Parts Supply Chain
“Additive manufacturing” (AM) is a big-picture term more at home in the boardroom than
the factory floor or garage. Naturally, AM separates itself from older, subtractive
technologies like milling. Otherwise, the term is less about the 3D printer itself, and
more about the manufacturing process transformed by 3D printing.
What is that transformation?
AM changes the way we think about inventory and supply chain, taking parts from the
point of manufacture to the point of use?
AM is flexible in the time it takes to load a file, from anywhere in the world. It enables
customized parts, in volume, and involves stocking raw materials like filament and
printing spare parts on demand.
Additive manufacturing (AM) describes types of advanced manufacturing that are used
to create three-dimensional structures out of plastics, metals, polymers and other
materials that can be sprayed through a nozzle or aggregated in a vat. These constructs
are added layer by layer in real time based on digital design. The simplicity and low cost
of AM machines, combined with the scope of their potential creations, could profoundly
alter global and local economies and affect international security.
7.
5. Explain nanotechnology and its application in different sectors?
5.1 Nanotechnology
Nano-science: As the study of phenomena and manipulation of materials at atomic,
molecular and macromolecular scales, where properties differ significantly from those at
a larger scale.
Nanotechnology: is science, engineering, and technology conducted at the Nano-scale,
which is about 1 to 100 nanometers.
Nano science and nanotechnology are the study and application of extremely small
things and can be used across all the other science fields, such as chemistry, biology,
physics, materials science, and engineering.
Fundamental concepts
It’s hard to imagine just how small nanotechnology is.
One nanometer is a billionth of a meter or 10-9 of meters.
For example:
There are 25,400,000 nanometers in an inch.
A sheet of newspaper is about 100,000 nanometers thick.
On a comparative scale, if a marble were a nanometer, then one meter would be the
size of the Earth.
Nano science and nanotechnology involve the ability to see and to control
individual atoms and molecules.
Everything on Earth is made up of atoms—the food we eat, the clothes we wear,
the buildings and houses we live in, and our own bodies.
The properties of materials can be different at the nanoscale for two main reasons:
First,
Nano-materials have a relatively larger surface area when compared to the same
mass of material produced in a larger form.
This can make materials more chemically reactive (in some cases materials that
are inert in their larger form are reactive when produced in their Nano-scale
form), and affect their strength or electrical properties.
8.
Second:
Quantum effects can begin to dominate the behavior of matter at the nanoscale
particularly at the lower end – affecting the optical, electrical and magnetic
behavior of materials.
Materials can be produced that are nanoscale in one dimension (for example,
nanowires, Nano rods, and nanotubes), in two dimensions (plate-like shapes like
Nano coating, Nano layers, and graphene) or in all three dimensions (for
example, nanoparticles).
Today's scientists and engineers are finding a wide variety of ways to deliberately
make materials at the Nano scale to take advantage of their enhanced properties
such as higher strength, lighter weight, increased control of light spectrum and
greater chemical reactivity than their larger-scale counterparts
5.2 Application of Nanotechnology
Medicine: customized nanoparticles the size of molecules that can deliver drugs
directly to diseased cells in your body.
Electronics: it has some answers for how we might increase the capabilities of
electronics devices while we reduce their weight and power consumption.
Food: it has an impact on several aspects of food science, from how food is
grown to how it is packaged.
Agriculture: nanotechnology can possibly change the whole agriculture part and
nourishment industry anchor from generation to preservation, handling, bundling,
transportation, and even waste treatment.
Vehicle manufacturers: Much like aviation, lighter and stronger materials will be
valuable for making vehicles that are both quicker and more secure.
9.
6. Explain biotechnology and its application in different sectors?
6.1 Biotechnology
Biotechnology is a technology based on biology.
It harnesses cellular and bimolecular processes to develop technologies and
products that help improve our lives and the health of our planet.
We have used the biological processes of microorganisms for long time to make
useful food products, such as bread and cheese, and to preserve dairy products.
Genetic engineering is the process of transferring individual genes between
organism genes in an organism to remove or add a desired trait or characteristic.
In modern biotechnology, researchers modify DNA and proteins to shape the
capabilities of living cells, plants, and animals into something useful for humans.
6.2 Application of biotechnology
Agriculture (Green Biotechnology): Biotechnology had contributed a lot to modify
the genes of the organism known as Genetically Modified Organisms such as
Crops, Animals, Plants, Fungi, Bacteria, etc. Genetically modified crops are formed
by the manipulation of DNA to introduce a new trait into the crops.
Aquaculture Fisheries: It helps in improving the quality and quantity of fishes.
Through biotechnology, fishes are induced to breed via gonadotropin-releasing
hormone.
Agriculture (Green Biotechnology): Biotechnology had contributed a lot to modify
the genes of the organism known as Genetically Modified Organisms such as
Crops, Animals, Plants, Fungi, Bacteria, etc. Genetically modified crops are formed
by the manipulation of DNA to introduce a new trait into the crops.
Environment (Environmental biotechnology): is used in waste treatment and
pollution prevention. Environmental biotechnology can more efficiently clean up
many wastes than conventional methods and greatly reduce our dependence on
methods for land-based disposal.
10.
7. Describe cyber security, types of cyber security treat and its benefits?
7.1 Cybersecurity
Cybersecurity is the protection of computer systems from the theft of or damage
to their hardware, software, or electronic data, as well as from the disruption or
misdirection of the services they provide. It is becoming more important due to:-
Increased reliance on computer systems.
Cybercrime is any criminal activity that involves a computer, network
devices or a network.
It is often committed by the people of destructive and criminal mindset
either for revenge, greed or adventure.
Some of cyber security measures to be taken to prevent cybercrime.
Staff awareness training: - Human error is the leading cause of data
breaches, so you need to equip staff with the knowledge to deal with the
threats they face.
Application security: - Web application vulnerabilities are a common
point of intrusion for cybercriminals. As applications play an increasingly
critical role in business, it is vital to focus on web application security.
7.2 Types of cyber security threats
Ransomware: - It is a type of malicious software. It is designed to extort money
by blocking access to files or the computer system until the ransom is paid.
Paying the ransom does not guarantee that the files will be recovered or the
system restored.
Malware: - it is a type of software designed to gain unauthorized access or to
cause damage to a computer.
Social engineering: - it is a tactic that adversaries use to trick you into revealing
sensitive information. They can solicit a monetary payment or gain access to
your confidential data.
Phishing: - it is the practice of sending fraudulent emails that resemble emails
from reputable sources. The aim is to steal sensitive data like credit card
numbers and login information. It’s the most common type of cyber-attack.
11.
7.3 Cybersecurity Benefits
Benefits of utilizing cybersecurity include:
Business protection against malware, ransomware, phishing, and social
engineering.
Protection for data and networks.
Prevention of unauthorized users.
Improves recovery time after a breach.
Protection for end-users.
Improved confidence in the product for both developers and customers.
12.
8. Identify and explain embedded systems and their Advantages and dis
disadvantages?
8.1 Embedded systems
It is a controller with a dedicated function within a larger mechanical or electrical
system, often with real-time computing constraints. It is embedded as part of a
complete device often including hardware and mechanical parts.
Modern embedded systems are often based on microcontrollers (i.e.
microprocessors with integrated memory and peripheral interfaces), but ordinary
microprocessors (using external chips for memory and peripheral interface
circuits) are also common, especially in more complex systems.
8.2 Advantages and disadvantages of embedded system
8.2.1 Advantages of Embedded:
Easily Customizable.
Low power consumption.
Low cost.
Enhanced performance
8.2.2 Disadvantages of Embedded systems:
High development effort.
Larger time to market
13.v