0% found this document useful (0 votes)
50 views17 pages

Challenges in Computer Science

The document discusses several challenges facing computer science as technology advances, including issues with mobile and cloud computing, data security, and the expanding digital universe. It proposes examining problems can lead to organizational solutions and improvements. Specific challenges mentioned are the growing use of mobile technology, need to update internet infrastructure for increased usage, and data leaks being a top security concern. Suggested steps to address issues include identifying bottlenecks, improving routing, utilizing better servers, and implementing software-defined networking. The document then covers topics like mobile cloud computing, internet of things, security and privacy concerns, networking speeds, and big data.

Uploaded by

Vijay kehal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views17 pages

Challenges in Computer Science

The document discusses several challenges facing computer science as technology advances, including issues with mobile and cloud computing, data security, and the expanding digital universe. It proposes examining problems can lead to organizational solutions and improvements. Specific challenges mentioned are the growing use of mobile technology, need to update internet infrastructure for increased usage, and data leaks being a top security concern. Suggested steps to address issues include identifying bottlenecks, improving routing, utilizing better servers, and implementing software-defined networking. The document then covers topics like mobile cloud computing, internet of things, security and privacy concerns, networking speeds, and big data.

Uploaded by

Vijay kehal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

CHAPTER 1

INTRODUCTION
Computer science is faced with many challenges as the digital universe expands. From mobile
and cloud computing to data security, addressing these issues can require large, structural
changes, but an examination of these problems can lead to organizational solutions and
improvements in the world.
It is quite risky to foresee the long-term future and pose the correct list of problems for the
science that is only 60 years old. Nevertheless it is very important to realize what has been
achieved so far, and which problems are expected or is important to be solved in the near future.
With this in mind, we present problems facing computer technology, architecture, distributed
and parallel computing, programming paradigms, computational models and complexity,
models of uncertainty, and artificial intelligence.

CHALLENGES IN COMPUTER SCIENCE


• More employees and customers are using mobile technology. A switch to cloud services and
an emphasis on mobile platforms are essential.
• The Internet’s infrastructure will need to be updated to match the “New Internet.”
• 80% of security professionals rated data leaks and exposure of sensitive information as the
highest concern.

STEPS TOWARD SOLUTION


Changing the architecture of organizational networks can seem daunting. Below are suggested
steps.
• Identify and remove bottlenecks, improve routing patterns, and utilize better servers.
• Use software-defined networking to allocate resources and increase data efficiency.
• Change 10GB fiber optic cables to 100GB.

1
CHAPTER 2
MONILE CLOUD COMPUTING
MOBILE COMPUTING
Always connected Always ON Always with us Convenience Local based service Payments
Ticketing Used by Global Population Limited Battery Power Limited Computing power vs PC
MOBILE COMPUTING.

Limitations of Mobile Computing :-


1. Insufficient Bandwidth: Mobile Internet access is generally slower than direct cable
connections, using technologies such as GPRS and EDGE, and more recently 3G networks.
These networks are usually available within range of commercial cell phone towers. Higher
speed wireless LANs are inexpensive but have very limited range.
2. Security Standards: When working mobile, one is dependent on public networks, requiring
careful use of Virtual Private Network (VPN). Security is a major concern while concerning
the mobile computing standards on the fleet. One can easily attack the VPN through a huge
number of networks interconnected through the line.
3. Power consumption: When a power outlet or portable generator is not available, mobile
computers must rely entirely on battery power. Combined with the compact size of many
mobile devices, this often means unusually expensive batteries must be used to obtain the
necessary battery life.
4. Transmission interferences: Weather, terrain, and the range from the nearest signal point
can all interfere with signal reception. Reception in tunnels, some buildings, and rural areas is
often poor.

2
CLOUD COMPUTING
A cloud service has three distinct characteristics that differentiate it from traditional web
hosting. It is sold on demand, typically by the minute or the hour; it is elastic -- a user can have
as much or as little of a service as they want at any given time; and the service is fully managed
by the provider (the consumer needs nothing but a personal computer and Internet access).
Significant innovations in virtualization and distributed computing, as well as improved access
to high-speed Internet, have accelerated interest in cloud computing.

A cloud can be private or public. A public cloud sells services to anyone on the Internet.
(Currently, Amazon Web Services is the largest public cloud provider.) A private cloud is a
proprietary network or a data center that supplies hosted services to a limited number of people.
Private or public, the goal of cloud computing is to provide easy, scalable access to computing
resources and IT services

BENEFITS OF CLOUD COMPUTING


 Data Storage
 Accessed Anywhere
 Computing On-Demand
 Auto Scaling
 Fault Tolerance

3
MOBILE COMPUTING CLOUD COMPUTING INTEGRATION
Mobile Cloud Computing (MCC) is the combination of cloud computing, mobile
computing and wireless networks to bring rich computational resources to mobile users,
network operators, as well as cloud computing providers. The ultimate goal of MCC is to
enable execution of rich mobile applications on a plethora of mobile devices, with a rich user
experience. MCC provides business opportunities for mobile network operators as well as
cloud providers. More comprehensively, MCC can be defined as "a rich mobile computing
technology that leverages unified elastic resources of varied clouds and network technologies
toward unrestricted functionality, storage, and mobility to serve a multitude of mobile devices
anywhere, anytime through the channel of Ethernet or Internet regardless of heterogeneous
environments and platforms based on the pay-as-you-use principle."
Applications and services available in the cloud are becoming increasingly available, and are expected
to continue to evolve and adapt MOBILE CLOUD COMPUTING .

4
BENEFITS AND CHALLENGES OF MOBILE CLOUD
COMPUTING
BENEFITS OF MOBILE + CLOUD COMPUTING
 Makes mobile devices more powerful by allowing them access to cloud resources
 Clouds are accessible by mobile devices
 Faster loading of apps -Longer Battery Life

CHALLANGES OF MOBILE + CLOUD COMPUTING


 Seamless working integration of Mobile and Cloud
 Protecting mobile user’s location data is a privacy sensitive issue Point where hackers
can take advantage of

5
CHAPTER 3
INTERNET OF THINGS
Internet of Things is an infrastructure of uniquely identified objects in the internet or tied to the internet,
such as with RFID or QR codes – both of which are becoming more prevalent with mobile devices
USEFUL BENEFITS OF INTERNET OF THINGS Examples of “things” or machines communicating
with each other (M2M) that would contribute to the Internet of Things include almost anything that can
be attached with a sensor, be it short range or long range from smartphones to cars to satellites. By
2020, it is projected that there could be up to 100 billion uniquely identifiable objects connected to the
internet.

A thing in the internet of things can be a person with a heart monitor implant, a farm animal
with a biochip transponder, an automobile that has built-in sensors to alert the driver when tire
pressure is low or any other natural or man-made object that can be assigned an IP address and
is able to transfer data over a network.

Increasingly, organizations in a variety of industries are using IoT to operate more efficiently,
better understand customers to deliver enhanced customer service, improve decision-making
and increase the value of the business.

6
BENEFITS AND CHALLENGES OF INTERNET OF THINGS
The internet of things offers a number of benefits to organizations, enabling them to:

 monitor their overall business processes;


 improve the customer experience;
 save time and money;
 enhance employee productivity;
 integrate and adapt business models;
 make better business decisions; and
 generate more revenue.

CHALLENGES
 The current Internet was not designed for the scale and dynamic nature of the Internet
of Things

7
CHAPTER 4
SECURITY AND PRIVACY

Securing computing and cyber systems is a challenging task under different types of attacks
from various malicious sources. Measures to be taken against these threats and attacks require
a wide range of techniques from cryptography to data analysis.

8
CHAPTER 5
NETWORKING AND SPEED

Users obviously want their networks to run fast in all situations. In some cases, a network delay
may last only a few milliseconds and have a negligible impact on what the user is doing. In
other cases, network delays can cause severe slowdowns for a user.

CHALLENGES
With the rapidly growing data traffic comes an increased need for speed, scale and mobility .

SOLUTION
 Smaller simpler solutions include identifying and removing bottlenecks, improving bad
or sloppy routing paths and utilizing better servers with improved space and bandwidth
usage
 Another solution to use the network smarter with the help of software-defined
networking that allocates network resources and increases data efficiency
 When both of those are exhausted and the rapid data growth exceeds the speed and
resources available now, there will be calls for changes to the global networking
architecture- changing the 10GB fiber optic cables to 100GB fiber optic cables

9
CHAPTER 6
BIG DATA AND DIGITAL UNIVERSE

Big data is an evolving term that describes a large volume of structured, semi-structured and
unstructured data that has the potential to be mined for information and used in machine
learning projects and other advanced analytics applications.

Big data is often characterized by the 3Vs: the extreme volume of data, the wide variety of data
types and the velocity at which the data must be processed. Those characteristics were first
identified by Gartner analyst Doug Laney in a report published in 2001. More recently, several
other Vs have been added to descriptions of big data, including veracity, value and variability.
Although big data doesn't equate to any specific volume of data, the term is often used to
describe terabytes, petabytes and even exabytes of data captured over time.

Big Data is so massive that it outpaces human understanding and technology AND THE
DIGITAL UNIVERSE.
As organizations improve networking and infrastructure, an explosion of data will lead to more
problems with rewarding solutions.
• By 2020, the digital universe will grow from 130 to 40,000 Exabytes.
• The data that requires protection will grow by 40%.
• Data will become more complicated and harder to secure, store, and analyze.

10
CHALLENGES OF DIGITAL UNIVERSE AND BIG DATA
Cloud Computing
• 40% of information in the Digital Universe “Touched” by Cloud Computing providers by 2020
• High cost of implementation
• Integration with existing architecture
• Data loss, security and privacy risks
• Interoperability
• Risk of intellectual property theft Security By 2020,the data that requires protection is growing faster
by 40% than the Digital Universe itself Networking Heavy Network Load

11
CHAPTER 7
DATA MINING
Data Mining allows organizations to continually analyze data and automate both routine and
critical decisions without the delay of human judgment. Banks can instantly detect fraudulent
transactions, request verification, and even secure personal information to protect customers
against identity theft. Deployed within a firm’s operational algorithms, these models can
collect, analyze, and act on data independently to streamline decision making and enhance the
daily processes of an organization.
Data mining allows for more efficient use and allocation of resources. Organizations can plan
and make automated decisions with accurate forecasts that will result in maximum cost
reduction. Delta imbedded RFID chips in passengers checked baggage and deployed data
mining models to identify holes in their process and reduce the number of bags mishandled.
This process improvement increases passenger satisfaction and decreases the cost of searching
for and re-routing lost baggage.
Improving data mining tools and techniques will be essential in order to improve processing
and analyzing the information available in Big Data TYPES OF DATA ARE BECOMING
MORE COMPLEX Unstructured text, audio, video, and other forms ACCESSING DATA IS
CHANGING Clustered databases both for storage and access are emerging.

12
CHAPTER 8
DATA VISUALISATION
BENEFITS
Visualisation has been shown to be effective tool not only for presenting essential information
In vast amounts of data but also for driving complex analysis.

CHALLENGES
• Big Data is still so large that it poses problems, such as dealing with and attempting to compare a large
percentage of unique values
• Learning new software specially designed to efficiency deduce insight
• Learning new machines that derives knowledge from Big Data.
• New 3D imaging techniques and immersive telecommunications may play a part in helping to
visualize Big Data and glean insights Visualization has been shown to be an effective tool not only for
presenting essential information in vast amounts of data but also for driving complex analysis.

13
CHAPTER 9
CHANGING THE WORLD
While the problems facing computer science and Big Data are paramount, these issues can lead to
opportunities within bioinformatics and health care to improve the world.

14
CONCLUSION
 Computer science is faced with many challenges as the digital universe expands.
 Data management and storage in future is going to be an significant issue.
 Limited capacity of transmission will bound the evolution of technology.
 From mobile and cloud computing to data security, addressing these issues can require
large, structural changes, but an examination of these problems can lead to
organizational solutions and improvements in the world.
 If treated well , the future technology may help in changing the world for well
healthcare.
 The need of more efficient and accurate algorithms would be necessary for dealing with
the big data.
 Certain modifications must be done in the current internet mechanisms to facilitate the
dynamic nature of internet of things.
 New measures are must to implement for the privacy and security of devices connected
over an network.

15
Future Scope
In the future that we envision, multicore will allow us to recharge our smartphones just once a
month. The Internet of Things will let us dress in clothes that monitor all our activities.
Nanotechnology will enable lives to be saved by digestible cameras and machines made from
particles 50,000 times as small as a human hair. And amid the exponential growth of large data
repositories will be increasing concerns about balancing convenience and privacy.

The potential for quantum computing is staggering since it’s constrained only by the laws of
physics. Universal memory replacements for DRAM will cause a tectonic shift in architectures
and software. 3D printing will create a revolution in fabrication, with many opportunities to
produce designs that would have been prohibitively expensive.

We predict that machine learning will play an increasingly important role in our lives, whether
by ranking search results, recommending products, or building better models of the
environment. And medical robotics will lead to many lifesaving innovations, from autonomous
delivery of hospital supplies to telemedicine and advanced prostheses.

With energy consumption increasing along with the world’s population, electric cars, LEDs,
smart grids, smart cities, dark silicon, new battery technology, and new ways of cooling data
centers are some areas where advances in sustainability are expected. Silicon photonics will
address bandwidth, latency, and energy challenges, and developments at all levels of the
network stack will continue to drive research and the Internet economy. In the area of software-
defined networks, OpenFlow and SDN will make networks more secure, transparent, flexible,
and functional.

There are many topics that are under the research criteria and there solutions will affect the
future of computer science technology.

 Data Warehousing
 Internet of Things(IoT)
 Big Data
 Cloud Computing
 Semantic Web
 MANET
 Machine Learning
 Artificial Intelligence
 Data Mining
 Image Processing
 Bioinformatics
 Quantum Computing

16
References
 Based on MSCS Infographics New Jersey Institute of Technology(NJIT)

 graduatedegrees.online.njit.edu/mscs-resources/mscs-infographics/future-challenges-
in-computer-science retrieved on 26 march 2019 at 21:00 hrs

 https://www.researchgate.net/publication/309575623_Research_Methods_in_Comput
er_Science_The_Challenges_and_Issues retrieved on 29 march 2019 at 09:00 hrs

 https://www.oxford-royale.co.uk/articles/4-challenges-computer-scientists.html
retrieved on 29 march 2019 at 14:00 hrs

 https://www.quora.com/What-are-the-greatest-challenges-in-computer-science-future
retrieved on 1 may 2019 at 17:00 hrs

17

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy