Chapter 7
Chapter 7
Institute of Technology
Introduction to Emerging
Technologies (EmTe 1012)
Chapter 7: Other Emerging
Technologies
February, 2025
1
Content Outlines:
• Nanotechnology
• Biotechnology
• Block-chain technology
• Cloud and quantum computing
• Autonomic computing
• Computer vision
• Embedded systems
• Cyber security
• Additive Manufacturing & 3D printing
2
Nanotechnology
• Nanotechnology is science, engineering,
and technology conducted at the Nano-scale,
which is about 1 to 100 nanometers.
• Nano science and nanotechnology are the
study and application of extremely small things
and can be used across all the other science
fields, such as chemistry, biology, physics,
materials science, and engineering.
3
Nanotechnology
• The ideas and concepts behind Nano science and
4
Nanotechnology
• He described a process in which scientists
would be able to manipulate and control
individual atoms and molecules.
• Over a decade later, in his explorations of
ultraprecision machining, Professor Norio
Taniguchi coined the term nanotechnology.
o It wasn't until 1981, with the development
of the scanning tunneling microscope
that could "see" individual atoms, that
modern nanotechnology began.
5
Fundamental concepts
Nanotechnology
• It’s hard to imagine just how small
nanotechnology is.
7
Nanotechnology
• But something as small as an atom is impossible to
see with the naked eye .
• The microscopes needed to see things at the
nanoscale were invented relatively, recently about 30
years ago.
• An atom has a diameter of about 0.1 nm.
consumption.
waste treatment.
10
Biotechnology
• Biotechnology is a technology based on
biology.
• It harnesses (binds) cellular and biomolecular
processes to develop technologies and
products that help improve our lives and the
health of our planet.
• We have used the biological processes of
microorganisms for long time to make useful
food products, such as bread and cheese, and
11
Biotechnology
• Brewing and baking bread are examples of processes that fall
within the concept of biotechnology (use of yeast (= living
organism) to produce the desired product).
• One example of modern biotechnology is genetic
engineering
• Genetic engineering is the process of transferring individual
genes between organisms or modifying the genes in an
organism to remove or add a desired trait or characteristic.
• In modern biotechnology, researchers modify DNA and proteins
to shape the capabilities of living cells, plants, and animals
into something useful for humans.
13
Application of Biotechnology
B. Medicine (Medicinal Biotechnology):
• This helps in the formation of genetically modified insulin
known as humulin.
• This helps in the treatment of a large number of diabetes
patients.
• It has also given rise to a technique known as gene
therapy.
• Gene therapy is a technique to remove the genetic defect
in an embryo or child.
C. Aquaculture Fisheries:
• It helps in improving the quality and quantity of fishes.
14
Application of Biotechnology
D. Environment (Environmental
biotechnology):
• Is used in waste treatment and pollution
prevention.
• Environmental biotechnology can more
efficiently clean up many wastes than
conventional methods and greatly reduce our
18
Blockchain Technology
• By design, a blockchain is resistant to modification of
the data.
• It is "an open, distributed ledger that can record
transactions between two parties efficiently and in
a verifiable and permanent way".
• The block chain network has no central authority;
it is the very definition of a democratized system.
Since it is a shared and immutable ledger, the
information in it is open for anyone and everyone to
see. 19
Blockchain Technology
The Three Pillars of Blockchain Technology
1. Decentralization:
23
Application of blockchain
A. The sharing economy
• With companies like Uber and Airbnb
flourishing, the sharing economy is already
a proven success .
B. Crowd funding
• Crowd funding initiatives like Kickstarter
and GoFundMe are doing the advance work
for the emerging peer-to-peer economy.
24
Application of blockchain
C. Governance
taking.
27
Advantages of cloud computing
• Cheap computing power
• No need for the initial costly capital
investment
• Energy costs are shared
• Cloud providers have vast resources of
computing power at their fingertips
• Allows you and multiple users to
access your data from any location
• Smartphone, laptop, desktop,
wherever you are, you can access the
data you need at any time
28
Quantum computing
• Quantum computers: truly do represent the
next generation of computing
• Unlike classic computers, they derive their
computing power by harnessing the power of
quantum physics.
• Currently, the only organization which provides
a quantum computer in the cloud is IBM
• They allow free access to anyone who wishes to
use their 5-qubit machine.
• Earlier this year they installed a 17-qubit
machine.
• So far over 40,000 users have taken advantage
of their online service to run experiments .
29
Advantages of quantum computing:
30
Autonomic computing (AC)
• Autonomic computing (AC) is an approach to
address the complexity and evolution problems in
software systems.
• It is a self-managing computing model named
after, and patterned on, the human body's autonomic
nervous system.
• The goal of autonomic computing is to create systems
that run themselves, capable of high-level
functioning while keeping the system's complexity
invisible to the user.
31
Characteristics of Autonomic Systems
o Autonomic systems/applications exhibit eight defining
characteristics
• Self-Awareness: “knows itself” and is aware of its state
and its behaviors.
• Self-Configuring: should be able to configure and
reconfigure itself under varying and unpredictable
conditions.
• Self-Optimizing: should be able to detect suboptimal
behaviors and optimize itself to improve its execution.
• Self-Healing: should be able to detect and recover from
potential problems and continue to function smoothly.
32
Cont’d…
• Self-Protecting: should be capable of detecting and
protecting its resources from both internal and external
attacks and maintaining overall system security and
integrity.
• Context-Aware: should be aware of its execution
environment and be able to react to changes in the
environment.
• Open: must function in a heterogeneous world and should
be portable across multiple hardware and software
architectures. Consequently, it must be built on standard and
open protocols and interfaces.
• Anticipatory: should be able to anticipate to the extent
possible, its needs and behaviors and those of its context,
33
Computer vision
• It is an interdisciplinary scientific field that deals
34
How computer vision works
1. Acquiring an image: Images, even large sets, can be
acquired in real-time through video, photos or 3D
technology for analysis.
38
39
Embedded systems
• It is a controller with a dedicated function within a larger
mechanical or electrical system, often with real-time computing
constraints.
41
Basic Structure of an Embedded
System:
• Sensor − It measures the physical quantity and
converts it to an electrical signal which can be
read by an observer or by any electronic instrument
like an A2D converter.
o A sensor stores the measured quantity to the memory.
• A-D Converter − An analog-to-digital converter
converts the analog signal sent by the sensor into
a digital signal.
42
Cont’d…
• Processor & ASICs − Processors process the
data to measure the output and store it to the
memory.
• D-A Converter − A digital-to-analog converter
converts the digital data fed by the processor to
analog data.
• Actuator − An actuator compares the output given
by the D-A Converter to the actual (expected)
output stored in it and stores the approved
output. 43
Cybersecurity
o It is the protection of computer systems from
the theft of or damage to their hardware,
software, or electronic data, as well as from the
disruption or misdirection of the services they
provide.
o It is the protecting computer systems from
unauthorized access.
o Cyber security is becoming more important due to:
• Increased reliance on computer systems.
• The Internet and wireless network standards
such as Bluetooth and Wi-Fi. and due to the
growth of smart devices, including
smartphones, televisions, and the various
devices that constitute the Internet of Things.
44
Cont’d…
• Cybercrime is any criminal activity
(unlawful activity) that involves a
computer, network devices or a network.
o It is often committed by the people of
destructive and criminal mindset either for
revenge, greed or adventure.
45
Cyber security measures
47
Types of cyber security threats
• Ransomware: - It is a type of malicious software. It is designed
to extort money by blocking access to files or the computer
system until the ransom is paid. Paying the ransom does not
guarantee that the files will be recovered or the system restored.
• Malware:- it is a type of software designed to gain
unauthorized access or to cause damage to a computer.
• Social engineering: - it is a tactic that adversaries use to trick
you into revealing sensitive information. They can solicit a
monetary payment or gain access to your confidential data.
• Phishing: - it is the practice of sending fraudulent emails that
resemble emails from reputable sources. The aim is to steal
sensitive data like credit card numbers and login information.
• It’s the most common type of cyber-attack.
48
Benefits of utilizing cybersecurity
Benefits of utilizing cybersecurity include:
• Business protection against malware, ransomware,
and customers
49
Cyber security vendors
52
Cont’d…
Additive Manufacturing:
• “Additive manufacturing” (AM) is a big-
picture term more at home in the boardroom
than the factory floor or garage. Naturally,
AM separates itself from older, subtractive
technologies like milling.
• Additive manufacturing (AM) describes types
of advanced manufacturing that are used to
create three-dimensional structures out
of plastics, metals, polymers and other
materials that can be sprayed through a
nozzle or aggregated in a vat
53
Thank you
54