You are on page 1of 59

Clique: The IT & Analytics Club of IMNU

Clique- The IT & Analytics Club Of Imnu

PLACEMENT DOSSIER

SPECIALISATIONS
Business Analytics
Information Management

Faculty Coordinator: Prof. Balakrishnan Unny


BATCH
MBA FT 2021-2023
MBA HRM 2021-2023
IMBA 2018-2023

Prepared on: 15 July 2022

1
Clique: The IT & Analytics Club of IMNU

Table of Contents
Section-1: IT & Administration .............................................................................................................. 3
Cloud computing ................................................................................................................................ 3
Green Computing ............................................................................................................................. 13
Quantum Computing ........................................................................................................................ 17
Metaverse ......................................................................................................................................... 21
Section-2: Current Technology ............................................................................................................. 25
Blockchain ........................................................................................................................................ 25
Internet of Things (IOT) ................................................................................................................... 27
Artificial Intelligence (AI) ................................................................................................................ 28
Augmented Reality ........................................................................................................................... 29
Virtual Reality .................................................................................................................................. 30
Cloud Computing ............................................................................................................................. 32
Cyber Security .................................................................................................................................. 33
Section-3: Application Of Current Technology .................................................................................... 35
Application of Internet of Things ..................................................................................................... 35
Application of Virtual Reality .......................................................................................................... 36
Application of Augmented Reality ................................................................................................... 37
Application of Artificial Intelligence................................................................................................ 38
Application of Block chain Technology ........................................................................................... 41
Section-4: Data Ethics & Security ........................................................................................................ 44
Data Ethics........................................................................................................................................ 44
Data Security .................................................................................................................................... 45
Section-5: Data Analysis....................................................................................................................... 47
Basics of Data Analysis .................................................................................................................... 47
Types of Data.................................................................................................................................... 48
Data Mining ...................................................................................................................................... 49
Data Cleaning ................................................................................................................................... 50
Descriptive Analysis ......................................................................................................................... 51
Predictive Analytics.......................................................................................................................... 53
Prescriptive Analysis ........................................................................................................................ 55
Data Visualisation............................................................................................................................. 56
Data Storytelling ............................................................................................................................... 59

2
Clique: The IT & Analytics Club of IMNU

Section-1: IT & Administration

Cloud computing

Cloud computing is the on-demand delivery of IT resources over the Internet with pay-as-you-
go pricing. Instead of buying, owning, and maintaining physical data centres and servers, you
can access technology services, such as computing power, storage, and databases, on an as-
needed basis from a cloud provider like Amazon Web Services (AWS).

Uses of Cloud Computing


Organizations of every type, size, and industry are using the cloud for a wide variety of use
cases, such as data backup, disaster recovery, email, virtual desktops, software development
and testing, big data analytics, and customer-facing web applications. For example, healthcare
companies are using the cloud to develop more personalized treatments for patients. Financial
services companies are using the cloud to power real-time fraud detection and prevention. And
video game makers are using the cloud to deliver online games to millions of players around
the world.

Benefits of cloud computing


Agility
The cloud gives you easy access to a broad range of technologies so that you can innovate
faster and build nearly anything that you can imagine. You can quickly spin up resources as
you need them–from infrastructure services, such as compute, storage, and databases, to
Internet of Things, machine learning, data lakes and analytics, and much more.
Elasticity
With cloud computing, you don’t have to over-provision resources up front to handle peak
levels of business activity in the future. Instead, you provision the number of resources that
you actually need. You can scale these resources up or down to instantly grow and shrink
capacity as your business needs change.
Cost savings
The cloud allows you to trade fixed expenses (such as data centres and physical servers) for
variable expenses, and only pay for IT as you consume it. Plus, the variable expenses are much
lower than what you would pay to do it yourself because of the economies of scale.
Deploy globally in minutes
With the cloud, you can expand to new geographic regions and deploy globally in minutes. For
example, AWS has infrastructure all over the world, so you can deploy your application in

3
Clique: The IT & Analytics Club of IMNU

multiple physical locations with just a few clicks. Putting applications in closer proximity to
end users reduces latency and improves their experience.

Types of cloud computing


The three main types of cloud computing include Infrastructure as a Service, Platform as a
Service, and Software as a Service. Each type of cloud computing provides different levels of
control, flexibility, and management so that you can select the right set of services for your
needs.
Infrastructure as a Service (IaaS)
IaaS contains the basic building blocks for cloud IT. It typically provides access to networking
features, computers (virtual or on dedicated hardware), and data storage space. IaaS gives you
the highest level of flexibility and management control over your IT resources. It is most similar
to the existing IT resources with which many IT departments and developers are familiar.
Examples: One of the important IAAS examples is Finix. It offers a platform that businesses
can use to automate their internal payment system. With the onboarding of merchants, they
enable the gateway and tokenization. It also aids in providing mechanisms for reporting, such
as sending settlement and chargeback reports. Another illustration of IAAS is the digital ocean.
It enables businesses to quickly create numerous virtual machines. Because they can scale data
storage based on incoming traffic, it helps them manage and scale their products effectively.

Platform as a Service (PaaS)


PaaS removes the need for you to manage underlying infrastructure (usually hardware and
operating systems), and allows you to focus on the deployment and management of your
applications. This helps you be more efficient as you don’t need to worry about resource
procurement, capacity planning, software maintenance, patching, or any of the other
undifferentiated heavy lifting involved in running your application.
Examples: Pager duty is one of PAAS examples, which helps the business perform incident
management. The business can monitor the newly created incidents on a real-time base. They
also help in terms of data collection and distribution of tasks.

Software as a Service (SaaS)


SaaS provides you with a complete product that is run and managed by the service provider. In
most cases, people referring to SaaS are referring to end-user applications (such as web-based
email). With a SaaS offering, you don’t have to think about how the service is maintained or
how the underlying infrastructure is managed. You only need to think about how you will use
that particular software.

4
Clique: The IT & Analytics Club of IMNU

Examples: One of the best examples of SAAS-based products is Stream native and Atlassian.
They enable the business to organize and process the data with good execution speed. Atlassian
offers a more workflow-based solution. Other examples of SAAS Applications are Salesforce,
HubSpot, stack, etc.

Types of Cloud
There are the following 4 types of cloud that you can deploy according to the organization's
needs-
Public Cloud

Public cloud is open to all to store and access information via the Internet using the pay-per-
usage method. In public cloud, computing resources are managed and operated by the Cloud
Service Provider (CSP).

Example: Amazon elastic compute cloud (EC2), IBM Smart Cloud Enterprise, Microsoft,
Google App Engine, Windows Azure Services Platform.

Private Cloud

Private cloud is also known as an internal cloud or corporate cloud. It is used by


organizations to build and manage their own data centres internally or by the third party. It can
be deployed using Opensource tools such as Open stack and Eucalyptus.

Based on the location and management, National Institute of Standards and Technology (NIST)
divide private cloud into the following two parts-

o On-premise private cloud


o Outsourced private cloud

Hybrid Cloud

Hybrid Cloud is a combination of the public cloud and the private cloud. we can say:

Hybrid Cloud = Public Cloud + Private Cloud

Hybrid cloud is partially secure because the services which are running on the public cloud can
be accessed by anyone, while the services which are running on a private cloud can be accessed
only by the organization's users.

Example: Google Application Suite (Gmail, Google Apps, and Google Drive), Office 365
(MS Office on the Web and One Drive), Amazon Web Services.

5
Clique: The IT & Analytics Club of IMNU

Community Cloud

Community cloud allows systems and services to be accessible by a group of several


organizations to share the information between the organization and a specific community. It
is owned, managed, and operated by one or more organizations in the community, a third party,
or a combination of them.

Example: Health Care community cloud

Applications of Cloud Computing:


Here are some important Cloud Computing applications:
Art Applications:
Cloud computing services deliver several art applications. Such applications can be used for
designing attractive books, cards, and creative images. They help in making instant creative.
These designs can then be used for creating and printing mini cards. It also provides
professional editing services. It can be configured or installed as simple desktop apps on the
personal computers of designers.
Examples: Vistaprint and Adobe Creative Cloud are top examples of cloud-based art
applications or services. These applications help designers edit existing designs.

File Storage Platform:


A cloud application would be something like the online file storage system. Users can host
files, documents, videos, and images on the cloud using one of the many online file storage
services available today. Users of these applications can use, view, and upload documents from
their local personal computers to these sites using a user-friendly interface. There are both free
and paid options for using these cloud computing services. The ability to access premium
services is granted to end users who pay a monthly or annual subscription fee.
Examples: Media Fire, Hot file, and Rapid share.

Image Editing Applications:


There are numerous cloud services that offer free photo editing to users. Under a single graphic
user interface, this cloud service provides image resizing, editing, cropping, and special effects.
The cloud services also provide applications with editable contrast and brightness in addition
to the aforementioned services. High-level, complex features are provided by the cloud service
application in exchange for subscription fees. They are tailored to make them simple for end
users to use.

6
Clique: The IT & Analytics Club of IMNU

Examples: Popular examples of image editing cloud applications are Fotor and Adobe creative
cloud.

Data Storage Application:


Currently, the cloud computing model offers a number of applications for data storage. It makes
it possible for users to store data in the cloud. A public cloud or a private cloud could be one
of these clouds. These clouds allow you to store data, files, and images. Cloud computing
enables collaboration and information sharing in this way. It is possible to instantly secure and
backup the data kept in the cloud. Data format conversion services are offered by cloud storage
providers.
Examples: Drobox, OneDrive, Box, Mozy, and Google suites.

Antivirus Application:
In addition, antivirus and support services are offered by the cloud services. It aids in enhancing
the system's efficient operation. Users of cloud antivirus software can perform routine system
maintenance. They enable you to recognise and then eliminate threats brought on by viruses
and malware. Such features are advantageous to end users in a number of ways because they
are readily available. These services are provided without charge. They identify the danger and
report it to the cloud's data centre, which assists in providing the end users with a solution.
Examples: Popular examples of Cloud antivirus software include Kaspersky endpoint
protection and Sophos endpoint protection.

Entertainment Applications:
Multi-cloud strategies are offered by cloud service providers. It facilitates communication
between entertainment applications and the intended audience. Online gaming and
entertainment services are included.
Examples: Google stadia, it is a cloud gaming service that provides a video gaming experience
at 4K resolution and within 60 frames. Project Atlas is one of the top examples of cloud
entertainment apps. These apps help online gamers establish an instant and smooth connection
and experience a smooth virtual gaming environment.

7
Clique: The IT & Analytics Club of IMNU

URL Conversion Applications:


Many cloud services provide URL shortening options. The goal of URL shortening services is
to reduce the size of long URLs to short URLs. Numerous cloud-based social media tools
provide URL conversion or shortening services. Additionally, they aid in protecting
applications from hacking and malware services. Such cloud computing platforms support or
encourage simple URL management. The acronym URL, which stands for uniform resource
locator, is used here.
Examples: One of the key examples is that of the Bitly. This application helps you to create
short URLs that help redirect the original website. Such applications also support
microblogging.

Meeting Applications:
Virtual servers are a common feature of cloud computing services that facilitate on-site meeting
spaces. They provide meeting applications, including video conferencing. Users of these cloud
computing applications can start virtual meetings. Both personal and professional needs may
justify starting this. Users of the services can quickly connect with others thanks to the services.
Additionally, they provide presentation sharing and screen sharing capabilities to foster
collaboration.
Examples: Zoom and GoTo meetings are some of the key applications of cloud-based meeting
applications. They offer smooth video conferencing and cloud-based presentation services.

Presentation Applications:
There are specific cloud-based applications that help the end-users to create formal
presentations. They also provide storage space to keep new and existing formal presentations.
These apps also enable the end-users to access their presentations from anywhere globally.
Examples: Slide Rocket is one of the premier cloud computing applications. It helps end-users
to draft and customize formal presentations

Social Media Applications:


Real-time connections are possible between users thanks to a number of cloud-based social
media applications. They also offer a platform for teamwork. This is possible from anywhere
in the world. These programmes enable millions of users to connect at once every minute.
Examples: The cloud-based applications that allow millions of users to connect on a real-time
basis are Facebook, Yammer, Twitter, and LinkedIn. They enable the end-users to share videos,
images, stories, and experiences. It drives real-time and personalized engagements across
different locations.

8
Clique: The IT & Analytics Club of IMNU

GPS Applications:
Offering GPS-enabled services to end users is a crucial development in cloud computing
services. Real-time navigation services are made easier with the aid of the GPS. The acronym
GPS refers to the global positioning system. The users of this application use an internet
connection to obtain guidance on the directions shown on the map, which aids in locating
locations.
Examples: The top examples of cloud-based GPS services constitutes Google maps and Yahoo
maps. These are open source and free-to-use applications. GPS-based services are used by
millions of people across the globe.

Accounting Applications:
A new cloud-based accounting tool is available to assist businesses and organisations with
accounting-related tasks. These programmes assist end users in managing profit and loss
statements in real time by allowing them to track expenses in real time.
Examples: One of the best examples of cloud-based accounting applications is Outright. Some
other examples are Zoho books and Kash flow.

Management Applications:
Applications for project management give users the ability to take notes right away and send
them to different stakeholders. Stakeholders' access to prepared notes that have been saved in
one location for reference when assigning tasks helps project management. Both
complimentary and complementary features are offered for these. A one-time subscription fee
must be paid before the user can use the premium features. The needs of the user's personal
and professional lives can be met by these programmes.
Example: The cloud services also provide management-related applications such as Evernote.

E-commerce Applications:
C Additionally, loud computing services have made significant progress in providing
ecommerce services. There are many cloud-based e-commerce applications that support the
ecommerce industry's need for streamlined and accessible business operations. These
programmes include dynamic tracking features that aid in the order tracking procedures. It
keeps track of the status of both the delivered and received orders. Knowing the tracking costs,
order refund rate, and business damage rate also aids business owners. With the aid of these
applications, business owners can track their inventory with a great deal less time and effort.
In terms of managing such applications, there are no upfront costs.

9
Clique: The IT & Analytics Club of IMNU

Examples: One of the best examples of cloud-based e-commerce applications is Amazon,


eBay, etc.

Data Governance and Cyber Security:


This application aims to provide cloud-based security. The organisation can secure a lot of
sensitive data by using this application. They outsmart hackers and make sure that all intrusions
into the organisational data are completely stopped.
Examples: Generally speaking, Z-Scalar operates as a zero-trust platform. It can link users
remotely to any hardware or software running on any network. It encourages flexible and safe
remote employment. Another illustration of a cloud-based cyber security feature that guards
against potential ransomware is Carbonite cloud. In essence, it strives to lessen security
breaches. Another illustration of a cloud-based solution that gives businesses access to
cybersecurity features is Force point.

Back-up and recovery:


The cloud provider and the vendor offer data backup and security services. This helps the data
be backed properly and helps secure data. If data is lost, they also have recovery solutions that
help faster data recovery. The traditional methods of data recovery could become a complex
problem. Sometimes retrieving lost data could be cumbersome. However, cloud computing
eliminates such limitations and promotes robust data recovery and backup solutions.
Examples: Examples of backup and recovery solutions include Drive personal, Back blaze,
and Crash Plan for small businesses.

Testing and development:


Cloud computing provides platforms that help in real-time testing and the development of IT
enabled resources. They ensure that the IT-enabled resources are ready to be used to deliver
services. Such services are offered cheap and are not all expensive. This, in turn, helps the
organizations to develop scalable and flexible IT products or services to drive the best
solutions.
Examples: Cloud-based testing and development examples comprise SOASTA CloudTest,
Load storm, and Blaze Meter.

Big Data Analytics:


Cloud computing services offer solutions that help in the churning and managing of big data.
Big data is a collection of data growing each day exponentially and generally presents the
characteristics of having huge volumes. It comprises data that is of considerable complexity
and size. Traditional computing mechanisms offers limited to no solutions to handle and
manage big data. Cloud computing offers solutions that help manage big data and eliminate

10
Clique: The IT & Analytics Club of IMNU

the need to have physical stores. Additionally, cloud computing offers big data analytics that
helps in driving the analysis of big raw data. This helps organizations to make decisions on a
quickly basis and focuses on the insights shared from cloud services.
Examples: Examples of cloud-based big data solutions are driven by Hana, Hadoop, Apache,
etc.

Cloud adoption in retail industry


The adoption of the cloud has not been uniformed across retail subsectors or functions. Pure-
play retailers, especially the digital natives that started with a “cloud-first” approach, are taking
advantage of the cloud’s ability to scale as needed. But traditional retailers, burdened by their
multiple, disjointed, and hard-to-abandon legacy systems, have been slower to make the
transition, although most agree that migrating workloads to the cloud is both necessary and
valuable.
The retailers take a journey or workflow approach to leveraging the cloud. The workflows and
their corresponding applications share two key criteria: they are ideally suited to leverage
advanced cloud capabilities such as big data, artificial intelligence/machine learning (AI/ML),
application-programming-interface (API) platforms, and developer tools, and they will drive
maximum value for customers.
Cloud computing in retail is used in many ways, including pricing management, inventory
management, remote warehouse management, and more. For example, cloud computing can
provide real-time data and help with real-time monitoring and tracking of inventory. As the
competition in the retail industry is increasing day by day, it’s essential for retailers to adopt
the cloud in order to thrive.

Cloud adoption in life-science industry:


Life-sciences companies are discovering the potency of cloud in enabling analytics, shrinking
innovation cycles, and standardizing processes across global operations, among other benefits.
Accordingly, recent cloud deals in life sciences have become a significant share of the
industry’s IT investment.
Moderna, for example, was able to deliver its first clinical batch of its COVID-19 vaccine
candidate to the US National Institutes of Health for Phase I trial only 42 days after the initial
sequencing of the virus by using cloud technology.
One of the many benefits of cloud computing in the life science industry is the ability to reduce
IT operational costs by outsourcing IT maintenance and support to the cloud provider. This
enables the life science industry to reallocate resources towards key objectives such as
developing new vaccines or medicines.

11
Clique: The IT & Analytics Club of IMNU

Cloud adoption in Banking Industry:


Cloud technologies are often dismissed in financial services due to the perception of higher
associated risk and security concerns. But some commercial banking groups have started to
break through those myths and harness cloud to enable and scale their digital strategies,
including product innovation, at much faster speeds. In doing so, they are gaining compelling
competitive advantages.

Examples:
Cloud computing ensures secure transactions and smooth customer experience in banks.
Hosting over the internet with the help of web apps ensures better speed and service to the
users. Payment Gateways, digital wallets, online fund transfer, and secure online payments are
among the best examples of the cloud computing service. Cloud ensures the secure and unified
customer experience. Updating the payments is quite very easy through cloud computing.
Use Cases in Banking:

12
Clique: The IT & Analytics Club of IMNU

Green Computing

Green computing, also known as green technology, is the use of computers and other
computing devices and equipment in energy-efficient and eco-friendly ways. Organizations
that use green computing methods often deploy energy-efficient central processing units
(CPUs), servers, peripherals and power systems. They also focus on reducing resource use and
properly disposing of physical and electronic waste (e-waste)

Green Computing Strategy


IT managers typically focus energy efficiency efforts on data centers, equipment rooms,
storage areas and other elements that use energy or are affected by energy use. Also a carbon
credit is one factor as it is used as a tradable permit or certificate that provides the holder of the
credit the right to emit one ton of carbon dioxide or an equivalent of another greenhouse gas
Saving money is one driving factor. Government regulations dealing with energy conservation
also drive green efforts. Concern about climate change, along with internal and external
pressure to be environmentally responsible and reducing the carbon foot print is a third factor
behind the green movement.

Strategies used in green computing

1. Smart technology - Organizations can use internet of things sensors and artificial
intelligence (AI) monitoring tools to collect and analyze information about the data
center and create a power usage model. AI-powered tools can also autonomously
manage heating, cooling, and power in the data center.
2. Upgrade and rearrange the data center - Older equipment often uses more energy
and puts out more heat than newer devices. Hot and cold aisle setups can be used to
group assets based on energy consumption and temperature, optimizing heating,
ventilation and air conditioning (HVAC) efficiency.
3. Power down - CPUs and peripherals can be powered down and turned off during
extended periods of inactivity. Power up energy-intensive peripherals, such as laser
printers, only when needed.
4. Virtualization - Virtualization is installing virtual infrastructure that allows several
operating systems and applications to sum on a lesser number of servers, helping to
reduce overall energy used for data centers.
5. Cooling Innovation - Cooling is an extremely important process in modern data
centers. Cooling systems of server rooms ensure appropriate operation conditions to IT
systems, such as servers and data storage, but, on the other side, they consume a lot of
energy.

13
Clique: The IT & Analytics Club of IMNU

Approaches to Green Computing

For the promotion of green computing, the below four approaches are utilized
1. Green Use – Reducing the power usage of computers and its periphery subsystems and
using them in an eco-friendly manner. Also adopting virtualization reducing the need
of energy.
2. Green Disposal – Recycling and reusing existing equipment, properly disposing the
wasted IT/computing materials, electronic equipment etc.
3. Green Design – Designing energy efficient as well as effective systems which have a
minimal impact on the green environment.
4. Green manufacturing – Manufacturing Biodegradable materials, also manufacturing
long usable, recyclable products and reducing wastage during manufacturing process.

Greening integrate with different IT Technologies


Green Cloud Computing
The green computing initiative also embodies sustainability in operations. Cloud data centers
operating on renewable energy resources lead to zero GHG emissions. Renewable energy from
sources such as the sun and the wind can be generated from on-site installations or purchased
from off-site corporations. The main drawbacks of renewable energy-based cloud data center
operations are the associated cost and unpredictable supply of the renewable resource. It is
estimated that with the advances in storage capacities, the cost/Watt of renewable energy will
halve in the next decade. Below given figure illustrates the options for greening cloud
computing systems.

14
Clique: The IT & Analytics Club of IMNU

Green Mobile Computing


Smartphones of recent generations are equipped with high storage capacity and the
computational power to perform resource-intensive tasks. Emerging media-rich smartphone
applications frequently trigger sensors, such as GPS, accelerometer, and wireless radios to
provide context-aware services. As a result, the computation, communication, and energy cost
of smartphones significantly increase. To handle the energy-performance trade-off, energy-
efficient system designs are necessary to meet the requirements of modern smartphone devices.
The figure depicts techniques for green mobile computing

Green big data analytics

The figure shows a green big data analytics process where storage and processing resources
reside on clouds and can be requested on demand. Cloud computing technology provides the

15
Clique: The IT & Analytics Club of IMNU

basis for green big data analytics as the optimum resource utilization with reduced energy
consumption. Currently, major big data sources and consumers are social networks, healthcare,
industries, commerce, and business enterprises.
An overall analysis of the state-of-the-art in green computing shows that the green algorithms
and protocols are reaching a high level of maturity, and significant efficiencies are possible.
The strength of green computing solutions lies in their diversity, with consideration of low-
level processor, memory, and network components for system optimization alongside greedy
and evolutionary heuristics. However, again, this must coincide with robust and intelligent
strategies that consider the overall performance energy trade-offs in terms of multi-objective
optimization.

Green IOT (Internet Of Things)


Green IoT is a set of procedures adopted by the IoT in the form of hardware or software
efficiency techniques. Green IoT aims to achieve energy efficiency through the reduction of
the greenhouse effect in the current services and applications. Moreover, to reduce the impact
on the environment, Green IoT focuses on the issues of green productions, green redesign, and
green recycling/disposal. Green Radio-Frequency IDentification (GRFID) Radio Frequency
Identification (RFID) is one of the promising IoT enablers. A RFID system comprises of RFID
tags and tags readers. RFID tags are in the form of microchips attached to the radio that works
as a transceiver. Green Wireless Sensor Network is a wireless sensor network comprise of
numerous sensor nodes that have resource-constraints, such as limited computing capability,
storage capacity, and power

Current companies which are using some of the ideologies mentioned above are as
follows:
1. Dell – Dell is keen to decrease the energy requirements of its data centres and hardware
and has been working to reduce its environmental impact. The company has been one
of the leading innovators in the tech sector when it comes to packaging and recycling
and in 2014 the company launched its ‘2020 Legacy of Good’ plan. In the plan, the
company has set goals to reduce greenhouse gas emissions from its facilities and
logistics operations, as well as reducing the energy intensity of its product portfolio by
80%. The company has set a few other environmentally friendly goals, but only time
will tell if they can achieve them.
2. IBM – IBM has been one of the ‘green’ leaders in tech for several years, dating back to
1967 when it issued its first policy on environmental affairs. Big Blue states on its
website that they will: "Use development and manufacturing processes that do not
adversely affect the environment, including developing and improving operations and
technologies to minimize waste, prevent air, water, and other pollution, minimize health
and safety risks, and dispose of waste safely and responsibly." The company is very
open about its achievements and failings when it comes to its environmental policy, for
example detailing its hazardous waste performances.

16
Clique: The IT & Analytics Club of IMNU

Quantum Computing

The quantum in "quantum computing" refers to the quantum mechanics that the system uses to
calculate outputs. In physics, a quantum is the smallest possible discrete unit of any physical
property. It usually refers to properties of atomic or subatomic particles, such as electrons,
neutrinos and photons.
Quantum computers harness the unique behaviour of quantum physics—such as superposition,
entanglement and quantum interference—and apply it to computing. This introduces new
concepts to traditional programming methods.

Quantum computing working


As you might have guessed, quantum computing is a complex field that’s difficult for non-
experts to understand. However, it is possible to grasp some of the fundamental concepts,
giving you a basic understanding of how quantum computers work. To grasp how quantum
computing works, there are a few key concepts to understand. Below, we’ve given some simple
explanations of these:

Qubits
As we explore in our open step on qubits, traditional computers are built on bits. These bits
(short for binary digits) are the basic units of information in computing, where two distinct
configurations can be measured. They can be thought of as on or off, up or down, or, as encoded
in binary, as either 0s or 1s.
In quantum computing, quantum bits or qubits form the basics of how these computers work.
These qubits can be made from quantum-mechanical systems that can have two states. For
example, the spin of an electron can be measured as up or down, or a single photon is either
vertically or horizontally polarised.

Superposition
Unlike traditional computing bits, which can be either 0s or 1s, qubits can exist as either 0s or
1s, or a mix of both simultaneously. This phenomenon, known as a state of superposition,
means that all combinations of information can exist at once.
When qubits are combined together, this ability to hold all possible configurations of
information at once means that complex problems can be represented far easier than with
traditional computing methods.

17
Clique: The IT & Analytics Club of IMNU

Entanglement
Another key part of quantum computing is the quantum effect known as entanglement. Put
simply, this phenomenon creates a correlation between two qubits. As such, when two or more
qubits are entangled, a change to one can impact the others.
Quantum computing algorithms are based on this principle, allowing complex problems to be
solved far quicker than would otherwise be possible.

Need of Quantum Computing

When scientists and engineers encounter difficult problems, they turn to supercomputers. These
are very large classical computers, often with thousands of classical CPU and GPU cores.
However, even supercomputers struggle to solve certain kinds of problems. If a supercomputer
gets stumped, that's probably because the big classical machine was asked to solve a problem
with a high degree of complexity. When classical computers fail, it's often due to complexity.
Complex problems are problems with lots of variables interacting in complicated ways.
Modeling the behavior of individual atoms in a molecule is a complex problem, because of all
the different electrons interacting with one another. Sorting out the ideal routes for a few
hundred tankers in a global shipping network is complex too.

Uses of Quantum Computer

Quantum simulation
Quantum computers work exceptionally well for modelling other quantum systems because
they use quantum phenomena in their computation. This means that they can handle the
complexity and ambiguity of systems that would overload classical computers. Examples of
quantum systems that we can model include photosynthesis, superconductivity and complex
molecular formations.
Cryptography
Classical cryptography—such as the Rivest–Shamir–Adleman (RSA) algorithm that is widely
used to secure data transmission—relies on the intractability of problems such as integer
factorisation or discrete logarithms. Many of these problems can be solved more efficiently
using quantum computers.
Optimisation
Optimisation is the process of finding the best solution to a problem given its desired outcome
and constraints. In science and industry, critical decisions are made based on factors such as
cost, quality and production time—all of which can be optimised. By running quantum-inspired
optimisation algorithms on classical computers, we can find solutions that were previously

18
Clique: The IT & Analytics Club of IMNU

impossible. This helps us find better ways to manage complex systems such as traffic flows,
airplane gate assignments, package deliveries and energy storage.
Quantum machine learning
Machine learning on classical computers is revolutionising the world of science and business.
However, training machine learning models comes with a high computational cost and that has
hindered the scope and development of the field. To speed up progress in this area, we are
exploring ways to devise and implement quantum software that enables faster machine
learning.

Advantages of Quantum computing:


1. The main advantage of quantum computing is that it is even classical algorithm
calculations. They are also performed easily which is similar to the classical
computer.
2. If we adding the qubits to the register, we increase its storage capacity exponentially.
3. In this computing qubit is the conventional superposition state. So there are
advantages of exponential speedup to the resulted by handle the number of
calculations and method.
4. Quantum computing required less power.
5. The other advantage of quantum computing is it can execute any task very faster and
very accurately compared to a classical computer. Generally, the atom changes very
faster in the case of traditional computing whereas in quantum computing it changes
even faster.

Disadvantages of Quantum computing:


1. The research for this problem is still continuing the effort applied to identify a
solution for this problem that has no positive progress.
2. Qubits are not digital bits of the day thus they cannot use as conventional error
correction.
3. The main disadvantage of Quantum computing is the technology required to
implement a quantum computer is not available at present days.
4. The minimum energy requirement for quantum logical operations is five times that
of classical computers.
5. Quantum CPU will have efficiency and heating problems of its own.
6. When a measurement of any type is made to a quantum system, decoherence is
totally broken down and the wave function collapses into a single state.

19
Clique: The IT & Analytics Club of IMNU

After knowing about the basic of quantum computing, let’s dive into some real sector
usage of quantum computing:

1. Finance – Quantum-Computing use cases in finance are a bit further in the future, and
the advantages of possible short-term uses are speculative. However, it can be believed
that the most promising use cases of quantum computing in finance are in portfolio and
risk management. For example, efficiently quantum-optimized loan portfolios that
focus on collateral could allow lenders to improve their offerings, possibly lowering
interest rates and freeing up capital. It is early—and complicated—to estimate the value
potential of quantum computing–enhanced collateral management, but as of 2021, the
global lending market stands at $6.9 trillion, which suggests significant potential impact
from quantum optimization.

2. Pharmaceuticals – Quantum computing has the potential to revolutionize the research


and development of molecular structures in the biopharmaceuticals industry as well as
provide value in production and further down the value chain. In R&D, for example,
new drugs take an average of $2 billion and more than ten years to reach the market
after discovery. Quantum computing could make R&D dramatically faster and more
targeted and precise by making target identification, drug design, and toxicity testing
less dependent on trial and error and therefore more efficient. A faster R&D timeline
could get products to the right patients more quickly and more efficiently—in short, it
would improve more patients’ quality of life. Production, logistics, and supply chain
could also benefit from quantum computing. While it is difficult to estimate how much
revenue or patient impact such advances could create, in a $1.5 trillion industry with
average margins in earnings before interest and taxes (EBIT) of 16 percent (by our
calculations), even a 1 to 5 percent revenue increase would result in $15 billion to $75
billion of additional revenues and $2 billion to $12 billion in EBIT.

3. Automotive – The automotive industry can benefit from quantum computing in its
R&D, product design, supply-chain management, production, and mobility and traffic
management. The technology could, for example, be applied to decrease manufacturing
process–related costs and shorten cycle times by optimizing elements such as path
planning in complex multirobot processes (the path a robot follows to complete a task)
including welding, gluing, and painting. Even a 2 to 5 percent productivity gain—in the
context of an industry that spends $500 billion per year on manufacturing costs—would
create $10 billion to $25 billion of value per year.

20
Clique: The IT & Analytics Club of IMNU

Metaverse

The metaverse is a virtual universe that extends the physical world's dimensions. Consider it a
hyper-realistic video game. Its purpose is to replicate what people already do on a daily basis,
such as socialising, shopping, and attending concerts. It recreates the real world in a virtual
environment in which users can interact with spaces, objects, and other individuals.
Additionally, the metaverse will be a vast industrial workspace. Before implementing their
equipment in the real world, manufacturing companies can test "digital twins" of their
machinery in the metaverse. The design can then be modified or enhanced prior to construction,
saving time and resources.
High-quality virtual reality, which allows users to interact with different elements as they
would in the real world, is essential to the development of the metaverse. The implementation
of the metaverse will be closely tied to the advancement of augmented reality technology.
Notably, the metaverse will not be a single platform, but rather a collection of interconnected
websites. You can freely move between platforms while maintaining the same avatars and
digital objects, similar to how Internet users today navigate between websites.

Pros of Metaverse:
1) Connecting the world and negating physical distance
The most notable benefit of the metaverse would be that it completely eliminates geographical
barriers. As soon as you enter the virtual world, your physical location becomes irrelevant and
you are no longer constrained by it.
2) Immersive experience
Consider the metaverse to be a 3D upgrade to traditional internet usage. A more immersive
way to experience the various aspects of the Internet and everything it has to offer.
3) Better Social Interactions online
During the Covid quarantine, the only way to communicate with other humans was via the
internet, despite its lack of interactivity.

4) Upgrading social media

Social media is likely the most popular term of the past decade. Facebook (Meta )
and Twitter are dependent on the social aspect of the Internet. They will
undoubtedly benefit from the upgrade to a virtua l environment in three
dimensions.

21
Clique: The IT & Analytics Club of IMNU

5) New business opportunities

Similar to how social media has contributed to the creation of numer ous business
opportunities and spawned a new form of marketing and advertising on its
platforms, the metaverse will likely p rovide even more opportunities.

6) Improvements to online learning and education

Learning and education were impacted by the Covid pan demic, as more than 90
percent of students were unable to continue their studies and we were forced to
find alternative methods to resume education. This is when online learning using
platforms such as Zoom became the norm. The metaverse will make learning more
accessible than ever before.

Cons of Metaverse:

1) Cybercrime

Cybercrime is a significant issue that has plagued the Int ernet since its inception.
Governments have spent millions of dollars and years combating it, thereby
enhancing the security of our current internet systems.

2) Negative Impact on cultures and societies

One disadvantage of bringing everyone so close together and fusing the various
cultures of the world into one is the loss of the world's beautiful cultural diversity.
If people spend the majority of their time in the metave rse, they will no longer
feel connected to their immediate society and will not feel the need to embrace
their local or regional culture.

3) Addiction Problems

Like gaming, addiction can become a problem. Some argue that ther e is a greater
risk of addiction in the metaverse because you are completely immersed in a
virtual world. Aside from physical necessities such as eating and sleeping, you do
not need to leave your VR setup.

4) Losing connection with the physical world

The ease with which you can lose track of time while in the metaverse is a major
concern for many individuals. As your senses are effectively disabled, or to put it
another way, they are linked to the virtual world rather than the real world.

22
Clique: The IT & Analytics Club of IMNU

5) Privacy and Security Issue

Internet privacy has always been a concern, with many users unaware that their
information is collected and sold to advertisers, among other things.

6) Virtual Bullying

The internet is notoriously hostile, and strangers tend to be cruel and intolerant of
individuals' differences. Malicious behaviour toward others can be observed in all
areas of the Internet, including social media and video games.

Metaverse Influences the Marketing

According to Bloomberg, the global economic value of the metaverse cou ld reach
$800 billion by 2024. It should come as no surprise that the metaverse will have a
significant impact on digital media and ecommerce, given that it is likely to be the
future of the Internet.

It is difficult to predict how much disruption the meta verse will cause, but there
is no doubt that it will pave the way for new and innovative ways of doing things.
Therefore, marketers must be at the forefront of its development.

Some aspects of "traditional" digital advertising may be carried over into the
metaverse, but there will also be entirely new dynamics where user experience
will play a central role.

Tim Sweeney, the founder of Epic Games, believes that games will play a crucial
role in the metaverse. The future of gaming will feature less display ad vertising
and a greater emphasis on exciting, engaging experiences.

With the evolution of the metaverse, brands will be req uired to reconsider their
products, services, and advertising strategies. There is no better time than now to
adapt to this new reality so that you are prepared to take advantage of the
metaverse and remain ahead of the competition

Example : - Gaming in the metaverse already has mainstream traction. Consumer


use cases are now expanding into new immersive retail, entertainment, sports, and
educational experiences. Then there are the metaverse’s sizable —but less talked
about—enterprise applications and opportunities, including virtual employee
training and team collaboration with avatars, virtual prototyping in manufacturing
and construction, and virtual-showroom displays for products such as cars. Even
government entities are experimenting with th e metaverse. In South Korea, the
city of Seoul announced a five-year Metaverse Seoul Basic Plan that will begin by
creating a virtual Mayor’s Office and a Seoul Campus Town. In December, Facebook

23
Clique: The IT & Analytics Club of IMNU

rebranded itself as Meta, and CEO Mark Zuckerberg declared his ambition to “help bring the
metaverse to life.” A month later, Microsoft said that its proposed acquisition of gaming giant
Activision provided “building blocks for the metaverse.”

Metaverse adoption in Healthcare In dustry


Johns Hopkins recently performed its first pair of surgeries on live patients using augmented
reality displays. The head of the neurosurgery and spinal department has said that it’s like using
GPS for the first time. It’s not that it teaches you how to drive; it doesn’t drive the car for you,
but you find that your ability to execute this task is much better than ever. Why does that matter
as a use case? Well, not only is healthcare a costly industry, but like GPS and AR in surgery,
it just needs to have a marginal impact on something of critical importance. It doesn’t need to
perform the surgery; all we need is a meaningful increase to success rates.

Metaverse adoption in Educational Service Industry


There are already a field of coursework and materials that are being produced that provide
educators with a new way to express and participate in education in the classroom. I grew up
building a volcano out of baking soda and vinegar and papier-mâché. Right now, students are
able to immerse themselves at the microscopic level, agitate magma, experience virtually being
the magma as it is ejected from that volcano into the atmosphere, and experience the impact of
those physics not just on earth but on the oceans of Venus.

24
Clique: The IT & Analytics Club of IMNU

Section-2: Current Technology

Blockchain
Blockchain, sometimes referred to as Distributed Ledger Technology (DLT) is a database that
stores encrypted blocks of data then chains them together to form a chronological single-
source-of-truth for the data. The asset is decentralized, allowing full real-time access and
transparency to the public.

Blockchain consists of three important concepts: blocks, nodes and miners-

• Blocks

Every chain consists of multiple blocks and each block has three basic elements:

➢ The data in the block a 32-bit whole number called a nonce. The nonce is randomly
generated when a block is created, which then generates a block header hash.
➢ The hash is a 256-bit number wedded to the nonce. It must start with a huge number
of zeroes (i.e., be extremely small).
➢ When the first block of a chain is created, a nonce generates the cryptographic hash.
The data in the block is considered signed and forever tied to the nonce and hash
unless it is mined.

• Miners
➢ Miners create new blocks on the chain through a process called mining.
➢ Miners use special software to solve the incredibly complex math problem of
finding a nonce that generates an accepted hash. Because the nonce is only 32 bits and
the hash is 256, there are roughly four billion possible nonce-hash combinations that
must be mined before the right one is found. When that happens, miners are said to
have found the "golden nonce" and their block is added to the chain.
➢ When a block is successfully mined, the change is accepted by all of the nodes on the
network and the miner is rewarded financially.

25
Clique: The IT & Analytics Club of IMNU

• Nodes
➢ Nodes can be any kind of electronic device that maintains copies of the blockchain
and keeps the network functioning.
➢ Every node has its own copy of the blockchain and the network must algorithmically
approve any newly mined block for the chain to be updated, trusted and verified.
Since blockchains are transparent, every action in the ledger can be easily checked
and viewed. Each participant is given a unique alphanumeric identification
number that shows their transactions.

Example

Personal loans and other forms of finance

Banks and financial firms provide loans to individuals and businesses in times of need — it
is an essential facet of the financial industry. But there are inefficiencies in the structure like
biases of the lender while giving out the loan, exhausting KYC processes and long waiting
periods. Blockchain technology could remove these inefficiencies.

In the normal lending process, a middleman is necessary to facilitate the loan, its approval,
and disbursal. But using blockchain smart contract technology, the process can be made
seamless. A smart contract is a piece of code that executes itself after certain conditions
within the contract are met.

The lender and seeker can agree to fair and feasible terms like proof-of-funds and payment
planning using smart contracts. These contracts will then validate and record transactions
without any bank or middleman, leading to a faster verification of the loan seeker and more
immediate loan disbursement.

26
Clique: The IT & Analytics Club of IMNU

Internet of Things (IOT)

The term IoT, or Internet of Things, refers to the collective network of connected devices and
the technology that facilitates communication between devices and the cloud, as well as
between the devices themselves. The Internet of Things integrates everyday “things” with the
internet. An IoT ecosystem consists of web-enabled smart devices that use embedded
systems, such as processors, sensors and communication hardware, to collect, send and act on
data they acquire from their environments. IoT devices share the sensor data they collect by
connecting to an IoT gateway or other edge device where data is either sent to the cloud to be
analysed or analysed locally.

The internet of things helps people live and work smarter, as well as gain complete control
over their lives. In addition to offering smart devices to automate homes, IoT is essential to
business. IoT provides businesses with a real-time look into how their systems really work,
delivering insights into everything from the performance of machines to supply chain and
logistics operations.IoT enables companies to automate processes and reduce labor costs. It
also cuts down on waste and improves service delivery, making it less expensive to
manufacture and deliver goods, as well as offering transparency into customer transactions.
As such, IoT is one of the most important technologies of everyday life, and it will continue
to pick up steam as more businesses realize the potential of connected devices to keep them
competitive.

Example

Home automation is one of the best examples of IoT. Smart homes or IoT-based home
automation systems are becoming popular day by day. In a smart home, consumer electronic
gadgets such as lights, fans, air-conditioners, etc. can be connected to each other via the
internet. This interconnection enables the user to operate these devices from a distance. A smart
home is capable of lighting control, energy management, expansion, and remote access.
Currently, this application of IoT is not utilized at a large scale because the installation cost is
too high, which makes it difficult for a majority of people to afford it. However, home
automation holds quite a promising future.

27
Clique: The IT & Analytics Club of IMNU

Artificial Intelligence (AI)

Artificial intelligence (AI) is a wide-ranging branch of computer science concerned with


building smart machines capable of performing tasks that typically require human intelligence.
AI works by combining large amounts of data with fast, iterative processing and intelligent
algorithms, allowing the software to learn automatically from patterns or features in the data.
AI is a broad field of study that includes many theories, methods and technologies, as well as
the following major subfields: Machine Learning, Neural Networks, Deep Learning.

AI makes it possible for machines to learn from experience, adjust to new inputs and perform
human-like tasks. Most AI examples that you hear about today – from chess-playing
computers to self-driving cars – rely heavily on deep learning and natural language
processing. Using these technologies, computers can be trained to accomplish specific tasks
by processing large amounts of data and recognizing patterns in the data.

Instead of automating manual tasks, AI performs frequent, high-volume, computerized tasks.


And it does so reliably and without fatigue. Of course, humans are still essential to set up the
system and ask the right questions. AI finds structure and regularities in data so that
algorithms can acquire skills. Just as an algorithm can teach itself to play chess, it can teach
itself what product to recommend next online. And the models adapt when given new data.

Example

We might have used navigation services or others to find our way through at some point in our
lives. For many, it is part of their daily lives. Whether using maps for navigation or using a
taxi-hire service like Uber, you are using AI-enabled services to travel from one place to
another.

Google, Apple, and many other navigation-related service providers utilize AI to interpret the
scores of information being received and provide you with information that helps in navigation
and get live traffic updates, allowing you to commute more efficiently.

28
Clique: The IT & Analytics Club of IMNU

Augmented Reality

Augmented reality (AR) is an enhanced version of the real physical world that is achieved
through the use of digital visual elements, sound, or other sensory stimuli delivered via
technology. One of augmented reality’s primary goals is to highlight specific features of the
physical world, increase understanding of those features, and derive smart and accessible
insight that can be applied to real-world applications.

AR is the integration of digital information with the user’s environment in real time. Unlike
virtual reality, which creates a totally artificial environment, augmented reality uses the
existing environment and overlays new information on top of it.

Example

IKEA Mobile App

App Aside from furniture with fun names that you need to assemble yourself and cheap
Swedish meatballs, IKEA is also known in the tech world as one of the first companies to use
augmented reality well.

The retailer begins experiencing augmented reality back in 2012, when shoppers could use
the app to see how tables and shelves would look in various places around your house. IKEA
is taking it a step further with its IKEA Place app, which now allows you select anything
from the store’s catalogue and see how it will look to scale anywhere in your house. This is
an extremely helpful tool for people who are wondering if a certain piece of furniture will fit
in a tight space, or if the colour of their prospective purchase will match the motif of the
room.

29
Clique: The IT & Analytics Club of IMNU

Virtual Reality

Virtual Reality (VR) is a computer-generated environment with scenes and objects that
appear to be real, making the user feel they are immersed in their surroundings. This
environment is perceived through a device known as a Virtual Reality headset. VR allows us
to immerse ourselves in video games as if we were one of the characters, learn how to
perform heart surgery or improve the quality of sports training to maximize performance.

Example

VR in Sport

VR is revolutionising the sports industry for players, coaches and viewers. Virtual reality can
be used by coaches and players to train more efficiently across a range of sports, as they are

30
Clique: The IT & Analytics Club of IMNU

able to watch and experience certain situations repeatedly and can improve each time.
Essentially, it’s used as a training aid to help measure athletic performance and analyse
technique. Some say it can also be used to improve athletes' cognitive abilities when injured,
as it allows them to experience gameplay scenarios virtually. Similarly, VR has also been used
to enhance the viewer’s experience of a sporting event. Broadcasters are now streaming live
games in virtual reality and preparing to one day sell virtual tickets to live games so that anyone
from anywhere in the world can ‘attend’ any sports event. Potentially, this could also allow for
those who cannot afford to spend money on attending live sports events to feel included as they
can enjoy the same experience remotely, either for free or at a lesser cost.

31
Clique: The IT & Analytics Club of IMNU

Cloud Computing

Cloud computing refers to the use of hosted services, such as data storage, servers, databases,
networking, and software over the internet. The data is stored on physical servers, which are
maintained by a cloud service provider. Computer system resources, especially data storage
and computing power, are available on-demand, without direct management by the user in
cloud computing. Instead of storing files on a storage device or hard drive, a user can save
them on cloud, making it possible to access the files from anywhere, as long as they have
access to the web. The services hosted on cloud can be broadly divided into infrastructure-as-
a-service (IaaS), platform-as-a-service (PaaS), and software-as-a-service (SaaS). Based on the
deployment model, cloud can also be classified as public, private, and hybrid cloud.

Further, cloud can be divided into two different layers, namely, front-end and back-end. The
layer with which users interact is called the front-end layer. This layer enables a user to
access the data that has been stored in cloud through cloud computing software. The layer
made up of software and hardware, i.e., the computers, servers, central servers, and
databases, is the back-end layer. This layer is the primary component of cloud and is entirely
responsible for storing information securely. To ensure seamless connectivity between
devices linked via cloud computing, the central servers use a software called middleware that
acts as a bridge between the database and applications.

Example

Dropbox, Facebook, Gmail

Cloud can be used for storage of files. The advantage is an easy backup. They automatically
synchronize the files from the desktop. Dropbox allowing users to access files and storage up
to 1 terabyte of free storage. Social Networking platform requires a powerful hosting to
manage and store data in real-time. Cloud-based communication provides click-to-call
capabilities from social networking sites, access to the Instant messaging system.

32
Clique: The IT & Analytics Club of IMNU

Cyber Security

Also known as information technology (IT) security, cybersecurity measures are designed to
combat threats against networked systems and applications, whether those threats originate
from inside or outside of an organization. A strong cybersecurity strategy has layers of
protection to defend against cybercrime, including cyber-attacks that attempt to access,
change, or destroy data; extort money from users or the organization; or aim to disrupt
normal business operations.

The term applies in a variety of contexts, from business to mobile computing, and can be
divided into a few common categories-

➢ Network security- It is the practice of securing a computer network from intruders,


whether targeted attackers or opportunistic malware.

➢ Application security- It focuses on keeping software and devices free of threats. A


compromised application could provide access to the data its designed to protect.

➢ Information security- It protects the integrity and privacy of data, both in storage
and in transit.

➢ Operational security- It includes the processes and decisions for handling and
protecting data assets. The permissions users have when accessing a network and the
procedures that determine how and where data may be stored or shared all fall under
this umbrella.

Example

Password Attacks

Back in August of 2021, the Canada Revenue Agency was a victim of a password cyber-attack,
whereas their online systems were shut down for several days, and over 5000 accounts were
compromised! This was due to the technique called credential stuffing. This is where the

33
Clique: The IT & Analytics Club of IMNU

hackers buy or steal users’ passwords from other sources and data breaches, and they use those
passwords to try to log into the CRA accounts. This can be a huge problem, especially if users
use the same password across multiple platforms.

34
Clique: The IT & Analytics Club of IMNU

Section-3: Application Of Current Technology

Application of Internet of Things

Pharmaceutical Industry:

• Drug Discovery and Development


1. Organ in a chip devices to run real life diagnosis scenario
2. Wearable device for subjects with sensors for real time health reporting
3. Use of sensors and devices to monitor clinical sites, subject screening and real
time reporting
• Manufacturing and Supply Chain
1. Use of auto ID with AIDC( Automated Information Data Collection) for smart
serialization
2. Real time logistic visibility using RFID and sensors to capture and report
parameters including temperature
3. Smart warehousing and routing
4. Predictive maintenance of machines and equipment

Smart Agriculture:

• Monitoring of Climate Condition


1. The most popular smart agriculture gadgets are weather stations, combining
various smart farming sensors that located across the fields, they collect various
data from the environment and send it to the cloud
2. The provided measurements can be used to map the climate condition, choose
the appropriate crops, and take the required measures to improve their capacity
• Greenhouse Automation
1. The use of IoT sensors enables them to get accurate real time information on
greenhouse condition such as lightning, temperature, soil condition and
humidity
2. Addition to sourcing environmental data, weather stations can automatically
adjust the conditions to match the given parameters. Specifically greenhouse
automation system use a similar principle

35
Clique: The IT & Analytics Club of IMNU

Application of Virtual Reality

1) Healthcare: Virtual reality (VR) creates a space where people can learn and develop
in actual, outdoor settings. Specialists who need to carry out extremely precise
operations can practise with VR without having to deal with an emergency.
Additionally, practitioners who need to familiarize themselves with the hospital
setting can do so without added stress and also the technology is used in cognitive
behavior therapy, which gives patients with phobias and anxieties a safe environment
in which to work through their issues.

2) Entertainment: One of the first sectors to adopt VR was the entertainment sector,
which continues to be one of its best uses today. You can see that virtual reality (VR)
is widely used in the online and/or console gaming industries. Similar to this, virtual
reality (VR) is being implemented in theatres and theme parks to simulate movie-like
adventures and enable visitors to experience their preferred cinematic masterpieces.

3) Automotive: VR aids automakers in their analysis of traffic situations and vehicle


behavior. Before creating a new model, they can evaluate and improve the prototypes
using the simulated scenarios. The development of the smart cars that will dominate
the market in the future makes extensive use of virtual reality. Artificial intelligence
(AR) and virtual reality are being used to teach cars how to drive, turn, and stop.

4) Education:
Even though it's thought that the education sector adopts new trends and technologies
rather slowly, virtual reality has already shown a lot of promise. For grownups, it
means that any industry can offer its workers professional training. However, VR is
a component of educational games, field trips, and general world exploration for
younger students.

5) Digital Marketing: Even though the majority of people dislike commercials, seeing
how a product is used up close can be both entertaining and educational. Virtual
reality has many uses in digital marketing. Retailers, for instance, can display
products to prospective customers in their homes. Alternatively, charities could
develop more sympathetic messaging for political issues.

36
Clique: The IT & Analytics Club of IMNU

Application of Augmented Reality

AR Glass:
Another type of transparent wearable device is AR Smart Glasses. Another type of
transparent wearable device is the AR Smart Glasses. They come in a variety of designs,
sizes, and shapes, but all are used to enhance reality. According to the assessment report of
MARKET Research Future, the market for AR Smart Glasses has shown a compound
annual growth rate of 13% as per the type Monocular or Binocular since 2017. The main
factor driving this rise in demand is that these glasses allow users of all ages to view real-
world scenes as well as virtual information, such as three-dimensional images, animations,
videos, etc.

Medical Field: AR is effective at providing a variety of methods that can manage patients'
complex medical conditions and organize the data of various types of surgery. With all of
this, the general public can benefit greatly from appropriate treatments that calm their minds
and remove all of the toxins from their bodies. Medical imaging is one such application of
AR in the medical industry. In order to provide medical benefits to their patients by carefully
examining their body parts, the surgeons, neurologists, or chemotherapists perform various
types of diagnosis in this. It could either be your heart, lungs, brain, or ear.

Mobile:
You can now see in real life what you wonder or have been wondering about for a very long
time thanks to AR, which has pushed the limits of your mobile devices! Mobile applications
utilizing augmented reality technology have made it possible to do everything from measure
the length and width of a kitchen table to design the environment based on your interest in
various pieces of furniture in the real world.

37
Clique: The IT & Analytics Club of IMNU

Application of Artificial Intelligence

1. AI Application in E-Commerce:
AI-powered Assistants: Virtual shopping assistants and chatbots help improve the user
experience while shopping online. Natural Language Processing is used to make the
conversation sound as human and personal as possible. Moreover, these assistants can have
real-time engagement with your customers. Did you know that on amazon.com, soon, customer
service could be handled by chatbots?
Fraud Prevention: Credit card frauds and fake reviews are two of the most significant issues
that E-Commerce companies deal with. By considering the usage patterns, AI can help reduce
the possibility of credit card frauds taking place. Many customers prefer to buy a product or
service based on customer reviews. AI can help identify and handle fake reviews.

2. Applications of Artificial Intelligence in Education:


Administrative Tasks Automated to Aid Educators: Artificial Intelligence can help
educators with non-educational tasks like task-related duties like facilitating and automating
personalized messages to students, back-office tasks like grading paperwork, arranging and
facilitating parent and guardian interactions, routine issue feedback facilitating, managing
enrolment, courses, and HR-related topics.
Creating Smart Content: Digitization of content like video lectures, conferences, and text
book guides can be made using Artificial Intelligence. We can apply different interfaces like
animations and learning content through customization for students from different grades.
Artificial Intelligence helps create a rich learning experience by generating and providing audio
and video summaries and integral lesson plans.
Voice Assistants: Without even the direct involvement of the lecturer or the teacher, a student
can access extra learning material or assistance through Voice Assistants. Through this,
printing costs of temporary handbooks and also provide answers to very common questions
easily.
Personalized Learning: Using AI technology, hyper-personalization techniques can be used
to monitor students’ data thoroughly, and habits, lesson plans, reminders, study guides, flash
notes, frequency or revision, etc., can be easily generated.

38
Clique: The IT & Analytics Club of IMNU

3. Applications of Artificial Intelligence in Lifestyle:


Autonomous Vehicles: Automobile manufacturing companies like Toyota, Audi, Volvo, and
Tesla use machine learning to train computers to think and evolve like humans when it comes
to driving in any environment and object detection to avoid accidents.
Spam Filters: The email that we use in our day-to-day lives has AI that filters out spam emails
sending them to spam or trash folders, letting us see the filtered content only. The popular email
provider, Gmail, has managed to reach a filtration capacity of approximately 99.9%.
Facial Recognition: Our favourite devices like our phones, laptops, and PCs use facial
recognition techniques by using face filters to detect and identify in order to provide secure
access. Apart from personal usage, facial recognition is a widely used Artificial Intelligence
application even in high security-related areas in several industries.
Recommendation System: Various platforms that we use in our daily lives like e-commerce,
entertainment websites, social media, video sharing platforms, like YouTube, etc., all use the
recommendation system to get user data and provide customized recommendations to users to
increase engagement. This is a very widely used Artificial Intelligence application in almost
all industries.

4. Applications of Artificial intelligence in Navigation:


Based on research from MIT, GPS technology can provide users with accurate, timely, and
detailed information to improve safety. The technology uses a combination of Convolutional
Neural Network and Graph Neural Network, which makes lives easier for users by
automatically detecting the number of lanes and road types behind obstructions on the roads.
AI is heavily used by Uber and many logistics companies to improve operational efficiency,
analyse road traffic, and optimize routes.

5. Applications of Artificial Intelligence in Robotics:


Robotics is another field where artificial intelligence applications are commonly used. Robots
powered by AI use real-time updates to sense obstacles in its path and pre-plan its journey
instantly.
It can be used for - Carrying goods in hospitals, factories, and warehouses, Cleaning offices
and large equipment and Inventory management.

6. Applications of Artificial Intelligence in Human Resource:


Did you know that companies use intelligent software to ease the hiring process?
Artificial Intelligence helps with blind hiring. Using machine learning software, you can
examine applications based on specific parameters. AI drive systems can scan job candidates'

39
Clique: The IT & Analytics Club of IMNU

profiles, and resumes to provide recruiters an understanding of the talent pool they must choose
from.

7. Applications of Artificial Intelligence in Healthcare:


Artificial Intelligence finds diverse applications in the healthcare sector. AI applications are
used in healthcare to build sophisticated machines that can detect diseases and identify cancer
cells. Artificial Intelligence can help analyse chronic conditions with lab and other medical
data to ensure early diagnosis. AI uses the combination of historical data and medical
intelligence for the discovery of new drugs.

8. Applications of Artificial Intelligence in Agriculture:


Artificial Intelligence is used to identify defects and nutrient deficiencies in the soil. This is
done using computer vision, robotics, and machine learning applications, AI can analyse where
weeds are growing. AI bots can help to harvest crops at a higher volume and faster pace than
human laborers.

9. Applications of Artificial Intelligence in Gaming:


Another sector where Artificial Intelligence applications have found prominence is the gaming
sector. AI can be used to create smart, human-like NPCs to interact with the players. It can also
be used to predict human behavior using which game design and testing can be improved. The
Alien Isolation games released in 2014 uses AI to stalk the player throughout the game. The
game uses two Artificial Intelligence systems - ‘Director AI’ that frequently knows your
location and the ‘Alien AI,’ driven by sensors and behaviours that continuously hunt the player.

10. Applications of Artificial Intelligence in Automobiles:


Artificial Intelligence is used to build self-driving vehicles. AI can be used along with the
vehicle’s camera, radar, cloud services, GPS, and control signals to operate the vehicle. AI can
improve the in-vehicle experience and provide additional systems like emergency braking,
blind-spot monitoring, and driver-assist steering.

40
Clique: The IT & Analytics Club of IMNU

Application of Block chain Technology

Banking and Finance:


Perhaps no industry stands to benefit from integrating blockchain into its business operations
more than banking. Financial institutions only operate during business hours, usually five days
a week. That means if you try to deposit a check on Friday at 6 p.m., you will likely have to
wait until Monday morning to see that money hit your account. Even if you do make your
deposit during business hours, the transaction can still take one to three days to verify due to
the sheer volume of transactions that banks need to settle. Blockchain, on the other hand, never
sleeps.
By integrating blockchain into banks, consumers can see their transactions processed in as little
as 10 minutes—basically the time it takes to add a block to the blockchain, regardless of
holidays or the time of day or week. With blockchain, banks also have the opportunity to
exchange funds between institutions more quickly and securely. In the stock trading business,
for example, the settlement and clearing process can take up to three days (or longer, if trading
internationally), meaning that the money and shares are frozen for that period of time. Given
the size of the sums involved, even the few days that the money is in transit can carry significant
costs and risks for banks.

Currency:
Blockchain forms the bedrock for cryptocurrencies like Bitcoin. The U.S. dollar is controlled
by the Federal Reserve. Under this central authority system, a user’s data and currency are
technically at the whim of their bank or government. If a user’s bank is hacked, the client’s
private information is at risk. If the client’s bank collapses or the client lives in a country with
an unstable government, the value of their currency may be at risk. In 2008, several failing
banks were bailed out—partially using taxpayer money. These are the worries out of which
Bitcoin was first conceived and developed.
By spreading its operations across a network of computers, blockchain allows Bitcoin and other
cryptocurrencies to operate without the need for a central authority. This not only reduces risk
but also eliminates many of the processing and transaction fees. It can also give those in
countries with unstable currencies or financial infrastructures a more stable currency with more
applications and a wider network of individuals and institutions with whom they can do
business, both domestically and internationally.
Using cryptocurrency wallets for savings accounts or as a means of payment is especially
profound for those who have no state identification. Some countries may be war-torn or have
governments that lack any real infrastructure to provide identification. Citizens of such

41
Clique: The IT & Analytics Club of IMNU

countries may not have access to savings or brokerage accounts—and, therefore, no way to
safely store wealth.

Healthcare:
Healthcare providers can leverage blockchain to securely store their patients’ medical records.
When a medical record is generated and signed, it can be written into the blockchain, which
provides patients with the proof and confidence that the record cannot be changed. These
personal health records could be encoded and stored on the blockchain with a private key, so
that they are only accessible by certain individuals, thereby ensuring privacy.

Property Records:
If you have ever spent time in your local Recorder’s Office, you will know that the process of
recording property rights is both burdensome and inefficient. Today, a physical deed must be
delivered to a government employee at the local recording office, where it is manually entered
into the county’s central database and public index. In the case of a property dispute, claims to
the property must be reconciled with the public index.
This process is not just costly and time-consuming—it is also prone to human error, where each
inaccuracy makes tracking property ownership less efficient. Blockchain has the potential to
eliminate the need for scanning documents and tracking down physical files in a local recording
office. If property ownership is stored and verified on the blockchain, owners can trust that
their deed is accurate and permanently recorded.
In war-torn countries or areas that have little to no government or financial infrastructure, and
certainly no Recorder’s Office, it can be nearly impossible to prove ownership of a property.
If a group of people living in such an area is able to leverage blockchain, then transparent and
clear time lines of property ownership could be established.

Smart Contracts:
A smart contract is a computer code that can be built into the blockchain to facilitate, verify,
or negotiate a contract agreement. Smart contracts operate under a set of conditions to which
users agree. When those conditions are met, the terms of the agreement are automatically
carried out.
Say, for example, that a potential tenant would like to lease an apartment using a smart contract.
The landlord agrees to give the tenant the door code to the apartment as soon as the tenant pays
the security deposit. Both the tenant and the landlord would send their respective portions of
the deal to the smart contract, which would hold onto and automatically exchange the door
code for the security deposit on the date when the lease begins. If the landlord doesn’t supply
the door code by the lease date, then the smart contract refunds the security deposit. This would

42
Clique: The IT & Analytics Club of IMNU

eliminate the fees and processes typically associated with the use of a notary, a third-party
mediator, or attorneys.

Supply Chains:
As in the IBM Food Trust example, suppliers can use blockchain to record the origins of
materials that they have purchased. This would allow companies to verify the authenticity of
not only their products but also common labels such as “Organic,” “Local,” and “Fair Trade.”
As reported by Forbes, the food industry is increasingly adopting the use of blockchain to track
the path and safety of food throughout the farm-to-user journey.

Voting:
As mentioned above, block chain could be used to facilitate a modern voting system. Voting
with block chain carries the potential to eliminate election fraud and boost voter turnout, as
was tested in the November 2018 midterm elections in West Virginia.5 Using block chain in
this way would make votes nearly impossible to tamper with. The blockchain protocol would
also maintain transparency in the electoral process, reducing the personnel needed to conduct
an election and providing officials with nearly instant results. This would eliminate the need
for recounts or any real concern that fraud might threaten the election.

43
Clique: The IT & Analytics Club of IMNU

Section-4: Data Ethics & Security

Data Ethics

Data ethics is a branch of ethics that evaluates data practices—collecting, generating,


analysing, and disseminating data, both structured and unstructured—that have the potential to
adversely impact people and society. It includes addressing and recommending concepts of
right and wrong conduct, with transparency in and defensibility of actions and decisions driven
by automated/artificial intelligence (AI) in relation to data in general and personal data in
particular.
With AI algorithms becoming more commonplace, and without regulated codes of ethics,
businesses need to create and maintain a structured and transparent data ethics strategy, which
can yield three important business benefits:

• Trust
• Fair Practices
• Data Privacy Compliance

Principles of Data Ethics for Business Professionals:


1. Ownership: The first principle of data ethics is that an individual has ownership over
their personal information. Just as it’s considered stealing to take an item that doesn’t
belong to you, it’s unlawful and unethical to collect someone’s personal data without
their consent.
2. Transparency: In addition to owning their personal information, data subjects have a
right to know how you plan to collect, store, and use it. When gathering data, exercise
transparency.
3. Privacy: Another ethical responsibility that comes with handling data is ensuring data
subjects’ privacy. Even if a customer gives your company consent to collect, store, and
analyze their personally identifiable information (PII), that doesn’t mean they want it
publicly available.
4. Intention: When discussing any branch of ethics, intentions matter. Before collecting
data, ask yourself why you need it, what you’ll gain from it, and what changes you’ll
be able to make after analysis. If you intend to hurt others, profit from your subjects’
weaknesses, or any other malicious goal, it’s not ethical to collect their data.
5. Outcomes: Even when intentions are good, the outcome of data analysis can cause
inadvertent harm to individuals or groups of people. This is called a disparate impact,
which is outlined in the Civil Rights Act as unlawful.

44
Clique: The IT & Analytics Club of IMNU

Data Security

Data security is the practice of protecting digital information from unauthorized access,
corruption, or theft throughout its entire lifecycle. It’s a concept that encompasses every aspect
of information security from the physical security of hardware and storage devices to
administrative and access controls, as well as the logical security of software applications. It
also includes organizational policies and procedures.
When properly implemented, robust data security strategies will protect an organization’s
information assets against cybercriminal activities, but they also guard against insider threats
and human error, which remains among the leading causes of data breaches today. Data
security involves deploying tools and technologies that enhance the organization’s visibility
into where its critical data resides and how it is used. Ideally, these tools should be able to apply
protections like encryption, data masking, and redaction of sensitive files, and should automate
reporting to streamline audits and adhere to regulatory requirements.
Digital transformation is profoundly altering every aspect of how today’s businesses operate
and compete. The sheer volume of data that enterprises create, manipulate, and store is
growing, and drives a greater need for data governance. In addition, computing environments
are more complex than they once were, routinely spanning the public cloud, the enterprise data
centre, and numerous edge devices ranging from Internet of Things (IoT) sensors to robots and
remote servers. This complexity creates an expanded attack surface that’s more challenging to
monitor and secure.

Types of Data Security:


• Encryption: Using an algorithm to transform normal text characters into an unreadable
format, encryption keys scramble data so that only authorized users can read it.
• Data Erasure: More secure than standard data wiping, data erasure uses software to
completely overwrite data on any storage device. It verifies that the data is
unrecoverable.
• Data Masking: By masking data, organizations can allow teams to develop
applications or train people using real data. It masks personally identifiable information
(PII) where necessary so that development can occur in environments that are
compliant.
• Data Resiliency: Resiliency is determined by how well an organization endures or
recovers from any type of failure – from hardware problems to power shortages and
other events that affect data availability. Speed of recovery is critical to minimize
impact.

45
Clique: The IT & Analytics Club of IMNU

Data security capabilities and solutions:


Data security tools and technologies should address the growing challenges inherent in
securing today’s complex, distributed, hybrid, and/or multicloud computing environments.
These include understanding where data resides, keeping track of who has access to it, and
blocking high-risk activities and potentially dangerous file movements. Comprehensive data
protection solutions that enable enterprises to adopt a centralized approach to monitoring and
policy enforcement can simplify the task.

• Data discovery and classification tools: Sensitive information can reside in structured
and unstructured data repositories including databases, data warehouses, big data
platforms, and cloud environments. Data discovery and classification solutions
automate the process of identifying sensitive information, as well as assessing and
remediating vulnerabilities.
• Data and file activity monitoring: File activity monitoring tools analyze data usage
patterns, enabling security teams to see who is accessing data, spot anomalies, and
identify risks. Dynamic blocking and alerting can also be implemented for abnormal
activity patterns.
• Vulnerability assessment and risk analysis tools: These solutions ease the process of
detecting and mitigating vulnerabilities such as out-of-date software,
misconfigurations, or weak passwords, and can also identify data sources at greatest
risk of exposure.
• Automated compliance reporting: Comprehensive data protection solutions with
automated reporting capabilities can provide a centralized repository for enterprise-
wide compliance audit trails.

46
Clique: The IT & Analytics Club of IMNU

Section-5: Data Analysis

Basics of Data Analysis

Data analysis is a process of inspecting, cleansing, transforming, and modelling data with the
goal of discovering useful information, informing conclusions, and supporting decision-
making. In today's business world, data analysis plays a role in making decisions more
scientific and helping businesses operate more effectively.

Accounting: Public accounting firms use statistical sampling procedures when conducting
audits for their clients. For instance, suppose an accounting firm wants to determine whether
the amount of accounts receivable shown on a client’s balance sheet fairly represents the actual
amount of accounts receivable. Usually the large number of individual accounts receivable
makes reviewing and validating every account too time-consuming and expensive. As common
practice in such situations, the audit staff selects a subset of the accounts called a sample. After
reviewing the accuracy of the sampled accounts, the auditors draw a conclusion as to whether
the accounts receivable amount shown on the client’s balance sheet is acceptable.

Finance: Financial analysts use a variety of statistical information to guide their investment
recommendations. In the case of stocks, analysts review financial data such as price/earnings
ratios and dividend yields. By comparing the information for an individual stock with
information about the stock market averages, an analyst can begin to draw a conclusion as to
whether the stock is a good investment. For example, The Wall Street Journal (March 19, 2012)
reported that the average dividend yield for the S&P 500 companies was 2.2%. Microsoft
showed a dividend yield of 2.42%. In this case, the statistical information on dividend yield
indicates a higher dividend yield for Microsoft than the average dividend yield for the S&P
500 companies. This and other information about Microsoft would help the analyst make an
informed buy, sell, or hold recommendation for Microsoft stock.

Marketing: Electronic scanners at retail checkout counters collect data for a variety of
marketing research applications. For example, data suppliers such as ACNielsen and
Information Resources, Inc., purchase point-of-sale scanner data from grocery stores, process
the data, and then sell statistical summaries of the data to manufacturers. Manufacturers spend
hundreds of thousands of dollars per product category to obtain this type of scanner data.
Manufacturers also purchase data and statistical summaries on promotional activities such as
special pricing and the use of in-store displays. Brand managers can review the scanner
statistics and the promotional activity statistics to gain a better understanding of the relationship

47
Clique: The IT & Analytics Club of IMNU

between promotional activities and sales. Such analyses often prove helpful in establishing
future marketing strategies for the various products.

Production: Today’s emphasis on quality makes quality control an important application of


statistics in production. A variety of statistical quality control charts are used to monitor the
output of a production process. In particular, an x-bar chart can be used to monitor the average
output. Suppose, for example, that a machine fills containers with 12 ounces of a soft drink.
Periodically, a production worker selects a sample of containers and computes the average
number of ounces in the sample. This average, or x-bar value, is plotted on an x-bar chart. A
plotted value above the chart’s upper control limit indicates overfilling, and a plotted value
below the chart’s lower control limit indicates underfilling. The process is termed “in control”
and allowed to continue as long as the plotted x-bar values fall between the chart’s upper and
lower control limits. Properly interpreted, an x-bar chart can help determine when adjustments
are necessary to correct a production process.

Types of Data

Qualitative and Quantitative Data: Qualitative data is non-statistical and is typically


unstructured or semi-structured. This data isn’t necessarily measured using hard numbers used
to develop graphs and charts. Instead, it is categorized based on properties, attributes, labels,
and other identifiers. Eg. Gender, Hobbies, etc. Quantitative data is statistical and is typically
structured in nature – meaning it is more rigid and defined. This data type is measured using
numbers and values, making it a more suitable candidate for data analysis. Eg. Age, Sales, etc.
Cross-Sectional and Time Series Data: Cross-sectional data are data collected at the same or
approximately the same point in time. Eg. Sales of all the FMCG companies in 2021. Time
series data are data collected over several time periods. Eg. Stock price data.
Primary and Secondary Data: Primary Data is a Data that has been generated by the
researcher himself/herself, surveys, interviews, experiments, specially designed for
understanding and solving the research problem at hand. Secondary Data is collected using
existing data generated by large government Institutions, healthcare facilities etc. as part of
organizational record keeping. The data is then extracted from more varied datafiles.

48
Clique: The IT & Analytics Club of IMNU

Data Mining

Data mining, also known as knowledge discovery in data (KDD), is the process of uncovering
patterns and other valuable information from large data sets. Given the evolution of data
warehousing technology and the growth of big data, adoption of data mining techniques has
rapidly accelerated over the last couple of decades, assisting companies by transforming their
raw data into useful knowledge. Data mining has improved organizational decision-making
through insightful data analyses.
Data mining process:
Data mining usually consists of four main steps: setting objectives, data gathering and
preparation, applying data mining algorithms, and evaluating results.
1. Set the business objectives: Data scientists and business stakeholders need to work
together to define the business problem, which helps inform the data questions and
parameters for a given project.
2. Data preparation: Once the scope of the problem is defined, it is easier to identify
which set of data will help answer the pertinent questions to the business. Once the
relevant data is collected, the data will be cleaned an additional step may be taken to
reduce the number of dimensions as too many features can slow down any subsequent
computation.
3. Model building and pattern mining: Depending on the type of analysis, investigate
any interesting data relationships, such as sequential patterns, association rules, or
correlations. While high frequency patterns have broader applications, sometimes the
deviations in the data can be more interesting, highlighting areas of potential fraud.
4. Evaluation of results and implementation of knowledge: Once the data is
aggregated, the results need to be evaluated and interpreted. When finalizing results,
they should be valid, novel, useful, and understandable. When this criteria is met,
organizations can use this knowledge to implement new strategies, achieving their
intended objectives.
Data mining works by using various algorithms and techniques to turn large volumes of data
into useful information. The most common ones are:
Association rules: An association rule is a rule-based method for finding relationships between
variables in a given dataset.
Neural networks: Primarily leveraged for deep learning algorithms, neural networks process
training data by mimicking the interconnectivity of the human brain through layers of nodes.
Decision tree: This data mining technique uses classification or regression methods to classify
or predict potential outcomes based on a set of decisions.
K- Nearest neighbour (KNN): K-nearest neighbour, also known as the KNN algorithm, is a
non-parametric algorithm that classifies data points based on their proximity and association
to other available data.

49
Clique: The IT & Analytics Club of IMNU

Data Cleaning

Data cleaning is the process of fixing or removing incorrect, corrupted, incorrectly formatted,
duplicate, or incomplete data within a dataset. When combining multiple data sources, there
are many opportunities for data to be duplicated or mislabelled. If data is incorrect, outcomes
and algorithms are unreliable, even though they may look correct. While the techniques used
for data cleaning may vary according to the types of data the company stores, but we can follow
these basic steps to map out a framework for the organization.
Step 1: Remove duplicate or irrelevant observations:
Remove unwanted observations from your dataset, including duplicate observations or
irrelevant observations. De-duplication is one of the largest areas to be considered in this
process. Irrelevant observations are when you notice observations that do not fit into the
specific problem you are trying to analyse. For example, if you want to analyse data regarding
millennial customers, but your dataset includes older generations, you might remove those
irrelevant observations. This can make analysis more efficient and minimize distraction from
your primary target—as well as creating a more manageable and more performant dataset.
Step 2: Fix structural errors:
Structural errors are when you measure or transfer data and notice strange naming conventions,
typos, or incorrect capitalization. These inconsistencies can cause mislabelled categories or
classes. For example, you may find “N/A” and “Not Applicable” both appear, but they should
be analysed as the same category.
Step 3: Filter unwanted outliers:
Often, there will be one-off observations where, at a glance, they do not appear to fit within the
data you are analysing. If you have a legitimate reason to remove an outlier, like improper data-
entry, doing so will help the performance of the data you are working with. If an outlier proves
to be irrelevant for analysis or is a mistake, consider removing it.
Step 4: Handle missing data:
You can’t ignore missing data because many algorithms will not accept missing values. There
are a couple of ways to deal with missing data. As a first option, you can drop observations that
have missing values, but doing this will drop or lose information, so be mindful of this before
you remove it. As a second option, you can input missing values based on other observations;
again, there is an opportunity to lose integrity of the data because you may be operating from
assumptions and not actual observations. As a third option, you might alter the way the data is
used to effectively navigate null values.

50
Clique: The IT & Analytics Club of IMNU

Descriptive Analysis

Measures of Location:

• Mean: Perhaps the most important measure of location is the mean, or average value,
for a variable.
• Weighted Mean: The mean that is computed by giving each observation a weight that
reflects its relative importance.
• Median: The median is another measure of central location. The median is the value in
the middle when the data are arranged in ascending order.
• Geometric Mean: The geometric mean is a measure of location that is calculated by
finding the nth root of the product of n values.
• Mode: The mode is the value that occurs with greatest frequency.
• Percentiles: A percentile provides information about how the data are spread over the
interval from the smallest value to the largest value.
• Quartiles: It is often desirable to divide data into four parts, with each part containing
approximately one-fourth, or 25% of the observations.

Measures of Variability:

• Range: The simplest measure of variability is the range. Range is the difference of
largest and smallest value.
• Interquartile Range: A measure of variability that overcomes the dependency on
extreme values is the interquartile range (IQR)
• Variance: The variance is a measure of variability that utilizes all the data. The
variance is based on the difference between the value of each observation and the mean.
• Standard Deviation: The standard deviation is defined to be the positive square root
of the variance.
• Coefficient of Variation: In some situations we may be interested in a descriptive
statistic that indicates how large the standard deviation is relative to the mean. This
measure is called the coefficient of variation and is usually expressed as a percentage.
Distribution Shape:

• Skewness: A measure of the shape of a data distribution. Data skewed to the left result
in negative skewness; a symmetric data distribution results in zero skewness; and data
skewed to the right result in positive skewness.

Five-Number Summary:

In a five-number summary, five numbers are used to summarize the data:


1. Smallest value
2. First quartile (Q1)
3. Median (Q2)

51
Clique: The IT & Analytics Club of IMNU

4. Third quartile (Q3)


5. Largest value
To develop a five-number summary we first arrange the data in ascending order. We then
identify the smallest value, the three quartiles, and the largest value.
Measures of Association between Two Variables:

• Covariance: A measure of linear association between two variables. Positive values


indicate a positive relationship; negative values indicate a negative relationship.
• Correlation coefficient: A measure of linear association between two variables that
takes on values between -1 and 1. Values near 1 indicate a strong positive linear
relationship; values near -1 indicate a strong negative linear relationship; and values
near zero indicate the lack of a linear relationship.

52
Clique: The IT & Analytics Club of IMNU

Predictive Analytics

The term predictive analytics refers to the use of statistics and modelling techniques to make
predictions about future outcomes and performance. Predictive analytics looks at current and
historical data patterns to determine if those patterns are likely to emerge again.
Predictive analytics is a form of technology that makes predictions about certain unknowns in
the future. It draws on a series of techniques to make these determinations, including artificial
intelligence (AI), data mining, machine learning, modelling, and statistics.

Types of Predictive Analytical Models


There are three common techniques used in predictive analytics: Decision trees, neural
networks, and regression.
Decision Tree: If you want to understand what leads to someone's decisions, then you may
find decision trees useful. This type of model places data into different sections based on certain
variables, such as price or market capitalization. Just as the name implies, it looks like a tree
with individual branches and leaves. Branches indicate the choices available while individual
leaves represent a particular decision. Decision trees are the simplest models because they're
easy to understand and dissect. They're also very useful when you need to make a decision in
a short period of time.
Regression: Predictive modelling techniques such as regression analysis may be used to
determine the relationship between a dataset’s dependent (goal) and independent variables. It
is widely used when the dependent and independent variables are linked in a linear or non-
linear fashion, and the target variable has a set of continuous values.

Types of Regression Analysis


1. Linear Regression: The most extensively used modelling technique is linear regression,
which assumes a linear connection between a dependent variable (Y) and an independent
variable (X). It employs a regression line, also known as a best-fit line.
2. Logistic Regression: When the dependent variable is discrete, the logistic regression
technique is applicable. In other words, this technique is used to compute the probability of
mutually exclusive occurrences such as pass/fail, true/false, 0/1, and so forth.
3. Polynomial Regression: The technique of polynomial regression analysis is used to
represent a non-linear relationship between dependent and independent variables. It is a variant
of the multiple linear regression model, except that the best fit line is curved rather than straight.
4. Ridge Regression: When data exhibits multicollinearity, that is, the ridge regression
technique is applied when the independent variables are highly correlated. Ridge regression
reduces standard errors by biassing the regression estimates.

53
Clique: The IT & Analytics Club of IMNU

5. Lasso Regression: As with ridge regression, the lasso (Least Absolute Shrinkage and
Selection Operator) technique penalizes the absolute magnitude of the regression coefficient.
Additionally, the lasso regression technique employs variable selection, which leads to the
shrinkage of coefficient values to absolute zero.
6. Bayesian Linear Regression: Bayesian linear regression is a form of regression analysis
technique used in machine learning that uses Bayes’ theorem to calculate the regression
coefficients’ values. Rather than determining the least-squares, this technique determines the
features’ posterior distribution. As a result, the approach outperforms ordinary linear regression
in terms of stability.

Neural Networks: Neural networks were developed as a form of predictive analytics by


imitating the way the human brain works. This model can deal with complex data relationships
using artificial intelligence and pattern recognition.

54
Clique: The IT & Analytics Club of IMNU

Prescriptive Analysis

Prescriptive analytics not only anticipates what will happen and when it will happen, but also
why it will happen. Further, prescriptive analytics suggests decision options on how to take
advantage of a future opportunity or mitigate a future risk and shows the implication of each
decision option. Prescriptive analytics can continually take in new data to re-predict and re-
prescribe, thus automatically improving prediction accuracy and prescribing better decision
options. Prescriptive analytics ingests hybrid data, a combination of structured (numbers,
categories) and unstructured data (videos, images, sounds, texts), and business rules to predict
what lies ahead and to prescribe how to take advantage of this predicted future without
compromising other priorities.

Examples of prescriptive analytics:


Businesses use prescriptive analytics to solve all sorts of real-world problems. Analysts in
different industries can use it to improve their processes:

Marketing and sales: Marketing and sales agencies have access to large amounts of customer
data that can help them to determine optimal marketing strategies, such as what types of
products pair well together and how to price products. Prescriptive analytics allows marketers
and sales staff to become more precise with their campaigns and customer outreach, as they no
longer have to act simply on intuition and experience.
Transportation industry: Cost-effective delivery is essential for success and profitability in
the package delivery and transportation industry. Minimizing energy usage through better route
planning and solving logistical issues such as incorrect shipping locations can save time and
money. Shippers produce massive amounts of data. Rather than employing armies of analysts
and dispatchers to decide how to best operate, these businesses can automate and build
prescriptive models to provide recommendations.
Financial markets: Quantitative researchers and traders use statistical modeling to try to
maximize returns. Financial firms can use similar techniques to manage risk and profitability.
For example, financial firms can build algorithms to churn through historical trading data to
measure risks of trades. The resulting analytics can help them decide how to size positions,
how to hedge them, or whether to place trades at all. Additionally, these firms can use models
to reduce transaction costs by figuring out how and when to best place their trades.

55
Clique: The IT & Analytics Club of IMNU

Data Visualisation

The graphical display of information and data is known as data visualisation. Data visualisation
tools, which include visual components like as charts, graphs, and maps, make it easy to view
and comprehend trends, outliers, and patterns in data. Data visualisation tools and technologies
are critical in the Big Data age for analysing huge volumes of data and making data-driven
choices.

Why Data Visualization?


Colors and patterns catch our attention. We can easily distinguish between red and blue, square
and round. Everything in our society is visual, from art and marketing to TV and movies. Data
visualisation is another sort of visual art that captures our attention and holds it there. When
we look at a chart, we can easily see patterns and outliers. When we observe something, we
rapidly internalise it. It's narrative with a purpose. If you've ever looked at a big spreadsheet of
data and couldn't find a trend, you understand how much more useful a visualisation can be.

“Visualization gives you answers to questions you didn’t know you had.”

56
Clique: The IT & Analytics Club of IMNU

Tools used for Data Visualization:

1. Power BI: Power BI allows users to analyse and interpret data both on-premise and in
the cloud. Power BI allows you to effortlessly and securely create and share
customizable dashboards and interactive results with colleagues and organizations.

2. Tableau: Tableau, the world's most popular contemporary analytics software, assists
people and businesses in becoming more data-driven. Tableau is a highly effective and
rapidly expanding data visualisation application used in the Business Intelligence
Industry. It aids in the simplification of raw data into a relatively clear manner. Tableau
assists in the creation of data that can be comprehended by experts at all levels of a
business. Non-technical people can easily develop customised dashboards. The Tableau
application analyses data quickly and generates representations in the form of
dashboards and workbooks.
The best Tableau software features include:
➢ Blending of Data
➢ Real-time evaluation
➢ Data collaboration
The best part about Tableau software is that it doesn't require any technical or
programming knowledge to use. The tool has piqued the curiosity of people from many
sectors, including business, researchers, and various industries.

57
Clique: The IT & Analytics Club of IMNU

3. Plotly: Plotly is a data visualization tool for making interactive graphs, charts, and
maps. You can also use Plotly to visualize a dataset and then share the URL to that
visualization with your audience via social media or your blog. Plotly graphs are
interactive and have a unique URL, making them easy to share. By hovering over data
points and examining information about them, readers may learn how you generated
them. Readers may also examine all of the data interactively rather than deciphering
your code, making it ideal for sharing both interactive graphs and datasets with your
audience. Plotly also includes a broad library of open-source visualization types,
allowing you to select from a wide range of plots and maps.

58
Clique: The IT & Analytics Club of IMNU

Data Storytelling

Data storytelling is the capacity to effectively explain insights from a dataset using narratives
and visuals. It may be used to contextualise data findings and motivate your audience to take
action.
The three essential components of data storytelling:
Storyboarding: To begin, when your analysts begin developing their data story, storyboarding
should be a critical component of the process.
Visualization of data: Following that, you want your analysts to share their data findings with
the rest of the company.
Narrative of data: A verbal or written narrative, also called a storyline, is used to communicate
insights gleaned from data, the context surrounding it, and actions you recommend and aim to
inspire in your audience.

59

You might also like