You are on page 1of 15

Module 5

Augmented reality:

AR typically involves using a camera or a device such as a smartphone or headset to


capture the real world and then display additional information or graphics on top of it. This
can be used in a variety of ways, such as enhancing education, entertainment, advertising,
and training.For example, an AR app could allow you to see information about products in
a store as you scan them with your phone, or display directions on a real-world map as
you walk through a city.

Architecture of an augmented reality:The architecture of an augmented reality (AR)


system typically involves several components that work together to create the AR
experience. Here are some of the main components of an AR system:

1.Input Devices: These are the devices used to capture the real-world environment that
will be augmented. Common input devices include cameras, depth sensors, and GPS.

2.Processing Unit: This component processes the input data captured by the input
devices and generates the necessary information for overlaying the augmented content
on the real-world environment. The processing unit is typically a computer, a mobile
device, or a dedicated AR headset.

3.Tracking System: This component helps to determine the position and orientation of the
device in the real world. This is essential for overlaying the augmented content in the
correct location and orientation. Common tracking systems include visual tracking,
marker-based tracking, and sensor-based tracking.

4.Augmented Content: This is the computer-generated content that is overlaid on the real
-world environment. Augmented content can take various forms, including images,
videos, and 3D models.

5.Output Devices: These are the devices used to display the augmented content to the
user. Common output devices include screens, projectors, and AR headsets.

6.User Interface: This is the interface through which the user interacts with the AR system.
The user interface can take various forms, including touchscreens, voice commands,and
gesture-based interfaces.
Examples of some brands using AR :

ASOS - See my Fit : it enhances the customer experience by capturing, by capturing their
body profile and display how they look in different sizes

Gucci - Try on shoes in AR : a very functional example of AR for retail in the footwear
industry by giving customers a visual representation of how a product will look in real life
after wearing it.

Lenskrt

SNAp chat

Application of AR military:

Augmented reality (AR) technology has a number of potential applications in military


operations. Some possible uses of AR in the military include:

Training: AR can be used to simulate combat scenarios and train soldiers in a virtual
environment. This allows soldiers to gain experience and practice without putting
themselves or others in danger.

Navigation: AR can provide soldiers with real-time information about their surroundings,
including maps, landmarks, and potential threats. This can help soldiers navigate
unfamiliar terrain and make better decisions in the field.

Targeting: AR can be used to enhance soldiers' targeting capabilities by providing real-


time information about enemy positions, weapons, and movements.

Maintenance: AR can help soldiers diagnose and repair equipment in the field by
providing visual guides and instructions.

Communication: AR can be used to facilitate communication between soldiers and


command centers, allowing for faster and more efficient coordination of operations.
AR in medical:

Surgical Navigation: AR can help surgeons visualize and plan complex procedures by
overlaying medical images and other relevant data onto the patient's body during surgery.
This can help reduce the risk of error and improve surgical outcomes.

Medical Training: AR can be used to simulate medical procedures and provide interactive
training for medical students and healthcare professionals

Rehabilitation: AR can be used to assist with physical rehabilitation by providing real-time


visual feedback on a patient's movements, progress, and goals. This can motivate
patients and help them recover more quickly from injuries or surgeries.

Patient Education: AR can be used to enhance patient education by providing interactive


visualizations of medical conditions, treatments, and procedures.

Diagnosis and Treatment: AR can be used to help physicians diagnose and treat patients
by providing real-time information and visualizations of medical images and

AR roles in tourism and sightseeing:

Virtual Tour Guides: AR can provide virtual tour guides that offer real-time information
about tourist attractions and historical sites, providing visitors with a more engaging and
informative experience.

Interactive Maps: AR can overlay digital maps with relevant information, such as
directions to popular tourist sites and the location of nearby restaurants or
accommodations.

Cultural Immersion: AR can enhance cultural immersion by overlaying historical images


and information onto tourist attractions, providing a deeper understanding of the cultural
significance of these locations.
Gamification: AR can be used to gamify the tourist experience by creating interactive
scavenger hunts or augmented reality games that encourage visitors to explore and
engage with their surroundings.

Language Translation: AR can translate signs and menus in real-time, making it easier for
tourists to navigate unfamiliar environments and communicate with locals.

Virtual reality:

Virtual reality (VR) is a computer-generated simulation of a three-dimensional


environment that can be experienced through the use of a headset or other immersive
devices. It simulates a user's physical presence in a computer-generated environment
and allows them to interact with and manipulate objects in that environment.

An example of virtual reality could be a VR game that simulates a real-life activity, such as
skiing or flying a plane. In such a game, a player would wear a VR headset and would be
able to experience the game's environment as if they were actually skiing down a
mountain or flying a plane. The player would be able to interact with objects in the
environment, such as adjusting the controls of the plane or making turns while skiing.

Mixed reality :

Mixed reality (MR) is a type of technology that blends elements of both virtual reality and
augmented reality. It allows for digital and physical objects to interact with each other in
real-time, creating a unique and immersive experience for users.

example of mixed reality could be a car manufacturer using MR technology to allow


customers to visualize and customize their cars in real-time. The customer could see a
digital version of the car in front of them and make changes to its color, features, and
other attributes using gestures or voice commands. The digital version would update in
real-time to reflect the changes, allowing the customer to see a realistic representation of
what their customized car would look like.

Augmented reality (AR) and mixed reality (MR) are two related but distinct technologies
that share some similarities but also have significant differences.
Augmented reality (AR) technology superimposes digital content (such as images, sounds,
or video) onto the real world, creating an enhanced or augmented experience for users.
AR technology typically uses a smartphone or tablet camera to recognize objects or
images in the physical environment and then overlays digital content on top of them.
Examples of AR applications include Pokémon Go and Snapchat filters.

Mixed reality (MR) technology, on the other hand, blends digital and physical content
together in a way that allows them to interact with each other in real-time. Unlike AR,
which simply overlays digital content onto the real world, MR combines both virtual and
real-world elements to create a new, hybrid environment. MR technology typically
requires the use of specialized headsets or glasses that allow users to see and interact
with virtual objects in their physical environment. Examples of MR applications include the
Microsoft HoloLens and Magic Leap.

Advantages of AR :

Enhanced experience

AR will be easy to use

Supports business activities

Disadvantages of AR

Unaffordable

Privacy and security problems

Risky behaviour
Module 6

Technology refers to the practical application of scientific knowledge for a particular


purpose. It encompasses a wide range of tools, techniques, and processes that are used
to solve problems, improve efficiency, and create new products or services.

Ethics in technology:

Ethics in technology refers to the moral principles and values that guide the development,
use, and impact of technology on individuals, society, and the environment. Ethical issues
arise in various areas of technology, including data privacy, cybersecurity, artificial
intelligence, biotechnology, and more.

One of the most significant ethical concerns in technology is data privacy. The collection,
use, and storage of personal data by tech companies have raised concerns about the
protection of individuals' privacy rights. Ethical principles such as transparency, informed
consent, and data minimization are critical in ensuring that personal data is collected and
used in an ethical manner ,Another ethical concern in technology is cybersecurity. The
increasing reliance on technology in various sectors has made cybersecurity an essential
aspect of technology ethics. Ethical principles such as integrity, confidentiality, and
accountability are critical in ensuring that technology is developed and used in a way that
safeguards against cyber threats.

Digital privacy :

Digital privacy refers to the right of individuals to control their personal information online
and how it is collected, used, and shared by companies and organizations. Example :
personal data , online activities tracking , social media , cybersecurity.

Threats and challenges:

Data security

Big data

Cloud computing

Open source software

Mobile payments
Social media related liabilities

Wearable computing

The internet of things

Virtual currencies

Remote automation and control

Block chain technology:

History: Blockchain isn’t just a database, it’s a new technology stack with ‘digital
trust’ that is revolutionizing the way we exchange value and information across the
internet, by taking out the ‘gatekeepers’ from the process. For a complete and more
detailed deep dive check out our article: A concise history of blockchain technology

Blockchain history goes back farther than you might imagine, but we’ve condensed it by
answering four critical questions:

The first blockchain-like protocol was proposed by cryptographer David Chaum in 1982.
Later in 1991, Stuart Haber and W. Scott Stornetta wrote about their work on consortiums.

But it was Satoshi Nakamoto (presumed pseudonym for a person or group of people)
who invented and implemented the first blockchain network after deploying the world’s
first digital currency, bitcoin.

Types of blockchain:

1. Public blockchain refers to a decentralized digital ledger technology that allows anyone
to participate and verify transactions on the network. In a public blockchain, data is stored
across a distributed network of computers or nodes, rather than in a central location. This
makes it difficult for any single entity to manipulate or control the data on the network.

2.private blockchain

Private blockchains are not open, they have access restrictions. People who want to join
require permission from the system administrator. They are typically governed by one
entity, meaning they’re centralized. For example, hyper ledger is a private, permissioned
blockchain.
3.hybrid blockchain :A hybrid blockchain is a combination of public and private
blockchains that leverages the benefits of both types of blockchains. It allows for a more
flexible and customizable approach to blockchain technology that can be tailored to meet
specific business needs and requirements.

4. Sidechain : sidechain is a blockchain running parallel to the main chain.

It allows users to move digital assets between two different blockchains and improves
scalability and efficiency. An example of a sidechain is the liquid network

Cloud computing : Cloud computing is a technology that allows you to access computing
resources, such as storage, applications, and processing power, over the internet. Instead
of having to run software or store data on your own computer or server, you can use
remote servers and resources hosted by a cloud service provider .In simple words, cloud
computing works like renting a computer or server over the internet. You can use as much
or as little of the resources you need, and you only pay for what you use. This makes it a
flexible and cost-effective solution for individuals and businesses of all sizes.

Types of cloud computing:

Public cloud

Private cloud

Hybrid cloud

Uses of cloud computing :

Create cloud native application

Test and build application

Store backup and recover data

Analyze data

Stream audio and video


Embedded intelligence

Deliver software on demand

Quantum computing :

Quantum computing is a type of computing that uses quantum mechanics, a branch of


physics that studies the behavior of matter and energy at a very small scale, to perform
calculations

Autonomic computing is a type of computing that is designed to be self-managing and


self-configuring, with the ability to adapt to changing conditions and optimize
performance automatically.

The idea behind autonomic computing is to create computer systems that are more
reliable, efficient, and adaptable, and that require less human intervention to operate. This
is achieved by building systems with a high degree of automation, self-monitoring, and
self-healing capabilities.

Computer vision :

Computer vision Is an interdisciplinary scientific field that deals with how computers can
gain high-level understanding from digital images or videos.

From the perspective of engineering, it seeks to understand and automate tasks that
the human visual system can do.

Computer vision tasks include methods for acquiring, processing, analyzing and
understanding digital images, and extraction of high-dimensional data from the real world
in order to produce numerical or symbolic information,

Example: Computer vision is used to detect and classify objects (e.G., Road signs or
traffic lights), create 3D maps or motion estimation, and played a key role in making
autonomous vehicles a reality. Self-driving cars collect data on their surroundings from
sensors and cameras, interpret it, and respond accordingly
Cyber security:

Cyber security is the application of technologies, processes and controls to protect


systems, networks, programs, devices and data from cyber attacks.

It aims to reduce the risk of cyber attacks and protect against the unauthorised
exploitation of systems, networks and technologies.

Types of cyber security :

1. Critical infrastructure cyber security

2. Network security

3. Cloud security

4. iOT security

5. Application security

Additive manufacturing : ( 3D Printing )

3D printing(sometimes referred to as additive manufacturing (AM)) is the computer-


controlled sequential layering of materials to create three-dimensional shapes.

A 3D Digital model of the item is created, either by computer-aided design (CAD) or using
a 3D scanner.

Additive manufacturing is a specific 3D printing process. This process builds parts layer
by layer by depositing material according to digital 3D design data.

Module 6
Technology refers to the practical application of scientific knowledge for a particular
purpose. It encompasses a wide range of tools, techniques, and processes that are used
to solve problems, improve efficiency, and create new products or services.

Ethics in technology:

Ethics in technology refers to the moral principles and values that guide the development,
use, and impact of technology on individuals, society, and the environment. Ethical issues
arise in various areas of technology, including data privacy, cybersecurity, artificial
intelligence, biotechnology, and more.

One of the most significant ethical concerns in technology is data privacy. The collection,
use, and storage of personal data by tech companies have raised concerns about the
protection of individuals' privacy rights. Ethical principles such as transparency, informed
consent, and data minimization are critical in ensuring that personal data is collected and
used in an ethical manner ,Another ethical concern in technology is cybersecurity. The
increasing reliance on technology in various sectors has made cybersecurity an essential
aspect of technology ethics. Ethical principles such as integrity, confidentiality, and
accountability are critical in ensuring that technology is developed and used in a way that
safeguards against cyber threats.

Digital privacy :

Digital privacy refers to the right of individuals to control their personal information online
and how it is collected, used, and shared by companies and organizations. Example :
personal data , online activities tracking , social media , cybersecurity.

Threats and challenges:

Data security

Big data

Cloud computing

Open source software

Mobile payments

Social media related liabilities

Wearable computing
The internet of things

Virtual currencies

Remote automation and control

Block chain technology:

History: Blockchain isn’t just a database, it’s a new technology stack with ‘digital
trust’ that is revolutionizing the way we exchange value and information across the
internet, by taking out the ‘gatekeepers’ from the process. For a complete and more
detailed deep dive check out our article: A concise history of blockchain technology

Blockchain history goes back farther than you might imagine, but we’ve condensed it by
answering four critical questions:

The first blockchain-like protocol was proposed by cryptographer David Chaum in 1982.
Later in 1991, Stuart Haber and W. Scott Stornetta wrote about their work on consortiums.

But it was Satoshi Nakamoto (presumed pseudonym for a person or group of people)
who invented and implemented the first blockchain network after deploying the world’s
first digital currency, bitcoin

Types of blockchain:

1. Public blockchain refers to a decentralized digital ledger technology that allows anyone
to participate and verify transactions on the network. In a public blockchain, data is stored
across a distributed network of computers or nodes, rather than in a central location. This
makes it difficult for any single entity to manipulate or control the data on the network.

2.private blockchain

Private blockchains are not open, they have access restrictions. People who want to join
require permission from the system administrator. They are typically governed by one
entity, meaning they’re centralized. For example, hyper ledger is a private, permissioned
blockchain.
3.hybrid blockchain :A hybrid blockchain is a combination of public and private
blockchains that leverages the benefits of both types of blockchains. It allows for a more
flexible and customizable approach to blockchain technology that can be tailored to meet
specific business needs and requirements.

4. Sidechain : sidechain is a blockchain running parallel to the main chain.

It allows users to move digital assets between two different blockchains and improves
scalability and efficiency. An example of a sidechain is the liquid network

Cloud computing :

Cloud computing is a technology that allows you to access computing resources, such as
storage, applications, and processing power, over the internet. Instead of having to run
software or store data on your own computer or server, you can use remote servers and
resources hosted by a cloud service provider .In simple words, cloud computing works
like renting a computer or server over the internet. You can use as much or as little of the
resources you need, and you only pay for what you use. This makes it a flexible and cost-
effective solution for individuals and businesses of all sizes.

Types of cloud computing:

Public cloud

Private cloud

Hybrid cloud

Uses of cloud computing :

Create cloud native application

Test and build application

Store backup and recover data

Analyze data
Stream audio and video

Embedded intelligence

Deliver software on demand

Quantum computing :

Quantum computing is a type of computing that uses quantum mechanics, a branch of


physics that studies the behavior of matter and energy at a very small scale, to perform
calculations

Autonomic computing:

Autonomic computing is a type of computing that is designed to be self-managing and


self-configuring, with the ability to adapt to changing conditions and optimize
performance automatically.

The idea behind autonomic computing is to create computer systems that are more
reliable, efficient, and adaptable, and that require less human intervention to operate. This
is achieved by building systems with a high degree of automation, self-monitoring, and
self-healing capabilities.

Computer vision :

Computer vision Is an interdisciplinary scientific field that deals with how computers can
gain high-level understanding from digital images or videos.

From the perspective of engineering, it seeks to understand and automate tasks that
the human visual system can do.

Computer vision tasks include methods for acquiring, processing, analyzing and
understanding digital images, and extraction of high-dimensional data from the real world
in order to produce numerical or symbolic information,

Example: Computer vision is used to detect and classify objects (e.G., Road signs or
traffic lights), create 3D maps or motion estimation, and played a key role in making
autonomous vehicles a reality. Self-driving cars collect data on their surroundings from
sensors and cameras, interpret it, and respond accordingly
Cyber security:

Cyber security is the application of technologies, processes and controls to protect


systems, networks, programs, devices and data from cyber attacks.

It aims to reduce the risk of cyber attacks and protect against the unauthorised
exploitation of systems, networks and technologies.

Types of cyber security :

1. Critical infrastructure cyber security

2. Network security

3. Cloud security

4. iOT security

5. Application security

Additive manufacturing : ( 3D Printing )

3D printing(sometimes referred to as additive manufacturing (AM)) is the computer-


controlled sequential layering of materials to create three-dimensional shapes.

A 3D Digital model of the item is created, either by computer-aided design (CAD) or using
a 3D scanner.

Additive manufacturing is a specific 3D printing process. This process builds parts layer
by layer by depositing material according to digital 3D design data.

You might also like