0% found this document useful (0 votes)
2 views103 pages

Introduction to IoT

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 103

Introduction to Internet of Things

Top 10 Technologies of Future

Source : https://dzone.com/articles/top-ten-technology-trends-for-2021
Top 10 Technologies of Future
Artificial Cyber
01 06
Intelligence TOP 10 NEW-AGE Security
TECHNOLOGIES
MARKET PREDICTION
Big Data FOR UPCOMING YEARS Cloud
02 07
Analytics Computing

Drones 03 08 Internet of
Things

Robotics 04 09 AR/VR
EXCEPT NO. 10,
TATA STEEL HAS
IMPLEMENTED ALL
THESE TECHNOLOGIES Autonomous
RPA 05 10 Vehicle
1. Artificial Intelligence
1. Artificial Intelligence
What is Artificial Intelligence (AI)?

Artificial Intelligence (AI) is a broad branch of


computer science that is focused on a machine’s
capability to produce rational behavior from external
inputs. The goal of AI is to create systems that can
perform tasks that would otherwise require human
intelligence. AI manifests itself in everyday life
via virtual assistants, search prediction technology,
and even ride-hailing services.

Summary

 Artificial Intelligence (AI) aims to develop machines that can accomplish what a human can in terms of reasoning.

 The four types of artificial intelligence are reactive machines, limited memory, theory of mind, and self-awareness.

 Artificial intelligence now affects productivity, employment, and competitive behavior in significant ways.
1. Artificial Intelligence
Artificial Intelligence can be understood as a simulation of human
intelligence. A simulation of human intelligence means that any
task performed by a program or a machine will be carried out in
the same way in which a human being would have done it.

Artificial intelligence has an ultra-wide scope to deal with problems


and to learn through past experiences. The core part of artificial
intelligence is the algorithms.

AI demonstrates some of the behavior that is linked with human


intelligence such as planning, reasoning, learning, manipulation,
creativity, and more.

The concept of what AI is and what it can do has changed from


time to time. But the core idea can be explained as machines
that can think and act like humans.
1. Types of Artificial Intelligence
1. Reactive Machines
Reactive machines perceive present external information
and plan actions accordingly. The machines perform
specialized duties and only understand the task at hand. The
machines’ behavior is consistent, given a repeated situation.
In the 1990s, IBM developed a reactive machine
named Deep Blue to play competitive chess, predicting
chess moves by identifying each piece’s board placement.

3. Theory of Mind 2. Limited Memory


Theory of mind machines can form thoughts and make decisions Limited memory machines can harness recent
in reference to emotional context; thus, they are able to observations to make informed decisions. The
participate in social interaction. The machines are still in the machines consider observational data in reference to
development stage, however, many exhibit aspects of human-like their pre-programmed conceptual framework. The
capability. For example, consider voice assistant applications that observational data is retained for a limited period and
can comprehend basic speech prompts and commands but
then forgotten.
cannot hold a conversation.

4. Self-Awareness
Self-awareness machines demonstrate intelligent behavior through ideation, the formation of desires, and
understanding their internal states. In 1950, Alan Turing developed the Turing Test to identify machines that could
behave indistinguishably from a human being.
1. Types of Artificial Intelligence
Narrow AI
Narrow AI can be seen in all the computing devices
that people use in their day-to-day lives. This is
what makes our lives easier.

People just need to press some buttons and all


other work will be done by the machine.

Earlier people needed to do everything by


themselves but now they can ask the voice
Conclusion assistant to do those things for them.

 Artificial Intelligence is the future. General AI


 It has the scope to change the technology for the Now, this is the best form of AI as it teaches
betterment of the world and the people living in it. machines or software to do the things that human
beings can do. This is the reason why it is called
AI will help Artificial General Intelligence, which means
 businesses to improve their processes, machines that can work like people.
 the government to improve the administration, and
 the general public to do daily work in an easy way.
1. Artificial Intelligence
Machine Learning

 ML or machine learning is what makes an AI


application intelligent enough to learn new things.

 This is the broad part of AI that most industries in


the world are working on.

 Because of this, a computer device takes up data


and with more data, it gets more intelligent.

 It is like feeding a human being with food that makes them stronger. Data makes a device that has
used ML smart and intelligent.

 Because of this, the software can learn how they need to improve and personalize themselves
according to their users.

 ML is also used in the voice assistants because of which they can remember what we say and
search related to that.
1. Artificial Intelligence
Elements Of Machine Learning
Machine learning can be regarded as a subset of AI and has mainly two
elements, namely supervised learning and unsupervised learning.

Supervised Learning
This is a rather common technique for teaching systems. It is done by
using a huge number of labeled examples in the form of data. The systems
are filled with a large amount of data that identifies the features of interest.
These are then labeled into the system’s memory. Once the system is
trained, these labels can be used to read data as well as create new data.

Unsupervised Learning
It is quite different from the above method of learning as this algorithm
attempts to locate patterns in data. They cluster together these patterns to
perform operations and give meaningful results.

Reinforcement Learning
This is a reward-based learning process. Here, rewards are processed
according to their input data. This is basically a trial and error process and
is greatly used in machine learning methods.
1. Artificial Intelligence

AI Changing The World

 AI will change the world in many different ways. There are different parts of industries that will
be directly affected by it like robotics and the automobile sector.

 AI will make robots and cars smart enough to be able to work on their own and control the
things around them as per their programming. Though it will take some time to make them
behave as normal as humans, even as of now they will be able to have a conversation,
understand what people say, and respond to them.

 Other parts that will be affected by it is the content that gets uploaded on the internet. Search
engines have started using AI to filter out information and news that is fake.

 This is the reason why now the internet does not list any website that is caught spreading fake
news or information about something. This will make the internet a better place for normal
people. These are just some of the ways, there are many other ways in which it will change
the world.
2. Big Data Analytics
2. Big Data Analytics
Introduction to Big Data Analytics

Big Data analytics is the process of collecting, organizing and analyzing


a large amount of data to uncover hidden pattern, correlation and other
meaningful insights.

It helps an organization to understand the information contained in their


data and use it to provide new opportunities to improve their business.

A field to analyze and to extract information about the big data


involved in the business or the data world so that proper
conclusions can be made is called big data Analytics.

These conclusions can be used to predict the future or to forecast


the business. Also, this helps in creating a trend about the past.
2. Big Data Analytics

We can define Big Data as three Vs


Volume: The amount of data that is being generated every
second. Everyday organizations like social media, e-
commerce business, airlines collect a huge amount of data.

Velocity: The rate at which the data is generated. Social


Media is being used by everybody and there will be lots of
data generated every second because people do a lot of
things over social media they post the comments, like the
photos, share the videos, etc.

Variety: Data could be of various forms structured data


like numeric data, unstructured data like text, images,
videos, financial transactions etc. or semi-structured data
like JSON or XML.
2. Big Data Analytics - How it works and key technologies (1/4)
There’s no single technology that encompasses
big data analytics. Of course, there’s advanced
analytics that can be applied to big data, but in
reality, several types of technology work together
to help you get the most value from your
information.
Here are the biggest players:

 Machine Learning.  Data management.


 Data mining.  Hadoop.
 In-memory analytics.  Predictive analytics.
 Text mining.
2. Big Data Analytics - How it works and key technologies (2/4)
Machine Learning.

Machine learning, a specific subset of AI that trains a


machine how to learn, makes it possible to quickly and
automatically produce models that can analyze bigger, more
complex data and deliver faster, more accurate results – even
on a very large scale. And by building precise models, an
organization has a better chance of identifying profitable
opportunities – or avoiding unknown risks.

Data management.

Data needs to be high quality and well-governed before it can be


reliably analyzed. With data constantly flowing in and out of an
organization, it's important to establish repeatable processes to
build and maintain standards for data quality. Once data is reliable,
organizations should establish a master data management program
that gets entire enterprise on the same page.
2. Big Data Analytics - How it works and key technologies (2/4)
Data mining

Data mining technology helps you examine large amounts of data to


discover patterns in the data and this information can be used for further
analysis to help answer complex business questions. With data mining
software, you can sift through all the chaotic and repetitive noise in data,
pinpoint what's relevant, use that information to assess likely outcomes,
and then accelerate the pace of making informed decisions.

Hadoop

This open source software framework can store large


amounts of data and run applications on clusters of
commodity hardware. It has become a key technology
to doing business due to the constant increase of data
volumes and varieties, and its distributed computing
model processes big data fast. An additional benefit is
that Hadoop's open source framework is free and uses
commodity hardware to store large quantities of data.
2. Big Data Analytics - How it works and key technologies (2/4)
In-memory analytics. By analyzing data from system memory (instead of from your hard disk drive),
you can derive immediate insights from your data and act on them quickly. This technology is able to
remove data prep and analytical processing latencies to test new scenarios and create models; it's not
only an easy way for organizations to stay agile and make better business decisions, it also enables
them to run iterative and interactive analytics scenarios.

Predictive analytics. Predictive analytics


technology uses data, statistical algorithms and
machine-learning techniques to identify the
likelihood of future outcomes based on historical
data. It's all about providing a best assessment on
what will happen in the future, so organizations can
feel more confident that they're making the best
Text mining. With text mining technology, you can analyze text data from the web, comment
possible business decision. Some of the most
fields, books and other text-based sources to uncover insights you hadn't noticed before. Text
common applications of predictive analytics include
mining uses machine learning or natural language processing technology to comb through
fraud detection, risk, operations and marketing.
documents – emails, blogs, Twitter feeds, surveys, competitive intelligence and more – to help
you analyze large amounts of information and discover new topics and term relationships.
3. Drones
3. Drones
Drone Technology

The term “drone” usually refers to any unpiloted


aircraft. Sometimes referred to as “Unmanned Aerial
Vehicles" (UAVs), these crafts can carry out an
impressive range of tasks, ranging from military
operations to package delivery.

Drones can be as large as an aircraft or as small as


the palm of your hand.
3. Drones
Drones, sometimes referred to as “Unmanned Aerial Vehicles”
(UAVs) are meant to carry out tasks that range from the mundane
to the ultra-dangerous.

These robot-like vehicles can be found assisting the rescue of


avalanche victims in the Swiss Alps, at your front doorstep
dropping off your groceries and almost everywhere in between.

Originally developed for the military and aerospace industries,


drones have found their way into the mainstream because of
the enhanced levels of safety and efficiency they bring.

These robotic UAVs operate without a pilot on board and with different levels of autonomy. A drone’s
autonomy level can range from remotely piloted (a human controls its movements) to adv autonomy,
which means that it relies on a system of sensors and LIDAR detectors to calculate its movement.
Generation 1: Basic remote control aircraft of all forms

Generation 2: Static design, fixed camera mount, video recording and still photos, manual piloting control

Generation 3: Static design, two-axis gimbals, HD video, basic safety models, assisted piloting

Generation 4: Transformative designs, Three-axis gimbals, 1080P HD video or higher-value instrumentation,


improved safety modes, autopilot modes.

Generation 5: Transformative designs, 360° gimbals, 4K video or higher-value instrumentation, intelligent


piloting modes.
Generation 6: Commercial suitability, safety and regulatory standards based design, platform and payload
adaptability, automated safety modes, intelligent piloting models and full autonomy, airspace awareness

Generation 7: Complete commercial suitability, fully compliant safety and regulatory standards-based design,
platform and payload interchangeability, automated safety modes, enhanced intelligent piloting models and
full autonomy, full airspace awareness, auto action (takeoff, land, and mission execution)
4. Robotics
4. Robotics

Robot is a machine—especially one programmable by a computer—capable


of carrying out a complex series of actions automatically. A robot can be
guided by an external control device, or the control may be embedded within.

Robots may be constructed to evoke human form, but most robots are task-
performing machines, designed with an emphasis on stark functionality,
rather than expressive aesthetics.

BigDog
Some example of Robots :
 Industrial robots,  Medical operating robots,
 Collectively programmed swarm robots,  Patient assist robots,
 UAV drones such as General Atomics MQ-1 Predator,  Dog therapy robots,
 Microscopic nano robots.
4. Robotics

Classification of Robots
 Autonomous
 Semi-autonomous and
 Range from humanoids

Examples of Humanoids :
Honda's Advanced Step in Innovative Mobility (ASIMO)
TOSY's TOSY Ping Pong Playing Robot (TOPIO)

By mimicking a lifelike appearance or automating movements, a robot may


convey a sense of intelligence or thought of its own.
ASIMO in 2005
Autonomous things are expected to proliferate in the coming decade, with
home robotics and the autonomous car as some of the main drivers.
Applications

1. Arc Welding

2. Spot Welding

3. Materials Handling

4. Machine Tending:

5. Painting

6. Picking, Packing and Palletizing


7. Mechanical Cutting, Grinding, Deburring and Polishing: Building dexterity into robots provides a
manufacturing option that is otherwise very difficult to automate. An example of this is the production
of orthopedic implants, such as knee and hip joints. Buffing and polishing a hip joint by hand can
normally take 45-90 minutes while a robot can perform the same function in just a few minutes.
5. Robotics Process
Automation (RPA)
5. Robotics Process Automation (RPA)
Robotic process automation (or RPA) is a form of business process automation technology based on
metaphorical software robots (bots) or on artificial intelligence (AI)/digital workers.

It is sometimes referred to as software robotics (not to be confused with robot software).

A software developer produces a list of actions to


automate a task and interface to the back-end
system using internal application programming
interfaces (APIs) or dedicated scripting language.

In contrast, RPA systems develop the action list by


watching the user perform that task in the
application's graphical user interface (GUI), and
then perform the automation by repeating those
tasks directly in the GUI.
5. Robotics Process Automation (RPA)

Robotic process automation (RPA) is a software technology that makes it easy to build, deploy, and
manage software robots that emulate human's actions interacting with digital systems and software.

Just like people, software robots can do things like:


 understand what’s on a screen,
 complete the right keystrokes,
 navigate systems,
 identify and extract data, and
 perform a wide range of defined actions.

But software robots can do it faster and more consistently than people,
without the need to get up and stretch or take a coffee break.
5. Robotics Process Automation (RPA)

 RPA tools have strong technical similarities to graphical user interface testing tools.

 These tools also automate interactions with the


GUI, and often do so by repeating a set of
demonstration actions performed by a user.

 RPA tools differ from such systems in that they


allow data to be handled in and between multiple
applications.

 For example : receiving email containing an invoice, extracting the data, and
then typing that into a bookkeeping system.
5. Robotics Process Automation (RPA)

Example of working of Software Bot using Automation Anywhere


5. Robotics Process Automation (RPA)

Advantages of RPA :

Accelerated Improved
Transformation Compliance

Contents Here Boosted


Higher
Get a modern PowerPoint Presentation
Accuracy
that is beautifully designed.
Productivity

Contents Here
Major Cost More Value from
Get a modern PowerPoint Presentation
Savings
that is beautifully designed. Personnel

Contents Here
Greater Happier
Get a modern PowerPoint Presentation
Resilience
that is beautifully designed. Employees
6. Cyber Security
6. Cyber Security

Cyber security is the practice of defending


computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks.
It's also known as information technology security or
electronic information security.
6. Categories of Cyber Security (1/2)

Network security is the practice of securing a


computer network from intruders, whether targeted
attackers or opportunistic malware.

Application security focuses on keeping software


and devices free of threats. A compromised application
could provide access to the data its designed to
protect. Successful security begins in the design
stage, well before a program or device is deployed.

Information security protects the integrity and


privacy of data, both in storage and in transit.

Operational security includes the processes and decisions for handling and protecting
data assets. The permissions users have when accessing a network and the procedures
that determine how and where data may be stored or shared all fall under this umbrella.
6. Categories of Cyber Security (2/2)

Disaster recovery and business continuity define how


an organization responds to a cyber-security incident or
any other event that causes the loss of operations or
data. Disaster recovery policies dictate how the
organization restores its operations and information to
return to the same operating capacity as before the event.

End-user education addresses the most unpredictable


cyber-security factor: people. Anyone can accidentally
introduce a virus to an otherwise secure system by
failing to follow good security practices. Teaching users
to delete suspicious email attachments, not plug in
unidentified USB drives, and various other important
lessons is vital for the security of any organization.
6. Cyber Security

Types of cyber threats

The threats countered by cyber-security


are three-fold:

1. Cybercrime includes single actors or


groups targeting systems for financial gain
or to cause disruption.

2. Cyber-attack often involves politically motivated information gathering.

3. Cyberterrorism is intended to undermine electronic systems to cause panic or fear.


6. Cyber Security
Common methods used to threaten cyber-
security:

1. Malware

 Malware means malicious software.


 One of the most common cyber threats,
malware is software that a cybercriminal or
hacker has created to disrupt or damage a
legitimate user’s computer.

 Often spread via an unsolicited email attachment or legitimate-


looking download, malware may be used by cybercriminals to
make money or in politically motivated cyber-attacks.
6. Cyber Security : Types of Malware (1/2)
There are number of different types of malware, including:

• Virus: A self-replicating program that attaches itself to clean file


and spreads throughout a computer system, infecting files with
malicious code.

• Trojans: A type of malware that is disguised as legitimate


software. Cybercriminals trick users into uploading Trojans onto their
computer where they cause damage or collect data.

• Spyware: A program that secretly records what a user does, so


that cybercriminals can make use of this information. For example,
spyware could capture credit card details.

• Ransomware: Malware which locks down a user’s files & data, with threat of erasing it unless a ransom is paid.

• Adware: Advertising software which can be used to spread malware.

• Botnets: Networks of malware infected computers which cybercriminals use to perform tasks online without the
user’s permission.
6. Cyber Security : Types of Malware (2/2)

SQL injection
An SQL (structured language query) injection is a type of cyber-attack used to take control of and steal data from a database.
Cybercriminals exploit vulnerabilities in data-driven applications to insert malicious code into a databased via a
malicious SQL statement. This gives them access to the sensitive information contained in the database.

Phishing
Phishing is when cybercriminals target victims with emails that appear to be from a legitimate company asking for
sensitive information. Phishing attacks are often used to dupe people into handing over credit card data and other
personal information.

Man-in-the-middle attack
A man-in-the-middle attack is a type of cyber threat where a cybercriminal intercepts communication between two
individuals in order to steal data. For example, on an unsecure WiFi network, an attacker could intercept data being
passed from the victim’s device and the network.

Denial-of-service attack
A denial-of-service attack is where cybercriminals prevent a computer system from fulfilling legitimate requests by
overwhelming the networks and servers with traffic. This renders the system unusable, preventing an organization
from carrying out vital functions.
7. Cloud Computing
7. Cloud Computing

 Cloud computing is the delivery of


computing services - including servers,
storage, databases, networking, software,
analytics, and intelligence - over the Internet
(“the cloud”) to offer faster innovation,
flexible resources, and economies of scale.

 You typically pay only for cloud services you


use, helping lower your operating costs, run
your infrastructure more efficiently and scale
as your business needs change.
8. Internet of Things (IoT)
9. AR/VR
8. Augmented Reality (AR)

 Augmented reality (AR) can be defined as a system


that incorporates three basic features: a combination
of real and virtual worlds, real-time interaction, and
accurate 3D registration of virtual and real objects.

 This experience is seamlessly interwoven with the


physical world such that it is perceived as an
immersive aspect of the real environment.

 Augmented reality is related to two largely


synonymous terms: mixed reality and computer-
mediated reality.
 Augmented reality (AR) is an interactive experience of a real-world environment where
the objects that reside in the real world are enhanced by computer-generated perceptual
information, sometimes across multiple sensory modalities, including visual, auditory,
haptic, somatosensory and olfactory.
8. Augmented Reality (AR)

 Perhaps the most famous example of AR technology is


the mobile app Pokemon Go, which was released in 2016

 There are as many uses for AR. Just a few examples:

 Enhanced navigation systems use augmented reality to


superimpose a route over the live view of the road.

 During football games, broadcasters use AR to draw lines


on the field to illustrate and analyze plays.
 Military fighter pilots see an AR projection of their altitude, speed, and other data on their helmet visor,
which means they don’t need to waste focus by glancing down to see them.

 Neurosurgeons sometimes use an AR projection of a 3-D brain to aid them in surgeries.

 Ground crew at Singapore’s airport wear AR glasses to see information about cargo containers,
speeding up loading times
8. Virtual Reality (VR)

 The definition of virtual reality comes, naturally,


from the definitions for both ‘virtual’ and ‘reality’.

 The definition of ‘virtual’ is near and reality is what


we experience as human beings.

 So, the term ‘virtual reality’ means ‘near-reality’.


This could, of course, mean anything but it usually
refers to a specific type of reality emulation.

 Virtual reality (VR), the use of computer modeling and simulation that enables a person to
interact with an artificial three-dimensional (3-D) visual or other sensory environment.

 VR applications immerse the user in a computer-generated environment that simulates


reality through the use of interactive devices, which send and receive information and are
worn as goggles, headsets, gloves, or body suits.
8. Virtual Reality (VR)

 Virtual Reality (VR) is the use of computer technology to


create a simulated environment

 The simulated experience can be similar to or completely


different from the real world.

 In a typical VR format, a user wearing a helmet with a


stereoscopic screen - views animated images of a
simulated environment.
 The illusion of “being there” (telepresence) is effected by motion sensors that pick up the user’s
movements and adjust the view on the screen accordingly, usually in real time.

 Thus, a user can tour a simulated suite of rooms, experiencing changing viewpoints and perspectives
that are convincingly related to his own head turnings and steps.

 Wearing data gloves equipped with force-feedback devices that provide the sensation of touch, the
user can even pick up and manipulate objects that he sees in the virtual environment.
8. AR, VR, MR & XR

 Augmented reality (AR) adds digital elements to a live view


often by using the camera on a smartphone

 Virtual reality (VR) implies a complete immersion


experience that shuts out the physical world. Using VR
devices such as HTC Vive, Oculus Rift or Google
Cardboard, users can be transported into a number of real-
world and imagined environments.

 In a Mixed Reality (MR) experience, which combines elements of both AR and VR, real-world and
digital objects interact. Mixed reality technology is just now starting to take off with Microsoft’s
HoloLens one of the most notable early mixed reality apparatuses.

 Extended Reality (XR) is an umbrella term that covers all of the various technologies that enhance
our senses, whether they’re providing additional information about the actual world or creating totally
unreal, simulated worlds for us to experience. It includes Virtual Reality (VR), Augmented Reality
(AR) and Mixed Reality (MR) technologies.
8. Difference between Augmented Reality and Virtual Reality

 Virtual Reality and Augmented Reality are two sides of the same coin.

Augmented Reality Virtual Reality


AR simulates artificial objects in the real environment; Virtual Reality creates an artificial environment to
inhabit
AR adds to reality, projecting information on top of VR replaces reality, taking you somewhere else.
what you're already seeing.

In AR, the computer uses sensors and algorithms to In Virtual Reality, the computer uses similar sensors
determine the position and orientation of a camera. and math.

AR technology then renders the 3D graphics as they However, rather than locating a real camera within a
would appear from the viewpoint of the camera, physical environment, the position of the user’s eyes
superimposing the computer-generated images over a are located within the simulated environment.
user’s view of the real world.
If the user’s head turns, the graphics react
accordingly. Rather than compositing virtual objects
and a real scene, VR technology creates a convincing,
interactive world for the user.
10. Autonomous Vehicles
10. Autonomous Vehicles
 Autonomous vehicle (AV or auto) is a vehicle that is
capable of sensing its environment and moving safely with
little or no human input.

 An autonomous vehicle also known as


 Self-driving car
 Driverless car
 Robo-car
 Self-driving cars combine a variety of sensors to perceive their surroundings, such as Radar, Lidar,
Sonar, GPS, Odometry and Inertial measurement units.

 Advanced control systems interpret sensory information to identify appropriate navigation paths, as
well as obstacles and relevant signage.

 Possible implementations of the technology include personal self-driving vehicles, shared robotaxis,
connected vehicle platoons and long-distance trucking. Several projects to develop a fully self-
driving commercial car are in various stages of development.
10. Autonomous Vehicles
Six Levels of Autonomous Vehicles

There are six different levels of automation


As levels increase, independence regarding operation control increases.

At level 0, the car has no control over its operation and the human driver
does all of the driving.

At level 1, the vehicle’s ADAS (advanced driver assistance system) has


the ability to support driver with either steering or accelerating & braking.

At level 2, the ADAS can oversee steering and accelerating and braking in some conditions, but human driver is required to pay
attention continuously to driving environment throughout the journey, while also performing the remainder of the necessary tasks.

At level 3, the ADS (advanced driving system) can perform most of driving task in some conditions, but human driver is required
to be able to regain control when requested by ADS. In remaining conditions, the human driver executes necessary tasks.

At level 4, vehicle’s ADS performs all driving tasks independently in certain conditions in which human attention is not required.

Finally, level 5 involves full automation whereby the vehicle’s ADS performs all tasks in all conditions, and no driving assistance is
required from the human driver. This full automation will be enabled by the application of 5G technology, which will allow vehicles
to communicate not just with one another, but also with traffic lights, signage and even the roads themselves.
Internet of Things
Development of Internet

90’s-00’s 2007-08 2014


70’s Beginnings and rise
Mobile internet Rise of Internet
PC Era. of Email, www,
picks up of Things
Yahoo and Google
Development of Internet of Things:
Can you guess some applications of IoT?

Let’s see some applications of IoT


Applications : Ice-Cream Vending Machine

 An Ice-cream vending machine tells the


supplier that it is running out of Butter-scotch
flavour, enabling the supplier to schedule on-
site visit to refill the same.

 Based on past consumption rate, the Ice-cream


vending machine also tells the supplier that it’s
current stock will vanish in next xx minute. So,
supplier can schedule on-site visit before that.
Applications : Plants tweaking their needs

Plants communicate if
they need more water
and/or fertilizer.
Applications :
Smart Medicine Bottle
A Blinking light on the cap of the
bottle reminds you that it’s time to
take your tablet.

If you forget, the cap of the


medicine bottle goes online
and alerts your doctor.
Applications :
Smart Watch
A pedometer in your training shoes
and a heart monitor in your wrist
band helps you run around the
block. You are constantly updated
about how many calories you
burnt. What is your current heart
beat, pulse rate, running speed etc.

All this data is simultaneously uploaded to your personal


tracking website – which can be integrated with your online
grocery account making it easy to compare how many calories
you have burnt vs. consumed.
ARROW –DIGITIZING SHIRTS
The Problem : The need to carry
around paper business cards and
resumes.

The Solution: With the use of an


NFC chip, the smart shirt lets you
activate a number of functions on
your phone by just tapping it to the
cuff. You can open and share your
LinkedIn profile or business E card
in a matter of seconds, rather than
having to carry them around on
paper all the time to share with
business partners and clients .
INTERNET OF COWS
BREATHOMETER MINT

The Problem: Lack of insight into how effective


your teeth cleaning practices are.

The solution: Mint is an oral hygiene device that


uses IOT technology to analyze the bacteria and
sulfur levels in your mouth and broadcast them
to your smartphone. The device also provides
you with personalized tips based on your dental
history.
HAPIFork
CONSUMER GOODS -WHIRPOOL

The problem: Lack of after sales insight about


usage and wear and tear of products.

The solution: To gain valuable insights about


their products and how they are used, sensors
on Whirlpool products keep monitoring them
after they have been sold, and this data shows
how they're using, and how the machines are
responding. This helps the company make
changes to future products to suit customer
needs.
CAR INSURANCE –BAJAJ ALLIANCE

The problem: Young people being priced


out of car insurance due to the perception
that they are high- risk drivers.

The solution: By collecting data from


millions of drivers insurance companies
can get a more accurate sense of how
people in a certain age group drive, and
price insurance more fairly for them as a
result
Smart Cities: Compology (&JUSCO)

The problem: Excessive waste in metro


cities, which is not recycled properly.

The Solution: Compology, a San Francisco


based startup has introduced waste OS, a
smart waste collection system that can cut
correction costs by almost 40%. Through the
use of IOT sensors, waste collection
agencies are able to run their fleets on the
most efficient route and identify the identify
when waste may need to be collected ahead
of time.
Smart Retail – Chai Point

The problem: Lack of a streamlined system


of a standardization for the production of tea
beverages.

The solution: chai point has diversified from


simply being a tea selling franchise and has
created a system which integrates IOT and
AI for clients. With this they can keep track
of how many cups of tea have been made,
they can alter the water and milk amounts
and even get insights on when to refill the
containers .
IBACO ICE CREAMS

25-30% inventory loss due to power outage


Simple IOT implementation by Nimble wireless
ROLLS ROYCE ENGINES

 Sensors fitted inside the engine


track engine health and fuel use to
diagnose potential faults

 Engine performance analysis is


done mid-flight, enabling proactive
maintenance.

 By an estimate, a 1% reduction in
fuel usage translates to
US$250,000/plane/year
HARLEY-DAVIDSON

 Operating costs dropped by $200 million,


downtime reduced.

 The company was also able to reduce its


build-to-order cycle by a factor of 36

 TAT for custom bike reduced from 180


days to 2 weeks
SIGTUPLE

 Low-cost digitization of images of a slide


under a microscope

 Started with smartphone as camera,


now building auto scan capabilities

 AI and ML for image analysis and


reports –Hematology reports
BETTER WHISKY DRINKINGEXPERIENCE

The Problem- Concerns around counter fitting,


as well as seal tempering.

The Solution: With patent pending open


Sense technology, each bottle of whiskey has
a unique identifier, which helps users know if it
has been tempered with in any way. It is also a
way for the company to increase personalized
communication to their consumers.
Connected Cars

Connected cars help monitor performance, communicate with each other to


navigate better, monitor health of each component

We can track almost anything


remotely to cargo packages,
lost children or dogs,
endangered animals etc. etc.
Tweeting plants, Body sensors, Driverless cars,
Connected contact lenses, Completely automated plants,
Personalized social networking ……….

What is the common factor ……….

Internet of Things
What is IoT?

- A phenomenon which connects a variety of things


- Everything that has the ability to communicate
History of IoT
• The first telemetry system was rolled out in Chicago way back in 1912. It is said to have used
telephone lines to monitor data from power plants.

• Telemetry expanded to weather monitoring in the 1930s, when a device known as a radiosonde
became widely used to monitor weather conditions from balloons.

• In 1957 the Soviet Union launched Sputnik, and with it the Space Race. This has been the entry of
aerospace telemetry that created the basis of our global satellite communications today.

• Broad adoption of M2M technology began in the 1980s with wired connections for SCADA
(supervisory control and data acquisition) on the factory floor and in home and business security
systems.
• In the 1990s, M2M began moving toward wireless technologies. ADEMCO built their own private
radio network to address intrusion and smoke detection because budding cellular connectivity was
too expensive.
• In 1995, Siemens introduced the first cellular module built for M2M.
IoT Definition

IOT defined as “Dynamic global internetwork with self-configuring capabilities; of


devices, mechanical and digital machines, objects, animals, people that have unique
identities, physical attributes, virtual personalities – seamlessly integrated to transfer
information associated with users and environments over the network without
human interference.”- Kranenburg 2008
Defintion of IoT
We define the Internet of Things as a…
Seamless combination of
embedded intelligence,
ubiquitous connectivity, Identify

Policies & Standards


and deep analytical Act Sense

Industries
Enterprise
insights that creates Consumer
unique and disruptive Public Sector
value for companies, Analyze Connect

individuals, and societies Collect

Value and Impact


IoT Definition

ITU Definition

“The IoT can be viewed as a global


infrastructure for the information society,
enabling advanced services by
interconnecting (physical and virtual)
things based on existing and evolving
interoperable information and
communication technologies (ICT).”
Any-Time/Place/Thing
Things

• Things are objects of the physical world (physical things) or of the


information world (virtual world) which are capable of being identified and
integrated into communication networks. Things have associated information,
which can be static and dynamic.

• Physical things exist in the physical world and are capable of being
sensed, actuated and connected. Examples of physical things include the
surrounding environment, industrial robots, goods and electrical equipment.

• Virtual things exist in the information world and are capable of being stored,
processed and accessed. Examples of virtual things include multimedia
content and application software.
Things
Introduction to IoT

The IoT can be defined as, A huge network of interconnected things; things
may be small devices, big machines and also includes people. Via this
interconnected network communication can occur between things-things,
things-people, and people-people
Just imagine, while your alarm rings in the morning, the lights of the room lit
up, and the coffee maker is notified to start making a coffee for you. The
geyser has to automatically set on, warming the water for your shower. While
you leave home for the office, the calendar on your smartphone may set the
best route for the office and thus instructing your car to drive in the best route.
Depending upon the traffic on the route, your office could be informed that
you would be late for the meeting.
Characteristics of IoT

1. Dynamicity.
2. Zero Configurations (self configuration)
3. Unique Identity
4. Semantic Inter Operability
5. Scalability
6. Integration into the information network:
7. Ambient and collective Intelligence
Characteristics of IoT
Challenges in IoT Deployment
Challenges to IoT deployment and value span 6 areas
Things Lack of scale needed to
Lack of integrated achieve acceptable cost
end- to-end points
solutions that Identify

deliver value

Policies & Standards


Act Sense • Lack of standards for critical
Enterprise layers of IoT solutions

Industries
Consumer
• Multitude of alliances and
Public Sector partnerships
Analyze Connect
• Complex • Policies not keeping up with
interoperability Collect technological advancement

Value and Impact • Complex interoperability


• Legacy environments
• Limited near term business cases
• Exponentially growing data volumes
• Concerns about design and
implementation complexity
Applications of IoT
Applications of IoT
Home Smart Lighting, Smart Appliances, Intrusion Detection, Smoke/Gas Detectors

Smart Parking, Smart Roads, Structural Health Monitoring, Emergency


Cities
Response
Weather Monitoring, Air Pollution Monitoring, Noise
Environment
Pollution Monitoring, Forest Fire Detection

Energy Smart Grids, Renewable Energy Systems, Prognostics

Retail Inventory Management, Smart Payments, Smart Vending Machines


IoT
Route Generation and Scheduling, Fleet Tracking,
Logistics
Shipment Monitoring, Remote Vehicle Diagnostics

Agriculture Smart Irrigation, Green House Control

Industry Machine Diagnostics and Prognosis, Indoor air quality Monitoring

Health and Lifestyle Health and fitness monitoring, Wearable electronics


Simple lawn sprinkler system

From devices to smart devices to IOT – The IOT enabling Technologies


• The system is used to water the lawns for certain duration every day.

• The system is made up of a series of underground pipes and valves as shown below.

• Every line has its own set of valves with an overall valve to control water flow.

• A normal sprinkler system (non-smart) user comes and turns on the valve manually or uses a remote
button and turns on the valve regularly for some hours every day.
Simple lawn sprinkler system

System to Smart System


• To this sprinkler system we can add intelligence-system to convert it into a smart system (embedded
system)
• we can add 16/32bit microcontroller, soil moisture sensors, add relays to control the valves
individually.
• The microcontroller at regular intervals of time checks soil moisture and at pre-programmed time of
day look at the data collected and based on pre-programmed information open/closed valves.
• The system is no longer dumb. The system has now some amount of intelligence added to it – The
smart sprinkler system is now IOT – it is an embedded system – smart definitely – but IOT? No.
Simple lawn sprinkler system
Smart System to IoT System

Taking the system a step further. At regular interval of time the soil moisture is still monitored
But the microcontroller, before deciding on the sprinkling schedule, also queries the database of a weather monitoring system to
determine whether there is possibility for rainfall in the next few hours, what is expected day-time/night-time temperature, what is
the expected humidity, was there dew early morning then determines the sprinkling schedule.
The smart system is now connected to the global internet making it an IOT system.
We can continue adding more feature to the system. Water level in the tank supplying water to the sprinkler system can be
monitored. If the water level is low then the sprinkler system can be alerted and its sprinkling schedule can be delayed. While relays
controlling inlet and outlet of water into the tank can be turned off and on respectively and the water pumping can be turned.

In case the water pumping system does not work the user of the water tank/sprinkler system can be altered via an SMS sent from
the sprinkler system automatically to his mobile via the cellular network - Another IOT feature.

More features can be added by using sensors to monitor the condition of the pipeline underground via which water is being supplied
to the sprinkler systems. Cracks, breakages in the underground pipeline can be detected by the sprinkler system. When this
happens the sprinkler system can look-up a database of plumbers-select; some-one who is available-use the internet to mail the
plumber the details of the error in the system, book an appointment and even do a transfer of money as the advance …. The
possibilities can grow.

All this happens in the background – with minimal to no intervention from the user of sprinkler system-hence also the term Ambient
or calm computing. This connection of day-to-day objects to the internet has also been called as ubiquitous computing (ubicomp) or
pervasive computing.
Applications of IoT (Internet of Things)
5. Internet of Things
Interconnected Terms
Synonymous Words

1. Ubiquitous Computing.
2. M2M,
3. Remote monitoring
4. Embedded computing,
5. Pervasive computing,
6. Smart services,
7. Industrial Internet
8. Internet of Things (IoT)
Synonymous Words

Ubiquitous Computing :
Ubiquitous computing (or "ubicomp") is a concept in software
engineering and computer science where computing is made
to appear anytime and everywhere. In contrast to desktop
computing, ubiquitous computing can occur using any device,
in any location, and in any format.
IoT vs M2M
Synonymous Words

1. Ubiquitous Computing Ubiquitous means everywhere.


2. Sensorization Pervasive means "diffused throughout
3. Remote monitoring every part of."
4. Embedded computing,
In computing terms, those seem like
5. Pervasive computing, somewhat similar concepts.
6. Smart services,
Ubiquitous computing would be
7. Industrial Internet
everywhere, and pervasive computing
8. Internet of Things (IoT) would be in all parts of your life.
Thank You

You might also like