Introduction to IoT
Introduction to IoT
Introduction to IoT
Source : https://dzone.com/articles/top-ten-technology-trends-for-2021
Top 10 Technologies of Future
Artificial Cyber
01 06
Intelligence TOP 10 NEW-AGE Security
TECHNOLOGIES
MARKET PREDICTION
Big Data FOR UPCOMING YEARS Cloud
02 07
Analytics Computing
Drones 03 08 Internet of
Things
Robotics 04 09 AR/VR
EXCEPT NO. 10,
TATA STEEL HAS
IMPLEMENTED ALL
THESE TECHNOLOGIES Autonomous
RPA 05 10 Vehicle
1. Artificial Intelligence
1. Artificial Intelligence
What is Artificial Intelligence (AI)?
Summary
Artificial Intelligence (AI) aims to develop machines that can accomplish what a human can in terms of reasoning.
The four types of artificial intelligence are reactive machines, limited memory, theory of mind, and self-awareness.
Artificial intelligence now affects productivity, employment, and competitive behavior in significant ways.
1. Artificial Intelligence
Artificial Intelligence can be understood as a simulation of human
intelligence. A simulation of human intelligence means that any
task performed by a program or a machine will be carried out in
the same way in which a human being would have done it.
4. Self-Awareness
Self-awareness machines demonstrate intelligent behavior through ideation, the formation of desires, and
understanding their internal states. In 1950, Alan Turing developed the Turing Test to identify machines that could
behave indistinguishably from a human being.
1. Types of Artificial Intelligence
Narrow AI
Narrow AI can be seen in all the computing devices
that people use in their day-to-day lives. This is
what makes our lives easier.
It is like feeding a human being with food that makes them stronger. Data makes a device that has
used ML smart and intelligent.
Because of this, the software can learn how they need to improve and personalize themselves
according to their users.
ML is also used in the voice assistants because of which they can remember what we say and
search related to that.
1. Artificial Intelligence
Elements Of Machine Learning
Machine learning can be regarded as a subset of AI and has mainly two
elements, namely supervised learning and unsupervised learning.
Supervised Learning
This is a rather common technique for teaching systems. It is done by
using a huge number of labeled examples in the form of data. The systems
are filled with a large amount of data that identifies the features of interest.
These are then labeled into the system’s memory. Once the system is
trained, these labels can be used to read data as well as create new data.
Unsupervised Learning
It is quite different from the above method of learning as this algorithm
attempts to locate patterns in data. They cluster together these patterns to
perform operations and give meaningful results.
Reinforcement Learning
This is a reward-based learning process. Here, rewards are processed
according to their input data. This is basically a trial and error process and
is greatly used in machine learning methods.
1. Artificial Intelligence
AI will change the world in many different ways. There are different parts of industries that will
be directly affected by it like robotics and the automobile sector.
AI will make robots and cars smart enough to be able to work on their own and control the
things around them as per their programming. Though it will take some time to make them
behave as normal as humans, even as of now they will be able to have a conversation,
understand what people say, and respond to them.
Other parts that will be affected by it is the content that gets uploaded on the internet. Search
engines have started using AI to filter out information and news that is fake.
This is the reason why now the internet does not list any website that is caught spreading fake
news or information about something. This will make the internet a better place for normal
people. These are just some of the ways, there are many other ways in which it will change
the world.
2. Big Data Analytics
2. Big Data Analytics
Introduction to Big Data Analytics
Data management.
Hadoop
These robotic UAVs operate without a pilot on board and with different levels of autonomy. A drone’s
autonomy level can range from remotely piloted (a human controls its movements) to adv autonomy,
which means that it relies on a system of sensors and LIDAR detectors to calculate its movement.
Generation 1: Basic remote control aircraft of all forms
Generation 2: Static design, fixed camera mount, video recording and still photos, manual piloting control
Generation 3: Static design, two-axis gimbals, HD video, basic safety models, assisted piloting
Generation 7: Complete commercial suitability, fully compliant safety and regulatory standards-based design,
platform and payload interchangeability, automated safety modes, enhanced intelligent piloting models and
full autonomy, full airspace awareness, auto action (takeoff, land, and mission execution)
4. Robotics
4. Robotics
Robots may be constructed to evoke human form, but most robots are task-
performing machines, designed with an emphasis on stark functionality,
rather than expressive aesthetics.
BigDog
Some example of Robots :
Industrial robots, Medical operating robots,
Collectively programmed swarm robots, Patient assist robots,
UAV drones such as General Atomics MQ-1 Predator, Dog therapy robots,
Microscopic nano robots.
4. Robotics
Classification of Robots
Autonomous
Semi-autonomous and
Range from humanoids
Examples of Humanoids :
Honda's Advanced Step in Innovative Mobility (ASIMO)
TOSY's TOSY Ping Pong Playing Robot (TOPIO)
1. Arc Welding
2. Spot Welding
3. Materials Handling
4. Machine Tending:
5. Painting
Robotic process automation (RPA) is a software technology that makes it easy to build, deploy, and
manage software robots that emulate human's actions interacting with digital systems and software.
But software robots can do it faster and more consistently than people,
without the need to get up and stretch or take a coffee break.
5. Robotics Process Automation (RPA)
RPA tools have strong technical similarities to graphical user interface testing tools.
For example : receiving email containing an invoice, extracting the data, and
then typing that into a bookkeeping system.
5. Robotics Process Automation (RPA)
Advantages of RPA :
Accelerated Improved
Transformation Compliance
Contents Here
Major Cost More Value from
Get a modern PowerPoint Presentation
Savings
that is beautifully designed. Personnel
Contents Here
Greater Happier
Get a modern PowerPoint Presentation
Resilience
that is beautifully designed. Employees
6. Cyber Security
6. Cyber Security
Operational security includes the processes and decisions for handling and protecting
data assets. The permissions users have when accessing a network and the procedures
that determine how and where data may be stored or shared all fall under this umbrella.
6. Categories of Cyber Security (2/2)
1. Malware
• Ransomware: Malware which locks down a user’s files & data, with threat of erasing it unless a ransom is paid.
• Botnets: Networks of malware infected computers which cybercriminals use to perform tasks online without the
user’s permission.
6. Cyber Security : Types of Malware (2/2)
SQL injection
An SQL (structured language query) injection is a type of cyber-attack used to take control of and steal data from a database.
Cybercriminals exploit vulnerabilities in data-driven applications to insert malicious code into a databased via a
malicious SQL statement. This gives them access to the sensitive information contained in the database.
Phishing
Phishing is when cybercriminals target victims with emails that appear to be from a legitimate company asking for
sensitive information. Phishing attacks are often used to dupe people into handing over credit card data and other
personal information.
Man-in-the-middle attack
A man-in-the-middle attack is a type of cyber threat where a cybercriminal intercepts communication between two
individuals in order to steal data. For example, on an unsecure WiFi network, an attacker could intercept data being
passed from the victim’s device and the network.
Denial-of-service attack
A denial-of-service attack is where cybercriminals prevent a computer system from fulfilling legitimate requests by
overwhelming the networks and servers with traffic. This renders the system unusable, preventing an organization
from carrying out vital functions.
7. Cloud Computing
7. Cloud Computing
Ground crew at Singapore’s airport wear AR glasses to see information about cargo containers,
speeding up loading times
8. Virtual Reality (VR)
Virtual reality (VR), the use of computer modeling and simulation that enables a person to
interact with an artificial three-dimensional (3-D) visual or other sensory environment.
Thus, a user can tour a simulated suite of rooms, experiencing changing viewpoints and perspectives
that are convincingly related to his own head turnings and steps.
Wearing data gloves equipped with force-feedback devices that provide the sensation of touch, the
user can even pick up and manipulate objects that he sees in the virtual environment.
8. AR, VR, MR & XR
In a Mixed Reality (MR) experience, which combines elements of both AR and VR, real-world and
digital objects interact. Mixed reality technology is just now starting to take off with Microsoft’s
HoloLens one of the most notable early mixed reality apparatuses.
Extended Reality (XR) is an umbrella term that covers all of the various technologies that enhance
our senses, whether they’re providing additional information about the actual world or creating totally
unreal, simulated worlds for us to experience. It includes Virtual Reality (VR), Augmented Reality
(AR) and Mixed Reality (MR) technologies.
8. Difference between Augmented Reality and Virtual Reality
Virtual Reality and Augmented Reality are two sides of the same coin.
In AR, the computer uses sensors and algorithms to In Virtual Reality, the computer uses similar sensors
determine the position and orientation of a camera. and math.
AR technology then renders the 3D graphics as they However, rather than locating a real camera within a
would appear from the viewpoint of the camera, physical environment, the position of the user’s eyes
superimposing the computer-generated images over a are located within the simulated environment.
user’s view of the real world.
If the user’s head turns, the graphics react
accordingly. Rather than compositing virtual objects
and a real scene, VR technology creates a convincing,
interactive world for the user.
10. Autonomous Vehicles
10. Autonomous Vehicles
Autonomous vehicle (AV or auto) is a vehicle that is
capable of sensing its environment and moving safely with
little or no human input.
Advanced control systems interpret sensory information to identify appropriate navigation paths, as
well as obstacles and relevant signage.
Possible implementations of the technology include personal self-driving vehicles, shared robotaxis,
connected vehicle platoons and long-distance trucking. Several projects to develop a fully self-
driving commercial car are in various stages of development.
10. Autonomous Vehicles
Six Levels of Autonomous Vehicles
At level 0, the car has no control over its operation and the human driver
does all of the driving.
At level 2, the ADAS can oversee steering and accelerating and braking in some conditions, but human driver is required to pay
attention continuously to driving environment throughout the journey, while also performing the remainder of the necessary tasks.
At level 3, the ADS (advanced driving system) can perform most of driving task in some conditions, but human driver is required
to be able to regain control when requested by ADS. In remaining conditions, the human driver executes necessary tasks.
At level 4, vehicle’s ADS performs all driving tasks independently in certain conditions in which human attention is not required.
Finally, level 5 involves full automation whereby the vehicle’s ADS performs all tasks in all conditions, and no driving assistance is
required from the human driver. This full automation will be enabled by the application of 5G technology, which will allow vehicles
to communicate not just with one another, but also with traffic lights, signage and even the roads themselves.
Internet of Things
Development of Internet
Plants communicate if
they need more water
and/or fertilizer.
Applications :
Smart Medicine Bottle
A Blinking light on the cap of the
bottle reminds you that it’s time to
take your tablet.
By an estimate, a 1% reduction in
fuel usage translates to
US$250,000/plane/year
HARLEY-DAVIDSON
Internet of Things
What is IoT?
• Telemetry expanded to weather monitoring in the 1930s, when a device known as a radiosonde
became widely used to monitor weather conditions from balloons.
• In 1957 the Soviet Union launched Sputnik, and with it the Space Race. This has been the entry of
aerospace telemetry that created the basis of our global satellite communications today.
• Broad adoption of M2M technology began in the 1980s with wired connections for SCADA
(supervisory control and data acquisition) on the factory floor and in home and business security
systems.
• In the 1990s, M2M began moving toward wireless technologies. ADEMCO built their own private
radio network to address intrusion and smoke detection because budding cellular connectivity was
too expensive.
• In 1995, Siemens introduced the first cellular module built for M2M.
IoT Definition
Industries
Enterprise
insights that creates Consumer
unique and disruptive Public Sector
value for companies, Analyze Connect
ITU Definition
• Physical things exist in the physical world and are capable of being
sensed, actuated and connected. Examples of physical things include the
surrounding environment, industrial robots, goods and electrical equipment.
• Virtual things exist in the information world and are capable of being stored,
processed and accessed. Examples of virtual things include multimedia
content and application software.
Things
Introduction to IoT
The IoT can be defined as, A huge network of interconnected things; things
may be small devices, big machines and also includes people. Via this
interconnected network communication can occur between things-things,
things-people, and people-people
Just imagine, while your alarm rings in the morning, the lights of the room lit
up, and the coffee maker is notified to start making a coffee for you. The
geyser has to automatically set on, warming the water for your shower. While
you leave home for the office, the calendar on your smartphone may set the
best route for the office and thus instructing your car to drive in the best route.
Depending upon the traffic on the route, your office could be informed that
you would be late for the meeting.
Characteristics of IoT
1. Dynamicity.
2. Zero Configurations (self configuration)
3. Unique Identity
4. Semantic Inter Operability
5. Scalability
6. Integration into the information network:
7. Ambient and collective Intelligence
Characteristics of IoT
Challenges in IoT Deployment
Challenges to IoT deployment and value span 6 areas
Things Lack of scale needed to
Lack of integrated achieve acceptable cost
end- to-end points
solutions that Identify
deliver value
Industries
Consumer
• Multitude of alliances and
Public Sector partnerships
Analyze Connect
• Complex • Policies not keeping up with
interoperability Collect technological advancement
• The system is made up of a series of underground pipes and valves as shown below.
• Every line has its own set of valves with an overall valve to control water flow.
• A normal sprinkler system (non-smart) user comes and turns on the valve manually or uses a remote
button and turns on the valve regularly for some hours every day.
Simple lawn sprinkler system
Taking the system a step further. At regular interval of time the soil moisture is still monitored
But the microcontroller, before deciding on the sprinkling schedule, also queries the database of a weather monitoring system to
determine whether there is possibility for rainfall in the next few hours, what is expected day-time/night-time temperature, what is
the expected humidity, was there dew early morning then determines the sprinkling schedule.
The smart system is now connected to the global internet making it an IOT system.
We can continue adding more feature to the system. Water level in the tank supplying water to the sprinkler system can be
monitored. If the water level is low then the sprinkler system can be alerted and its sprinkling schedule can be delayed. While relays
controlling inlet and outlet of water into the tank can be turned off and on respectively and the water pumping can be turned.
In case the water pumping system does not work the user of the water tank/sprinkler system can be altered via an SMS sent from
the sprinkler system automatically to his mobile via the cellular network - Another IOT feature.
More features can be added by using sensors to monitor the condition of the pipeline underground via which water is being supplied
to the sprinkler systems. Cracks, breakages in the underground pipeline can be detected by the sprinkler system. When this
happens the sprinkler system can look-up a database of plumbers-select; some-one who is available-use the internet to mail the
plumber the details of the error in the system, book an appointment and even do a transfer of money as the advance …. The
possibilities can grow.
All this happens in the background – with minimal to no intervention from the user of sprinkler system-hence also the term Ambient
or calm computing. This connection of day-to-day objects to the internet has also been called as ubiquitous computing (ubicomp) or
pervasive computing.
Applications of IoT (Internet of Things)
5. Internet of Things
Interconnected Terms
Synonymous Words
1. Ubiquitous Computing.
2. M2M,
3. Remote monitoring
4. Embedded computing,
5. Pervasive computing,
6. Smart services,
7. Industrial Internet
8. Internet of Things (IoT)
Synonymous Words
Ubiquitous Computing :
Ubiquitous computing (or "ubicomp") is a concept in software
engineering and computer science where computing is made
to appear anytime and everywhere. In contrast to desktop
computing, ubiquitous computing can occur using any device,
in any location, and in any format.
IoT vs M2M
Synonymous Words