Wonders in Technology

Embed Size (px)

Citation preview

  • 8/7/2019 Wonders in Technology

    1/44

    WONDERS INTECHNOLOGY

    By : Abhishek Dhawan(MECHANICAL2nd year )

    Akshita Gupta (COMPUTER SCIENCE2nd year)

  • 8/7/2019 Wonders in Technology

    2/44

    Introduction We have seen that a lot of wonders have already

    taken place in technology in past by the

    invention of various electronic media and thereapplication at the software as well as hardwarelevel . But now a days new trends are being setwhich has revolutionalised the whole scenario of

    technology for the present and the future as wellleading to various miraculous inventions .

  • 8/7/2019 Wonders in Technology

    3/44

    INVENTORS INVENT

    INVENTIONSENGINEERS LIVEINVENTIONS

    THERE ARE DIFFERENT WAYS TO PRODUCESUCH MIRACLES LIKE BY COMPUTERSCIENCE , ELECTRONICS , MECHANICAL ETC.

    SEPARATELY ALL THESE HAVE MADETHEIR MARK GLOBALLY BUT MERGINGTHEM TOGETHER HAS LED TO THE WONDERSIN THE FIELD OF TECHNOLOGY LIKE:

  • 8/7/2019 Wonders in Technology

    4/44

    Nanotechnology

    IN ELECTRONICS

    IN

    ELECTRONICS

  • 8/7/2019 Wonders in Technology

    5/44

    WAT IS IT ??Nanotechnology has already reached the electronics industry

    with features in microprocessors now less than 100

    nanometres in size. Smaller sizes allow faster processing

    times and also more processing power to be packed into a

    given area.

    Nanoelectronics offer a new approach for the

    electronics industry in the form of new circuit materials,

    processors, information storage and even ways of transferringinformation such as OPTOELECTRONICS.

  • 8/7/2019 Wonders in Technology

    6/44

    WHERE IT IS USED ??

    Computers

    Telecommunication

    Optics

    These further have different applications that

    are discussed in the next few slides :

  • 8/7/2019 Wonders in Technology

    7/44

    COMPUTERS

    Nanotechnology gives scope to develop new

    ideas and methods of running super-fast

    processors, storing data, and many other

    computational advances.

    It also allows for new applications which

    require more processing power, or to be

    smaller, or less energy intensive.

  • 8/7/2019 Wonders in Technology

    8/44

    WHERE IS IT

    USED ??

    FAST PROCESSORS-

    As a result of the limitations of

    current technology,manufacturers are turning tonanotechnology to produce thenext generation of processorsand computer components.

    Chipmakers in the computingindustry are already working atthe nanoscale . These small chipsalso suffer less from leakage

  • 8/7/2019 Wonders in Technology

    9/44

    CARBON NANOTUBES

    IBM researchers have developed

    transistors from carbon nanotubes.

    These have shown vast improvements

    on the more conventional silicontransistors

  • 8/7/2019 Wonders in Technology

    10/44

    ew type of memories

    More and more modern electronic devices need larger memories. For example, takeconsumer products such as mobile phones and MP3 players. When these wereinitially released, storage-size was small, with premium models featuring about

    512MBof memory. However, now consumers demand their memory in gigabytes;

    Apples latest Ipod boasting 60GB of memory. The desire is for larger storage insmaller spaces, but not at the expense of energy requirements. Current technology

    makes these demands very difficult to meet, but nanotechnology offers the solution.

  • 8/7/2019 Wonders in Technology

    11/44

    QUANTUM COMPUTING

    Quantum computing is the area of study focused on

    developing computer technology based on the

    principles of quantum theory, which explains the

    nature and behavior of energy and matter on thequantum (atomic and subatomic) level.

    Quantum computers work differently from

    conventional systems in that they can handle more

    than the traditional '0' and '1' bits of information. In

    fact, 'qubits' - as they are named - can process anything

    in between that; meaning that new types of calculation

    and simulations can be performed.

  • 8/7/2019 Wonders in Technology

    12/44

    Telecommunication

    and handheld devices

    More and more in modern life, people

    are working on the move, which

    means taking their laptop, phone, and

    other electronic equipment

    everywhere they go.

    Nanotechnology can offer improvedversatility through faster data

    transfer, more mobile processing

    power and larger data storage.

  • 8/7/2019 Wonders in Technology

    13/44

    FAST TRANSFER

    Faster transfer of data within and between

    devices can be achieved using nanotechnology. A

    major limitation in transfer speeds is the use of

    electrical wiring and contacts.

    The use of optical fibres revolutionised the

    telecommunications industry by increasing the

    rate of data transfer between telephoneexchanges. It has also meant that new services

    can be implemented such as broadband internet.

  • 8/7/2019 Wonders in Technology

    14/44

    OPTICS

    An area of electronics in which nanotechnology can

    make a significant difference is in optics; specifically

    displays and lighting.

    Due to the limitations of current technology the

    displays are not very portable and take a lot of spaceIn order to make portable displays nanotechnology is

    being used widely.

  • 8/7/2019 Wonders in Technology

    15/44

    Nanotechnology will bring about a newera of displays in a number of ways.

    Organic Light Emitting Diodes (or OLEDs) are cheaper and easier to manufacture

    than LEDs. These consist of thin layers ofelectrically conducting organic

    molecules which are approximately 100nanometres (nm) thick.

    The convenience of these is that theycan be applied to different materials

    using a process similar to ink-jet printing(as is the case for organic dye-basedsolar cells). The downside is that OLEDshave a much shorter life-span and arealso much less efficient than LEDs. Themain applications of OLEDs are in smallvideo screens (such as mobile phones).

    N di la

  • 8/7/2019 Wonders in Technology

    16/44

    Light emitting diodes ( LEDs ) losevery little energy as heat and alsolast up to 20 times longer thanconventional light bulbs. Withadvances in their nanocrystalline

    structure in recent years, they arenow emitting more light per watt ofpower consumed than incandescentbulbs and about the same asfluorescent bulbs.

    Using different semiconductormaterials, different colours of LEDare possible (note this is theopposite effect as that described forsolar cells which absorb different

    spectrums of light).

    NEW LIGHTENING

  • 8/7/2019 Wonders in Technology

    17/44

    NANOTECHNOLOGY ANDFUTURE

    Nanotechnology may offer new ways of working for electronics.Nanotechnology science is developing new circuit materials, newprocessors, new means of storing information and new manners oftransferring information. Nanotechnology can offer greaterversatility because of faster data transfer, more on the go

    processing capabilities and larger data memories.

    A new field is emerging in electronics that will be a giant leap incomputer and electronics science. It is the field ofquantumcomputing and quantum technology. Quantum computing is area ofscientific knowledge aimed at developing computer technology

    based on the principles of quantum theory. In quantum computingthe qbit instead of the traditional bit of information is used.Traditionally, a bit can assume two values: 1 and 0. All thecomputers up-to-date are based on the bit principle. However, thenew qbit is able to process anything between 0 and 1. This impliesthat new types of calculations and high processing speeds can be

    achieved.

  • 8/7/2019 Wonders in Technology

    18/44

  • 8/7/2019 Wonders in Technology

    19/44

  • 8/7/2019 Wonders in Technology

    20/44

    Pros

    In the present day competitive world, manycompanies hire hackers as an important partof their technical group to ensure security oftheir companys key essentials. In the businesswar there are many who try to extract

    important information and data of renownedcompanies through hacking. Therefore, itbecomes really significant for companies tohire hackers.

  • 8/7/2019 Wonders in Technology

    21/44

    consON THE OTHER HAND, COMPUTER HACKING CAN BE

    NEGATIVE IN MANY WAYS. THERE ARE HACKERS WHOPLAY FRAUD AND INTRIGUES TO VARIOUS DISPARAGINGPURPOSES LIKE BREAKING SECURITY CODE TO ACCESSUNAUTHORIZED NETWORK, STEALING PERSONALINFORMATION, ALTERING FINANCIAL DATA OF A

    COMPANY, STEALING SIGNIFICANT BUSINESSINFORMATION, BREAKING COMPUTER SECURITY,EXTRACTING BANK DETAILS OF AN INDIVIDUAL, ANDENJOYING UNAUTHORIZED ACCESS TO THE SYSTEM.HACKING CAN BE MORE DESTRUCTIVE IF ANY KIND OFNATIONAL SECURITY INFORMATION OR CONFIDENTIAL

    GOVERNMENT DATA IS EXPOSED. APART FROM THISTHERE ARE MANY DESTRUCTIVE ACTIVITIES A HACKERCAN PERFORM FOR HIS OR HER OWN BENEFIT. THIS SIDE OFHACKING IS VERY GLOOMY AND CAN LEAD TO MANYCOMPUTER-RELATED CRIMES.

  • 8/7/2019 Wonders in Technology

    22/44

    Effects of computer hacking Computer hacking is a breach of computer security. It can expose sensitive user data and

    risk user privacy. Hacking activities expose confidential user information like personal

    details, social security numbers, credit card numbers, bank account data and personal

    photographs. User information, in the hands of computer hackers, makes it vulnerable to

    illegitimate use and manipulation.

    Hackers may even delete sensitive information on gaining access to it. Deletion or

    manipulation of sensitive data with intent to achieve personal gain is another effect ofcomputer hacking. A user whose computer has been hacked is at the risk of losing all the

    data stored on his/her computer. Manipulation of sensitive user data is a grave

    consequence of hacking

    Computer hacking can lead to theft of critical business information. Important

    information about business clients and customers can be lost or manipulated through

    computer hacking. Hacking can expose email addresses to hackers, which they might use

    for spamming and hampering email privacy.

    Information critical to national security, confidential government data, information

    related to national defense, security and crime, if exposed by means of hacking, can have

    grave consequences on the welfare of the nation. Hacking of highly sensitive data can

    potentially risk the national security and stake the overall well-being of the country'scitizens.

  • 8/7/2019 Wonders in Technology

    23/44

    In ethical hacking, the hacker identifies the

    weakness in the system, but instead of takingadvantage of the situation, alerts the owner, sothat the later can fix the problem and make hissystem secured. The ethical hacker can convey

    the message to the owner by various meansranging from a simple phone call to leaving anelectronic card in the system, as an obvioussignal that the system was breached. Ethical

    hackers use the same tools as hackers do, butthey are not a threat to the system. Somepeople do ethical hacking as a hobby, whilesome pursue it as their career.

  • 8/7/2019 Wonders in Technology

    24/44

    HOW IS IT DONE??

    Hackers use various methods and toolsto hack into a particular system, and inorder to understand their methodology,one has to get into the hacker's shoes.Ethical hacking guide covers black hatmethods used by hackers to vandalize yournetwork, for its security. Be careful to useyour own computer to practice ethicalhacking. You can try hacking your ownsystem to find the loopholes in the security.

    You can also hack a friends PC, but makesure that you have the permission to do so.Illegal hacking is considered as a severeInternet crime, and can earn up to 10 yearsimprisonment, hence it is wiser to takenecessary precautions.

  • 8/7/2019 Wonders in Technology

    25/44

    Different kinds of hackers

  • 8/7/2019 Wonders in Technology

    26/44

    White Hat HackersWhite Hate Hackers are the ones who are termed as ethicalhackes. These are the ones who follows morality, ethics,abides by the laws and still hack! It seems weird, but yes,thats how it is! This is how it happens an ethical hacker is

    permitted to hack computer systems or networks and he trieshis best to hack it. Now the question arises why? Anobvious answer to this is that unless there is anunderstanding of whats insecure in our system or network, wewont be able to protect it. An ethical hacker provides withvulnerabilities or loop holes in the system or network through

    extensive use of various hacking techniques. Thesevulnerabilities and flaws are then generally corrected throughcorrective and preventive measures.

  • 8/7/2019 Wonders in Technology

    27/44

    Black Ha Hack rs

    Black Hat Hackers who are also called as Crackers arepeople who break into computer systems and networkswithout any prior permission. They are the people who breakfor various reasons such as robbery, revenge, showing-offtheir skills, causing damage or just any random reason.Black Hat Hackers can be regarded as the new criminals ofthis digital age. Several federal laws have been enacted tocurb Black Hat Hacking. The IT Act 2000 which is followedby a number of countries have listed out several ways todeal and punish Black Hat Hackers. A lot of networksecurity agencies have been formed after several hacking

    cases being reported. These agencies work for designingsecurity policies and measures to protect organizations andindividuals alike from getting hacked.

  • 8/7/2019 Wonders in Technology

    28/44

    Grey Hat HackersGreyHatHackers are hackers who havedesigned their own reasons to hackcomputer systems and networks. They arelike Robin Hoods of today's age. They can beseen as a mix ofWhiteHat and BlackHat

    Hackers.GreyHatHackers can do good forsome people and can even cause damagedepending on their approach. For example,GreyHatHackers typically hack siteswhich they feel is socially bad like adultand gambling sites. Some from these breed

    of hackers hack systems and networks, findout the vulnerabilities and loop holes andreport them to the respectiveorganizations or owners. They do this justfor getting popularity, showing-off or someof their own reasons and visions.

  • 8/7/2019 Wonders in Technology

    29/44

    IS IT MECHANICAL +ELECTRONICS ??

  • 8/7/2019 Wonders in Technology

    30/44

    Mechatronics is the synergistic combination ofMechanical

    engineering, Electronic engineering, Computer engineering,

    Control engineering, and Systems Design engineering in orderto design, and manufacture useful products.

  • 8/7/2019 Wonders in Technology

    31/44

    HOW DID THIS CONCEPT

    CAME??The portmanteauMECHATRONICS was

    coined by TE

    TSU

    ROM

    ORI, the senior engineerof the Japanese company YASKAWA in 1969.

    An industrial robot is a prime example of a

    mechatronics system; it includes aspects of

    electronics, mechanics, and computing to doits day-to-day jobs.

  • 8/7/2019 Wonders in Technology

    32/44

    Mechatronics is centered on mechanics,

    electronics, computing, control engineering,molecular engineering (from nanochemistry

    and biology), and optical engineering, which,

    combined, make possible the generation of

    simpler, more economical, reliable and

    versatile systems

  • 8/7/2019 Wonders in Technology

    33/44

    WHATDOES ITCONSISTOF ??

    Mechatronics is the synergistic

    integration of sensors, actuators,signal conditioning, power electronics,decision and control algorithms, andcomputer hardware and software to

    manage complexity, uncertainty, andcommunication in engineered systems.

  • 8/7/2019 Wonders in Technology

    34/44

    HOW DOES IT WORK??

    For most mechatronic systems, the main issue is

    no more how to implement a control system, but

    how to implement actuators and what is theenergy source. Within the mechatronic field,

    mainly two technologies are used to produce the

    movement: the piezo-electric actuators and

    motors, or the electromagnetic actuators andmotors. Maybe the most famous mechatronics

    systems are the well known camera autofocus

    system or camera anti-shake systems.

  • 8/7/2019 Wonders in Technology

    35/44

    Disciplinary Foundations of

    Mechatronics

    Information

    Systems

    Electrical

    Systems

    Computer

    Systems

    Mechanical

    Systems

    Mechatrnoics

  • 8/7/2019 Wonders in Technology

    36/44

    Elements of

    mechatronics in variousfields

    Mechanical

    electromechanical

    Electronics/electrical

    Computers and information technology

  • 8/7/2019 Wonders in Technology

    37/44

    Elements ofMechatronicsMechanical

    Mechanical elements refer to

    mechanical structure, mechanism,

    thermo-fluid, and hydraulic aspects of a

    mechatronics system.

    Mechanical elements may include

    static/dynamic characteristics.

    A mechanical element interacts with

    its environment purposefully.

    Mechanical elements require physical

    power to produce motion, force, heat,

    etc.

    El t f M h t i

  • 8/7/2019 Wonders in Technology

    38/44

    Elements of Mechatronics

    Electromechanical Electromechanical elements refer to:

    Sensors

    A variety of physical variables can be measured using sensors, e.g., light using photoresistor, level and displacement using potentiometer, direction/tilt using magnetic sensor,sound using microphone, stress and pressure using strain gauge, touch using micro-switch, temperature using thermistor, and humidity using conductivity sensor

    ActuatorsDC servomotor, stepper motor, relay, solenoid, speaker, light emitting diode (LED), shape

    memory alloy, electromagnet, and pump apply commanded action on the physical process

    IC-based sensors and actuators (digital-compass, -potentiometer, etc.).

    DCMotor Pneumatic CylinderFlexiforce Sensor

  • 8/7/2019 Wonders in Technology

    39/44

    Elements of Mechatronics

    Electrical/Electronic Electrical elements refer to: Electrical components (e.g., resistor (R), capacitor

    (C), inductor (L), transformer, etc.), circuits, andanalog signals

    Electronic elements refer to: analog/digital electronics, transistors, thyristors,

    opto-isolators, operational amplifiers, powerelectronics, and signal conditioning

    The electrical/electronic elements are used tointerface electro-mechanical sensors and

    actuators to the control interface/computinghardware elements

  • 8/7/2019 Wonders in Technology

    40/44

    Elements of MechatronicsComputer/Information System

    Computer elements refer to

    hardware/software utilized to

    perform:

    computer-aided dynamic system analysis,

    optimization, design, and simulation

    virtual instrumentation

    rapid control prototyping

    hardware-in-the-loop simulation

    PC-based data acquisition and control

  • 8/7/2019 Wonders in Technology

    41/44

    Mechatronic Applications

    Smart consumer products: home security, camera, microwave oven,toaster, dish washer, laundry washer-dryer, climate control units,etc.

    Medical: implant-devices, assisted surgery, haptic, etc.

    Defense: unmanned air, ground, and underwater vehicles, smartmunitions, jet engines, etc.

    Manufacturing: robotics, machines, processes, etc.

    Automotive: climate control, antilock brake, active suspension,cruise control, air bags, engine management, safety, etc.

    Network-centric, distributed systems: distributed robotics, tele-robotics, intelligent highways, etc.

  • 8/7/2019 Wonders in Technology

    42/44

    Machine Components: Basic Elements

    Inclined plane wedge

    Slider-Crank

    Cam and Follower

    Gear, rack, pinion, etc.

    Chain and sprocket

    Lever

    Linkage Wheel/Axle Springs

  • 8/7/2019 Wonders in Technology

    43/44

    ROBOTICS: A PART

    OF MECHATRONICS

  • 8/7/2019 Wonders in Technology

    44/44

    Thank you !!