New 03A Short Version New Trends in Computer Science.pptx

SamahAdel16 21 views 25 slides Oct 13, 2024
Slide 1
Slide 1 of 25
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25

About This Presentation

The latest trends in computer science encompass a range of innovative technologies that are reshaping our digital landscape. Virtual Reality (VR), Augmented Reality (AR), and Mixed Reality (MR) are transforming user experiences in fields such as gaming, education, and training, with applications lik...


Slide Content

NEW TRENDS IN COMPUTER SCIENCE CONT. LECTURE 3

OBJECTIVES Understand the basic concepts of the latest trends in computer science: Virtual Reality - Augmented Reality – Mixed Reality Cybersecurity Internet of things Provide examples of real-case applications of the latest trends in computer science

VIRTUAL REALITY AUGMENTED REALITY MIXED REALITY

VIRTUAL REALITY Virtual reality ( VR ) implies a complete immersion experience that shuts out the physical world. VR is typically achieved by wearing a headset like Facebook’s Oculus equipped with the technology, and is used prominently in two different ways: To create and enhance an imaginary reality for gaming, entertainment, and play (Such as video and computer games, or 3D movies, head-mounted displays). To enhance training for real-life environments by creating a simulation of reality where people can practice beforehand (Such as flight simulators for pilots).

VIRTUAL REALITY

Augmented reality (AR) is a technology that enriches the user’s perception and provides a live view of the real world with digital information, aiming to expand it by adding images, sound, video and other virtual details.  The purpose of AR is to augment the environment and let virtual elements interact with real objects to create intended meanings. In AR, informatively-designed virtual environments coexist with real ones by providing additional data about the real world. AUGMENTED REALITY

Today, AR technology is commonly complemented by mobile phone technologies such as GPS, 3G, 4G and remote sensing. The combined image is usually projected onto mobile screens, augmented reality glasses and other devices. Examples of AR systems are those that are used in photography and editing like Snapchat filters, virtual dressing rooms, interior decoration applications like IKEA mobile as well as virtual battlefields, and games such as Nintendo's Pokémon Go. Moreover, AR is also widely used in marketing, and medical and healthcare applications. AUGMENTED REALITY

MR brings together real-world and digital elements. In mixed reality, you interact with and manipulate both physical and virtual items and environments, using next-generation sensing and imaging technologies. Mixed Reality allows you to see and immerse yourself in the world around you even as you interact with a virtual environment using your own hands—all without ever removing your headset. It provides the ability to have one foot (or hand) in the real world, and the other in an imaginary place, breaking down basic concepts between real and imaginary, offering an experience that can change the way you game and work today. MIXED REALITY

AUGMENTED – VIRTUAL AND MIXED REALITY From gaming; to movies, to medicine, the uses for Virtual Reality, Augmented Reality, and Mixed Reality are expanding. Healthcare: for training, such as for surgical simulations Film and TV: for movies and shows to create unique experiences Virtual travel: for virtual trips to an art museum—or another planet—all from home Professional sports: for training programs like  STRIVR  to help pro and amateur athletes Gaming: for over 1,000 games already available, from first-person shooters to strategy games to role-playing adventures And others: Holograms – Education - Engineering/construction - Remote working

VIRTUAL REALITY AND AUGMENTED REALITY Please visit this link: https://www.youtube.com/watch?v=f9MwaH6oGEY to watch a video about what virtual reality and augmented reality are. Please visit https://www.credencys.com/blog/7-great-applications-of-augmented-reality-that-be-seen-in-the-real-world-today/ to learn about 7 different applications to AR in real world today

CYBERSECURITY

CYBERSECURITY Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyber attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users via ransomware; or interrupting normal business processes. Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative. Cyber security is important because the government, military, corporate, financial, and medical organizations collect, process, and store unprecedented amounts of data on computers and other devices. A significant portion of that data can be sensitive information, whether that be intellectual property, financial data, personal information, or other types of data for which unauthorized access or exposure could have negative consequences.

A successful cybersecurity approach has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe. In an organization, the people, processes, and technology must all complement one another to create an effective defense from cyber attacks. People: Users must understand and comply with basic data security principles like choosing strong passwords, being wary of attachments in email, and backing up data.  Processes: Organizations must have a framework for how they deal with both attempted and successful cyber-attacks. One  well-respected framework  can guide you. It explains how you can identify attacks, protect systems, detect and respond to threats, and recover from successful attacks.  Technology: Technology is essential to giving organizations and individuals the computer security tools needed to protect themselves from cyber-attacks. Three main entities must be protected: endpoint devices like computers, smart devices, and routers; networks; and the cloud. Common technology used to protect these entities include next-generation firewalls, DNS filtering, malware protection, antivirus software, and email security solutions. CYBERSECURITY

Why is cybersecurity important? In today’s connected world, everyone benefits from advanced cyber defense programs. At an individual level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of important data like family photos. Everyone relies on critical infrastructures like power plants, hospitals, and financial service companies. Securing these and other organizations is essential to keeping our society functioning. Everyone also benefits from the work of cyber threat researchers, like teams of threat researchers investigating new and emerging threats and cyber attack strategies. They reveal new vulnerabilities, educate the public on the importance of cybersecurity, and strengthen open-source tools. Their work makes the Internet safer for everyone. CYBERSECURITY

Examples of cybersecurity threats Phishing Phishing  is the practice of sending fraudulent emails that resemble emails from reputable sources. The aim is to steal sensitive data like credit card numbers and login information. It’s the most common type of cyber attack. You can help protect yourself through education or a technology solution that filters malicious emails. Social engineering Social engineering is a tactic that adversaries use to trick you into revealing sensitive information. They can solicit a monetary payment or gain access to your confidential data. Social engineering can be combined with any of the threats listed above to make you more likely to click on links, download malware, or trust a malicious source. Ransomware Ransomware  is a type of malicious software. It is designed to extort money by blocking access to files or the computer system until the ransom is paid. Paying the ransom does not guarantee that the files will be recovered or the system restored. Malware Malware  is a type of software designed to gain unauthorized access or to cause damage to a computer.  CYBERSECURITY

CYBER SECURITY How online credit transaction works

CYBER SECURITY Please visit this link: https://www.youtube.com/watch?v=JdfmV2KW11I to watch a video about how cyber security works.

INTERNET OF THINGS

INTERNET OF THINGS The internet of things , or IoT , is a system of interrelated computing devices, mechanical and digital machines, objects , animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

INTERNET OF THINGS

INTERNET OF THINGS

INTERNET OF THINGS Please visit this link: https://www.youtube.com/watch?v=NjYTzvAVozo to watch a video about how life is more simple with connected devices

ASSIGNMENT Please choose ONE of the trends discussed in Weeks 2 and 3 and write a report about the possible applications of this trend. Your report should be no longer than 1 and a half pages ( and no less than 1 page). The due date is before your next lecture.

SUMMARY AND DISCUSSION
Tags