260 likes | 374 Views
Emerging Trends in Computer Science Dr. Gurvinder Singh Reader, Deptt of Computer Science & Engineering, GNDU, Amritsar. Emergence of I.T. Industrial Revolution (1900-1950) Green Revolution (1960-1980) Information Revolution (1980-till now). INFORMATION An ASSET
E N D
Emerging Trends inComputer ScienceDr. Gurvinder SinghReader, Deptt of Computer Science & Engineering,GNDU, Amritsar
Emergence of I.T.Industrial Revolution (1900-1950)Green Revolution (1960-1980)Information Revolution (1980-till now) INFORMATION An ASSET • All the Business possible on Internet • Virtual offices • Wireless Computing PDA’s GPS way finders • MOBILE COMPUTING
Sequential Processing • 1 CPU • Simple • Big problems???
There are three ways to do anything faster:Work harderWork smarterGet help
Data Parallelism • Applying the same operation simultaneously to elements of a data set
Control Parallelism • Applying different operations to different data elements simultaneously
In computers … • Work harder => increase the processor speed • Work smarter => use a better algorithm • Get help => use parallel processing
Parallelism levels • CPU • Multiple CPUs • Multiple CPU cores • Threads – time sharing • Memory • Shared • Distributed • Hybrid (virtual shared memory)
PARALLEL COMPUTING (i) Design of Scheduling algorithms (ii) Simulator based design of scheduler (iii) Speed up of execution using AMDAHL’s Law & Gustafson’s Law (iv) Clustering (v) GANG Scheduling (vi) PARAMETRIC STUDY of algorithms
Major Areas are SOFTWARE ENGINEERING (i) METRICS DESIGN • (ii) Object Oriented Analysis and Evaluation • (iii) Evaluation of Metrics • (iv) Software Comprehension • (v) Reengineering Issues
NETWORK SECURITY Issues (i) FIREWALL implementation (ii) Analysis of Cryptographic Techniques (iii) Levels of Security Layered wise. (iv) Implementation of Security at O.S.level, Database level, Programmer level, user level. (v) Identification of Security Threats & corresponding action.
DATABASE DESIGN &ARCHITECTURE (1) Multimedia Databases (2) Distributed Databases (3) Knowledge based Databases (4) NLP (5) Query Optimization (6) Bio Informatics (7) VLDB (8) Security Issues
Future belongs toEMBEDDED SYSTEM • Used for Single, Well defined Task • Combination of H/w & S/w • H/w is CUSTOM BUILT(Customised)
Categories of Embedded Systems 1. Stand alone I/P can be electrical signals from sensors Or Commands from hurmans O/P can be electrical signals to drive other system Or some LED or LCD display 2. Real time E./S Result or O/P in specific time 3. Mobile devices: Handheld PC’s , Palmtops.
Requirements of E.S 1. Low Power Consumption Due to Battery supply 2. Efficient use of Processing Power 3. Efficient use of MEMORY 4. Appropriate Execution time 5. Cost effectiveness 6. Reliability
Challenges in development of Embedded Software 1. Choice of fns for H/w & S/w Which fns to be performed by H/w & which fns to be performed by S/w so co designing is required and quite complex. 2. Embedding an Operating System Services such as Memory mgmt, I/O mgmt and process mgmt. are to be combined with Assembly & HLL Also API’s to interface with different. Applications.
3. Code optimization for faster execution & less memory occupation. 4. Efficient I/O Input devices have limited Functionality, Small Keypads with 8-12 Keys Output also consist of small LCD displaying only 8-12 char/line. So writing embedded S/w with no I/o device such as Keyboard or display is Complex.
5. Testing & Debugging Very complex in Embedded Systems S/w can’t be tested on TARGET Hardware So SIMULATION of Field Conditions is very Challenging
POSITIONS IN I.TEmbedded Systems System Designers and Co Designer’s required 1. Functions earmarked for H/w 2. Functions earmarked for S/w (1) Mobile Software designer (2) Automobile’s Engine Monitoring (3) Digital Cameras (4) Robotics (5) PDA’s
II Software Testing Professionals (1) Ability to write Test scripts (2) Ability to design test plans (3) R & D based positions III Network Planners & Managers 1. Site Surveys 2. Configuration Planners 3. Topology optimizers 4. Routing and Protocol design
Issues 5. Network Security Control 6. N/w Administration 7. Compatibility Issues IV. EDP Professionals 1. OLAP 2. Data Warehousing 3. Data Mining 4. MIS & DSS based tool Designing 5. GIS based designing
V) WEB MANAGERS 1. Web Advertising 2. Web Hosting 3. Site managers 4. Virtual office managers 5. User groups 6. E-Commerce & M-Commerce 7. EPS based facilities
(VI) IPR based position 1. Cyber Crime Acts regulators 2. Cryptographic Solution providers 3. Ethics based solutions (VII) Ergonomics based positions 1. Electronic & Cyber doctors 2. Ergonomics research