Download presentation
Presentation is loading. Please wait.
1
Emerging Trends in Computer Science Dr. Gurvinder Singh Reader, Deptt of Computer Science & Engineering, GNDU, Amritsar
2
Emergence of I.T. Industrial Revolution (1900-1950) Green Revolution (1960-1980) Information Revolution (1980-till now) INFORMATION An ASSET All the Business possible on Internet Virtual offices Wireless Computing PDA’s GPS way finders MOBILE COMPUTING
3
Application Demands
4
Sequential Processing 1 CPU 1 CPU Simple Simple Big problems??? Big problems???
5
There are three ways to do anything faster: Work harder Work smarter Get helpThere are three ways to do anything faster: Work harder Work smarter Get help
6
Data Parallelism Applying the same operation simultaneously to elements of a data set Applying the same operation simultaneously to elements of a data set
7
Control Parallelism Applying different operations to different data elements simultaneously Applying different operations to different data elements simultaneously
8
In computers … Work harder => increase the processor Work harder => increase the processor speed speed Work smarter => use a better algorithm Work smarter => use a better algorithm Get help => use parallel processing Get help => use parallel processing
10
Parallelism levels CPU CPU – Multiple CPUs – Multiple CPU cores – Threads – time sharing Memory Memory – Shared – Distributed – Hybrid (virtual shared memory)
11
PARALLEL COMPUTING (i)Design of Scheduling algorithms (ii)Simulator based design of scheduler (iii) Speed up of execution using AMDAHL’s Law & Gustafson’s Law Law & Gustafson’s Law (iv) Clustering (v) GANG Scheduling (vi) PARAMETRIC STUDY of algorithms
12
Major Areas are SOFTWARE ENGINEERING (i) METRICS DESIGN (i) METRICS DESIGN (ii) Object Oriented Analysis and Evaluation (iii) Evaluation of Metrics (iv) Software Comprehension (v) Reengineering Issues
13
NETWORK SECURITY Issues (i) FIREWALL implementation (ii)Analysis of Cryptographic Techniques (iii)Levels of Security Layered wise. (iv) Implementation of Security at O.S.level, Database level, Programmer level, user level. (v) Identification of Security Threats & corresponding action.
14
DATABASE DESIGN & ARCHITECTURE (1)Multimedia Databases (2)Distributed Databases (3) Knowledge based Databases (4)NLP (5)Query Optimization (6)Bio Informatics (7)VLDB (8)Security Issues
15
Future belongs to EMBEDDED SYSTEM Used for Single, Well defined Task Used for Single, Well defined Task Combination of H/w & S/w Combination of H/w & S/w H/w is CUSTOM BUILT(Customised) H/w is CUSTOM BUILT(Customised)
16
Categories of Embedded Systems 1.Stand alone I/P can be electrical signals from sensors I/P can be electrical signals from sensors Or Or Commands from hurmans O/P can be electrical signals to drive other system Or some LED or LCD display 2.Real time E./S Result or O/P in specific time 3.Mobile devices: Handheld PC’s, Palmtops.
17
Requirements of E.S 1. Low Power Consumption Due to Battery supply 2. Efficient use of Processing Power 3. Efficient use of MEMORY 4. Appropriate Execution time 5. Cost effectiveness 6. Reliability
18
Challenges in development of Embedded Software 1. Choice of fns for H/w & S/w Which fns to be performed by H/w & which fns to be performed by S/w so co designing is required and quite complex. and quite complex. 2. Embedding an Operating System Services such as Memory mgmt, I/O mgmt and process mgmt. are to be combined with Assembly & HLL Also API’s to interface with different. Applications.
19
3. Code optimization for faster execution & less memory occupation. 4. Efficient I/O Input devices have limited Functionality, Small Keypads with 8-12 Keys Output also consist of small LCD displaying only 8-12 char/line. So writing embedded S/w with no I/o device such as Keyboard or display is Complex.
20
5.Testing & Debugging Very complex in Embedded Systems S/w can’t be tested on TARGET Hardware So SIMULATION of Field Conditions is very Challenging
21
POSITIONS IN I.T Embedded Systems System Designers and Co Designer’s required System Designers and Co Designer’s required 1. Functions earmarked for H/w 2. Functions earmarked for S/w (1) Mobile Software designer (2) Automobile’s Engine Monitoring (3) Digital Cameras (4) Robotics (5) PDA’s
22
II Software Testing Professionals (1) Ability to write Test scripts (2) Ability to design test plans (3) R & D based positions IIINetwork Planners & Managers 1. Site Surveys 2. Configuration Planners 3. Topology optimizers 4. Routing and Protocol design
23
Issues 5.Network Security Control 6.N/w Administration 7.Compatibility Issues IV. EDP Professionals 1.OLAP 2.Data Warehousing 3.Data Mining 4.MIS & DSS based tool Designing 5.GIS based designing
24
V) WEB MANAGERS 1. Web Advertising 2. Web Hosting 3. Site managers 4. Virtual office managers 5. User groups 6. E-Commerce & M-Commerce 7. EPS based facilities
25
(VI) IPR based position 1.Cyber Crime Acts regulators 2.Cryptographic Solution providers 3.Ethics based solutions (VII) Ergonomics based positions 1.Electronic & Cyber doctors 2.Ergonomics research
26
THANKS
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.