simplebooklet thumbnail

This booklet consists of all the new technologies that are emerging with the passage of passing time.

of 0



Emerging  technologies

Emerging technologies are technologies that are perceived as capable of changing the status quo.These technologies are generally new but include older technologies that are still controversial and relatively undeveloped in potential, such as 3D printing, preimplantation genetic diagnosis and gene therapy which date to 1981, 1989 and 1990 respectively.Emerging technologies are characterized by radical novelty, relatively fast growth, coherence, prominent impact, and uncertainty and ambiguity. In other words, an emerging technology can be defined as "a radically novel and relatively fast growing technology characterised by a certain degree of coherence persisting over time and with the potential to exert a considerable impact on the socio-economic domain which is observed in terms of the composition of actors, institutions and patterns of interactions among those, along with the associated knowledge production processes. Its most prominent impact, however, lies in the future and so in the emergence phase is still somewhat uncertain and ambiguous."


Image result for emerging technologies

Image result for emerging technologies


List of some of the emerging technologies -

1. Artificial itelligence (AI) biometrics

2. Vision enhancement

3. Robotics

4. Quantum cryptography

5. Computer-assisted translation (CAT)
6.  3-D and holographic imaging

7. Virtual reality

8. Cloud computing

9. E-books and online newspapers

10. OLED displays

1. Artificial intelligence (AI)          biometrics

A known problem with biometric technology is that many fingerprint identification systems falsely reject a person’s fingerprints – when the scanned fingerprints are checked against the database no matches are found.

Artificial intelligence (AI) biometrics overcomes this problem using dynamic profiling – the system learns by using AI about a person’s fingerprints on every scan. This means a person doesn’t have to worry about getting their finger in exactly the right place every time on the scanner. The system learns from the different alignments and is therefore still able to match the fingerprints to those stored on a database.

Facial – recognition systems have the same problem. A human being is still able to recognize a face even if the person has grown facial hair, now wears glasses or has aged. Computerized facial- recognition are confused by such soft biometric changes. New systems use AI to learn from scanning a number of faces and can pick out these soft biometric features. This means the system can still recognize faces and cross – reference these attributes with corresponding images stored on the database.

Other AI biometric technologies are being developed, so these security systems become increasingly more reliable.

Low vision enhancement systems (LVES) use video technology a headset connected to a computer. The system allows images to be projected inside the headset I front of the eyes. This effectively brings the objects closer for examination by the user of the system.

Night vision enhancement (NVE) amplifies infrared light and visible light so that an image can still be seen in apparent darkness. For example, the military use this technology to carry out surveillance at night. The dim light source is captured and passed through an image intensifier tube, which converts the light into electrons. These electrons pass through another tube where they are amplified to produce several times the original number of electrons. A screen at the end of the tube is coated in phosphor dots that glow when electrons collide with them- this results in an image that is considerably clearer than the original.

2. Vision enhancement


Robotics has been around for many years, mostly in the manufacturing industry. They are used in car factories to weld car bodies, spray body panels and fit items such as windscreens. No human intervention is required. However, there are areas outside manufacturing where robotics is evolving rapidly, and we could see robots appearing in many areas of our lives in relatively short space of time.

One application is use of drones. These are unmanned flying devices that are used by both the military and civilians. The military have used drones in reconnaissance missions for a number of years. Civilians uses include surveying the landscape in 3-D for use with GPS, investigating weather phenomena (for example, flying into hurricanes or other weather conditions that would be dangerous for manned surveillance), or search and rescue/fire fighting in natural disasters. All of these are currently under evaluation and many more application could evolve over the coming years.

Another application is the use of robots in surgical procedures. Robotic surgery allows surgeons to perform complex procedures with more precision, flexibility and control than standard surgical techniques. With this technique, surgeons use robotics equipped with a camera arm and several interactive mechanical arms – these have joints that work like a human wrists.

3. Robotics

Conventional cryptographic techniques rely on mathematical approaches to secure key transmission. However the security they offer is based on unproven assumptions and depends on the technology available to an eavesdropper.

Quantum Key Distribution is a technology that allows transmission of a sequence of random bits across an optical network and also verifies if this sequence was intercepted or not. This verification is based on the laws of quantum physics.

Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solution to the key exchange problem.

4. Quantum cryptography

Quantum cryptography was proposed first by Stephen Wiesner, then at Columbia University in New York, who, in the early 1970s, introduced the concept of quantum conjugate coding.

A computer-assisted translation tool facilitates the translation process by resolving the text into smaller, translatable segments. It organizes these segments of text in a manner which makes it easier for the translator to translate the text effectively, and makes the process of translation time-efficient. The segments can be recalled later on and thus the translator ensures that the terminology and writing style of the original is followed. It also provides savings when the material that needs translation is similar to previously translated material – you only pay for part of the sentence that has changed.

Computer-assisted translation, computer-aided translation or CAT is a form of language translation in which a human translator uses computer software to support and facilitate the translation process.

5. Computer-assisted translation (CAT)

Computer-Assisted Translation (CAT) tools aid translators and linguists in increasing translation production

6. 3-D and Holographic Imaging

The Digital Holography and Three-Dimensional Imaging meeting provides a forum for science, technology, and applications of digital holographic, and three-dimensional imaging and display methods. Topic areas include interferometry, phase microscopy, novel holographic processes, 3D and novel displays, integral imaging, computer generated holograms, compressive holography, full-field tomography, and holography with various light sources including coherent to incoherent and X-ray to terahertz waves.  This is a highly inter-disciplinary forum with applications in biomedicine, biophotonics, nanomaterials, nanophotonics, and scientific and industrial metrologies.

Virtual reality or virtual realities (VR), also known as immersive multimedia or computer-simulated reality, is a computer technology that replicates an environment, real or imagined, and simulates a user's physical presence and environment to allow for user interaction. Virtual realities artificially create sensory experience, which can include sight, touch, hearing, and smell.

Naming discrepancies aside, the concept remains the same - using computer technology to create a simulated, three-dimensional world that a user can manipulate and explore while feeling as if he were in that world. Scientists, theorists and engineers have designed dozens of devices and applications to achieve this goal. Opinions differ on what exactly constitutes a true VR experience, but in general it should include:

  • Three-dimensional images that appear to be life-sized from the perspective of the user
  • The ability to track a user's motions, particula­rly his head and eye movements, and correspondingly adjust the images on the user's display to reflect the change in perspective

In this article, we'll look at the defining characteristics of VR, some of the technology used in VR systems, a few of its applications, some concerns about virtual reality and a brief history of the discipline. In the next section, we'll look at how experts define virtual environments, starting with immersion.

7. Virtual reality

A virtual reality CAVE display projecting images onto the floor, walls and ceiling to provide full immersion. See more virtual reality pictures.

8. Cloud computing

Cloud computing is a kind of Internet-based computing that provides shared processing resources and data to computers and other devices on demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services), which can be rapidly provisioned and released with minimal management effort. Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in third-party data centers. It relies on sharing of resources to achieve coherence and economy of scale, similar to a utility (like the electricity grid) over a network.

An e-reader, also called an e-book reader or e-book device, is a mobile electronic device that is designed primarily for the purpose of reading e-books and digital periodicals. An e-reader is similar in form, but more limited in purpose than a tablet. In comparison to tablets, many e-readers are better than tablets for reading because they are more portable, have better readability in sunlight and have longer battery life.

An online newspaper is the online version of a newspaper, either as a stand-alone publication or as the online version of a printed periodical.

Going online created more opportunities for newspapers, such as competing with broadcast journalism in presenting breaking news in a more timely manner. The credibility and strong brand recognition of well-established newspapers, and the close relationships they have with advertisers, are also seen by many in the newspaper industry as strengthening their chances of survival.

9. E-books and online newspapers


Image result for about online newspaper

An organic light-emitting diode (OLED) is a light-emitting diode (LED) in which the emissive electroluminescent layer is a film of organic compound that emits light in response to an electric current. This layer of organic semiconductor is situated between two electrodes; typically, at least one of these electrodes is transparent. OLEDs are used to create digital displays in devices such as television screens, computer monitors, portable systems such as mobile phones, handheld game consoles and PDAs. A major area of research is the development of white OLED devices for use in solid-state lighting applications.

There are two main families of OLED: those based on small molecules and those employing polymers. Adding mobile ions to an OLED creates a light-emitting electrochemical cell (LEC) which has a slightly different mode of operation. OLED displays can use either passive-matrix (PMOLED) or active-matrix (AMOLED) addressing schemes. Active-matrix OLEDs (AMOLED) require a thin-film transistor backplane to switch each individual pixel on or off, but allow for higher resolution and larger display sizes.



Image result for oled displays


10. OLED displays

Made by - Snehpreet kaur

Grade - 9 (A)

Subject - ICT



Special thanks to -

Ms. Suman


Ms. Pratha




Scott (from simplebboklet)

Image result for THANK YOU