Categories
News world

「東大史上最高の天才」が挑む”究極の謎”。解明すればノーベル賞?「なぜ生命は動くのか」の答えとは…【ホリエモン×岡田康志】


He is now being called the very best wizard in the Tokyo market and the very best wizard in the Tokyo University market on different net media, however the best mystery is what it indicates to be alive.One of the definitions of living is movement. Why did God produce something with such inadequate fuel efficiency? Well, I see. We have produced modern technology that permits us to first take a look at living cells with a microscopic lense, however additionally to see points that can not be seen with a standard microscopic lense.

Yes, Mr. Horie and Mr. Kaa. Thanks significantly. Yes, as soon as possible.

I want to introduce our visitor. Mr. Yasushi Okada, group leader of the Center permanently Equipment Study at the Institute of Scientific research. Thank you for joining us today. Thanks really much.

Mr. Okada has been called the best in the marketplace, the most effective wizard in the Tokyo University market, in various media, net media, etc. He took an IQ test when he was a very first year junior high student.

162 This is precisely the like the high marker in maths on the simulated exam at the College of Tokyo when I remained in intermediate school and surrendered an A grade on the simulated test at the University of Tokyo. That’s wonderful.

I’m jealous. I’m jealous. I was additionally called a genius. This moment, I’m mosting likely to solve the mysteries of energy top quality and life, and I’m going to chat about Mr. Okada’s brain, which seeks the utmost secrets by seeing points that can not be seen.

I ‘d like to take a more detailed check out this.First of all, before we enter into the main subject, I would certainly like you to have a look at this.This is likewise associated with Mr. Okada’s study, yet I’ve seen individuals state that they’re cute on social media. It’s ended up being a warm subject, and it’s been developed into a meme and seen around the world.

It’s called a motor healthy protein, yet could you please discuss to me what it is? In our society, simply as those vehicles bring goods to numerous locations, which is exactly how logistics is developed, logistics in the feeling of transferring what is needed to the area where it is needed within the cell. This is really vital, and what is accountable for this is this motor taper called kinesin.For instance, the system in which this is most created is the nerve cell, and within these afferent neuron, there is a motor healthy protein called kinesin, for instance. It is known that various conditions occur when the memorial mind is mutated as a result of traffic congestion or genetic diseases, consisting of Alzheimer’s disease, but we do not recognize the exact cause.

Although it is not, one of the risk variables is, for example, this genetic anomaly of Kinesi, which is the source of various supposed intractable neurological conditions such as the condition that Dr. Hoki experienced from and the disease that Dr. Hoki dealt with. To place it just, if that vehicle quit, there would certainly be no materials at the convenience store, and every person would be in trouble.In the same way, there is a healthy protein that carries things inside cells.

Well, I’m talking extremely gradually, yet is it really quick? The real speed has to do with one pulse per 2nd, however the size of things is a few 10s of nanometers or something like that, so if this kinesin might be made use of by humans to carry cargo like this. In terms of getting out, the rate at which this transportation is lugged has to do with that of a Shinkansen. Well, when you consider it, it appears quick. Lengthy nerve cells have to do with 1 meter long, so they go from your head to your waist, and then from your aware of your feet, so when you wish to move your legs quicker, your mind sends out commands to your legs.

If you attempt to share the information swiftly, if you relay it bit by bit, it will certainly come to be slower each time you relay it, so it would certainly be faster to link it straight without relaying it.Yes, that makes good sense, however the Kishi is not actually moving it from right here to below. Are you bring it? Are you bring it? Papa, Papa, it’s rather quick.

It’s quite fast.What sort of secrets of life can be solved by researching Kinesi?That’s why we’re studying on Unki’s mind to begin with. I assume the ultimate secret is what it suggests to be alive, and within that, probably among the interpretations of being to life that we without effort consider is remaining in motion. If you unexpectedly drop and stop relocating, you’ll think you’re dead, ideal?

Yeah, yeah, yeah. So because feeling, being able to move has a great deal to do with exactly how we live.But on the other hand, it likewise goes back to the subject we were speaking about earlier. Yes, movement is a totally physical sensation, and at the time we had no concept just how it moved.In that pick up, I was questioning just how tapa in living points produces movement.

I assumed that was fascinating, so I started investigating it, and I have actually been researching for about 30 years and have pertained to comprehend how it works, however there are still many points we do not recognize, and for instance, there’s one point I actually do not understand. It’s simple, but I don’t really understand it.The trouble with this CG movie is that it’s a lie.In reality, the within a cell isn’t clear like this.The just people using it nowadays are the visitors at the Gion Event.

Or, there’s in fact healthy protein in the packed beef like a Mandensha.If you were to place it on a scale, you ‘d locate a Gigatsuri dish.It’s lugging regarding the very same quantity of stuff on its back, and it’s going for 300km/h. It’s dangerous, and it resembles it’s going in one direction, but in truth it’s going in both directions, so if you have both backwards and forwards, you won’t have the ability to shelter. After that, in the lane alongside you, autos traveling at 300km/h were whizzing previous each various other.

There are as many individuals as jampacked trains, so it’s actually terrifying, ideal? You would certainly think there would not be any type of accidents, so you would certainly be wondering what’s going on. It’s hard to picture something similar to this working, right? As I was waddling along, I stated, Oh yep, yeah, that’s the optimal meeting. Hey, this is the globe of life and science, where there’s a great deal of development, and this remained in January of this year.

Mr. Okada made a presentation like this. This is the left-right balance of the body. This means that the system by which the heart is damaged has actually been clarified. This was additionally published in the clinical journal Science, but may I ask you to clarify this?

Most of you possibly think that the heart is on the left side. I think that’s why the heart gets on the left side. I had actually never believed regarding it previously, yet I assumed it was strange that everyone’s heart got on the left side. Well, I are among those people, but the person who ended up being well-known is Mr. Kato, the young professor who is presently doing the elimination in my lab, and he really did not just look at it, he did it under the microscope.

If you play around with that 100m thick hair, you can squeeze it and relocate it, so we made a fantastic microscopic lense and used that to straight move the hair expanding below and see what takes place on the left and best sides. This is the story of how we found the system that establishes left and right.Fudo: Cells can identify in between appropriate and left by acting as antennas.Yes, this focus flow is always existing? It’s the activity of the hair that develops this.

Back in the year 2000, what we did was first discover that the hair was relocating, and after that use the activity of the hair to identify the focus. In the 2000s, they verified that there is a circulation of water called a stream, and that they also verified exactly how water flows, and that the downstream side of the circulation is to the. Things is, if you don’t have it, it’s going to be right, and afterwards it’s going to be arbitrary, oh, it’s going to be random, so it’s random, so if fifty percent of individuals are mosting likely to be right, they have that type of electron, but yeah, I see. It feels like everybody experiences symptoms such as sperm not moving or not moving.I see.

Since I’m below, it appears like this field is establishing at a rapid rate. The world is making excellent progression now, where medicines like Alphafault, for instance, can be utilized to cure diseases that can not be cured, but the most significant hurdle is developing replacements. That’s why cancer might appear like a solitary cancer, however it’s really heterogeneous, meaning it’s composed of several sorts of cancer.In truth, it has a great deal of mutations, so the genes mutate rapidly, and the cancers that need new replacements are in fact cancers that are heterogeneous. So, it’s difficult to develop an effective replacement for that due to the fact that you need to create the protein, so if you have something like this, it’s truly easy to do, right?

Does that mean that we can carry out a drug that is customized to the cancer cells? Yes, that’s precisely what makes this possible.The technology that calls out genetics series is very developed and has actually come to be cheaper. When the initial task was to check out the hair of that individual, it was a time when we were ultimately able to check out a single person’s hair after spending a substantial quantity of cash all over the globe. We reside in a time when mins can be reviewed in 100s, but the innovation that is the basis of this is in fact the one-minute microscope modern technology that I discussed previously.

Since modern technology called screening has appeared, you can easily check out something for 100 bucks and take a look at the genome of your cancer cells. So, if this kind of cancer had a hereditary mutation, it would have the ability to do something similar to this. Even within the cells, logistics in the sense of supplying what is required to where it is required is extremely important. It’s kind of adorable to see it strolling. Is it walking?

There’s a Gimasuri celebration. It’s bring something such as this on its back and going 300km/h, yet it’s not like Kishi is in fact lugging it from right here to below. It’s bring it. I wonder if the heart is on the left side.It’s hazardous, isn’t it?

It was also included in the publication Science.I had actually never considered it, however the heart gets on the left side.This is amazing.

Categories
Library News

C# Tutorial For Beginners – Learn C# Basics in 1 Hour


Hi! Thank you for taking my C# tutorial for beginners. Let me quickly give you an overview of what you’re going to learn and how I’ve structured this tutorial. In the first section, I’m going to talk about fundamentals of C# and .NET.

one of the questions that a lot of beginners ask is what is the difference between C# and .NET so I’m going to cover that I’m also going to talk about CLR assemblies namespaces IL code and stuff like that then over the next two sections I’m going to talk about types I’m going to talk about primitive and non primitive types now at this point you still cannot write any C# programs but I have designed a number of quizzes to help you reinforce what you’re going to learn then from Section four where I talk about control flow you’re going to start writing simple C# programs and from that section onwards in every section you’re going to learn something new about C# and you’re going to write more interesting programs and finally I’m going to conclude this course with a section on debugging so I’m going to show you some of the tools we have so when you have bugs in your code you know how to find them and get rid of them I’m also going to talk about some good program practices that help you write better and more reliable code so we have a lot to cover and let’s get started okay so this is the very first section of this course in this section I’m going to start by teaching you the very basics of C# one of the questions that a lot of beginners ask is what is the difference between C# and net so that’s the first thing I’m going to answer here next I’m going to talk about CLR or common language runtime which is the runtime environment for .NET applications next I’m going to talk about the architecture of .NET applications and as part of this I’m going to introduce you to concepts such as classes namespaces and assemblies and finally I will show you all these concepts in action I’m going to introduce you to the very basics of visual studio and write a very simple C# application so you can see classes namespaces and methods in action I hope you enjoyed this section and let’s get started okay what is darknet framework and how is it different from C# some developers who are absolutely new to C# don’t know the difference so in this lecture I’m going to talk a little bit about C# and .NET framework C# is a programming language .

NET is a framework for building applications on the windows .NET framework is not limited to C# there are different languages that can target that framework and build applications using that framework examples are F sharp or vb.net okay now but what exactly is .NET framework Dartmouth framework consists of two components one is called CLR or common language runtime and the other is a class library for building applications in the next lecture we’ll talk about CLR in more detail okay before we understand what CLR is and why we need it let me explain a little bit about the history of C# before C# we had two languages in the C family the C language and C++ with either of these languages when we compiled our application the compiler translated our code into the native code for the machine on which it was running which means if I wrote an application in C++ on a Windows machine with 8086 processor architecture the compiler would translate my code into the native code for that machine that is a Windows machine with an 8086 processor now we only have different hardware’s and we have different operating systems so if I took the application that compile the application on the computer with a different architecture that would not run so when Microsoft was designing the C# language and the .NET framework they came up with an idea that they borrowed from the Java community in Java when you compile your code it’s not translated directly into the machine code it’s translated into an intermediate language called bytecode and we have the exact same concept in C# so when you compile your C# code the result is what we call IL or intermediate language code is independent of the computer on which it’s running now we need something that would translate that il code into the native code or the machine that is running the application and that is the job of CLR or common language runtime so CLR is essentially an application that is sitting in the memory whose job is to translate the il code into the machine code and this process is called just-in-time compilation or JIT so with this architecture you can write an application in C# and you don’t have to worry about compiling that into the native code for different machines as long as a machine has CLR that can run your application okay now let’s learn about the architecture of .

NET applications at a very high level when you build an application with C# your application consists of building blocks called classes these classes collaborate with each other at runtime and as a result the application provides some functionality now what is a class a class is a container that has some data which is also called attributes and functions which is also called methods functions or methods have behavior they execute code they do things for us data represents the state of the application let me use an example think of a car the car has some attributes like its make its model its color these are the attributes of a car a car also has some functions we can start it or we can move it so you can think of a car as a class in a real world application we have tens hundreds or even thousands of classes each class responsible for a piece of functionality an example of that is classes that are responsible for getting the data from the user process the data and display something to the user now as the number of classes in an application grows we need a way to organize these classes that’s where we use a namespace so a namespace is a container for related classes for example in .NET framework we have namespaces each containing tens of related classes we have namespaces for working with data like databases we also have namespaces for working with graphics and images we have namespaces for working with security now in real world application as these namespaces grow we need a different way of partitioning an application and that’s where we use an assembly and assembly is a container for related namespaces physically it’s a file on the disk which can either be an executable or a DLL which stands for dynamically linked library so when you compile an application the compiler builds one or more assemblies depending on how you partition your code in the next lecture we’re going to write a very simple structure application and you’re going to see all these concepts in action okay in this video we’re going to have a quick tour of visual studio and build a very simple C# application so here I’ve got Visual Studio open let’s go to file new project okay in this dialogue on the left side we’ve got a section called templates and here you see the kind of applications we can build with C# so as you see in the list we can build desktop applications web applications apps for cloud mobile services workflows and various kind of things but in this course and the subsequent parts of this course we’re just going to focus on console applications a console application is a very simple application that does not have a graphical user interface and it’s a great learning tool for learning a new language so we’re not going to be distracted by various complexities of larger applications so on the left side select windows and on the right side select console application then give a name to your project so let’s call it hello world which is a common tradition when learning a new language and specify a location you can put it wherever you want I know this concept of solution in Visual Studio we have this concept of solution which can have one or more projects with a very simple application you have only one solution and one project but as your application grows you add more projects each responsible for something different but now we don’t have to worry about it now click OK alright let’s see what’s happening here some developers get a little bit intimidated the first time they open visual studio and that’s very enough because there are so many menus and panels here that is a bit confusing but let me tell you something 90% of the time you’re going to use only 10% of these or even less so don’t worry about all these menus here you don’t need to use all of them at all times 90% of the time all you need is the code editor here sometimes you need the solution Explorer in fact I personally hardly ever use solution Explorer because I do everything with my keyboard and if you watch my course double your coding speed you will see that everything is possible with keyboard so you don’t need these panels here you don’t need to grab your mouse and navigate around you don’t really need this stuff also none of the stuff on the toolbar are ever required don’t worry about it everything you can do with your keyboard alright now let’s take a look at this first to char program so we created a console application and on the right side you see the solution Explorer panel in case you don’t see that go to view and select solution Explorer top you see we have a solution which has only one project under that we’ve got the project called hello world look at these four items here properties expand that we have a file here called assembly info this is the identification or the assembly that will be produced as a result of compiling this application so when we compile the console application we’re going to get an executable and that’s an assembly that assembly has an identification look at these attributes here like the title description which is currently not set company product copyright trademark culture a grade you know various kind of things like even version so these are all part of assembly identification or assembly manifest in most cases you don’t have to worry about it but if you want to create an assembly and you want to distribute it send to other people then you may want to come here and give you the proper name and a proper version so for now we don’t have to worry about it on the references you see any assemblies that this project is referencing to do its job when you create a project with visual studio by default it as a reference to a bunch of assemblies that you’ll see here these are all part of .NET framework so at a minimum Visual Studio assumes you’re going to use classes in system assembly or system the data to work with databases and so on you may not necessarily use all these assemblies in your project but that’s just part of the template config’ is an XML where we store the configuration for this application sometimes you may want to store connection strings to the database or you may want to have some settings about your application all of them will end up here and finally you see program dot C s which is where we are going to start writing code all right let’s see what’s happening here so in this file program that C S on the top you see a bunch of using statements what is this all about well our project is called hello world so by default Visual Studio creates a namespace called hello world when we write code in this namespace we have access to any classes defined in this namespace so if you want to use a class that is defined in a different namespace we need to import it in our code file and that’s why we use the using statement so by default Visual Studio as these five using statements system is a namespace in .NET framework and that’s where we have all these basic utility classes and primitive types there system that collections that generic is used to work with lists collections and so on system that link is used to work with data and it’s a comprehensive topic that I have covered in my C# Advanced Course system the text is used to work with tags and coding and stuff like that and finally system the threading is used to build multi-threaded applications in this video we’re going to create a very simple application and we’re not going to use any of these for namespaces here so we’re just going to use system for now I’ll leave them there and then I will show you how to clean them up all right so here’s our namespace and insight namespace by default we have a class called program so every console application you create with Visual Studio has a class called program inside program by default we have a method or a function called main and that’s the entry point to the application so when you run your application CLR execute the code inside main method and that’s where everything kicks off this method is declared as static and that’s something I’m going to cover later in the next section methods have input and output so what goes inside parenthesis is the input to the method which we call parameter or argument note that parameters are optional but in this case in the default template the main method has a parameter called args which is of type string array we’re going to learn about string array in the next section what you see before the method name is the return type or the output of the method void in C# means nothing that means this method does not return any value it just contains some code that’s it also note that C# is a case sensitive language so this main has to be with capital M otherwise CLR is not going to find this method as the entry point of the application okay and one last thing is note these curly braces so where we have a block of code we need to surround it with curly braces so that is applicable for methods for classes and for namespaces alright now let’s write a very simple C# program so let’s go here we have a class called console which is used to read data from console or write data to it it has a bunch of methods access this method using the dot notation and here you see various members of this class methods are indicated by a purple cube so beep is used to play a beep sound or clear is used to clear the console we’re going to use the right line method this method can optionally take a parameter so I’m going to pass a string here hello world just that I note that statements in C# terminate with a semicolon as you see here now take a look at using system on the top do you see that it’s highlighted whereas the others are grayed out the reason for that is in this file we are using a class called console which is defined in the system namespace that’s why that using statement is active we are not using any classes defined in other namespaces and that’s why they’re grayed out so we can get rid of them to make our code cleaner we can either delete each one by ctrl X like that or if you’re using resharper you can get rid of all of them by pressing Alt + Enter here and selecting the first option which is remove unused directives in file so it’s faster now let’s run the application with ctrl + f5 so this window that you see here this black window is what we call console and that’s why this kind of project is called console application you okay that’s it for this lecture from this point in every lecture we’re going to learn something new about C# and we can write more interesting and more complex programs I hope you enjoyed this lecture and thank you for watching well hello it’s mush here your C# instructor I just wanted to quickly let you know that this video you’ve been watching is actually part of my C# basics course on udemy in this course I walk you through all the core concepts of C# in a step-by-step fashion plus you get access to exercises cheat sheets and a discussion board to ask your questions in case you’re interested you can get this course with a discount using the link in the video description and if not that’s perfectly fine continue watching as the next section is coming up okay this section is going to be the first step in your journey to learn C# so I’m going to introduce you to variables and constants I’m going to talk about various data types and type conversion I’m going to talk about scope and overflowing and finally I’m going to talk about various operators we have in C# so let’s get started okay we are going to start our journey by learning about variables and constants a variable is a name that we give to a storage location in memory where we can store a value any constant in an immutable value that is a value that we know at compile time and that value cannot change throughout the life of the application why do we use constants the reason for that is to create safety in our application imagine you’re creating an application that involves some mathematical computation around circles we have this number called P which is 3.14 and we use that to calculate the area of a circle that number should always be the same we don’t want to accidentally change that in our program if you accidently change that everything is going to blow up in terms of the results the program produces so we declare that number as a constant and this way we create safety in our application in C# to declare a variable we start with the type followed by an identifier and finally semicolon here ain’t represent integer which is a number between minus 2 billion and plus 2 billion later in this video I will show you all the primitive types that you need to know also note that C# is a case sensitive language which means in this case these two identifiers are different one has lowercase n and 1 has uppercase n when declaring a variable we can optionally assign it the value like what you see here you don’t have to but there is one thing you need to know about variables and that is you cannot use a variable unless you initialize it so let’s say if I declare this int number here and I decide to display it on the console my application will not become part I have to assign it a value before I can use it before I can read it I will show you that later when we jump to coding to declare constant we start with the keyword cunt next we have the datatype and an identifier and here we have to initialize it with some value we cannot define a constant without setting its value there are a few things you need to know about identifiers first one is that an identifier cannot start with a number so you cannot have an identifier like the one you see here instead you need to replace one with the word one so an identifier cannot include whitespace so you cannot have an identifier like first space name it has to be one word an identifier cannot be a reserved keyword like int that you saw earlier if you are desperate to use a word that coincidentally clashes with one of the C# keywords you can perfect that with the add sign and finally as a recommendation always use meaningful names for example avoid a name like f n instead use first name this way your code will be more readable or maintainable and cleaner and everybody will understand that in terms of naming convention here are three popular naming conventions that have been around in the C language family we’ve got camelcase Pascal case and Hungarian notation with camelcase as you see I have bolded here the first letter of the first word is lowercase and the first letter of every word after has to be uppercase with Pascal case the first letter of every word has to be uppercase with Hungarian notation we prefix the name of a variable with the datatype it uses so here str represents a string Hungarian notation is not used in C# and I have noticed programmers coming from C or C++ background use that in their code if you’re one of them I highly recommend you not to use Hungarian notation because C# developers are not used to that and they don’t like to see Hungarian notation in the code it makes your code look a little bit ugly so in C# to name your local variables use camel case so as you see here the first letter of the first word is lowercase and if we had more words here in the identifier the first letter of every word had to be uppercase four constants use Pascal case so here you see I’ve got a constant here constant integer and the first letter of every word is uppercase here is the list of most commonly used primitive types in C# in fact the actual list is slightly bigger than this but I deliberately decided not to include those data types because they’re hardly ever used in fact they are there for interoperability with other languages I personally over the past 12 years of me coding in C# I’ve hardly ever used them in fact never so I decided not to confuse you with too much details that you don’t need in the next slide I’ve got a link here in case you want to learn about the other primitive types so let’s take a look at the table here on the left side I have divided these datatypes into four categories integral numbers real numbers character and boolean this column shows the C# data times and these are C# keywords note that C# keywords are always lowercase each of these C# keywords or C sharp types maps to a type in .

NET framework which is displayed in this column so these types are part of the.net framework and when you compile your application the compiler internally would translate the C# keyword you use here two equivalent .NET type the third column here shows the number of bytes each data type uses and I have listed these data types from the smallest to the largest in each category so in the category of integral numbers you see byte is the smallest it takes only one byte whereas long is the largest and it takes 8 bytes the more bytes we have the more storage we have and we can store larger numbers you don’t really have to memorize the range of each data type but remember white can store a value between 0 to 255 short can store a value between minus 32,000 to plus 32,000 integer can store a value between minus 2 billion to Plus 2 billion and long is even bigger than that in terms of real numbers we have three data types float double and decimal float maps to the single type in that framework and it takes four bytes and as you see it can store a very large number double is twice as big so it uses eight bytes and decimal uses sixteen bytes the more precision you need the bigger data type you use we also have character which is represented by char keyword and it’s two bytes so characters in C# are unicode and finally we have bull which represents boolean which can be either true or false in case you want to learn more about the other data types that I told you they’re not really used you can simply go to Google and search for C# built-in types and the first page is the MSDN page that lists all the primitive types in C# and most of these data types are pretty straightforward but there is something tricky about real numbers in this table I have listed the data types we have for real numbers load double and decimal I’ve highlighted double because that’s the default data type used by a C# compiler when you’re using real numbers so if you want to declare a float you need to explicitly tell the compiler to treat the number you have as a float here is an example I’ve declared a float call it number as I need one point two here I have added the suffix F and that is to tell the compiler to trade this number as a float if I didn’t have this F here compiler would think one point two is a double because double is the default data type for real numbers and of course I cannot assign a double number into a float so the program would not compile same applies to decimals so if you want to declare a decimal you need to add the suffix M at the end of the number in C# we also have a few other types which are not considered primitive types and they are string array enum and class we’ll learn more about them throughout this course okay that’s it for this lecture in the next lecture we’re going to talk about the concept of overflowing I hope you enjoyed this lecture and thank you for watching okay now let’s talk about the concept of overflowing here I’ve declared a variable of type byte cut the number and assign it to 255 as I told you earlier in the slide 255 is the largest value you can store in a byte now in the next line I’m increasing the value of number by one and trying to store 256 in the number but if you compile the application and display number on the console you will see zero and this is what we call overflowing so we have exceeded the boundary of the byte data type in C# by default we don’t have overflow checking which means we can modify the value of a variable at runtime and if we go beyond the boundary of its underlying data type we will get overflow now sometimes this is not desirable in your application you want to stop overflowing if that’s the case you need to use the check keyword so here is how it works we have the checked keyword followed by curly braces which indicate the code block and inside that block we have the variable declaration and any kind of arithmetic operations with this code overflow will not happen at runtime instead an exception will be thrown and the program will crash unless you handle the exception the topic of exceptions is an advanced topic and I have covered it in my C# advanced course for now all I want you to know is that if you use the check keyword overflow will not happen and instead the program will throw an exception now do we really need that in reality honestly I have never ever ever came across this situation because if I was concerned that in this case my number variable would overflow I would just simply use the short data type instead of byte but I decided to include the concept of overflowing because I wanted my sous-chef course to be comprehensive so just be aware of that in case you hear about overflowing somewhere but you’re probably not going to use that in the real world in the next lecture we’re going to talk about the concept of scope okay let’s talk about the concept of scope what is the scope scope is where a variable or a constant as meaning and is accessible take a look at this block of code here as you know a block is indicated by curly braces here we have three blocks of code here’s one here is another and here is the last one inside the first block I’ve got a variable called a an a is accessible anywhere inside this block or any of these child blocks if I go out of this block and try to access a the program will not compile the same rule applies to other variables so let’s take a look at this block here B is meaningful anywhere inside this block or any of its children if I go outside this block and try to access B I’m going to get a compile time error okay I think that’s enough theory for now let’s open up visual studio and do some coding okay let’s start by declaring a variable of type byte and call it number now we want to display it on the console so as you remember from the last lecture we type console dot write line and put the variable here note that as I was typing console dot write line my resharper plugin automatically added this using statement on the top system is a namespace and console is a class that is defined in the system namespace so in order to use the console class we need that declaration here on the top if you’re not using resharper you have to go here and manually type using system semicolon okay now take a look at this number here it has a red underline and if we put the mouse cursor here it says local variable number might not be initialized before accessing if you remember from the slides I told you in C# before you can access a variable you need to set it you need to initialize it and that’s the reason here we have the red underline we cannot display the number on the console before initializing that so if I try to compile the application we’re going to get an error to compile an application you press ctrl shift + B and here is the error list use of unassigned local variable number we can solve this problem by initializing number like setting it to 2 for example and you see the red underline is gone we can compile again control-shift be build succeeded take a look here okay now we can run the application by pressing ctrl + f5 okay so we got two on the console now let’s extend this example and declare a few more variables define an integer int count equals 10 and a float float say total price equals 20 $95 now note this red underlined here let’s find out what’s happening here so I put the mouse cursor here it says cannot convert source type double to target type float if you remember from the slides I told you by default the sea-shore compiler traits real numbers like this one here as double whereas we are declaring a float so here we need to explicitly tell the C# compiler to treat this real number as a float and we can do that by appending an F at the end so the error is gone let’s take your character so char character equals a note that in C# we enclose characters by single quote like here we can also declare a string string is not one of the primitive types and have covered it in a separate lecture in this course but for now let me show you how to declare a string which is type string give it a name first name equals mosh note that with strings we enclose them in double quote so that’s one of the differences between strings and characters and finally let’s declare a bull bull is working equals true so with bulls we can either set them to true or false both true and false our keywords as you can see they’re indicated by the blue color here and they’re lowercase so everything you see here that is blue is a keyword like static void string class name space and all these data types here now let’s display these variables on the console so let me show you a trick instead of writing constant the right line we can do a shortcut this is what we call a code snippet so we type CW that is short for console.writeline and then press tab and Visual Studio automatically converts that to console the right line there are various code snippets that help you write code faster and I will try to point them out throughout this course so let’s display count now another one totalprice and note that i can just type t oh and here is what we call intellisense it’s visual studios auto completion mechanism you don’t have to type the full name of a type or a variable as long as the intellisense detects tab and is highlighted here like total price you can simply press tab and there you go visual studio automatically completes that for us let’s display the character same here I just press tab again I type only a few characters it can press tab or enter and finally is working we run the application by ctrl + f5 so we got all these values on the console okay now let me show you something else in C# we have a keyword called var which makes variable declarations easier for example here instead of explicitly specifying the datatype for each of these here I can simply type var and I let the C# compiler detect the datatype for this variable here so let me replace all of this with var okay now if we hover the mouse over the VAR keyword we can see the underlying data type in this case is system that boolean which is the data type which maps to C# pull keyword how about this one that’s a string and this one is a character and this one is system that single which maps to float in C# and in the case of count it’s in 32 which is integer and same for a number so the tricky thing here is by default C# treats integral numbers as integer and when you use the VAR keyword it assumes that it’s an integer if you really want to go for a byte then you have to explicitly specify it as byte here but tell you from experience it’s safe to use integer in most cases in fact if you look at the classes in the.net framework in most cases integer is the data type used for representing integral numbers okay I revert this back now I show you something else so let’s take a look at this one here so it’s a char which is a character I can put the mouse cursor here and press control and then click that opens the object browser window take a look here it’s object browser and it’s a way to look at the various classes in your project or in the.

net framework in this case because I did a ctrl click on the char or VAR keyword this is what we got here so char is highlighted in the object browser on the right side you see all the members of the chart type so these purple ones are functions or methods if you scroll down here you see two fields here min value and Max value we’ll explore them shortly and note that here is the Declaration of Char Char is a structure we will cover structures later in this course and note that it’s a member of system namespace it can click system and that shows the system namespace as well as all the types defined in the system namespace so these are part of the.net framework ok let’s close this for now let’s explore another example so I’m going to get rid of all the code here we can simply press control X on each line and that deletes all these lines here ok let’s do a console the right line so CW tab this time I pass a string here I specify two placeholders and finally supply a couple of arguments okay let’s see what’s going on here so here what we have is called a format string it’s a kind of string that can be used as some kind of template so at runtime what we have here indicated by curly braces and 0 as the argument will be replaced by the value we pass here so 0 represents the first argument after this format string and 1 represents the second argument after this format string in this case bited max value so let’s run this application we got 0 and 255 and that’s the range that you can store in a byte we can do the same with a float so CW tap a format string float mean value float Max value run the application so this is the range we can store with a float it’s a huge number that is displayed using the scientific notation okay now let’s take a look at constants so I get rid of these two lines here control X control X we define a constant with the Const keyword Const float P 3.14 and we have to put F at the end because it’s a float now because we declared P as a constant here I cannot change it in my program so I cannot go here and say P equals 1 the compiler is not happy and that’s why we see that red underline here if you hover the mouse here it says read only local constant cannot be used as an assignment target it’s a little weird expression to understand but basically the intention of using constants is to have some kind of safety in your program so if there are values that should not be changed throughout your program you define them as constant and this way you want to accidentally modify their values well if you made it this far you seem to be very enthusiastic about learning C# and I highly recommend you to take my C sharp basics course using the link in the video description this way you can learn all the core concepts in a structured way and you don’t have to waste time jumping from one free tutorial to another you can see that currently this course has over 5,000 students with over 400 five-star reviews plus it comes with a 30-day money-back guarantee so if you’re not satisfied you can ask udemy for a full refund within 30 days and you get all your money back no questions asked again you can get this course using the link in the video description I hope to see you in the course in this video I’m going to talk about various kinds of type conversion in C# we have implicit type conversion explicit type conversion which is also called casting and we also have conversion between non compatible types here is an example of implicit type conversion a blight as you know takes only one byte of memory and an integer takes four bytes so we can easily copy a byte to an integer what happens at runtime is let’s take a look at this slide so here’s the binary representation of our B variable here so one is represented as seven bits of zero and one bit of one when we copy a byte to an integer what the runtime does is it prefixes that value with a bunch of zeros to fill the four bytes there is no data loss in situations like that when the compiler is 100% sure that the types are compatible and no data loss will happen values can be converted to a different type implicitly here is another example of implicit type conversion so we have an integer set it to one and we copy that to a float again in this example no data loss will happen but let’s take a look at this one here we have declared an integer and we’re trying to copy that to a byte and integer is four bytes so when we convert that to a byte three bytes out of four bytes will be gone and there is a chance for data loss now data loss doesn’t always happen it only happens if the value restored in the integer is beyond the capacity of a byte in this example one can be stored in a byte so no data loss will happen but if we had let’s say 300 here we cannot store 300 in a byte so as a result of that conversion data will be lost when the compiler knows that there is a chance for data loss it doesn’t allow implicit type conversion and you need to explicitly tell the compiler that you’re aware of the data loss and you still want to go ahead with the conversion in situations like that what we do is we prefix the variable with the target type so here I’m trying to convert I to a byte this is what we call as casting here is another example so we have a float set to 1.0 and if we try to convert that to an integer the compiler would complain I will show you that later in the coding demo so we need to tell the compiler that we are aware of the data loss and we still want to convert F which is a float to an integer so we cast it like here sometimes we are working with types that are not compatible but you still need to convert them for example we might have a number represented as a string as you see here and we need to convert it to an integer in situations like that because string and int are not compatible they cannot use explicit casting so we need a different mechanism for converting a string to a number in situations like that we need to use the convert class or use the parse method so convert class is part of .NET framework and is defined in the system namespace of methods for converting various types to other types and they all start with two in this case we’re trying to convert s which is a string to an int 32 in 32 as you know is a .

NET framework type which maps to a sushar p– integer type remember a blight is one byte short is two bytes and integer is 4 bytes and long is eight bytes you probably know that each byte has 8 bits so an integer which has four bytes times eight bits ends up being 32 bits that’s why it’s called two in 32 and in 16 which represents 16 bits equals to short which is 2 bytes we also have this parse method here all the primitive types that I explained in the last lecture like integer long float boolean they all have this parse method and the parsh method takes a string and tries to convert that to the target type in this case an integer here are some of the methods that you can find in the convert class to byte which converts the given value to a byte 2 in 16 to convert the given value to a short 2 in 32 to convert the given value to an integer and to n64 to convert the given value to a long okay in a theory let’s jump into code and see all this concept in action okay let’s say implicit type conversion in action first I declare a bite call it B and set it to 1 now I declare an integer and set it to be again to recap a byte is only one byte and an integer is 4 bytes so we can copy b2i without data loss and as you see there is no compile time error here let’s put on the console so console dot write line and we pass I here note that as I typed consult the right line my resharper plugin automatically added this using system statement on the top again if you don’t have resharper you need to go manually add this statement here we run the application by ctrl + f5 so we got on the console now let’s reverse this and see what happens so I’m going to get rid of this code here control X control X control X first I declare an integer set it to one then I declare a byte and try to copy I to B we immediately got this red underline here if you hover the mouse here the tooltip says cannot convert source type int to target type byte sometimes this error might be in a different file which is not open in Visual Studio here so you may see the error when compiling the application let’s simulate that so I compile this application by ctrl shift and B which stands for build so here’s the error cannot implicitly convert type int to byte an explicit conversion exists are you missing a caste so now you understand the concept of implicit versus explicit type conversion so what we need to do here is to do a cast so we casted integer to a byte now in this case no data loss will happen because the value is small enough to be stored in one bite let’s put B on the console console by right line B we run the application so everything is good but let’s see what happens if we said I – let’s say thousand we cannot store the number thousand in a byte the maximum we can store in a byte is 255 so if you run the application now we got to 32 because some of the bits were lost and this is the reason that C# compiler knows that there is a chance for data loss and it enforces you to explicitly specify the cast sometimes you know that despite the differences in data types there is no chance of data loss like in the last example where I was set to 1 in those cases we can safely apply a cast okay now let’s take a look at non compatible types so let’s clean up this code I start by declaring a string let’s call it number and set it to one two three four recapping from the last lecture note that here I could declare this with the VAR keyword and since our compiler automatically detects that this is a string so number will be defined as a string and we can see that by hovering the mouse here it says system that string now let’s say we want to convert that to a number if I declare an integer like I I cannot cast that number to an integer because they’re not compatible let’s take a look at the error cannot cast expression of type string to type int so if you see that error that’s the time when you need to use the convert class so we type in convert dot take a look at this method here – bite – char – in 16 in 32 and many other methods here so let’s convert that to an integer which is int 32 and pass number as an argument here now let’s print out the I on the console run application so I is 1 2 3 4 all good but let’s see what happens if instead I declare this as a byte and here we need to use convert dot 2 byte and here we display B on the console a byte does not have enough storage to store the value of 1234 so when we run the application now the application crashed the cancel is here and here is the exception exception is Dartmouth frameworks error reporting mechanism it’s an advanced topic and I have covered it in detail in my C# Advanced Course but in this video I will briefly show you how to handle exceptions so here it says unhandled exception the type of exception is system that overflow exception which means we try to store a value that was too large or too small for a byte so each exception or error as a type in this case overflow exception and has a message value was either too large or too small for an unsigned byte sometimes the exception messages are friendly enough that are easy to understand sometimes they’re a little bit tricky and the best way to work out what is going wrong is to jump on Google and search for the error and there’s pretty much always a Stack Overflow page that explains that now let’s describe that let’s see how to handle the exception here happened during conversion of that string to bite what we need to do here is to wrap these few statements with a try-catch block let’s see how it works so I just typed try and press the enter and visual studio automatically generated this block for me again this is what we call a code snippet let me undo this I’ll show you one more time so try see this try here in the intellisense and this icon represents a code snippet so if I press enter or tab you automatically get this code block so what I’m going to do now is to move this code enter a try block and the catch block gets an exception by default visual studio as this throw here don’t worry about it just delete it again I will explain it in detail in my sushar Advanced Course for now let’s see what’s going on here so the code that you put inside the try block will be somehow monitored and if an exception happens this block will be executed this prevents your application from crashing the reason our application crashed earlier was because we did not handle the exception so if you don’t handle exception the exception will be propagated to the .NET runtime and that the run times mechanism is to stop your application and display the error here we can handle the exception and that would prevent the exception from being propagated to .NET runtime so instead we can display a friendly message to the user saying for example console.writeline the number could not be converted to a byte now let’s run the application again see we got the firmly message and the application didn’t crash so what I want you to take away from this lecture is this we’re class works pretty well in most cases but in cases where the source type cannot be converted to the target type there is a chance for exception and you need to be aware of that and what you need to do is to wrap this block of code with try-catch let’s take a look at one more example before we finish this lecture let’s remove this and instead – drink call it STR and set it to true we can use the convert class to convert that value to a boolean so bull P equals convert that to boolean and we pass that STR here again in this example string and bull are not compatible and that’s why we cannot use explicit casting so here we are using the convert class we can display B on the console application so the true string was successfully converted to a boolean value that’s pretty much it for this lecture before I finish I just need to emphasize something here that throughout this course during early lectures you may see me using some short variable names like P or STR here that’s purely for demonstration and keeping things simple and in building real-world applications we should really avoid naming our variables ABC STR it’s not really a good practice the only exception is when we get to loops which you will see later in this course in for loops we use counter variables and we call them I or J it’s a common convention now here we are just starting to learn C# and it’s really impossible for me to demonstrate building a real world application because you’re just covering their basics or alphabets I hope you enjoyed this lecture and thank you for watching okay we got two operators in C# we have five types of operators arithmetic comparison assignment logical and bitwise let’s take a closer look at each of these operators we use arithmetic operators in computations where we are working with numbers so as you see in this slide we have add subtract multiply divide and remainder of division we also have two arithmetic operators called increment and decrement which are a shortcut for adding one or subtracting one from a variable so a plus plus is equivalent to a equals any plus one now with this increment and decrement operator there are two ways you can apply them you can use them as a postfix so in this example a is 1 and when we apply the postfix increment operator first the value of a is assigned to B so B is going to be 1 and then a is incremented by 1 so in this example after the second line is executed a is going to be 2 and B is going to be 1 now let’s take a look at a different way of applying increment operator as a prefix so in this example in the second line first a is incremented by 1 and then it’s assigned to B so after the second line both a and B are going to be 2 so be aware of this difference ok next comparison operators so we got equal which is indicated by double equal sign not equal greater than greater than or equal to less than and less than or equal to now what I want you to pay attention to in this list is that the testing for equality is accomplished by double equal sign and that’s different from a single equal which is the assignment operator next assignment operators so the most commonly used is the one with a seen the equal sign so here we set a 2/1 pretty basic now look at the next four types of assignment operators addition assignment subtraction assignment multiplication assignment and division assignment let’s see how they work for example addition assignment a plus equal 3 means add 3 to a so it’s equivalent to writing a equals a plus 3 and the same rule applies to other 4 assignment operators logical operators are used in boolean expressions which are often used in conditional statements will get two conditional statements later in this course so a real-world example is where you have a condition and you want to make sure that condition and another condition both are true or maybe one of them is true so that’s where you use a logical operator in C# the logical end is indicated by double ampersand and the logical or is implemented by double vertical line we also have the not operator which is indicated by an exclamation mark and finally in here we’ve got the bitwise operators bitwise operators are often used in low-level programming like when working with windows api or in sockets or encryption explanation of these is beyond the scope of this course but if you are interested let me know and I write a blog post for you now what I want you to take away here is that the bitwise End is indicated by a single ampersand whereas the logical end which we use in conditional statements is indicated by double ampersand same for bitwise or and logical or so remember the difference ok enough theory let’s flip over to visual studio and see all these concepts in action okay let’s start with the arithmetic operators first so I define two variables a equals 10 B equals 3 let’s add them together and display the results in the console that’s pretty easy right run the application so the result is 13 now let’s take a look at division so I replace the ad operator with division you the result is three the interesting thing here is because both a and B are integers the result of the division ends up being an integer if you like a floating-point number as the result of the division you need to cast both these numbers to a float so like this now if you’re on the application the result is a floating-point number now let’s look at a more tricky example let’s say C’s 3 B’s 2 and a is 1 I want to show you the concept of operator precedence so if I type a plus B times C what do you expect the result to be from a mathematical perspective B should be multiplied by C first which means two times three equals six and then it should be added to one so the result should be seven let’s run the application so C# behaves exactly as what we expected so multiply or division operators have higher precedence than add or subtract if you’d like to change the precedence you can do so by using parentheses so in this case if you would like to have a and B added together first and then multiply it by C this is how we would achieve that in this case the result will be 9 there you go okay now let’s take a look at comparison operators so let’s get rid of C here and instead see if a is greater than B very simple example right the result is false so what I want you to know here is the result of the comparison expression is always a boolean value which is true or false we can test for equality so double equal sign in this case a is not equal to B so the result should be false now let’s see the not equal operator so simply have an exclamation mark here followed by an equal sign in this case because a is not equal to B the result should be true okay now let me show you a more tricky example what do you expect here well first this is the not operator which is applied on boolean values or boolean expressions in this case this is a boolean expression and as you saw earlier it was true because a is not equal to B so we apply the not operator to that and the result ends up being false let’s run the application so we got files here but this code is not easy to understand or easy to read because here we have two negatives one negative and two negative and for us humans to negative is hard to comprehend two negatives always equal to one positive so in your program if you end up in situations where you have two negatives make sure to always inverse them with one positive so in that case I can get rid of the first negative and convert the second negative to a positive like that and we will get the same result which is false now let’s take a look at logical operators so I create another variable here VAR c equals 3 I’m going to change that to C greater than B and C greater than a what do you expect here as the result well C is greater than B so the result of that expression is true also C is greater than a so the result of that expression is true as well and here we have the end operator so true and true equals to true let’s run the application there you go now let’s make a tiny change here so this time because we know C is not equal to a this expression evaluates to false true and false results in false let’s run the application so we got false now let’s see the effect of the or operator so I’m going to replace the end with or which is double vertical line in this case that is true or false the result ends up being true and of course we can apply not operator here as you saw earlier which changes the true to false now this expression doesn’t really look easy to understand it’s just purely for demonstration of how we can combine different operators and make up more complicated expressions okay that’s it for this lecture I hope you enjoyed it and thank you for watching okay so we got to comment a comment is text that we put in our code to improve its readability and maintainability in C# we have two ways to write comments if your comment is only a single line you can prefix the comment with double slash but if your comment is longer and it’s multiple lines you need to start it with slash star and then finish it with star slash this type of comment is more like the comments we used to write in C and C++ code these days it’s more conventional to write either single line or multi-line comments prefixing with double slash so in this example we can rewrite this multi-line comment with double slash style like this now as a rule of thumb keep your comments to minimum use comments only win required and that’s when explaining wise house constraints and things like that do not explain what the code is doing your code should be so clean and straightforward that it doesn’t need comment if a comment explains just what the code is doing is redundant and the problem with redundant comments is we change the code but not everyone is very consistent in changing the comments so after a while these comments become outdated and because they don’t get compiled like the code there is no way to validate them and after a while they become useless so again keep them to minimum and explain wise house and constraints that you had at the time you wrote the code so the next person who is reading your code knows the reason why you wrote the code that way in this section you learn that C# is a statically typed language which means once you ticular a variable you need to specify its type and that type cannot change during the lifetime of that variable you also learn about the primitive types in C# such as integer character boolean and so on now in the next section I’m going to introduce you to non primitive types in C# such as classes or structures arrays strings and in ohms so I’ll see you the next section

Read More: Hector Alcazar | Uncharted 4 A Thief’s End Part 2 | PS5 Playthrough Gameplay Reactions 4K

Categories
Technology

Hector Alcazar | Uncharted 4 A Thief’s End Part 2 | PS5 Playthrough Gameplay Reactions 4K

Hey it’s, sarah, and welcome back to my channel. Okay, guys it’s, time to get started with part two of uncharted 4 and we had such a tremendous start.

We started off with a flashback of nate’s life as a kid how he was part of an orphanage, nothing i’ll save it for confession.

Later on, we found out that he actually had a brother.

I’m not staying out of trouble.

This is an exception nah.

I have a cool brother, nice jump.

Now we have to assume that our parents haven 39, t really been around and that sam has been the only one taking care of us which made it all the more sad when we saw nathan’s face, seeing that sam had to leave him once a Little bit like a year, then we fast forwarded to a time when nate, sam and rafe was in the panama prison on the quest to find the next clue for their treasure fund.

There is a cathedral of saint dismiss in scotland, wait.

The last sighting of avery was in scotland that can’t be a coincidence.

You know i had my doubts about you too. Let’s find vargas, get the hell out of the, but when they were trying to escape sam actually got shot and well that’s where we are now now the writing and the voice acting and uncharted 4 is superb.

No, he’s not dead.

Wasn’t what did it wasn’t he just in the boat with us a while ago, oh god.

No, i do want to mention that i’ve been wanting to post longer videos, however, because of the copyright issues that i’m.

Having with this series, i have to keep them shorter, like to an hour long, because i wouldn’t know how many times i need to re edit and re upload them now.

The copyright is so stingy with this game that it’s actually pretty hilarious.

I want to show you guys what i mean, because i feel like you guys, are gon na get a kick out of it.

Okay, so here you see a list of all the uploaded versions that had copyright issues.

Now i’m gon na click on this particular one.

To give you guys an example, which is the next episode all right, so here you can see that they claim copyright for background music of just 10 seconds now i’m just going to play it here, so you guys can see how picky they’re. Being okay, it’s not even a main thing or a main event: um it’s just a few moments of background, and just for that small clip.

The copyright holder can claim the entire video honestly being demonetized.

Doesn’t bother me as much, but i just find it a little off that these guys get to control all the ads and all the revenue of the entire video for just 10 seconds of background music, but other than that.

It’s not really affecting my enjoyment of the playthrough and i’m having a blast with this amazing game.

So i’m excited.

I hope you’re excited.

Let’s get started with uncharted 4 part tall whoo right made it to the bottom.

Okay, according to your signal, you’re at the coordinates.

No, not yet.

Anyway, you got any pinks from up there pray not all right. I’ll just keep heading downstream copy that keep me posted.

You got it.

I might watch it down to a quarter tank.

You want to come up yeah, i’ll, be fine.

Can’t be far if you don’t find it soon? I’m calling it i’ll, find it all right.

Oh oh treasure, i feel like a little mermaid.

We’re a man brah.

I can’t believe sam’s really dead.

We’re doing the 15 years later thing fit.

I mean fast forward thing yeah. I got something here: no rust right, color, maybe hit the rocks tore off before tumbling.

Hey you,’re mumbling.

Sorry, it looks like a piece of our wreck must be close by you.’re teasing me now.

Drake you’re teasing me dude.

I love this game there you are.

I found it all right, how’s it look that’s beat up but intact.

Okay, where am i supposed to go okay here? What do we got here? All right? I can see the cargo it’s like most of the crates are here.

Can you get an accurate cow? I’m gon na have to go inside for that standby all right here we go there morning, fellas all right.

I’m in yeah looks like a lot of it.’s still strapped down see.

We got one two, three okay, but my count. We’re shy.

Two crates, i’m gon na go round them up hold on how about you come up.

First, get a fresh tank; ah the crate’s got ta be nearby.

I got this yeah.

No, let’s get a tank.

Oh there, it is.

I found one ah crap, the crate’s pinned beneath the trailer.

Tell you what secure the other crate.

First then, we’ll lift the trailer up for you yeah.

You see that’s. Why you get paid the big bucks? Oh there, it is found the other crate one down one to go, secure it in the trailer we’re.

Nearly at your position.

All right see you soon dude.

This is so much fun.

I’m having fun all right that’s, one crate, secure, good timing.

We’re right above you slings on its way down coming down.

Oh okay, let’s get it! Okay, it’s in position hook up the trailer we’ll raise it up a bit for you.

Okay got the cable.

I’m gon na try looping it around one of the axles, all right that’s, one all right! You watch your oxygen.

Now that’s, fine, the gameplay, is so good and that’s, two okay, trailer secure, ready to go all right, get clear. We’ll, lift it up ready when you are and up we go.

Okay.

Is that enough, yeah plenty, just don’t drop it on me.

No promises! Okay, we got the other crate.

I’m gon na strap it in with the others.

For some reason.

I’m scared a zombie’s gon na pop out of nowhere.

There you go: oh boy, all cargo present and accounted for and with five minutes of oxygen to spare jesus hey.

Maybe you should hang out then see if you can find some other treasures down there nah i’m good wan na ride up.

Okay, i’m in position. Get me out of here will ya you got it going up all right.

We’re gon na come to you hang on, hang on it’s, so weird playing a naughty dog game and playing a character that lives in a world that works good to have you back, drake yeah, it’s good to be back toss down.

Your gear here you go thanks.

Nice whoa, this tank’s kind of light.

I’m just making your job easier right, my man, how’d we do.

How do you think full recovery every last bit making the rest of us look bad, making the rest of you look good nice dude, even the nbc’s are so good.

You,’ve earned a break.

No, no thanks.

Take a dive over being at the office any day, yeah either way it’s gon na be a while.

What are you talking about about thursday’s? Job? Oh, come on no got under bid. You got to be kidding me: hey competition,’s! Tough! Let’s see here now care to do the honors, okay, yeah sure thanks wow, look at that.

What is it? We struck? Copper! Oh! Well, you’d be surprised how much this stuff is worth clients paying good money for the full cover.

Sure you don’t want to just melt it down, make some pennies come on.

Let’s go celebrate first round’s on me bar hopping with you guys: no, no! No! Not unless there’s hazard pay yeah it’s.

All the same.

To you, i think i’m just gon na.

Do the paperwork and uh get home and crash a raincheck, though all right suit yourself, hey good work today, thanks nice.

Is he a dad? Now? Is this after uncharted? 1.

2.

3. 15 years after hey nate, hey hold on hey.

What are you doing here? Uh? I got a present for you, president.

What’s this got some news for my contact about that wreck off the coast of malaysia: oh no uh, the ship’s intact, yeah, cargo;’s right for the pagan! You are a persistent one.

I’ll give you that and all the money came through for the equipment too.

We are all set except uh, my best guy, the guy.

I trust for the job, the only one he he’s got cold feet.

My feet were never warm to begin with and tell me this contact.

Yours did you get the permits? No, he did not get.

The permits.

Can’t, no one get the damn permits, but nate don’t. You see that works in our favor.

No permits means no competition, the ship is ours.

No permits means no go.

Hmm that’s.

True, that’s, true no pyramids would mean no go permit money for the both of us.

Okay, i don’t know about you, but i don’t want to be working salvage.

When i’m 60, Do you sure beats prison? Listen.

I have to pass and trust me.

So should you okay, just take it with you.

Humor me. I’m not gon na change my mind.

Well then, don’t hurt to sleep on it.

Does it say hi to carla and the kids for me all right, no pressure, nate but think about it.

I want to see if nate has babies with elena.

You really did your homework on this one.

Oh okay, narrow down the search area.

It would make a hell of a fine.

I can’t read your penmanships are too pretty.

I can’t read it son of a no no, no way you are going with the others, okay.

Well, what’s gon na make me wan na go climbed your big brother, some years back. I think this was an uncharted show.

I remember that one of the stranger things i’ve collected along the years.

We have all of the treasures we got from the old games.

This is so cool spanish doubloon found in a german, u boat in the middle of a jungle who would have thunk? Oh, i remember i remember i remember that, but this is probably the treasure i didn’t get to get you remember, sir.

Francis drake takes a bullet for sully.

Look at us charted one noise, okay, wherever this is on my old camera, it’s hot.

You’d, like it.

How have it found this on my old guitar? You’re like that, like she, your wife bro.

Well, i we already know that you married her, but oh wait.

Let’s go don’t tell me. I’m single shambala, oh chloe.

Where did we find the time to take a photo or maybe at the end of the game when everything was fixed francis and his elaborate puzzles? I remember this one all too clearly g lawrence.

What’s this now this was a crazy ride.

Um this was probably the first.

How are things living up to my head? Another lifetime chloe? Oh, it’s chloe nothing, but enough to keep the heat on the wine stock caught one end of something that sounded right up here.

Should you ever give me a yell? I’m always on time for a quick, getaway, love chloe.

I wonder if she’s, i think she is gon na make an appearance.

I think she was on the cover of this game, even not really my style anymore.

Hmm they come take cover surrounded.

What no way are we practicing bullseye don’t like your nate. This is so cute.

Oh, he misses the action adventure all right, take that and that eat plastic eat plastic! Look for ammo, because, okay, this is pretty cute.

This is pretty cute back in business.

This is such a clever way of getting us back into shape for the gameplay.

I love it.

Yeah bring it like.

Oh nice yeah, i’ll be right there.

So long.

We’re still married to the lane yeah my time’s over oops.

I didn’t mean to do that. I thought i was out of ammo.

I didn’t want to go down just yet man.

I wanted to keep playing wow.

Can you imagine if nate was your dad and that’s so cool? If it was your dad and uh wait, you know what the cover and dive is so much smoother like.

I could do this all day anyway, as i was saying, wouldn’t it be much funny much funny it wouldn’t be funny.

If nathan was your dad and he went up and he saw him rolling around the attic that’d be cute, i’d love it.

If i saw my dad like that anyway, let’s go on left playing for now.

Ooh, our home is pretty good.

They have a pretty good home.

It’s messy, very messy. Oh, was this our second wedding? Oh, we look so cute together.

Now that is a good one.

Wow all the little details are so great.

It makes it feel like a real home.

I mean it’s so messy, but it i mean that this is what a house looks like.

Sometimes i love it so realistic.

There’s even a loofah that’s so cool wow.

It’s.

The office the home office – oh, is this what you’re working on a travel guide? Oh wow! We really need to go on another vacation wow that’s.

So nice look at the details. Oh it’s been too long.

Okay, wow! There’s.

Only three photos: okay, it’s, so different.

It’s like night and day with exploring houses, and the last of us, like this house, is full of stuff from the real world.

I love it.

You were up there a long time.

Well, i was researching something: oh.

Is that what we’re calling it these days, i was hey.

Would you mind grabbing the food? I’m just wrapping up here.

Oh yeah, sure thing. Thanks nice, where’s the food? Oh there you go.

I love our home, it’s, so cozy finish it yeah.

You know it’s, probably too long and full of typos, but that’s what editors are for right god, i’m starving.

It looks good mm, hmm joe.

How was your day there? What huh got none of that? Oh, i’m.

Sorry, i’m.

Sorry how was your day? Oh, it was fine mm.

Hmm typical day in paradise, uh huh, i um.

I got to pull a bunch of garbage out of a river um.

Yes, at least you got to go for a swim. Did you find any exciting garbage? Oh some, brilliant stuff.

It was a um early 21st century truck.

We got, apparently the natives called it a semi.

Our dear lawyer, so boring stuff.

Tell me about the article.

Well, it started out as this fluff piece about tourism in bangkok, but i don’t think the magazine is gon na, like the angle that i’m taking, because everyone immediately commented about how rude the smog was, that it was like shocked to the lungs.

Like the second that you got off the planet, he’s, not listening.

Oh wow, look at their faces the details, they love it.

Ah, what? Where are you? Where are you here being stabbed with a fork? Oh really, what just keep going that’s? So crazy, it was interesting.

Um, oh interesting! What’s my article about what this one? Oh um! Oh all! Right! Let’s just go for the last city of bangkok. What about you know the uh lost city of bangkok, not not of bangkok, lost city near bangkok, in or about the city limits of bangkok, wow, all right, i’m, sorry, no! It was valiant.

I was in the ballpark right in a different state, but yeah you were in a ballpark.

Jameson asked you about that malaysia job again, jameson always asked me about the malaysia job look nate.

I really think that you should take it.

You know what i don’t want.

It really i mean he doesn’t have the permits and we, you do have one day they kind of work anymore.

It’s just not worth it it it.

Doesn’t sound that risky all right.

If it’s just a permit, no way, you could call sullivan you haven,’t seen him in two years.

Could we please drop this okay? I just don’t want you to not take it because of me. I’m not taking it because of me.

Okay, i appreciate the gesture it’s.

Just wait.

Are we in bad times it’s, like i,’m gon na go ahead and do the dishes just stop.

I’ll do them? No, you did them last night.

No, you cooked, i cleaned it.’s, fine! I mean at least at least uh.

Let me let me try to earn it or something.

Let me um play you for it.

You’ll play me for it.

Yeah yeah yeah your little tv game thing. I bet i can beat your high score.

You think that you can beat my high score on my tv game thing yeah.

I think you’re scared.

Now you don’t even know what it’s called.

I don’t need to know what it’s called.

I’ve seen you play it’s jumping and running, and i have a natural talent for that.

So what do you say chicken? Is it a bet? Oh wow, wow? Oh, is that a playstation one? Oh, i’m learning.

Alright, oh that sound that sound is so good.

It has to load load.

Yes, this is taking a really long time. You have no patience.

You have no money turn something on.

You expect it to okay.

Let’s crash crash manico.

This was naughty dog’s, first game; no, that did.

That was always first game.

How do you uh they make it go? Oh wow that’s so smart of them.

Okay, i love how nathan is not a gamer.

It’s so hard.

Oh wait! Oh my god! I’m actually playing it. Oh, my goodness, i’m actually playing it.

This is very nostalgic.

This is very nostalgic for me.

Right now, okay run away from the boulder.

Why is the boulder chasing me? Just run away from it, i did nothing to this boulder.

I didn’t use your spin attack whoa.

I used to play this all the time i didn’t think this was the one guys abandoned makes sense.

It’s like a fox and jeans.

Okay smash the boxes, what is a fox smashing crates and that’s just what he does and it’s not very realistic.

These graphics are pretty good perfect by the way foxes can’t do this. It’s a bandicoot that doesn’t look anything like a bandicoot.

Have you ever seen a bandicoot? No, but i’m sure they don’t wear sneakers.

Okay, grab the fruits, wait a barnacle! It’s a real animation, nice, okay, good! No! I didn’t beat.

Oh may it be her.

What is that it? You asked for it.

Oh wow, he’s so good totally had it.

You can give it another shot, come on double or nothing.

My car could really use a good cleaning really going to start the smack talk there’s, this mode called easy mode.

I just switch it wow it’s way easier on you.

Just keep talking keep talking. What are you going to do? I’m warning: what are you going to do in real life? What can you do show me? What can you enjoy? What do you think about that? Oh it’s so sweet.

I want to punch them.

Are you happy yeah? Of course you um um really come here.

You know, i think he’s totally turning down the job for her.

You know he just loves her so much so she doesn’t want him.

She doesn’t want her to worry, but he is totally turning that job for her.

But oh, he loves her, not open yet dude.

I love how it’s.

Like i’m, watching a movie, we’re closed, come on man all right.

I’m coming coming yeah. Can i help you yeah? I’m uh, looking for my little brother, it’s about your heights, a little bit leaner, definitely less gray in the temples sam.

It’s good, to see you again nathan, all right all right.

Take it easy.

How i thought you i saw you get shot.

Yes, you did right there, jesus the doctors, they doctors, they patched me up and they tossed me right back into the cell yeah, but i i made calls i checked everywhere.

Everything i heard everything i found it all confirmed.

You were dead, okay, so they wanted to see me rotten, that sell for the rest of my life and i nearly did he’s a semi man.

If i had known i i swear to you, i would have come back.

I know nathan.

No it’s. Important.

Now, though, is that i’m out: hey hey you still with me wow.

I love the needs of there.

Dude wait.

Is this a ghost? Am i hallucinating you’re not gon na pass out on me or nothing are you? I just might it’s a lot to digest.

You know it is a lot today, kids, what did you get out yeah? How did you get out there? There did you even get here find me all right, slow down, hey have a seat.

Are you gon na have a flashback? Are you gon na me yeah? What’s the tell well call some of your contacts tell me some pretty crazy ass story.

Crazy stories got shot hanging from a derailed train in the himalayas.

Oh yeah, that actually happened come on man.

What did i miss sam? Where do i start start with the best part or shambhala? Okay? Um, a few years back, i got roped into uh uh breaking into this turkish museum to steal his oil lamp, okay, oil. It was an artifact from marco polo’s lost treasure, fleet, kubla khan 39, s treasure yeah, yeah and, as it turns out, it was a whole hell of a lot more on those ships than just treasure.

I mean what can i say: another lost city destroyed and uh.

We made it out alive.

Would it matter what i picked, though unbelievable yeah yeah it was.

We should have been there.

No, it’s literally unbelievable.

You you tell me you stumble upon yet another archaeological gold, mine and somehow you managed to walk away with nothing.

Well, it’s a story of my life.

I guess, but you know i managed to grab a few trinkets here and there paid off the car.

The house engagement ring the engagement ring i’m married. I can’t belie elena from the stories that’s, my wife you got ta come meet her tonight dinner.

At my place you’re coming to dinner.

I can tell her all about you.

I got to tell her all about you nathan, i’m in a lot of trouble here.

What happened? What are you talking about? What kind of trouble? What’s the name hector alcazar ring about with you yeah? He’s, the the drug, lord butcher of panama, right, why it’s a funny story, but uh last year he was my cell mate.

So this is how i got out of prison.

No, what happened? Well, you’re not reading the night samuel come here, lisa the guards they’re singing.

Well, they’re, probably drunk perhaps, but they are content.

How can they be contained with their small lives, their miserable jobs? I mean they have wives to go home to what do we got no offense, we have ambition, bro and when we get out of here that ambition will take us to places.

These idiots cannot. Even imagine yeah well amen to your optimism.

What will you do when you get out samuel that’s? If i get out of here, i’m sure you can imagine i can, but i want to hear you say it.

I will find the greatest pirate treasure of all time, which i’m sure you are sick of hearing about by now.

Oh no, the tale of henry avery and his 400 million in jules and gold has become a sweet lullaby for me.

Do you really think you can find it given the opportunity, absolutely ambition? What is that avery quote? I am a man of fortune and i must seek my fortune.

I like how he thinks the hell was that the opportunity of a lifetime samuel.

Are you ready to seek your fortune? How long have you had this plant since the moment i set food in this place? Samuel keep up.

We’re going to have to move quickly holy that’s a lot of dead bodies.

These men are sadistic.

We’re doing the world a favor huh here you’ll need this. Oh, my goodness, you remember how to use it.

Yeah it’ll, come back to me hector.

You do that and you’ll start a goddamn riot exactly energy.

This is crazy.

My bad, you see the blood’s working yeah.

I see that looks so good is everyone another position.

I think that’s what he’s, trying to say what? Why just do it? It’s gon na explode.

Oh my goodness, yeah yeah, i’m fine.

You see i kind of guessed that right, but i still got shocked that’s.

How you know this is a good caveat. Oh my goodness, dude! I love.

I love it.

Oh samuel take cover: where are we going? Oh there, okay in a minute, we will either be free all day.

Are you ready? Oh samuel, stay back.

Okay, i’m just gon na get some ammo, while y’all get ready, hmm yeah! I think i like this one, what the hell do we do.

Oh, i’m pinned down.

Oh nice, oh foreign scratch! Your back! You scratch mine! Oh well, here tell me! Oh no! I know i’m good.

I’m better than good.

Actually, you’re dehydrated.

So what’s next for samuel, drake jesus? What is next uh? I take a bath. I’m gon na sleep in a real bed, maybe find a nice warm body to sleep next to me, uh track.

My brother down seems like a pretty good start: yeah.

It is so um.

How long do you think it will take for you to retrieve every stranger i don’t know i mean i get back to the states.

I can resume my search hello.

It’s kind of hard to say until i get started.

You said you know what i think yeah uh.

I do.

Okay, but listen it’s not like avery, left some map with a big red x on it.

Okay, but i’ve, i’ve, i’ve got some berries. Oh okay, just just wait a minute.

Take take hey yo, oh my goodness.

I knew it.

I like you samuel! More importantly, i believed you.

That is why you were here.

I can get it okay, i just need some time damian, you see.

The problem is i’m.

Having all of these doubts into my mind, hector listen to me.

I will find it.

I swear how long six months people are lazy. They always ask for more time than they actually need three months, three months, three months, half the treasure, can you do it? It three months have the treasure now, if you run but try to hide the treasure or do something really stupid like go to the authorities.

Oh no and when you least expect it i will be there at that point.

Death is not a mercy.

I will grant you dude.

You should have just left me in the prison.

This is some ball here.

Come on.

No, the nearest town is 10 kilometers.

In that direction towards the sunrise it’s been a while, since we’ve seen these sunrise outside huh almost when i find it, then what don’t worry when the time comes, i’ll be there to collect.

When i swear to samuel alcazar lets me go, and here we are. This is bad.

Let me just pick up the trail where we left off and wait trail sam.

There’s no trail after rafe, and i escaped he took his parents fortune and bought up all the land around st dismas cathedral.

We comb that place for weeks.

Avery’s treasure isn’t there not that that stopped rafe warren’s been digging for years still, hasn’t turned up squad, not really surprised.

What does that mean? He doesn’t know where to look.

Well.

I just you know, happened to do a little digging of my own and uh.

I bet your rafe doesn’t have this: it’s, really amazing what you can find on the internet these days, just the saint dismiss cross.

Oh, is it because the one we found was broken and hollow? Remember holy crap, it’s still intact, avery made more than one cross. So what i was missing from the one in panama is probably still inside this one all right, but where is this? Oh, this exquisite piece is going up for auction in three days at the rossi estate, the rossi estate.

Oh, you know it uh yeah, and how do you plan on securing an invite to an exclusive, heavily guarded black market auction? Don’t necessarily need an invitation per se huh yeah, and where are you gon na get the money to output all the high rollers? I could take a second mortgage out on my house and it still wouldn’t be enough to yeah.

You’re gon na, try and steal it huh.

We are oh, no.

Oh man, listen! I’m.

I can’t.

I’m.

I’m out what no besides there are plenty other guys that are much more equipped to handle this kind of thing like who um, i don’t know like uh anybody, charlie cutter.

No, no, he’s my go to guy.

For this. Absolutely not! I don’t trust, charlie or anybody else that you’ve got on that phone with my life.

Okay, i need you on this one.

It’s like he,’s, really my brother and i don’t know how to say no, not with the time i got left, certainly not with alcazar, hey hun it’s me how uh listen.

You’re, not gon na believe this jamison just walked in here with the permits yeah.

I can’t even tell her about my brother.

It’s, like i,’m gon na, take that malaysia job after all, see anything yet just a bunch of high class low life criminals, all cleaned up for prom and no sign from sullivan.

Yet well, there’s still plenty of time like the storage room’s in the building behind the manor.

You see it from up there, just the very top of it.

Oh, i wonder what they got tucked away in there.

Let’s just focus on avery’s cross. Okay! No, you sure you don’t want to pick up something for the wife that’s cute just keep it simple right, simple and it’ll be a whole lot simpler.

If it was just the two of us sam, we could be inside already not cleanly.

Have you even thought about a backup plan in case uh sullivan gets cold feet? No, because he won’t or if he got caught sam.

He knows the people running the auction.

He’s gon na schmooze.

His way right through that party get upstairs unlock the window and we’re in it.’s a solid plan, uh huh, all right, fine, good, say it.

What if he stole the cross for himself, not in a million years, that’s so cute that we’re talking about reports? He’s double crossed people in the past, but not us, no, not you! I know you two have never seen eye to eye huge understanding, but i trust him all right.

He’s, family! No! No! No! No! I just need you to trust him too.

Fine bye, he’ll come through for us.

He will. I trust actually come on.

You have to at least just for one second, consider the possibility see trust just try to keep the ducks clean yeah.

I love i i miss my sister.

Oh, my oh, my honestly, i feel like this game is just gon na keep getting better and better um.

I’m happy.

I forgot about the start of the game and that i didn’t.

I forgot that it was sam that made all the more that made me all the more happy or surprised, pleasantly surprised that sam was still alive um.

I am, however, i’m, not a.

I don’t blame him for the decision that he made to, of course escape, but i already kind of knew deep down that it wasn’t gon na go well, obviously because he was telling the story of how he was in trouble.

But my heart, my heart, i i don’t know like i can already feel how this game is gon na break my heart and how i’m gon na be sad, but i still don’t know ball is up in the air. I don’t know if sam would really be a bad guy if he’s, gon na get betrayed and everything, but i’m just really hoping that i’m gon na have a happy ending like with the previous games because they’ve.

All been happy ending, so i hope i’m gon na get one um with nathan lying to elena, though about the permit.

I kind of wonder why he did that.

I’m worried um, but it might make it seem, like you know, that might make for a good story, though so i’m excited to see how that’s gon na pan out.

I’m also excited to see sullivan again because it’s been two years since they last talked, and i wonder why that is, but my favorite part has got to be the playstation one when they showed that and then they showed crash bandicoot, like i Didn’t know that crash bandicoot was naughty dog or it seems like it’s the first game ever that they even even that they even made.

So that was a pleasant surprise, because i used to play crash bandicoot, but yeah.

This is just overall.

I can understand why this is everyone:’s, favorite, uncharted it’s, so fun it’s like very nostalgic, but especially the little treasures that we had in the attic.

Just so many nice things to say, and i’m excited to see the rest of the game – i’m happy.

I’m very, very happy anyway, as always, if you guys like this video, do give me a thumbs up and leave a comment down below, and i’ll see you guys next time bye, you .

Categories
Technology

IoT Full Course – Learn IoT In 4 Hours | Internet Of Things | IoT Tutorial For Beginners | Edureka

The Internet of Things
is the giant network of interconnected devices from these devices are capable
of making decisions without any human intervention. Edureka welcome you to the full course session
on the internet of things and what follows is a series of fundamental concepts
on the internet of things which will help you
get started with IoT. But before we begin let's look at our agenda for today.
so we can start out with introducing you
to the concept of iot. We are going to discuss. Why do you need I will take what is iot of you benefits
of iot for biofuel features and finally the very important five layer
architecture of authority.

Then you're going to discuss
Raspberry Pi in this section. We are going to talk
about why you need Raspberry Pi what does Raspberry Pi
of you Hardware specifications and the installation
of Rosman fire also, This module. We have a few demos
including the Raspberry Pi a few cents hats and
Raspberry Pi camera module. Next. We are going to discuss
the top seven projects in iot in this section.

We're going to talk
about the best projects that we found in Rog next. We will talk about iot devices are going to talk
about various devices which came into Inception after the concept
of iot was introduced then we want to talk
about iot applications in this Section we
are going to discuss practical applications of iot in various domains such as Healthcare
security traffic governance. So on and so forth and finally
we are going to discuss all things career in Ironton. They're going to talk
about the job market the opportunity the salary
in different geographies and experience so on
and so forth, but that we come to the end of our agenda also going to take
up this time to subscribe to us and don't forget to hit that
Bell icon to double missile. Update from The Edge
Arabia YouTube channel.

So without Much Ado, let's get started
what is internet of things now to help you understand
what is internet of things? Let's look at an example
of a mobile phones Forest. Okay. Our mobile phones
has GPS tracking. It also has mobile gyroscope
you have adaptive brightness, which gets adjusted based on the light falling on it
you have voice recognition. And you also have face detection which identifies who is
the user now again iPhone x is coming with face detection. So again, these are
a lot of features that are coming pre-built on the mobile asset and most of these have a common
interaction between them because let's say
one application can use all of these features. I can also have these features in itself being interacting
with each other. Let's say based
on a GPS location. My brightness could be adjusted
or based on the direction. My phone is being held
the brightness in itself can also The adjusted as well. So there are a lot of features but when they interact
with each other these features come together to bring
in a better system that anything that they can
provide individually as such that's what internet of things is it
basically is a platform where we can connect
every day things which are embedded
with either Electronics software or sensors to the internet and this in turn enables us
to collect as well as exchange between these things.

Now when I say things it
can be anything and Nothing, let's say I have
an internet platform where and I can connect these things if I take the example
of my house, I can connect my lock. I can connect my AC. I can connect my light and all this can be managed
on the same platform since I have a platform so I can also connect
my car to this. I can keep a track
of my fuel meter. I can keep a track
of my speed limit. I can also keep track
of the location of the car as well. Now if there is
a collective platform where all of these are connected
wouldn't it be great because I would love to Of the AC on and set
a cool temperature at my home by the time
I reach back from office if I have a platform that knows my preference and
that keeps track of where I am and where I'm going
to then it can also identify that I'm going from work back to Hope
and my preference suggest that it would be best if there was an easy
temperature of about 22 or 23 degree centigrade
and this is something that is definitely possible
through internet of things.

Now, this is just one
of the examples now, let's say tomorrow
you come back. Home, it would be great. If I wouldn't even need
a key to unlock my door my home system should be aware that I have come home
and should unlock all the doors that are needed. And now this can be done if my mobile and my home
devices are connected onto the same platform based
on the location of my mobile. It can identify that I am at my hope
so it will automatically unlock the door and let
me come in as well.

These are some
of the real world implications of Internet of Things. These are something
that are already happening but going forward what Need to understand is that when I have
a specific component with me, which can do a lot individually
wouldn't it be great if I can collaborate
this complaint with my system of different components
and build up at a system. This is what internet
of things is helping us to okay, you provide a platform to which
all these things are connected through the internet. So internet becomes the medium
through which you're connecting all these components were
things to a platform. Moving forward let's
try to understand. Why do we need internet of things now to help
you understand why let's look at an example. This is a patient at home.

Okay, he's on constant
life-support wearing. His status is being checked to a health monitoring system
present on the cloud. Let's say at a point
there is certain issue with respect to his health. Let's say there's some
irregularity with his heartbeat or his blood pressure is low. There's some fluid being
developed or so far now what? Offenses since the system
on the cloud is connected to a hospital as well. This information would
get passed on to the hospital as well. They're in what would happen is that they would get
the complete details with respect to the patient and the important
information with respect to the current situation
of the patient as well. We made it aware with respect
to what issue exactly is the patient facing
as well as enable them to dispatch an ambulance immediately to bring the patient
back to the hospital as well.

Now meanwhile, once the patient
has been picked up and brought back to the hospital
there could be prescriptions. There could be medicine. They could also be
an operating theater made ready in case of an emergency
situation as well. There'd be doctors on standby who have the complete
history of the patient who have the complete details of the present condition
of the patient as well. So this in turn brings
in a lot of transparency and reduces a lot of effort and time involved with respect
to this same thing. Let's take in today's scenario. There has to be someone
wandering this patient's health. If there's a fluctuation they
need to call the hospital they need to call request
for an ambulance.

And meanwhile,
once the ambulance is here. They take the patient
and their back into the hospital then again there needs
to be a lot of checkups that need to be done because the doctors are
not fully aware again. There is a lot of tests
that need to be run and this in turn leads
a lot of delay as well in certain emergency cases as such if a system can do
this then this is exactly where our future lies in and what we have to definitely
move forward to to now Internet of Things basically
is expanding the interdependence of humans to interact contribute and collaborate with
things around us. Now. What do I mean by
interdependence of human see how we depend on each other like how I'm explaining
this concept to do if you're not clear you
would reach back to me. You would request me for help. Okay, this becomes
an interdependence between us when I'm giving you knowledge when you're not here
you're coming back to me and you're helping
similarly tomorrow if there's something
that you can do for me, I would reach out to you.

We all are interdependent
on each other for something or the other if we can expand this interdependence
to interact collaborate and contribute with respect to
the different things around us. Then we would be building
a proper Internet of Things environment. This would be a much more
safer secure effortless and time-saving environment
into existence moving forward. Let's Talk about the various
benefits of Internet of things. Now. The first thing that would be as a benefit of having an Internet
of Things platform would that you could efficiently
utilize the resources that are available if I have a smart system
which can interact with everything if it has
enough computational power if it has enough understanding of how things work
between each other.

I'm quite sure the usage of the resources available
will be more efficient as well. This resource could be
in terms of monetary. It could be in terms
of natural resource it. Also be an input taken up by the thing as
an input and so far. Okay. So all this can
be more efficient if I have a platform which is more smarter
and interconnected as well apart from this it minimizes
the human effort involved if my system is smart enough
to interact it to filter smart enough to do things that I do need to get involved with then my interaction
is always going to be minimum.

This is same with everyone and
that's one of the major reasons why Internet of Things
has become popular today. The and the concept of smart home is always growing
as well in the same perspective because if the system in itself
is able to do most of my work at hope then I don't need
to put in much effort. I can relax at home without
having to worry about anything. Okay, the next benefit
would be it saves time. If it rains my human effort
definitely it is going to save my time. Okay apart from that if the resources are utilized
more efficiently then again, it is going to save
a lot more time as well. All-in-all any benefit
of Internet of things will in turn help you save
a lot of time as well. Okay. So time is one
of the major factor that can be saved on an Internet
of Things platform. Now if I have an artificial
intelligence platform through which all
of this is managed and maintained then
the personalization and the human touch also
comes into the picture.

Now today most of us have had a level of interaction
with an artificial intelligence or a virtual
intelligence as well. This could be
a personal assistant like see Hurry, or it could be
an assistance application like Google assist now if I have system where all these components and things are interconnected then in turn all
the security present on each of these things
is going to get multiplied and it's going to build a much
more secure system apart from that the level of security that we would be integrating to the platform in itself
is going to be quite huge.

So the overall security
booth respect to everything is going to increase
multiple times as well. Now let's look at some
of the major features of Internet of things. Now any technology that is available
today has not reached its hundred percent capabilities
and it always has that Gap to grow Internet
of Things is one of the major Technologies
in the world today that can help any other
technology reach its true and complete potential as well. Now there are mainly three
aspects to Internet of Things.

Things as to how it works first
is the connect aspect here. Basically, what you need
to work on is you need to ensure that there is a connectivity
between all the things around you all the necessary
things to The Internet of Things platform. Okay, then comes analyze now,
I have my things around me. They each are going
to generate some amount of data now this data
needs to be collected and it needs to be
analyzed to build a business intelligence solution if I have a good insight, The data that is gathered
from all of this then definitely I can call
my system as a smart system. Finally what happens is
in order to improvise and improve your system. You need to integrate it with various models to improve
the users experience as well.

Let's say there's
a personalization module that is there or let's say
there's going to be an aspect when I can directly
connect to my providers. Now. This provider could be Amazon. It could be Flipkart. It could also be my retail store
that is next to me. Let's say I'm out of milk to retail store
will get a notification and he would send
milk right away and the same thing can be done. Let's say I have my coffee
machine requires special beans and this be isn't is
almost complete then what my system could do
is it could go online to Amazon and purchase
these beans for me as well. So there are a lot
of things that I can do when I integrate this
with respect to various models and improve the overall
experience to a single user or a group of users
on the world itself such. Okay. Now, let's talk
about each one of One by one let's start with connect.

Now. The first stage of connect
is device virtualization because what you
need to First do is that you need to standardize
the integration of the device to the Enterprise platform, which is present on the flower. Okay. Now, it could be present
on a cloud it could be present on a so, but again, it's all going to be connected
through the internet. So what I need to do is
that I need to ensure that certain level of standard
is present on the device so that it can go on and connect to my Internet
of Things platform. Now to help you
understand this better, there could be a standard
power plug and there could be a power block which has
an inbuilt Wi-Fi support so that it can
connect to my lap. No to build a smart home system. I need the second power point because there only I would have
the access to control it over the internet and my system could integrate
with respect to the same. Okay. Now if I take the first
standard PowerPoint then what would happen is that I need to manually
switch it on and switch it on how in the second case
I could send a signal to it and In don't we'll switch it on
and switch it off.

So there's supposed to be
a level of standardization through which I can integrate
all of these devices to my platform. Next comes high-speed messaging. So now what I have done is that I have connected all
these devices to my platform but these devices in turn
generate a lot of data and this data is what is going to help
us understand better on how we can improve
the overall system and help and provide the user
with better experience. So for that we need
to To have high-speed messaging. Okay. This basically means that there needs to be
a reliable secure and a bidirectional
communication Channel between the devices and the platform not the purpose
of it being bidirectional is because you need to control
each one of them as well.

Let's say I want to switch
on the AC then the signal would be going on
from the cloud platform to the device. So this is how it works on. Okay. So every communication needs to be reliable
it needs to be secure and it needs to be
bi-directional as well. Moving on to the third point of connect you need
to have endpoint management. If I don't have
an endpoint manager, I have established a way through which all my devices
can connect to my platform. I also ensured that the data
is going to be sent from the device to the cloud and the cloud can send back
to the device as well through a secure Channel, but if I don't actually identify from which device
which data is coming and how this data
has to be processed.

Then it becomes a failure
of the system. This is where Management comes into picture endpoint management
basically helps you in managing the devices
endpoint identity the metadata and the overall life cycle
involved with respect to these things are such. Okay, so to put it quite simply
it basically helps you identify from which device
which data is coming and what needs to be done
with this data as well. Now coming on to the next
feature is analyzed and the first thing that you
need to do for analysis, is this reprocessing now if the data coming from the
device Not on a real-time basis, then my system
is often Williams.

There's no use if I tell my system to switch
on the AC at my home. And by the time I reach there if the AC is not even
turned on then it's a failure on my system. Okay, so real-time analysis of the incoming and outgoing
data and must be done. I have with respect
to different aggregations it filtering correlations
processing and so far. Okay now apart from this
what you need to do is that this is raw data that is being streamed
from all the things you need. Need to identify which is contextually
important information which is going
to be taken forward. So once I have
the irrelevant information, then I can even generate
composite streams of information which can be taken ahead
for future analysis and understanding as well. This is what your data
enrichment process does. Then you have events
to now in events to basically any information that you want can be queried and visualized from
the vast amount of data which is present on my cloud. Okay. Now this in turn
can also help me get a better insight and Analysis if I have all the enriched data
present on my cloud platform.

I have a tool which helps me identify
what is needed help me analyze. This data helps me visualize
it then definitely it becomes more useful as well. And when I have data coming from different things as such
this in turn can also lead to being a collection
of big data now when I talk about Big Data, it's not just a few GB of data as it's going to be
terabytes of data because because the data generated
from the things around us is that was and if you doing it
over a period of time then definitely it is going to grow
into a big data domain as well.

Now coming to the third feature of Internet of Things
comes Enterprise connectivity. So this is what I
was basically telling you about. Let's say I have a requirement from my retailer or even
an Enterprise organization which is present. It could be Amazon. It could be flipcard anything as
as any Enterprise organization which provides me a service. If I can connect to them
through this platform, then definitely My
overall process also becomes easier as well. Let's say this is
service provider. Okay, let's say there is
a leakage in my Plumbing or let's say there's some issue
with respect to my electricity.

Then it can contact to the
corresponding service provider. It can send them a detail and corresponding they
would be dispatched. This would in turn
reduce my effort of having to check the problem
having to call someone wait for them to come back all that gets reduced to minimum
required effort as well. Well, now how does
this communication happen? So for that we have rest API. Okay. Once I've integrated
my rest API with respect to the cloud application and my internet of things
then communication between the Enterprise communication
between the platform and the communication
between the things around us can be made more efficient and can be more easy as per the third aspect
is command and control if I don't have command and control on my platform
then it's awful noise.

Yes, I built a very great. Table something that's
quite extraordinary. But if you cannot command it if I cannot control it as
per my requirement, then the system
in itself is not useful if I cannot tell my door
in a smart home to unlock when I want it then it
becomes failure on my part. If I cannot control the AC
on my horse motto then again, it's a failure. So always the major aspect when you integrate
with respect to these things. The major thing is that you need to ensure there's
a huge control on system and you're able to Um and it as per your requirement
now this command could either be through a voice
based recognition. It could also be a message that you can send
through your mobile application and so forth as well when we come down
to the iot ecosystem.

There's no single
consensus or again. There's no singles
architectural design that's out there
which is agreed universally because each company
each organization each user for that matter has
different requirements and We look down to it. We can break it down to a simple
three level architecture where and we have
a perception layer where centers actually
gather the information from the environment around it. Okay. Once this is done
I'm going to use I'm going to pass this information
to the network layer the network layer in itself
takes up the responsibility of transferring this data from the sensors
to the next layer, which is the application layer
now here the main objective of the responsibility
is the application in itself delivers
this information to the end user or the When platform for
that matter this architecture can also be expanded
to a five layer architecture. Now when I talk
about a five layer architecture, it's quite similar here.

It's a the difference mostly
comes around with respect to the transport layer
the processing layer and the business
layer mostly here when we had three layers
doing the earlier task. We've just broken this down so that we have
an easier operation or a smoother system
for that matter. Now again, the perception
layer remains same when it gathers the information
from the sensors, but the transport layer
actually Transports the data between the sensor
to the processing center.

Now, this could be
through a wireless system. It could be through Bluetooth. It could be two RFID
3G NFC or any medium that I choose to once. The information has been
transmitted the processing layer comes into picture which actually stores the
relevant information analyzes this and again processes it as
per the users requirement. Now again, this could
employ various databases Cloud Computing Services as well as big data
processing modules to store this information as as well as process
it for that matter. Once this is done. I give the information
to the application layer, which is actually responsible for delivering Superior Services
to the end user for that matter on top of all of this stands your business lamp now
any device for that matter when it is working
on a large-scale environment a business layer
is usually used here. Now, let's say I'm working
in an organization where we using multiple pumps for different views features
in different locations for that matter a business layer
here actually monitors the complete functioning
of these parts.

You can also have these
in various cars as well. So what do I would note here is if a car is going to break
down then I also get an awareness with respect
to that individual car and it also helps me enable or help me reach out to
the closest customer care center so that it can assist
the user coming down to how I can process it again. This can be divided
into two segments. I have my cloud computing
based processing. We're in here. It's quite simple
once I have the information. I pass it on
to the cloud platform which then in turn also. Processes it and also has
various applications to deal with this process information
for that matter.

Now again, this is something
that I can do on a system which does not require
any immediate action and requires a large amount
of processing for that segment. But let's say I am in a system where I need immediate
response in those cases, I can go with my for computing now again
for computing is something that represents a layered
approach wherein we actually insert monitoring pre processing and storage with
the security layer. Between the physical
and the transport lab. Let me just go back
a few slides here to help you understand this. Now. If you actually look my for composedly comes
between these two layers when I add four new layers
for that matter. Now again, this is used in order
to make a system quite smarter or effective with respect to it
now between my physical layer and my transport lab, I have a monitoring layer. I have a pre-processing layer
a storage layer and a security line now to help
you understand this. Let's take in real-world
example out them.

Let's say I have
a complete traffic system. Which is built
on my internet of things. Now, let's say at one point. There is an ambulance that has come to a first signal
I detect this and what I do is that I allow the ambulance
to move from this traffic signal by giving it a green line, but what you need
to understand is if I'm using a cloud computing this message has
to be passed on to the cloud. This information has
to be then process and then correspondingly a map
has all stood to be created at the same time when I use a fog approach
what happens is that all the pre-processing and the storage happens
on the Gateway level itself. The information from the sensor
goes all the way to the Gateway there and it actually processes this
stores the relevant information and sends this back to the discourage
ponding sensors as well.

So let's say if there's
an immediate track that I can create
to the closest hospital. I would highlight all
the traffic signals to be green so that the ambulance can move
smoothly as well now security here is very essential because if I implement
this tomorrow anyone can actually try to manipulate this
for their requirements as well. Imagine there is a high High
Speed police chase happening and the culprit uses this in order to move fast
from the traffic signal. So this is something
that is really Ascension. Although there is a pro to this. There's also a con and this is how we try to overcome
this issue now talking about each one
of these new layers when I come
to the monitoring layer. What it actually does is it
monitors the power consumption it monitors each of these resources as
well as their response and the services that are running
on these resources. Now this in turn
helps me monitor or gives me a complete idea. Of which other services are which are the sensors
which are working? Where are the challenges? What is the power consumption
and how it works with respect to that same now once I have information
from these sensors what you need to understand is that usually you work with thousands of sensors
in a real-world environment.

Now, I need to understand which
are the necessary information. So I'm going to do a level of filtering I'm going
to do a level of processing and then I'm going
to apply a level of analytics to understand what is needed and what is not from
these information as well now. Now the temporary storage area
is something that I use in case I want to store
any relevant information. Let's say I'm creating a route
today for an ambulance as well. And this is going to be stored
in my temporary storage area. But this also needs to be used
in future scenarios. So once I am done
with this usage, I can also push it
onto the next transport layer which can send it
to any other storage system that has part of my environment. Now as I said security plays
a very important role, although my for
computing is something that makes my system faster.

It should not be easily. Inaudible now in
a cloud-based system. I have the assurance that it's not really easy
to break down the security. It's quite hard where there are
various layers of security which are part of the system. But when I have a fork system, it's essential that
this factor or the security which deals with the encryption which deals with the privacy
of the information. The Integrity of this
information is maintained. Now, there's also a very
interesting variation of this which is called an edge
Computing system wherein rather than doing all
these operations are After I have gathered
this on the Gateway, I can do it
on the individual notes or individual sensors as well
with respect to it.

So where I have edges
these becomes point for me to perform
operations on the data that is being collected. So that's the slide variation of our for computing system
is such next let's talk about the various
taxonomy associated with internet of the X. Now. These are the key Concepts
or these are the key layers which are present with respect
to most architectures. That's out there. As I said, this is a general
guide ER e Person on each system that's out.

There requires its own level
of customization requires its own level of approach
to solve that problem. But these always remain
the fundamental layers which are included in all the architectures
out there first. We have the perception layer, which is usually the layer where we gather the information
from the various sensors that's out there or we
use the various sensors which are required as
part of our system. Then we have
the processing layer where in we perform filtration.

We summarize the data
we again do a level of analytics on This data before we decide to send
this relevant data to the system that's above this. Now. Then I have a communication line of communications layer
is very simple as in here will
Define the protocols and standards as
well as the medium through which the information
has to be passed from my sensors to my main system as well middleware is something
that's quite essential here. What it does is that it creates
an abstraction as well as it makes my system work
much more smoother. Now what you need
to understand is that there are various
components in what hear me? That really helps me integrate the information
coming out from each of these sensors or each
of these individual systems.

Once it's present that I can pass it on
to my application layer where and I have various applications which help to improve
the overall experience of the user as well as provide much more accuracy and
efficiency to the information that's present now coming down. Let's talk about each layer
one by one now before I talk about
the perception layer what you need to understand is that one of the most
important aspects of Annette of things is context awareness. That is what you need
to understand with respect to the change of environment
is very important. And this is extremely impossible
without the usage of sensors as such now sensors in themselves are
very small in size. They again cost you very little and at the same time they
consume very little power again.

There are various constraints with respect to the factors
as the battery capacity and the ease
of deployment as well, but let's not go
into them as such. Now when I talk
about sensors again, we have various types of sensors as such one of
the easiest example of sensors that can be seen
on a daily basis is the sensors which are part of your mobile. You have a location sensor you
have movement sensor camera in itself is actually another sensor your microphone
your light sensor. These are all various important
aspects of your mobile that we use on a daily basis apart from this neural
sensors medical sensors, like the fitness bands
that we use Healthcare bands, which are used
for heart patients. In environmental sensors, which check the temperatures
around the environment make you aware of the changes
chemical or biosensors which are very useful
on a daily basis as 12 again infrared
sensors are something that's quite common as well. When we talk about RFID. This is something
that's really important or not. This is something that really gathers a lot
of attention with respect to it RFID stands for radio frequency
identification now unlike a traditional barcode.

It does not actually require
a line of sight of communication between the tags. And the reader
and can identify itself from a distance without even
a human intervention or a human operation for that matter RFID
is are technically of two types you have active
and passive active tags actually have some amount of power source
associated with it and passive sources do not have
anything related to it. And when we talk about
the RFID Technologies as well, there's near and far and near RFID reader uses
a coil through which we actually pass AC current
and Create a magnetic field. Now when we generate
a magnetic field anything that comes in its vicinity it
registers with respect to it. Now when I talk about afar
RFID it basically is a dipole antenna in a reader. Now this again propagates
an electromagnetic waves and tax themselves also have
a dipole antenna now again, these are something that's used
in various applications. That's out there. Now one key factor, which is associated with the perception layer
is an actuator now when I talk about an actual It
actually is a device which can affect a change
in the environment by converting any sort
of energy into another now.

This could be a motor
which is generating electricity. This could be a windmill which is converting
the wind outside to you to of electric form as
well in these are just some of the examples that's out there and actuators themselves
play a very essential role in the perception lab now, the next layer that we have
is the pre-processing layer. But before I really talk
about the pre-processing layer, let's actually try to And the limitations of trying
it to process everything that we have
on the cloud system, which is part of our ecosystem. Now when I talk
about this one of the key or one of the biggest challenges
for me is mobility. Let's say my sensors are on devices which are
in constant motion. Then it becomes
a really high challenge for me to pass this information continuously
to my cloud environment again, this could be true the challenge
of Transport layer.

This could also be due
to the challenge of power consumption
associated with it when my Smart device or when my sensors
for that matter are in constant motion
run constant Mobility. Then it cannot completely pass
all the relevant information on to the cloud. Now. This intern actually
causes a challenge for me to have some latency. This could also lead
to early 10 C with respect to real time processing
of the information that it gets as well.

Now if I'm working
on a critical system, then real-time information is
something that I will highly depend on and that becomes
a challenge as well now. Now if I really want to scale up if I want to use a lot
of devices then my cloud computing system
also needs to scale but there's always a chance
to increase the latency because I'm working
with multiple sensors or multiple devices. That's out there. Imagine today. I have a system with just
includes thousands answers, but let's say in a smart
home system There is close to about 10 to 20 thousand
sensors associated with it. So this is just
one small system. Imagine if I'm trying to build
a smart city in that case.

Is going to be hundreds of
thousands millions of sensors that's out there if my cloud computing system
cannot process this on a real-time. Then there's going
to be a high challenge with respect to that sick. And this is exactly where the usage of smart
gateways comes into a picture. This layer actually helps
me process my data on real type. It also helps me filter the data
on based on the priority or the requirement and creates a local copy
of whatever is needed or whatever needs
to be taken forward. Word now when I come
to the pre-processing layer or when I come to the features of for computing
for this matter, there's a very low latency because the information
does not have to go to the cloud system wherein the processing
needs to be taken up.

It always is done
on the Gateway level itself. This information really
is faster as we've seen in the previous example
about the ambulance now, I can also use distributed nodes where in the information
does not have to be other processing has to be on one single node
for that matter when I'm using Distributed notes
then I can also distribute the effort or the work that is needed as well when I'm on a mobile
environment as well. These Smart Systems
can communicate with the gateways present
in its closest proximity. It does not have to connect
to just one single Gateway.

If I'm setting up gateways
across multiple points in my city, then it makes it quite faster
and more efficient and this in turn can also lead
to a real-time response from the Gateway
for that matter. Once I have
a real-time response, then it is big. Taking my system faster and as in the previous example rather
than just clearing one signal. I can clear an entire path
for the ambulance as such now once I have relevant
information those which are necessary or those
which are really something that I need to ponder or I need to analyze can be sent
to the cloud system as and when as it's needed as such
so this is something that really makes my pre-processing layer
important and efficient and effective coming
to the next layer, which is the
most important layer.

It's out that which is
my communication lab now as your Internet of Things
environment actually grows. This is a compromise or this is a combination
of various heterogeneous devices which are connected
to the internet. What you need to understand is that these devices
in then self need to pass these informations
and some of the challenges that the communication layer
should actually address is with respect to let's say
first start off with addressing and identifying of each of these informations
wherein I know which Each device is sending
me the information. What is that device if I want to communicate back
to that device as well. How do I do that again? When it comes down
to the communication in itself? This should also not cost me
a huge amount of consumption with respect to power because if I save up a lot of energy with respect to
how the information is gathered, but I waste a lot of energy
in transmitting this information then I don't have a smart system
again information itself, which comes should
use various route.

Protocols which actually
require very low memory and should be very efficient
for that matter. If the information
itself needs to be bounced around different layers going
from different segments of your Echo System, then it needs to use
very less memory and this itself should be
very fast as well as seamless for that matter. Now when I come down to each of these components
for that segment, let's talk about NFC
or the near field communication.

Now NFC is actually a very short-range
Wireless communication. Technology through which usually
mobiles interact with each other or a distance of a few
centimeters for that matter. Now all the type of data
can actually be transmitted between two NFC enabled devices in seconds by bringing
them close to each other. Now this in turn is actually
based on the RFID concept and it uses a variation of the magnetic field
to communicate data between two NFC enabled devices. If again, we go down into slide specifications and FC
usually works The frequency band of Thirteen point
five six megahertz. But again, this is very similar
to high frequency RF. Id I'm not going to bore
you more with respect to the technical details will
talk about the next segment, which is your RFID and wsn
integration for smart objects. Now again, many a times what you need to
understand is the data from one single sensor is actually not useful
for monitoring large areas and complex activities now here what you're going to use is that you're going to use
various sensor nodes to it.

Interact with each other in this
also has to happen wirelessly. Now the disadvantage of a non IP technology such as
RFID NFC or Bluetooth is that it's range is very small, so they cannot be used in many applications wherein
large area needs to be monitored through many sensor nodes
deployed in various locations for that matter a wsn or a wireless sensor Network
consists of 10. Mm sensor nodes connected
using a wireless technology. They collect the data
about the environment and communicated to
the Gateway to Ice and relay the information to the cloud infrastructure
over the internet as such now when I come down to the iot network protocol
for that matter, usually what you
need to understand is that the IP for protocols
themselves can only be used for communication
of close to 20,000 device.

Now again, the internet
protocols used by these devices is something that's quite a challenge as well
because when you look at it, the predicted amount of devices that's going to be available
by 2020 in The Internet of Things domain is
Close to 40 billion imagine 40 billion devices
communicating with each other. Now if I don't have
a smart system or if I don't have
an effective low power system, then I cannot communicate or I cannot gather
the information from this now usually are low-power IPv6
is used for these Network on these communication which helps you in passing of
information from these sensors onto your processing or onto your Cloud
infrastructure now again, when I come down to the low
energy technology my main, With respect to communication
is always to ensure that low energy technology
is most probably used in this segment. We have your
Bluetooth low energy, which is usually
referred to as a ble and this was actually developed by the Bluetooth
special interest group.

Now what you need
to understand is that it actually has a shorter
range for communication and consumes lower energy as compared to
its Computing protocol. Now the BL a protocol stack
is actually quite similar to the stack used
in classic Bluetooth technology, however it As two parts, it has a controller
and it has a host as well. Now the physical and the link layer are
implemented in the controller and the controller
is typically an SOC or a system on chip
with a radio for communication.

Now the functionality of the upper layers again
are included in the host and BLS actually not compatible
with classic Bluetooth. Now, the next is a low-power. Y5. Now. Again, the Wi-Fi Alliance has
recently developed a Wi-Fi Halo, which is based
on your IEEE 802.11. It had standards this
in turn consumes, very less power than compared
to your standard. Wi-Fi devices also
has a longer range. Now this exactly is why it is
most suitable for The Internet of Things applications
for that segment. Now any device that supports Wi-Fi also
supports IP connectivity, which is very important
for an iot application for that matter now. The last is ZB ZB is also based on the IEEE
802.15.4 Station protocol and is used mostly in
personal area networks or pan. Now again, the range for zigbee devices to communicate is very small
usually between 10 200 meters and the details of the network
and the application layers are also specified
by zigbee standards as such unlike the ble
the network layer which is part of the zigbee provides
for multi hopping routing the when I come down to more details
about this agree Network.

I have three tabs which is an ffd full
functional device and RF. Reduce function device and
one zigbee coordinator as well. Now with this. I just hope you have
a simple understanding of how communication
is essential for The Internet of Things architecture and the various ways that you can implement
the communication between the devices as well. Now the next concept
or the next layer with respect to the iot architecture is
the middleware segment.

Now when I come down
to the Middle where one of the key challenges and one
of the key issues that comes into the picture
is the interoperability. Operate ability as well as
the program abstraction imagine. I have 40,000 devices
communicating with each other 40,000 devices may not all use
the same programming language or may not pass the information
in the same way as well. I need to build or I need
to have something that ensures that these devices
communicate with each other and there is
an abstraction maintained between the information pass
from these as well. Now if I have
multiple devices also what I need to ensure is that these devices
Independently discoverable and I can manage
each of them today. I need to be aware. If one single sensor
also breaks down because the information
coming from the sensor is extremely important as well when it comes
down to scalability. It is extremely useful because when I need to grow
my ecosystem this middleware really comes into picture if I can replace
an existing middleware with something I
can help me scale up, then I don't have to completely
V8 my entire ecosystem as well with respect to it
usually When I use a highly capable middleware, then it also lets me perform
big data analytics and Implement security
and privacy as well and this in turn usually
helps me communicate with my cloud computing and also context
detection the again when you come down
to the middleware segment, you need to understand with respect to
the various specifications of the application.

Which kind of database
is it oriented. What is the semantics
it's based on what kind of events can process and what kind of service
can it process or White ass but these are some aspects that you need to keep in mind while you're selecting
your middleware for your architecture. Now the last layer is
your application lab Now application is something
that really is what your end user gets or is what usually maintains or helps process
your information to the best that's out there. Now this in turn can be used
in different domains. It can help you achieve
different things. It can help you have
a smarter lifestyle it can help you have a smarter environment
your entire home system can be Managed with respect to an application
your car management can be done using application. You can build
an entire social life and entertainment system based
on a smart application now, although the end user
usually only looks at the application layer. This actually is the front face
of your entire architecture. Now with this. I hope you at least
have gotten an idea of what the entire skeleton of your iot architecture
comprises of now what we have discussed
here is just the skeleton.

It's always up
to the user to add. Muscles to it and complete
it with a skin as per your requirement Raspberry
Pi today has become so common that you can find it across
most households as well today. It has become one
of the most cheapest and common Computing device that can be found
almost everywhere, but let's actually go back
to understand the ideology which bought Raspberry Pi
into development itself.

Now Raspberry Pi basically was bought by the Raspberry
Pi Foundation to Introduced or to bring in the information
technology back to the schools where in students can learn how to program
from scratch the growth of technology today
has grown to such a level that everyone today has ease of access to do
anything on a computer but back in the early and late 90s and 2000 for using
a computer you needed to know how to program and how to work around
with respect to it. So this in turn have to build a very strong foundation
for programming knowledge And with the growth of UI
everything has become so easy that today you don't need
to learn programming to do much. But at the same time
this has made it harder for people to identify and understand good programmers
from those who are not. So in order to
build a generation which starts with a very
strong programming foundation and fundamentals. The main ideology
was to introduce or take back it to the basics and make it accessible
across every school as well.

Again, as I said, it was introduced by
the Raspberry Pi foundation in 2012 as watching. The moving forward what
exactly is Raspberry Pi now. This is one of the questions
most of you would have a cross your mind as well because you
might have heard about Raspberry Pi body
might still not have a Clarity. So let me help you clarify
that right away. Now as per the definition
Raspberry Pi basically is a series of very
small single board computers, which actually have
additional features as Bluetooth Wi-Fi USB capabilities
General input Output ports and so forth now it basically is a very small
low-cost credit card computer which has actually
can be plugged into any monitor as well as
you can include a keyboard and mouse and it
increases the opportunity for people to explore
learn and understand how to program as well.

Now the latest version of Raspberry Pi
is Raspberry Pi 3, which was released
in February 2016 as well. Now Raspberry Pi
basically is a combination of raspberry operating And Pike which basically stands
for Python programming language. But before we move forward, let me just show you
a very simple video which Raspberry Pi has put out so that you can understand the ideology of Raspberry
Pi Foundation as well. This is a Raspberry Pi it's
a credit card sized computer that costs around 25 pounds designed to teach
young people's program and is capable
of doing all kinds of wonderful things
back in the 80s kids had to learn
how to code computer too.

You use them and as
a result these kids grew up with an inbuilt understanding
of how computers work. Now, we need more programmers than ever before so to deal
with this problem. Some clever people came up with the Raspberry Pi
to reignite the spark. It runs minutes
a free operating system from an SD card just like
the one in your digital camera and it's powered by
USB phone charger. You just plug in a mouse
and the keyboard. To a TV or Monitor and you're ready
to go in schools. Not only is best berry pie a great way to learn programming
skills as part of ICT. There are also dozens of cross-curricular applications
next science and music and all over the world. People are experimenting with Raspberry Pi's and
attending raspberry jam events where people of
all ages are learning what can be done
with a Raspberry Pi since the first
Raspberry Pi was ship. We've seen examples of people
using the pipe in a variety of amazing interesting projects taking advantage of its size
portability cost programmability and connect ability.

And whether you want to learn
to make games build robot or even teach a bath parachute with Raspberry Pi
the sky's the limit. So I hope you guys had
a great learning experience with respect to that. That was basically the ideology
of the Raspberry Pi foundation on introducing Raspberry Pi
into the market as well moving on some
of the capabilities that Raspberry Pi
enables you to do is that it helps you to browse
the internet as well as what complete HD videos
on the same device as well.

So all you need to have
is a HD supported display as such now apart from that even basic operations
like making spreadsheets. Creating words presentation
all these can be done on Raspberry Pi and you
have a huge set of games that are available which can be played
on Raspberry Pi making it quite interesting and easy as well for people
to enjoy the component as well. Then you have various
add-on capabilities, like infrared cameras
and security system, which can be built
keeping Raspberry Pi as the core Hardware as well. Then you can also use
many music machines as well as detection
of weather stations, which we actually had done
in our previous session.

On as well. Now. These are just some
of the top capabilities that I have picked up
from the list Raspberry Pi today has become one
of the biggest component that has enabled
users to achieve and create a lot as well today. The capability of Raspberry Pi
is restricted just to your imagination whatever you
can imagine can be done using Raspberry Pi given the amount
of effort put into that. Mmm now moving on let's look
The Raspberry Pi Hardware as well before that. Let me show you how I would be using
a Raspberry Pi as part of this tutorial session. So let me just give
you a simple overview of the component as such now
what you basically see is that the Raspberry Pi Hardware. So let me just switch over the camera and let me show
you the Raspberry Pi now here what you're seeing is the
Raspberry Pi 3 Hardware as such and this is your processor
and system on chip, which is an adrenal
a few P3 processor.

Now two important ports
here is the CSI. Which is the
camera serial interface where you can connect camera
directly to the Raspberry Pi and the DSi Port which is
the display serial input Port. Okay. Now, let me just flip
this over slightly. And if you see this
is a 2.5 M. M– micro USB connector. So your standard mobile charger
can be used to charge the Raspberry Pi and this is a standard
HDMI port for display. So your standard
TVs and monitors which have an HDMI support
can be used to become a video interface for that. Then you have an audio jack, which is used to connect
your audio input now, let me just flip the slightly
over and let me zoom out a bit.

Now if you see we have
an Ethernet connector following which there are
four USB slots as well. So when you see here, there's a 40 pin General
input output pin present here. So this is something that's quite interesting and configurable from
your Raspberry Pi a software where you can configure for what
each purpose pins can be used which will be silly little head. Now the final thing that I
want to show you is behind here when you flip backside, so there is a micro
USB slot present here. This is mainly to insert
your memory card. And when I say memory card, I would generally recommend
at least a 16 GB memory card.

This is mainly because the Operating system
and itself is about 4 GB and if you use an AGP, then what happens is there is
very Less storage space for your operating system
to work on as well. So 16 GB memory card
would be really helpful. And one thing that you want to see is
this is an Evo class, which is something similar
to a class 10 memory card. So if you get a memory card, make sure it's at least a Class
A Door class 10 memory card so that you can have
high disk read and write processing
now coming back. Now bow your head let's just
skim through the various changes that has happened
over the hardware of Raspberry Pi now.

We are not going to devote
too much time into this because this is a completely
in detail session how I would be stopping
at these slides for 10 seconds. So if you wish to know more
you can pause the video and get a complete look as well. talking about the processor
the first generation of Raspberry Pi initially came with a broad
Camby CM 2 8 3 5 SOC and it basically was similar to the first
generation smartphone chips and the architecture that was used also was
an armv6 architecture now the over the years
Raspberry Pi 3 has grown a lot and today it has a capability
of 1.2 gigahertz which basically is
because of the a arm cortex a53 64-bit processor it is
considered to be 10 times faster in comparison to Raspberry Pi wow now I'm talking
about the change in raspberry pi over the years as you can see here the various
models have been listed and the architecture change has also been mentioned
here as well so in case if you are interested in Rome
or you can pause the video and take a look at this now when you come to the memory
the first model of Raspberry Pi came with a 256 MB RAM and which basically
were shared by the GPU but today with Raspberry
Pi Version 2 and 3 you have four times that you have about 1GB of ram which again is shared
by the GPU as well.

Now the default split was at hundred and ninety-two MB RAM
for the CPU basically, which was more than
enough to play a full HD that is 1080p video
or perform simple 3D operations, but again, not too
complicated operations as well. Now moving forward when you look at the networking
capabilities in terms of networking capabilities, the Model A of Raspberry Pi
did not have any such features, but from model B
of version 1 itself, you had an ethernet port which was introduced here
and from version 3.

You also have Wi-Fi and Bluetooth capabilities
introduced here as well. Now talking about
the peripherals in Raspberry Pi there are basically
four USB ports. Now, this has been introduced in
model B version 1 plus onwards and today you have a lot more that you can do with respect to
that even audio input ports and audio output ports
have not Over the years but the on-board storage has changed a lot
with respect director. Now again, when you look at the video
capabilities video controllers, basically here you
can watch complete HD videos but Raspberry Pi does not have
a hatch 256 decoding Harbor but the CPU in itself is
way more capable and helps you in decoding
the h26 included videos through software operations now in terms of GPU the GPU in Raspberry Pi 3 runs
at a higher clock frequency, which is about 300 or 400 in comparison
to the previous versions which is at about
250 six megahertz.

Now in terms of video input
you have a 15 put CSI connector that has always been present
with the Raspberry Pi and we output has changed
over the years. You have a HDMI port
you have a DSi port and now you also have
a 3.5 mmm trrs Jack as well. Now in terms
of the connector capabilities. There are 17 pins of the gpio port switch
can be configured as per your requirements as well. No, moving forward. These are the various
details with respect to the general input output pin. This data has been
taken from Wikipedia. So in case if you're looking
for more information, you can definitely
check out wiki space or the official Raspberry
Pi documentation as well now coming down. Let's begin the Raspberry Pi
installation process here.

But first, let me help you understand
the different operating systems that are available at present. Okay Raspberry Pi
in itself supports. Has multiple operating systems
as such but we will mainly be working on raspbian. Okay. So these are some of the most
popular operating systems supported on Raspberry Pi so you have risc OS you have
FreeBSD operating system. You have net BSD operating
system Plan 9 is again from Bell Labs as well as
Windows has its own Windows 10 of iot version. Okay. So for this session, we're not going to go
into the Windows 10 will stick to the core Raspberry
Pi operating system now for downloading
the operating system. You can go on
to the original site. That is Raspberry Pi Dot o– r– g– And there in the downloads tab, you can download
the operating system. Let me just show it to you. Okay. So this is the Raspberry Pi
home page and here if you go on to the download section, you can download
the operating system.

Now if you are starting off
with Raspberry Pi an Internet of Things trust me. This is the best place
that you can find a lot of informations
with respect to it. Okay, most people actually published their details
with respect to the projects that they're working
many popular projects are also available. You can find a lot of help as
well as good information here. Okay. So this is definitely
the place to go to if you go on to the download section
here, okay this I'll show you 2 options you
have nodes or you have raspbian. I would recommend
that you go with notes because this is a complete
package with respect to the different operating
systems as such so here again, you have noobs and Loops like so
my recommendation would be you download notes and make sure you using a 32 GB memory card with this
would be really helpful because it gives a lot of memory
for your operating system.

So in case if you're going for a 16gb or below I
would recommend you go with the nope slide, but make sure you keep the bare
minimum of 16 GB in case if you working with Raspberry Pi
but do not mistake me. When I say use
a 16 GB memory card. You can install it
on an 8GB as well. But again, the operating system
has less memory to work. So at least go for 16 or higher 32 is
what I would recommend. So once you download
this ZIP file, or you can even download
it by a torrent. Okay, but I would recommend
download it as a zip file. Let me show you the file. So this is the noobs file. Let me extract this. Okay, it may take some time. It's about a 1.5 GB file. Okay, the lights were seen as
slightly lower in comparison, but this is something
that I would recommend in case if you're working
with Raspberry Pi.

Okay, so I have
my noobs folder here. So what you need to do is that you need to copy everything
inside the nude photos and then paste it
inside the SD card. Okay, make sure you are
not directly copy pasting the folder
that you have extract. So what happens is
if you do that, it does not actually recognize
the operating system as part of the Raspberry Pi
so copy everything that you've extracted
and then directly paste it inside the SD card. Now again, this
is why I recommend that you use a high
speed memory card because in case if you are not using it then what happens is
But it takes a lot of time with respect
to fetching the data. Okay. Now as I had mentioned if you're going for a memory card
for your Raspberry Pi you can use something
like a 16gb at least and make sure it has
a high transfer speed.

So this in turn will give you
a lot of memory area to work around with as well. As I would recommend
you take something like a class 10 memory card that is available
in the market today. So these have a very good read
and write speed ratio. So definitely this is something
that you should consider while you're getting a memory
card for your operating system. Okay now Once you're done
copying with this, let's go on to install
this memory card onto a Raspberry Pi and let's
begin the installation process. Okay, so now we've
successfully copied all that is needed
for our operating system.

So safely remove this make
sure you rejecting it safely because sometimes
what happens is if you do not see if rejected the
files get corrupted before you load it
into your Raspberry Pi this is certain issue with respect
to the memory cards. So just eject this. Okay. So this is my Raspberry Pi and
if you actually flip it over. This is the slot where you
have to insert the memory card. Now, we've copied
the noobs folder into this memory card.

Okay, let me just insert this
into this and let's begin with respect to
the installation process. Let's begin installing
this memory card onto my Raspberry Pi
and start with the setup. So, let me just turn the
on my Raspberry Pi. Okay, so this is a screen. I'm getting by default. Now what happens is the
installation steps initializes. So the Raspberry Pi
is getting loaded. Now there are
two operating systems that are present here by default
and we want raspbian. So let me just select
raspbian and click on install option present here. If you see here it
basically is telling me that it requires 4.5 GPA. So this is why I was recommending you
to get at least 16 GB or more because if I have an 8 GB memory card if 4.5 GB goes off with
the operating system itself, then there's not
much memory left for me to work around with now.

Let me just click on install. Just before I do that in case if you are using
a different language, or if you want to use
a different keyboard as well, you make sure you're
specifying that okay. So there are written language
is present here. So choose the
corresponding language as per your requirement. Once you selected
that description install and this is just
basically going to ask you whether you want
to format your data and install the operating system
on top of this. So click on yes, and the installation process has
begun now it may take some time. So I request you
to be a bit patient because this is an Operating
system installation process, so please be a bit patient
and hope you have fun mean wire. So now as you can see the
operating system installation has completed successfully
once you hit on okay, it's going to ask me whether I want to reboot or it
automatically reboot as well.

Okay. So yeah, it's automatically
rebooting at this point. Okay. Now as you can see the Raspberry
Pi operating system has successfully been installed. Okay. So this is what your Raspberry
Pi operating system would be looking like okay. So this is raspbian
as such so there are different operating systems
that are available today for you to install that we
have discussed already now that we've installed
raspbian on our system. Let's look at some
of the accessories which can be used
with Raspberry Pi now one of the most popular and interesting accessory to
Raspberry Pi is the sense hat. Okay, so that basically is
a hardware attached on top.

There are various hearts that are available
but censored is the most popular because you have various
onboard sensors present here. You have a temperature humidity and pressure sensor present here
as well as a gyroscope and a joystick also present
here apart from this. The reason that it
is quite popular is because it has an 8 cross
8 LED Matrix display that is present to him. So let me just switch over and show you the sense
hat component as well. And okay. So here you can see
the sensor know how it is slightly different from
the the other accessories is because it's got an 8 cross
Aid LED Matrix present here, which can be used
for displaying various things and we will also be seeing
how you can display this as well now coming on
to the other components here. Now if you see here, it's already got
multiple sensors here. It's got an accelerometer and the gyroscope
meter present here.

It's also got we just
this part the axe low and gyrometer present here. So you can see it's got
labeling as well. Then you have
a humidity pressure and temperature sensor
on board with respect to this and it's quite interesting
and useful as well. Now one of the easiest things
with respect to this is that it can directly
be placed on top of the Raspberry Pi's gpio pins and thereby making it quite easy
to assemble it as well. So it directly sits on top
of the gpio pins as well.

So this is something which makes the entire Raspberry
Pi ecosystem quite easy and effective one other
interesting key point or factor that makes the sensor
quite interesting is that it's gotten
on board joystick as well. So in case if you are a gamer
and you want to try out the games on Raspberry Pi you
can use this choice to catch. As such now another additional
component that most people use with Raspberry Pi is the camera
now in 2013 itself one year after Raspberry Pi
1 was launched. It had introduced
the Raspberry Pi camera along with the firmware
update as well. Now the r a spy cam is
basically an 8 megapixel camera and can directly be connected to the Cs airport present
on the Raspberry Pi itself.

Now, it's also very interesting and can record up to
thousand ATP videos as well. So moving forward. Let's also look
at the infrared camera. So this is a very
interesting thing. So this was something that helps you capture
video in infrared mode and is called pine oil. Okay. So again, these components
can be bought online and is one of the most easily by now the final accessori
announce the most interesting and essential accessory
to the Raspberry Pi is the Gert board. Basically it is used
for educational purposes and it helps you expand
the operations done using the general
input output pins here, so, Using this you
can connect to various LEDs which is Analog Devices sensors
and much more.

This also helps you connect to Audrey know which is also
another DYI Hardware device which has gained a lot
of popularity but in comparison to Raspberry Pi order, no is still growing
Stitch moving on. Let's begin with
our sensor tutorial and what we'll be doing is we'll be exploring five
different demos to understand how the sense had component
can be used effectively. Now the first thing
that we'll be doing is we'll Implementing
a very simple code and we'll be trying
to display a certain letter on top of the sensor. Okay, so I'm going
to display p&d but the value of that color is going
to be generated by random.

Okay, so let me just run
you through the code that's present here. So the first line is
from censored import sense. So what it basically is doing is that it's helping
you import sense at and establish a connection
to the censored component. We're going to use time
for mainly sleeve function. Oh and random for generating
a random integer. Now. What I'm doing is that I'm initializing
the censored which is sense equal to sense at basically initializes it then
what I'm doing is that I'm generating
a random integer between the range of 0
to 255 now for those of you who would have guessed
why I'm doing this.

Definitely this is because the RGB value
lies in this range, so it's somewhere
between 0 to 255 then what I'm using is that I'm using
a censored function which is show later and then I'm specifying
which It means to show and I'm going to specify
the color combination. So this is the RGB
values present here. Okay, so it's going to show
the letter e and it's going to create a random input
with respect to that same.

Okay, then it's going to sleep for one second again
generate a new random integer and then it is going to show D. Okay. So again, it will sleep
and then it's going to clear. So let me just show you
this to you practically. So now what I'm going to do is that I'm going to connect
to my Raspberry Pi. Using VNC Network. So it's virtual Network, which I'm connecting it to
because it's not quite easy for me to record the video on the Raspberry Pi so I'm going
to use VNC server for that and I'll just give you
a simple idea of how you can connect to VNC server
to your Raspberry Pi as well. Now one essential thing that if you are connecting
to the VNC server, then you both need to be
on the same network.

Okay. So what I've done is
I have used a hotspot connected both my Raspberry Pi
and my laptop to the Network so in case you are wondering how to connect to your Raspberry
Pi y remote server, this is how you do it. Just go to your settings
go to preferences. You have Raspberry
Pi configuration here. Now in your interfaces make sure
that VNC is enable. Once you've done this then
VNC server gets enabled and onto your system
just download VNC server and VNC viewer and
you can connect your Raspberry Pi quite easily. Okay. So let me just show you the code which we're going
to be executing now, it's the same that we
have seen earlier. So, let me just make
a small modification to this. So this is awkward again as we have seen we are first
initializing the censored with sense equal to censored then we're generating
a random integer and then we showing a letter e on that so let me
just change this. Let me just set it to 0 and let
me just copy this once more and I'll also show a third
combination here as well.

So I'm just generating
a random value between 0 to 255 and I'm displaying
based on that color. Letter e d and f okay, so let me just save this once
so let me show you the output that is going to be
displayed on the sense that as well. So so let me just
execute the program. Okay. Now let me just switch
over to the censored so that you can see the output.

It's a ready green d
and a blue f as well. So this is what So based on the inputs that I
have given it has displayed a certain letter on the censored
LED display as well. So let's go back
to our presentation and look at the next program
that is involved here. So the next program basically
is going to display an image. Now what it does here is that it basically is going
to display an image that Gives you a complete idea of the various color
combinations possible on the sense at as well. So what I have basically done is that I have identified the RGB colors red orange
yellow green blue indigo violet and E stands for empty, which is null. Okay and based on this.

I've created a
random Matrix here, but each of these values defines
for a pixel of the sensor now as I have mentioned
to you earlier, this is an Eight cross
it led Matrix. So each of these values is for one of the
individual pixels themself and with respect to how they
start the numbering starts from left top position. So accordingly it goes
in a row by row, man. Okay, so let me just show you
the output for this as well. So this is our program
and let me execute this and show it to you. And now let me just switch over
to the Raspberry Pi. To here you can see
the different color combinations that are present
on the Raspberry Pi sensor. The first row was
left completely empty. The next row has
to our values present here. So this is how it
has been defined. If you notice the code here, there are two are following
by three empty spaces.

And before that. Also, if you can consider
three empty spaces that is one rule. So every specific
value is pertaining to one specific row as such now
coming back to our presentation. And so the third one
is quite interesting. What we're basically
going to do here is that we're going to rotate a letter based on the different
orientation of the screen. So let me show you how this is done rather
than just tell it to you. So what we basically
going to do here is that we're going
to rotate a letter J on different angles as well. So we've defined
the different angle 0 90 180 270 and these
are the various angles which is going to rotate for. Okay. I'm going to run a for Loop where it rotates
the same on different. Angles as well. So let me just show you
that so just let me add since dot here here. Now. The reason I'm doing
that is mainly to ensure that the sense that is cleared
after the rotation process.

So let's execute this. Let me switch over
to the Raspberry Pi and if you see here
A Jay has been displayed and it's rotating. Okay, it has stopped. So let me just rerun
this once again. So what is happening here is that I'm rotating
the letter J by 90 degrees and it's completing to complete
circles on the Raspberry Pi. Okay, so it's a very
simple thing but it's important that you understand
how this is done because what we're
basically doing is that we are setting
the rotation using the sensor. Okay, and then we're sleeping at point zero five
milliseconds as well. Again, you can increase
the delay here. You can change the letter here. You can even change
the angle to understand how it works as well. So this is something that you
should definitely explore about and get a better
understanding with coming down the next and most basic thing that you can do. Using sensor is that you can measure the temperature
pressure and humidity. So we've already
tried to do this in our previous session as well where we've measured
the temperature the pressure and the humidity now here
I'm just rounding it off and based on a specific value.

I'm going to ensure whether the display
is going to be red or green as well. So let me come back to my senses
at let me just open the code and we will modify this on the go to get
a better understanding. Let me explain. In the code once again, so first I'm establishing
a connection to the censored then I'm running
an infinite Loop where I'm getting the temperature the
pressure the humidity. I'm rounding it off and
if the temperature is about 36, so this is just a value that I have set then
the background color should be green and the color of the text
should be complete wide. Okay. So this is a simple modification
I have made else in normal situation if it is less than 36 degrees
then what it should be.

Is that it should have
a background color of blue and the text color
should be yellow. So this is basically to help me
identify the different ranges. Then I am creating
a message variable which is storing
the following format where temperature is equal to temperature value pressure
is equal to pressure value and humidity is equal
to the humidity values. Finally. I'm going to show
this message on my sense at LED display screen. So let's just see how this works
and execute the program. So let me just execute
the program and let me also switch over
to the Raspberry Pi. So here let's begin
with the execution of the code.

So now you can see by default. It is having a blue background and the text is
actually in yellow. Okay, so if you would have
noticed the temperature is about 34 degrees Centigrade. So to this letter or Scroll once more
let's just validate the value of temperature. You can also print
this into the screen. You can also send it
via an API and much more. So if you can see, it's thirty four point
two degree Centigrade now to this what I'm going
to do basically is that I'm just going
to introduce a hot water source.

Okay, so I'm just trying
to raise the temperature here. So let me just shift
a little bit and please keep a note
on the temperature value. So the temperature
has started Rising. So it is taking some time. I think the water
has cooled down a bit. All right, so it's started
now the color background color has changed from blue to green and the text color has changed
from yellow to white as one now. These can be used in critical
measure environments as well. So let's say you are
in a situation or an environment where you need to have
a constant Monitor and constantly be aware with respect to the environment
change in example, like space or any other environment
that you're working with.

Definitely. These are certain things
that can really be important and helpful as well. So Coming back. Lets us. Look at the last program
of the sensors tutorial, which is basically detecting
the motion of the sense that now what I'm basically
going to do here is that I am going to rotate
my science at and I'm going to identify the value of
pitch roll and yaw on basically, these are the orientation
with respect to the x axis y axis and Z axis and this is just from
the orientation of the sense that as well. Now this is mainly done
using the gyroscope but to get a better
understanding and more precise. Value will also try to include and incorporate
the accelerometer as well. So let me come here. Let me just show
you the program.

So this is the program as well. So let me just stop
the execution here. So as I had mentioned this is going to run
infinite number of times because the while statement
here is indefinite. So let me just stop
this and let me just run the orientation program and Let's just see
the default values of pitch yarn and roll first. So now by default if you see pictures
about zero role is about 96 and Ian is about 0 itself. Now, let me just switch
over to the sense at and what I'm going
to do parallely is that let me try radiating
the value of the sensor as well or let me try rotating
the sensor to give you a better understanding of
how it works simultaneously.

You can also see the change
in Pitch Ian and road. So if you see Here
I'm slightly lifting it and the value of which
has risen from zero to six role also has changed
Ian also has changed. I'm going to try tilting
it same pitch roll and yaw on also has changed. So I'm just filling it with respect to various accesses
and you can see the change here. You notice the changes I
definitely hope you do. Okay. So now let us actually stop
the execution of this program because this is also
an infinite Loop and to same orientation program. Let us actually
try to incorporate the accelerometer and understand how more precise we can make now instead of just
taking the pitch roll and yaw on I'm here going
to directly take the value of acceleration here.

We have taken the value
of orientation and here we're going to take
the Of Aksum duration, okay how basically the first is with respect
to the gravitational force that acts on this. So now let me just show
you the code here. Now again, what you need
to understand the difference between gyro measure
and Axle row measure is just that its senses
both the static as well as Dynamic change
with respect to that but your gyroscope
many measures the rotation of a specific device as such.

Okay, so let me just execute
this program as well. so let me just first begin
by clearing the screen and then we'll execute
the code once again, so let's just execute
the acceleration code to get a better understanding
and simultaneously what I'll do is that I'll just show you
how the change with respect to the axis is or how you if you change the Raspberry Pi how the value will also
change so by default if you can see
the value of x is 0 the value of y is also 0
and Z is 1 so now what To do is that let me Begin by slightly
rotating the Raspberry Pi now if I change the Raspberry Pi into a vertical
position like this. Okay, so it's a perfectly
vertical position. But if you notice the value
of x it is become minus 1, okay, why has become 0
and Z has become 0 same time. If I rotate it in such a manner. I'm just keeping it
on different axis the value of x becomes plus 1 instead of
minus 1 same with respect to Y if I change it in such
a horizontal way it is minus 1 and if I change it in such a manner then
it becomes plus one.

Okay. If you flip it completely
over then the value of Z becomes minus one as well. So if this is the vertical
position then the value of Z remains one, I hope this is clear
for you guys. So again, these are
all different parameters today what I have done
as part of this is that I've just
help you understand how you can explore
the various parameters and various components that are associated to the Raspberry Pi
censored as well. Now what how you use it and what you use it
for is completely left you these are just some
of the basic things that you can do
using Raspberry Pi the limitation of
Raspberry Pi stops where your imagination stops. Okay, now that we've installed
raspbian on Raspberry Pi it's time we begin with the demo
for this session. Now, what we're trying to do is that we're trying to build
a weather detection system to get the real
time weather analysis when we talked
with real term analysis.

It basically is the pressure
temperature and humidity. And what we want to do is that we want to get a live
mobile notification for this. So for that will be first
using censored board which will help us measure
the various metrics like temperature humidity
and pressure. Iran to a Raspberry Pi then
we'll use Raspberry Pi to transfer this data
and display it on the sense that as well. So we'll just be displaying
the temperature as of now on the set. And finally we'll be
using insta push API and Python program through which
we can send this notification across the Internet
to our mobile application. So let's begin
this demo part first. Let me show you
what's and satis and how you can assemble sense
at on Raspberry Pi. Okay. So this is my Raspberry Pi unit and this is That's what
I was referring to.

This is sunset boat. Okay. Now if you see this is
a simple additional board that you can add on top
of your Raspberry Pi. Okay. Now it's quite simple, but how it's different is that in comparison
to your Raspberry Pi there is a neat cross 8 digital
LED display present here. So you can use this for various different purposes
as per your requirement. Okay. Now, it's simply sits
on top of the Raspberry Pi. Okay, just make sure
the alignment is correct.

And once you've done
with that just push it on top. And the pins would
merge accordingly. Once you do that you
can just place the four screws across the different ends
and tighten it up. And once you're done with this, you can integrate
and use the censored for various different purposes. We will use sensor to measure
the temperature the pressure as well as the humidity
across in this room that is present. Okay, so this has
different sensors present on it and we'll be using them
for today's demo. Okay. So let me just put this up
and once it's all set up.

Let's go back to our demo and let's begin
with understanding the programs before we begin the execution. Okay. So moving on now that you've understood
about Raspberry Pi's and Saturn V. We also install
raspbian on our Bye, let's move forward and start with respect
to today's demo part. So again going back
just to remind you. We trying to create
a better control system wherein we try to measure
the temperature the pressure and the humidity
around the sensor as such. Okay. So the first thing we're going
to do is I let me just connect to my Raspberry Pi. Okay. So this is
my Raspberry Pi interface. Now. Let me just show you
the program as well. So I've divided the actual
program into three parts so that it's easier for you to understand how this program
works as such now, the first program that we are going to execute
is the sensing environment.

So this is a simple program that's going to sense
the environment variables. That is the temperature
pressure and humidity. And then it's going
to correspondingly display these values on the censored
LED display panel. Now, let me explain this program
to you one by one now firstly we need to import the He boosts
the values on the censored. So for that we're going
to use this line from sense underscore hat import sense
at so this will give me the corresponding values from the sensor
to my Raspberry Pi interface. Then I'm also importing type. Now. The main objective of time is to help me keep
a log of all the values that are measuring. Okay, so that will be
seeing little ahead.

After that. I'm going to assign
the censored values to a variable known as sense. Okay, so through this variable. I'm going to correspondingly
relate to all the values coming. From the sense at okay
moving forward we have written a while loop
and this is an infinite while it's going to continuously measure the temperature
pressure and humidity and is going to correspondingly
be displayed on the sense that as well. Okay. So let me help you understand how the temperature humidity
and pressure are measured. Okay. So what you need to do
to measure the temperature is used the function sense dot
get underscore temperature. So this function that is get underscore
temperature will give me the temperature value measured by the sensor
in degree centigrade.

It and hear what I'm
basically doing is that I'm just converting
it into fahrenheit. Okay, so the value in degree Centigrade into
1 Point 8 plus 32 is just a Fahrenheit representation
of the current temperature. I'm using a round
function to round of the corresponding value. I don't need any decimal
point values here. I want a whole number. So what I'm doing is that I'm using a round function
and once I have the temperature then I'm going to be storing it
inside a temp variable. Okay. Similarly. We are going to use
sense not get humidity and sense dot get
pressure to get both. The humidity as well as pressure and store it in humidity
and pressure variables are such. So basically I have
all my three variables that are needed now. What I'll do is I'll create
a string called message. Okay into which I'm going to
store the temperature humidity and pressure with
a specific notation.

So T is going to be equal to the temperature H is going
to be equal to the humidity and P is going to be equal
to the pressure. Now comes the part where have to display this value
onto my sensor display screen. Okay, so here I'm going
to use the function. Sense dot show
underscore message. So this is basically
a call through which I can send any message to
my sensor display screen. Okay. Now here I am just passing
the message with respect to the temperature humidity and pressure variable and then I'm also
defining a scroll speed.

Now. This is something that
you can play around with if you want to have
a fastest-growing you can modify it. I have chosen a 0.08 scroll
speed then the other two factors are the font color
and the background color. Okay. Another text color I
have set as 200 240. Tea and 200 now
if you can guess these are basically the RGB values for
the corresponding text color. So this is something
that I have said as per my requirement you
can play around as well as background color is something that I have set to 0 0 and 0. Okay. So you have complete freedom to modify this as
per your interest. I would definitely recommend
that you try playing around with this to get a better feel
of how it works. Okay. Now what I'm doing is that I'm putting my system
to sleep for four seconds.

This is basically to introduce a delay between the
measurement carried out. On the sensor now, if I don't do this since it's a continuously
running infinite loop it's going to keep measuring
at one after the other. So I want a simple delay
between the measurement. So I'm putting the system
to sleep for four seconds. After that.

What I'm doing is
that I'm opening a file called weather dot txt now here. I am going to create
the log into this file. I'll take the present time and
then pass the message as well. So these both with respect
to the present time as well as the message are going
to be stored in form of a law.

Okay, so in case in future if I want Want to refer
to the measurement, this is something
that will be really helpful. Finally. I'm also going to print
message on my console. Now. This is something just
for our understanding as well. We'll be seeing it
on different places will see it on the console will see it on the sensor as well as we
will be seeing it inside the log file as well. Finally. I'm closing the log and then I'm putting my system
to sleep for 5 seconds. So these sleep delays
are just to ensure that the consistent values
are being measured in regular interval and there is no hindrance
with respect to Okay.

I hope you guys
are clear with this because I'm going to go on
to execute this program. So let me open my console. Okay here let me write
the command for executing a Python program
and it's very simple. It's just python followed
by the filename. Okay. Now in our case
it's sensing environment. Okay, so let me execute this. And now if you see
the values are being computed and on the sense that the values are being shown as well so you can see here
the change with respect to that. Okay, firstly it showed me
all the temperature humidity and pressure and now
it's already come on the console as well. Similarly the going to have
a simple delay and then you can Already it showing me
the next values on my sensor and it's going to be
stored in a log file.

And then it's going
to come onto my console. So very interesting. Right? So definitely you can play
around with respect to the font. You can play around with respect
to the background color as well as if you are interested, you can try bringing
different temperature items near the sensor to see
the variation with respect to that as well. Let's say if you have
a glass of hot water and you bring it near the sensor the temperature value will
correspondingly change as well. Okay. So this is something that
you can really Experiment on and have a good understanding
of how things work.

So let me just close this program and let's
see the log file. Okay. So this is my weather
dot txt file. So I have taken different
temperature measure variables. It's been log from a long time that we've been
trying this out on. So definitely there are
a lot of values here. Okay. So let me just show
you the latest value. So this is a range of values that I had just tried
out some time back. So all the log
all the temperature and pressure log are being
stored here continuously. Okay when you feel comfortable.

This is the latest log that we have just created with
respect to the three values. This is the current
status as such. Okay. So again, this is something
that you can experiment on. I am just told it because of
my future reference as well. Okay. So I hope you guys have got
a simple understanding of how you can connect to your sense at measure
the temperature pressure and humidity and also display it on the console as
well as on your sex act.

Now coming on to the second part second part
is the slightly Advanced version of the same program here. We're trying to do something
a little more apart from just seeing it on the screen. Okay. Now I want to send an email
with respect to all the logs that I have or let us say
at a regular interval. I want to have an email which notifies me with respect
to the present temperature and the current
pressure and humidity.

Now, this is something
that you can definitely use while you're working
on a social experiment as such usually
in the Laboratories. It's important that you
always keep Check on the temperature
pressure and humidity. So this is something
that you can try out. So let me show you the code. Alright, so here I am just including something new as well
apart from our previous code. Okay. Now if you see our previous code
is still present here. I'm taking the temperature. I'm taking the pressure humidity
storing into a message and then I'm also
printing that message but apart from that
I'm using a few libraries which are very essential
for mailing me this detail.

Okay. So for that, I'm going to use
first SMTP Library. Okay, because your I'm
wailing Protocols are SMTP based protocols. So these are something
that I will be using in case I need to send a mail
with respect to all the details as such so these
are standard protocols through which I be communicated. Okay. Now coming down with respect to what Mi Ami is
a Miami basically is an extension or multi-purpose
internet mail extension. Okay through which
I can send emails which support text characters non text characters audio
video images and so forth. So sending a mail. Is an essential important
Library as such? Okay moving on forward. Let me explain you the code now here we
are repeating the same thing. We are also importing the time function and then we
are establishing a communication between the sense
at and the program.

Okay. So here first you need
to specify the from address that is from Coos mail ID
you're sending this. So I have created
to test Melodies one is a durocher test 11 at gmail.com. So from this address
the mail is going to be sent and the address
which is going to be receiving. This is a deal-breaker. A Raspberry Pi. Okay. So from this email-id
I'm going to send a log with respect to the data that is measured from I
censored Raspberry Pi. Okay, then I'm going to use my Mi Ami multi-part
function from here.

I'm going to distribute my mail
into multiple parts. So this is what your Mi Ami multi-part function
will help you to that. So in my message part the from
is going to be the from address that is from whom it
is going the two is going to be the to address
and the subject. I am defining it as temperature
Raspberry Pi so temperature Then I'm measuring
all the temperature as well as the pressure and humidity and storing it
inside a message variable. So here what I'm doing is that I'm basically going
to attach the message in a plane format
to my message variable, which is going
to be the details of the temperature and pressure.

Okay. Now, let me come down and help you understand
this part of the code. Now. I'm going to establish
a connection to my server. So I'm going to use
your server variable where and I'm establishing
an SMTP protocol do Google. Okay. That is your or
smtp.gmail.com sensor. This is a standard
mail protocol SMTP for Gmail. It is smtp.gmail.com
other meals you can just replace the corresponding me and then
you have the port number. So again with respect to SMTP. This is a standard Port that you would be using
for communication. That is 25. Okay, then I'm going
to start my server. So that is server dot start TLS. Okay, once I start this then I'm going to specify
the login credentials. This is basically
for authentication Factor. So server DOT log in you have to provide
the Username and password. So my from address is
my username and my editor a kpi is the password
for this email-id. Okay once have specified
this then what I'm doing is that I'm converting
the message as a string.

Okay, sometimes what happens is while you are trying
to send this. It may not get sent as such because it has
values also associated with it some directly converting
it completely to a string. Okay, and then storing it
inside a variable known as text. Then I'm calling
the function sin. Email through which I'm
specifying from which address is going to which address
it should go and the text which is part of it. Finally. I'm quitting the connection
between the server. I hope you've understood
till here with respect to the program now, it's time we
execute this program. Okay, so let me call
python email dot p y okay. So now what it has done now,
it's connecting to my server. That's the delay here. Okay, its measured
the temperature its measured the humidity as well as
measured the pressure and then it's going
to send the mail. So let me show you
this meal ideas were so as you can see here. I've already received a mail from anyway car test lab
it's called temp rasp that we had set and it's given me
the corresponding value of temperature humidity
and pressure.

Uh sure so this is what
I was referring for so you can do this across to let
me show you my sent box as well. Okay. Now if you see a new Sandbox, I can actually see that this male has been said
so there are two ways for me to verify this as well. So this is something
that is really helpful for me now coming back to my Raspberry Pi let us
now see the final program in which we want
to incorporate this and do a little more. So let me explain you the code
little more better here. There are few things do here. So first you have pikul and Jason being imported
now pikul, basically, Is going to help you establish
a connection between your API. So we're going to use an API through which I'm going
to pass my data. So for that I'm including
bikers here apart from that you have string IO, which is a standard string
input output management package and you have
your our PI dot gpio. So that is Raspberry Pi's
General input output. I am just referring
to it as gpio.

Okay, so moving forward
whenever you see gpio it is the general input output
from the Raspberry Pi and then you have the similar
function you have sense. Go hat from censored
and time function and I'm establishing
a connection here as we have done earlier
between my sensor and my application and I am clearing
the screen on sensor. Now. What happens is sometimes if you've executed
a program before and you've stopped the execution
of the program then what happens is the display will still have the remaining
data present on it.

It stays stuck on the sensor. So before we move on
to with respect to our program, we will clear the data out. Okay, so that's what
sense dot cleared us now here. Two things that are present
here hot and cold. Okay now why they're
being used I'll come back to that a little ahead. Okay apart from that. There's also a new variable
known as push message. So we'll be talking
about this also when we come down later and you'll understand what
the push message is used for. Now. Let's try to understand the code which will help me
display numbers on my sensor. Now, you might be wondering if I have already displayed
number and data on my sensor. Why do I need a separate
part of the score because here we're trying
to do something different.

And from what we
have already done, so here firstly what we're doing
is that we're setting an offset from the left and the top. Let me go back
to my presentation here. Okay. Now here this is the standard program that
we are talking about. But let's see. This is what we need. Okay. So this is what we're going
to explode ahead. Now. This is my actual sense at okay. This is a neat cross
8 LED display function. Okay. So here what I'm going to do
that I'm going to eliminate the First Column and the first two rows
from the top. Okay, so this We will give me a 6 cross 7 Matrix area
remaining with me.

Okay, this is where I'm going to do all
my operations from now onwards. So this is something interesting
and I'll help you understand why I am taking this region. Now before we move on let's take
a simple look with respect to the core present here. Okay. Now before I do that, let me try to help
you understand why I have taken a 6 cross 7 Matrix area. Now. This was the remaining area. I have divided this remaining
area into two parts. Okay. Okay, I'm just going
to give a gap of one column between these two and the left hand side is going
to represent the temperature or the value in tens place and the right hand side segment
is going to give me the value in once place.

So this basically is
a 3 cross 5 Matrix where and I have 15 positions
to play around with boom. But this number again, this is 15 areas that
I can play around with in a 3 cross Phi Matrix. Now, let's go back
to our code now. Let me help you understand
how it works now. I have basically
10 numbers with me. Okay. So each one is going to have
a specific way of representing in a 3 cross five Matrix. So that's what I
have written here in this number Matrix as such. Okay. So each of the line
is a representation of a corresponding number
in a 3 cross 5 Matrix and this one and zero
basically is a configuration for the LED to be either turned
on or turned off. So normally when we
write 0 the first line will always be full. The first three numbers are one. Okay, then you have 1 0 1. Okay again 1 0 1 1 0 1 and my last three
numbers will be again one so as and when you represent
zero in a normal form, this is how you do that so it may not be so clear
to you right now.

Okay. So what I would recommend is before you try to understand how each of the numbers
are displayed set an offset on your sensor there
try playing around with respect to different
values to understand how you can represent each of the numbers once Made
two or three mistakes, then you'll get a clear-cut
understanding of how each of the numbers can be displayed. Now. This is for a 3 cross
Phi Matrix tomorrow. You want to try it across the
across it you can do that as well. So definitely make sure to try out make mistakes only
then will you learn? Okay.

So each of the line is
a representation for a digit in a 3 cross Phi Matrix. Now, let's try to understand how we can display
a single digit for that. I'm going to define a function
called show digit, okay. Okay. So this is the function it
takes a value as an input. Okay. It takes a value for x d OK XD is the x-coordinate
for where the digit has to be present yd is
the again the y-coordinate as to where the digit
has to be represented and the last is a simple
RGB value present here. Now first thing
what I'm going to understand is that I'm going to compute
the offset position. Okay. Why do I need to
compute an offset? Because each of the
numbers are present in different rows of the call. So I Need to understand
which is the present number and which value do I
need so for that what I'll do is the incoming
value into 15 will always put me at the start of that room. Let's say the value is 3, okay. So 3 into 15 tells me that I need to
move 45 positions.

So as I said
each row has 15 so 15. Okay, then I have 30
in the next row. Okay, and once I'm done with
the 45th transfer then I'm here. This is the standard
representation for three. 3 so I have this complete row
at my disposal presently. I am pointing to the start
of three value. Okay. So this is something
important to remember. So this is why we
are Computing an offset by multiplying the value in 250. So I have the complete
access to this row. Okay now we'll try to execute a for Loop through which
I'll place these values into the different parts
of the LED display. Okay. Now see I have
three cross 15 area. So I need to identify
in which area should which Look up that is
which led should be turned on. I have three rows and 5 columns. So I need to identify this. Let's go back. Now. The first thing that I'm going to do is
that I'm going to compute x t OK XD basically is going
to be the value of p modulo 3.

Okay. This basically is going
to give me value of 0 1 or 2. Okay. So if you go back
to our presentation, it's either going to start
from this 0th position or it is going to be in the first position or in
the second position. Okay, similarly in
the left hand side. Also, it could be
this 0th position first position or second position. So basically we are
dividing this that's what you need to understand. Okay coming back. Let me just remove this. Okay. Similarly. I'm going to compute my y of T by have to basically
is to help me understand which value should I take
from this complete row, so this will basically start
from zero and go all the way till 14 as such.

Okay, so it will basically
represent which column value should I take So I
hope you understand from this which column value
should I keep taking for my next value. Once I have this then what I'll do is I
am going to call the sense dot set pixel Rumba
how we had called sense – roh message so there and we had sent
a complete message. Now, what we're doing is
that we just sent to each of the pixels
individually as such. Okay, so we're going
to use the x coordinate.

Okay, which is going
to be my x t plus XD. Okay. Remember this? Okay. We'll Define X. Still it'll add but just
keep this in mind XT plus XD is going to give
me the x coordinate y t + yd is going to give
me the y coordinate and then basically
my RGB number comes so here I have just done
a multiplication of P into R. So whichever I want I'll
just convert it accordingly. Okay. Now comes the choice of when you have to display
two digit number. So instead of going back
to the same function. F defined a new function, which is called show number now show number is
The original function that will be caught because the temperature measured is most often
a two digit number. So this is where the actual code
was going to start from. Okay. So number takes four values. It takes a variable called while which is
the present temperature. I have my RGB value as well as
I'm going to begin the function here firstly I'll begin by taking the absolute value
of the given input.

Okay, when I say absolute value, I am basically trying
to identify the number present in the tens place. He's okay. So this is what absolute value will be whatever the digit
is present in the tens place. I'm going to store it
in my abs underscore value so that I'm just
providing it here to the tens place then
let me also identify what is in units place and this
is simple mathematical operation where I divide
the number by 10, I'm going to get a remainder and that's what I want. So I'm going to use
a modular douche. So my absolute value divided by 10 is going to give me
the unit's place as well.

Now, what I'll do is I'll run. If condition so here
what I'm going to do if the value is greater than 9 then I'm going to call
the show digit function which I had defined earlier and I'm going to pass
the tents value. Okay, the value present
in the tens place. So and then I'm going
to also pass the XD n yd. In this case x d + yd
is going to be the offset left and offset top why let
me help you understand here.

My offset top is going to be
with respect to this position. It's going to start from here. Okay, so it will point
to the third row. Okay my offset. Left will point
to Second column here. So I know that this is
where my tens place has to come. So that's why
I'm passing it here. Okay. I also am going to pass
the standard RGB value that I have got input here then
for a second time.

I'm going to call the show
digit function where and I will pass the unit's place, but with an offset
of additional four spaces. Okay. So this coming back
to our segmentation. This is going to be
four positions from our left. So offset left is going to give
me the first place but offset, Plus four is going
to be the start place where I have defined
for my units place when I say from top it's worth
going to be the same because I'm not separating with
respect to different levels. So I'm just going to change
with respect to my offset left. Okay. So that's the only difference
present here now coming down. We are Computing the basic
temperature the humidity and pressure and then storing it into a message string
now comes the place where I need to do
my actual implementation now if you remember
our problem statement, We have to send
the pressure temperature and humidity as a notification
on our mobile device. Okay, so for that I'm going
to use in stop push which is an application
through which I can send notifications across my mobile.

So my python application that is the final application
will communicate to install push and that will
in turn communicate to my mobile application that on which I
have configured it. Okay. So the notification
will be received on my mobile application
now coming down. Me remind you again
why we are using this in a real world scenario. This is something
that is being used by NASA. Okay, they're they're using
it to identify if the exterior temperature is
falling between a specific range or even let's say if there's a change
in the pressure inside the cabin or if the humidity is too high, so all this can be measured and you can get notified
with respect to any change that you want. Okay now coming back
to our program. This is why I have defined
a range of cold and hot If it falls below 37 degrees, I want a notification
if it goes beyond 40, I want a notification. So this is my range by value. It should either be
only 38 or 39. Okay. So this is why I am using
cold and hot variables now. Let me help you understand how the in stock push
application is working for that.

Let me open my browser
and show you how you can configure in stock push for
your Raspberry Pi application. Okay. So this is
my insta push homepage. Okay now first. Seeing what you need to do is that you need to begin
by creating a user ID credential here and it is very important. When you logging
into your application, you use the same credentials. So make sure you
do not lose this because it's very important only if you use the same
credential will you get this notification so remember that so you have an option
to sign up for free as well? Okay. All you need to do is
provide your username provide your email address
and then specify a password now, let me just log in. Okay, so I'm just logged in. Okay now here you can see
there's already a timeline because I have already
configured this application. Let me help you understand how you can do this now
in my application. I already have a temp
notify application. Okay, which will be using as
part of our understanding. Okay, firstly let me click
on ADD application now once I do this I need
to specify a name.

So let me just call it sample. Once I click on Sample once I press add
application sample gets created now it is asking me
to add event here. So click on add event. So let me call this temp rasp. Okay, and then tracker
would be message. Make sure you create a tab here
after you specify whatever it is that you specify and here push
message will be message. So make sure it's present
inside curly braces. What are we are specifying here. Once this is done just click on add event and this event
is going to get added. Okay, so the event
has been added now it's time. I helped you understand
why I had specified message there so rumor let me go back.

To my code. Remember we had defined
something known as push message. So this is why I
have defined message here. So this is what is going to be sent between
my final program application and my insta push application. So this is why we had defined
this variable earlier as well. Okay now coming down
with respect to this. Let me go back to my insta push
and let me help you understand. What all do you need
before you move ahead? Okay, just go to the basic info Tab and here there are
two things that you need. Okay first. First you need
your application ID and then you need
the application secret. So this is very similar to how
you have a user ID and password. So this is what you're going
to use in case you're working with an application. Okay. So make sure you note
this application ID and the corresponding
application password. Now if you come back
to my program you can already see I have mentioned
the application ID as well as the application secret and here the push event is
to my temp notify. So this was the previous event
that was already set.

So I will be reviewing. Bring to that as well. Now, what you need to do is that you need to use Curl
to post whatever data that you have
to the insta push API. So for that you're going
to use biker dot curl function. Okay, and this in turn
will help you communicate between your application
and insta Porsche. Okay. So all the communication
is going to be through a variable called
C. Now C dot set up. Okay here what I
am going to specify is that I'm going to specify
the URL first, okay. The URL is going to be HTTP colon slash slash
a pi dot insta pushed IM / version 1 / post. Okay. There's also another
alternative URL which is HTTP colon slash slash
a pi dot insta pushed IM / post itself now in case the other is not working you
can use this or vice versa.

Okay, moving forward. I need to set up
the customer headers basically for my authentication
and content type specification. Okay. So for that you're going to use
the command C dot set of forward by C dot HTTP header. Then I'm going to specify x – install push –
a pi D plus my app ID, which I have specified earlier. So this will help
me identify to which up. This has to be pushed. Okay. The next is going to be x –
insta push – app secret. So basically the app secret
your your password in this case.

Okay, then comes
the content type. That is what What type
of content I go to pass so this is going to be
application dot Json. So I'm basically going
to pass a Json file to my API. Okay. So I hope you guys
are clear till here. Okay. Now what I'm going to do is that I'm going to
define the function through which the message
is going to be passed. Okay. So here what I'm going
to do first is that I'm going to use
a dictionary structure for passing the data as Json
in my post function. So Jason – field is going to
create a dictionary and in through that
I'm going to send this data. Okay. Now what I have to do is that I have to specify
the field values.

So first comes the event, okay, which is basically
what event I need to relate to then comes my tracker. I'm not specified any tracker
as such then comes my message where and I'm going to pass
the push message push message basically is the
temperature the pressure and the humidity as such now if you want you can print this but I am not going
to print it here. Finally. I'm going to use Json dot dump
to make a Json file and going to assign it
to post Fields variable. Okay. So post field is the variable which I am going
to pass to my APA. Okay next to send your Json file with post use the following
command C dot set-top. Okay inside which you're going
to specify CDOT post field and you're going
to pass this post field, which is the Json file as such then if you wish
to capture the response, then you can capture
it inside a buffer. So for that I am also going to
use a buffer to write operation and this can Done
with the following command C dot set up inside which I'm going
to write C dot right function and buffer, right? That is the right back
has to be into my buffer.

Okay. Now if you want to be updated whether the post
has been sent then you can use the following command that is C dot set top followed
by C of C were Burrows. So this will make sure that I am getting posted
on my terminal with respect to the communication finally
comes our operation of checking the temperature. This is very similar
to what we have. I've done earlier where we are running
an infinite Loop. I'm measuring my temperature
in degree Centigrade. I'm measuring my humidity
measuring my pressure storing this value
inside a message variable and then putting it
to sleep simultaneously. I am also writing
into a log file and this is going
to be stored with respect to the present time. Okay, so till here I
hope you guys are clear now comes the part where I
have identified my temperature.

I'm just making sure
it's an integer and then I'm going to call
my show number function. But if we had defined a function based on which it
is going to be displayed on my Raspberry Pi so this
is a call to that function. Okay, once I
have done with this, I'm going to store it into temp
1 then I will make sure that I am writing it
into my file and then comes the interesting part if my present temperature is
either greater than or equal to the hot message or if it is lesser than or equal
to a cold temperature that we have defined rumor
the two variables.

We had defined earlier. This is where they
are being used. Used. Okay, the push message
will start with either if it's hot or if it's code following that would be
the present values. Okay, the pressure the
temperature and the humidity. Okay, then what I'm doing is that I'm going to pass this push
message to my P function that I have just defined.

So basically it will first
convert the push message into a Json data and then it will pass it
through the communication. So this is
what is happening here. Okay. Same thing will happen in case
it is the temperature Falls below the cold rain. Guess what? Okay, then I'm going
to create a Json file and then call CDOT perform. So this basically will initiate
the curl operation to start finally to capture
the response from the server. You can actually
use the buffer rage. Okay. So with this we have come
to a conclusion. Let me just show you
the final part of this. Okay, so make sure that you're closing
the communication through curl. So you see door closed. Okay. This will ensure that the communication done
through curl is closed as well as you ensure that the General purpose
input output is cleaned up so that new values
are being taken.

So now let's execute
the final program. That's python final
program dot P by okay. Now as you see on
the Raspberry Pi it showing me that it's presently
35 degrees Centigrade, okay. Okay, I've started getting
notifications on my phone. Let me just share
this phone screen with you. Okay, and you can see there's
a variation with respect to the temperature shown
on the Raspberry Pi as well. Okay, let me show you
first my phone screen. Now. If you see here it's actually showing multiple
notifications being generated. Okay, it's showing me
that it's cold presently. And here's the complete list of
the temperature notifications.

So I'm getting a constant
notification with respect to the change in temperature. So you can see it's continuously
being Generated here as well. So this is something
that is really helpful when you're working
around with respect to a real-time scenario. So like I said NASA
extensively uses this for their own purposes of measuring the
temperature pressure both in their scientific research
area as well as the shuttles and space stations
that the user. Okay. So with this we come
to a conclusion of our demo session Raspberry Pi
has become the heart. Of The Internet of Things domain and camera is one
of the most interesting modules that you can add onto this
interesting Hardware as well.

Now, let's begin by exploring
the pie camera for that matter. Now the pie camera was one of the best additions
to the Raspberry Pi component because this module has helped
the users to use the perspective of camera into one
of the smallest and the most effective combination
of the internet of things. Now the main objective of the by camera module is
to help you capture images. It's capture videos time-lapses
even slow motions as well. Now apart from this
the pie camera also helps you capture videos in full HD
at 30 frames HD at 60 frames and even Vijay videos
at 90 frames as well. Now there are two versions
of my camera that are out there. Now the latest version being
the camera module version 2, which was introduced
in 2060 now, although there's not much
of a difference between both these cameras. There has been a slight increase in the resolution wherein
you had five megapixels for the first module you have a It's not and even the sensor
on board has been swapped out where in there was omnivision
for the first version now, it has been replaced by
a Sony sensor as well.

Now talking about the by camera. You need to be quite careful while you're working out
with the by camera. So let me help you understand how you can set up by camera
with your Raspberry Pi as well. Now, there are five different
stages on setting up by camera will be looking at each one
of them one by one first. Let me help you understand
how to connect your pie camera to the Raspberry Pi now
this Is very important because we've used
three camera modules and we managed to burn
out two of them. So please be careful because this is
a very delicate ribbon and this is also
a very delicate module as such so let me
help you understand how you can attach the CSI cable
to the Raspberry Pi and then I'll also
help you understand. Once you've done this how to enable the camera as part
of your Raspberry Pi as well. So this is
my Raspberry Pi camera, and this is the version
2 of the camera now if you notice this is the camera
that you can see and this is something
that's really difficult.

It gets a piece be careful. Now one thing that I really want you to notice
here is the connector here. So this is called The Sunny Side
Up and this is called the silver and now you need
to be really careful when you're plugging this so, let me just bring in
my Raspberry Pi here as well. So here we have
our Raspberry Pi 3, and I'll just show you
how to connect this. There are mainly two precautions
that you really need to consider while you're working
with the Raspberry Pi camera. One thing is just please ensure that the Raspberry Pi is
Switched Off or disconnected before you connect
the Raspberry Pi. Camera as well. The this actually leads to a high chance
of blowing up your camera. We've already successfully
managed to do that once so, please ensure firstly that the Raspberry Pi is
Switched Off and also that the connection is correct. If you notice the silver
side present here, this should be facing
the HDMI port that is present here.

Now in order to connect this
let me just slightly push it off and this slot needs
to be slightly raised up. You insert it like this. Okay. Please be very careful. Once you've successfully
inserted it then just push down the hinge as well. This will lock it. So make sure the silver side is
towards the HDMI and the Sunnyside is
to your 3.5. Mm Jack side as well. Now. It's recommended that you get
a case wherein you can also support the camera because it's slightly
challenging because there are rubber in itself is delicate. So when you get a case, which has the camera support,
it will be really useful to you as well. So it is a very delicate items. So please be careful
while you're working. Thing with the Raspberry
Pi camera module moving on. Let's look at how to go
into the interface and enable the Raspberry Pi camera module
for your Raspberry Pi as well.

So now that we
have successfully connected to our Raspberry Pi
let me show you how to connect or enable
the Raspberry Pi camera on your Raspberry Pi as well. Now, what I have done is that I have established
a remote connection between my Raspberry Pi and my system using
VNC viewer as well. So this makes it quite easy
for me to show you what I'm doing
on my Raspberry Pi. So once you have successfully
connected and turn down your Raspberry Pi you
can go into the menu and then go to the preference
section here going. To the Raspberry
Pi configuration. And what you need to do is go
into the interface section here. Once you're here make sure that you have enabled the camera
option as well by default. This would be disabled. Now. I have any able most of these
for different purposes so you can just enable
the camera option as well. Once you're done with this then
we'll go on to the next stage, which is understanding how you can capture images
from the Raspberry Pi camera and how to capture video
from Raspberry Pi camera as well now rasp eyes still
is actually a shell command.

Which lets you Is
the camera module and capture an image now, the command for capturing
an image is rasp. I still – oh and name of the image that
you want to store it as now – oh is basically
to open the camera and capture the image
and at the same time if you want to rotate the image
vertically or horizontally, you just need to pass
the parameter – VF or – Hatcher now both of this
will either flip it vertically or flip it horizontally
and when you pass both of them, it will completely
flip it around as well now apart from this if you wish to capture a video from the Raspberry Pi
you can use the command r a spy with doing
this will help you again capture the video
from the camera module. Now, this is something
that gets stored by default as a h.264 video as well. If you wish to convert this you
can use the following command, which is sudo
apt-get install – why g-pack now? This video will actually
help you install MP4 box onto your machine and help you convert
your h.264 videos into MP4 format as well.

Now once you have it
in MP4 format then Quite easy to play this video
and check it out as well. Now again, if you want to run it
for a fixed duration, then what you can do is
that you can also pass the duration as part
of the parameters while you're specifying
a spy with as well. Now one thing that you
need to keep in mind while you're doing this is that the timeframe that you're passing
here is in milliseconds. So please be careful
while you're doing this now, although I am specifying 10,000. It's only for 10 seconds that the video is going
to be captured as well. Now, let me help you understand
how you can do all this. By using a python function
rather than a shell command as well for that.

What you need to do is that you need to install
a package called by camera. Once you've done this
then you can easily access or you can easily perform
all the operations as part of your Python program using
the pike Ram module as well. Now, what you need to do is that first you need to update
all the packages that you want. Then you need to install the python by camera
package that's present.

Now if you have two versions
of python on your machine that I would recommend
that you run both these commands that is python – by camera and by In 3 – bye camera this
in turn will ensure that you have the 2.7 and version as well as
the three-point X version of Pi camera present
on your machine as well. You can also install Pi camera
using pip install as well.

So the command is pseudo pip
install Pi camera as such moving on let's talk about how you
can actually create a program or how you can use
a Python program to record the videos
for the same 10 seconds. Now earlier. What I had done is that I had just mentioned
that run for 10 seconds using the Shell command r a spy
with but Technically speaking. This does not really account
for all the challenges that may come across while you're actually
capturing a camera now that is where you use a Python program
to help you ensure that even if an exception is come across then
you can handle it and due to that will
be actually using the with statement here firstly what I would like to do. I would like to import
the time package of now importing the time package
also helps me access to the pi camera module and the by camera function
will in itself connect to the pie camera module
and the data that comes With them
not when I'm using with function here this in turn will actually help me
in handling all the exceptions and encapsulating
the proper tasks and cleaning up
the tasks as well.

So basically becomes
a best practice while you're using the by camera or while writing any codes
for that matter. So most of us programmers
would like to consider all the scenarios
and take care of it. And in this case python
has given as the with statement to it take care of it as well. Now if I use the command
camera dot start with you, what is going to happen is that it's going to give me
a Review of what my camera is C and I call a sleeve
for 10 seconds this in turn will ensure
that for the next 10 seconds.

The camera preview is
on once that's done. I'm going to stop the preview. So what I have here is a preview of what my camera is seeing
for 10 seconds as well. But this is not
where it restricts. There are various other commands
that my pie camera brings in as well talking
about these commands when I use the command
camera dot capture. It captures an image
and Camera dot start recording and stop recording
will in turn help me. Did a video as well if I go back
to my previous program here here I can also
write camera to capture in order to capture the image
between the 10 seconds or what I can also do is that I can also start recording
at the same time as well.

So I started recording Let
it wait for 10 seconds, and then I stop
the recording as well. So these are different commands that you usually use
together apart from this if you want to capture a stream, then you can use camera to capture my streams followed
by what type of stream that you want to store
it as well now if you wish To stream the video that is coming from your
Raspberry Pi then you can use the command camera dot captures
followed by my stream and the type of stream that you wish to store. Now again, this also can be recorded wearing you use
camera dot start record. It captures the stream
and you specify the quantization that is needed to this as well. Again, if you wish to play
with some of these properties of the camera as well, you can play around
with the brightness. You can change the resolution and you can even add a weight
with respect to it. Similarly as you have a timer function in
your standard cameras the same. Be used here as well.

So let's say I want to start
the recording after 5 seconds. I can do that as well. Now with this, let's come to the demo
of this session. Now, this is a slightly
interesting demo. I'm quite sure most
of you are looking forward to this as well. Then we'll try to
help you understand how you can actually set
up a security camera at your home as well. Now talking about the overall
system here now here, what I would like to do is that I would like to capture
the image of anyone who comes to my door.

Once that's done I would check if this person is a recognized
person or is it someone that already has
access to the house? If not, I can always
prompt my user and And give access to it. If not, I can deny access to it. Now to those of you actually see
in our iot projects video. You would have noticed
that in Mark Zuckerberg section. He had actually
allowed his parents. Now, I do not want
to manually have to do this when I just automatically allow
people to do this as well. That's a smart system
or that's an enhanced system that we really would love
to achieve as well. So we would not be
completely able to achieve it but we will take
our tiny steps towards it and we can all enhance it as
per our requirements as well.

So firstly what
We're going to do is that we're going
to detect the face. We're going to gather this data. We're going to compare it and then we're going to start
recognizing data as well. Now again, this is
a learning process that takes place. This is something
that involves a lot of understanding and this
slightly gets interesting for most of you as well. Now when we talk
about face detection now, the first stage of face detection is
Verena program actually decide whether an image has a face
or it does not and this stage in itself is called
a classifier as well. In order to achieve this opencv
actually provides us with to pre trained and ready to use
face detection classifiers, which are part of it. We have the half classifier and we have the LBP
classifier as well. Now one thing that you
need to notice or one thing that you need to keep in mind while you're working
with this is that the classifiers
themselves process the image while they are in grayscale
as well because it gives the machine quite Clarity on whether to classify it
or not as such now when I talk about each
of the classifiers whether I talk about
the heart classifier or the LBP classifier, Each has its pros and cons.

So let's actually try
to understand this. Now the concept of phase
detection is not something that's quite alien to most
of you and I'm quite sure you've all seen it be it
in our Facebook applications Snapchat. Some of us have also seen it
on the ATM machines as well. We're in Phase
detection is incorporated. And if you wish the most
simplest methodology or if you want to see
the most common example that's out there
for face detection or face recognition. You can see it in most of the phones today
as well again here. What happens is
that The two algorithms that are most widely used are
the higher classifier and the LBP classifier as well. So again, both of these classify are mostly processing
the images in grayscale because we don't actually need the color related
information to decide if there is a face
or not now again, there are going to be
two classifications present here the computer program
which actually decide whether there is
a positive aspect where in the phase is present or the negative aspect where
the face is not present or so.

So this is how you
decide or this is what you Call a classifier
for that matter now in opencv as we have seen. There are two
different classifiers, which is the higher classifier
and the LBP classifier as well. Now again, when you talk
about the higher class where it is actually
a machine learning approach that we take a and this was created by
Paul y Le and Michael Jones wherein they are trained
many positive images and negative images
without faces as well.

Now this intern actually
started helping them understand that extracting feature
takes quite some time and if you consider
both What segments when you consider higher and LBP had actually takes
up slightly more time. But at the same time it gives you a slightly more
precise solution as well. Now what it actually does
is it actually considers the adjacent pixels
to the region where the face is protected and then it actually
sums up the intensity of these pixels in each
of these regions as well. Once it's done. It actually calculates the
difference between these sums and then it uses
them to differentiate between the section and the subsection
of the Ages as well now when it comes to the LBP
section of this here, it creates a 3 cross 3 window
at the time of image as well.

Then what happens is that it starts comparing
from the Centre pixel with all the other pixels which are greater
or equal to the value which is set as 1
or 0 as well then again, it goes on to read
the binary value in a counterclockwise order
and converts it to decimal which are Center values
of the pixel as well. Now what happens is that this process is completely
repeated one after the other and you An easier or a smarter
solution to this as well. Now again, as we have discussed both
of them have an advantage and a disadvantage as we are talking
about the half classifier there. It has a very high accuracy
when it comes to detection of face and there's quite
minimalistic false positive. But the challenge is that the computational time
that it takes is quite slow. And again, the training time that it takes is quite long as
well and even in dark segments, it's not quite accurate as well
because it fires High Clarity with respect to the images
or the scanning area that it takes in the picture.

But at the same time when you look at LBP
classifier its computation and training time is actually
quite fast and shorter when you compare
to the hard classified as well now it is quite robust when to any elevation changes that is when there's
a change in lighting. It's still comfortable
and capable of handling this but at the same time
it's not quite accurate or it's not on the same level
at the same time has a high chance of false
positive fatigue as well now. Move on forehead. Let me just show you about
these packages slightly better. Now. If you come into
your opencv package now, I would recommend that you download the opencv
library from GitHub itself. And if you come
inside the segment and you go inside data what you can see here are
the different hard classifiers and LBP Castle path. Now, if you go inside
the hair Cascade section here, you can find different
XML files present here, which will help you understand or help you recognize
different aspects of a body it can start from I you
can start go to I classes And then sue forward as but now
what will mainly be using is that we'll be using
the frontal face segment here.

Okay. And again, these are XML files. So even if you open them
and if you see them you would not perfectly
get a clear-cut idea but this is something that we have to use as part
of our program as well. Meanwhile while this is opening. Let me go back. Let me show you
the lpp segment as well. Okay. Now what you see here
are different values that are associated in these are different values
to help you identify or help you understand how the face recognition
should take place as such. Okay. No again. It's a very huge document. So what they're trying to do is that it again going to try
to restructure it again. I think you've got
a simple idea at this point.

So let me just close
this and let me go back now if you check the LBP Cascade segment as well here
you have different segments. So again, what we'll be using is that we'll be using the frontal
face segment as such. So what I've done is that I've just created
a separate folder where I've kept my program and these two opencv files
for different algorithms as well now coming back we've done with our
detecting the face. Let's talk about Using our faces as well now till here
what I have done is that I have detected my face, but I need to start
recognizing this face as well. So face recognition mainly can be classified into
three different steps first. I've actually dealing with the data Gathering stage
now in the stage, what you're mostly
going to do is that you're going to gather
any relevant information with respect to that face. So usually this is done
when you have multiple photos of a person and then
you start identifying or you start training
your machine on this face and then it starts recognizing
the Face every time that it comes up with an image
of the same as well.

Now there are
three different functions that opencv provides us to do this and let me give you
a brief idea on each of them so that you know, which to use well now first
comes the Eugene faces now Eugene freezes actually
takes all the images at once looks for all the important and useful
components in these phases which are known
as principal features and then passes it
on now one key factor that makes or one key challenge
with respect to the Eugene. Phase function is that it requires a good
amount of Illumination.

But at the same time when you have your fish your
face here individually images or individually features
are extracted rather than extracting one by one and this in turn actually does not have a challenge
with the illumination segment as such third is your lbph, which is your low
binary pattern histogram and this is very similar
to your LBP as but but what happens here is that you create a binary Matrix
and convert into decimal factor and then you actually Not
a histogram with respect to it. So what happens here is
actually a comparison with respect to the histograms
that are present. So each phase will
have a correspondingly different histogram and I just compare
these histograms to in order to identify which phase
it is belonging to now. Let me come back to my place where you buy and
before I go forward as we said this segment
actually deals with two parts first is actually
capturing the detection and the second is
with the recognition part.

So let me first show you
how you can detect it now. We've already discussed above. About detection or how to
capture any intrusion detection in our Raspberry Pi 3 tutorial where we actually capture
someone opening the door and coming in as well. Once I've captured this image. Then I need to start
recognizing now first. Let me show you
this program here.

If you want more details on how it works out then
you can definitely check out our Raspberry Pi
3 tutorial as well. Now if I use the following code,
let me just expand this a bit so that I think you
may not be visible to you. We just increase the font size. Yeah, I know. I think you can all see
my code as well. Now again, we're using
different packages here you using user Library CV
to the time and numpy as well. Now, I'm first going to set the first frame
then I'm going to decide whether there's any
detection as well.

Okay. Now for this as we have mentioned
in our Raspberry Pi 3 tutorial, you can use the IP
camera application which is an Android application and you get an IP address
as well or a URL which have specified here. Now, let me just run
this and show you what I'm seeing at this moment. Now what it's going
to do also is that it's going
to capture the last image that the camera sees as well. So any change
with respect to it? It's going to overwrite until I quit or I exit
from the program as such so let me just run this. I just zoom in a bit. So let me go back to my desktop and I'll run
the camera application. Now what it's doing is that it's connecting
to my phone camera and it's going to create or show
you what I'm seeing or what. My phone is seeing
at the moment.

So what you see in is
my Raspberry Pi set up here as you can see, it's set up on a curve
because it's slightly tends to get heated up, but you can see it's
a separate device as well. So this is my first frame
and what I'm going to do is that I'm going to put my hand
in front of it and I'm going to make this as my last frame
as well while this remains. I'm going to press
Q to quit from this. And it also has created an image called test
dot jpg here as well.

Let me just open this and if you see it's my hand
that has been captured. So what happens here is that it captures the last
in frame as well. So if you want to get
a better understanding of which image it captures
will rerun this but before that, let me just remove this file. Okay. So let me just send
it to the waste bin. And then what we'll do is we
just re execute this program. I'll start by keeping my hand in
the front of the camera itself.

So this is my first frame, okay. And any change to this
let me I'll just move it off completely. So this is going
to be my last frame and I press Q to quit from this and let's
just recheck the image as well. So you can see it
has captured the last frame as such with respect to this. So it's a very interesting thing
for capturing this and now let's actually come
now into our program which talks about
face recognition and face detection as well.

So this is the program that will help me detect
the face train my application and also understand which face
belongs to whom as well. So I have imported my opencv
to because that is where my face detection
and face recognition. Algorithms are present. I'm going to use
the OS module here as well because I need access to the drives our the path where these images are going
to be stored as well and numpy is one of the very
Key Programs of is one of the very key modules, which is required for any face
detection recognition as well.

Because the information that you're going to be using
would be stored as a numpy array for that matter. Now again, what I'm going to do is
that I'm going to actually identify the face
of three people. Okay. I'm going to identify
whether the image that I'm passing is of Ronaldo
is of messy or is off Robin. Okay. Our if it does not fall
into either of these three, it's going to give
it as null as well. Now our first program
or the first function that we're going to be
working is with respect to detecting the fixed. Now, as I said, all the images are going
to be converted into grayscale. So that's what I'm
going to be using. C V2 dot CVT color
to grayscale conversion. Once this is done. I'm going to create a face
Cascade for that matter. Now C V2 dot Cascade classifier
actually specifies which kind of classifier to be used.

Now for this program. We're going to be using
the LBP classifier. Okay. And as you see it's
for the frontal face as well. We've seen there are different
aspects but we're going to be using LBP frontal
face classifier as such now this phase is going to store
the list of all the faces that I'm going to be detecting
or I'm going to be identifying. Okay. So for this what I'm
going to do is is that I'm going to specify
face underscore casket and then I'm going
to ask it to detect in multi scale parameter. So I'm going to say it has
to identify in grayscale. The scaling factor of the image is set as 1 Point
2 and the minimum number of pixels that it
should consider is 5 okay. Now if no faces are detected
from the images that I pass then it has
to pass the parameter as none.

But if it is detected then I
want all the four coordinates with respect to
the X and y-axis, which I'm going to be storing
in XY W and Okay, X Y width and height
with respect to smarter or I'm going to specify
which part of the image does the face actually contain. So I'm going to specify with
respect to the four coordinates that I'm going to be passing. Once this is done. Then I'm going to define
the next function which is to prepare my data now as we've seen first comes
detection then comes preparing when it comes to it. I need to specify the path from where it has to pick up
the images for that matter. So let me come back. Let me show you
where the images are. Isn't now when you see
inside training data folder. Okay, I have actually
three folders present here, which is my S 1 S 2 and S 3
if I go inside as one you can see there is
a Ronaldo's photos. If I go back
into S 2 you can see that is Messi's photos. And if you see inside S3, this Robbins photos
present here now.

Let me come back
to the core now here. What I'm doing is
that I'm passing the path then I'm calling the phase function
as well as the labels. Now again, the phase is going
to hold the sub phases of all the subjects
and labels actually. Help me identify which
it belongs to as well. Now what it's going to do is that it's going to run a for
Loop wherein it goes through. Each of the images
is present in the path. Now again, what we have decided
or what we have started with the naming convention
is with s 1 2 3. So what it's going to do is
that it's going to check if the folder name starts with s because usually there are
system photos separately. So it is going to check
if the folder name starts with s if it does not then it's going
to go into the next Loop. But if it does it will check
that folder as well. Then what is going to do is that it's going to create
the label for it or it's gonna identify
which folder I'm presented.

If you actually go back inside
back to my training data, you can see I have specified
1 2 3 after this so it's just to help me identify which label
it belongs to as well. You can use any different
naming conventions that you want as such then
what I'm going to do is that I'm going to specify
where the folder or where the images is present, which is actually
one level inside this so I'm going to go
into the next directory. And then what I'm going to do is that I'm going to run a for
Loop for all the images. Are present in this if an image or a file
for that matter starts with DOT because system files
usually start with DOT.

So those are going to be ignored but others are going
to be recognized using my opencv where and I'm going
to read the image first. I'm going to show you a message
that says training on the data. I'm going to resize
the image to a size that is comfortable for me, which is 400 pixel
to find a picture. Okay, and then I'm going to wait
four hundred milliseconds for that matter. Now what you can see here is that I'm calling
to detect phase function which is present earlier. Yeah, so this again is a call
back to the previous function where it goes up and it actually
calls the previous function that we have created
to detect the face as well. Once that is done. It's also going to revert with me the position
as well as the face or the ID which it
belongs to as well.

Now if a phase is present
then I'm going to append it to my face list and I'm also going to add
a label to this face as well. Once this is done. I'm going to
destroy these windows because again opencv
creates a lot of windows, so I'm going to ensure that it's destroyed
by doing it twice as well. This is done. I'm going to return the This which I have and the labels
correspondingly as well. Now what you need
to understand is that here the faces here are
of different players as well. So each of the phases present in each of these images
is going to be segregated.

It's going to store
this into a location and it's going to start
raining on them as well. Then what I'm going to do is that I'm going to prepare
the training data. Now this again is something that is becoming a recursive
function for that matter. It's going to be
calling itself again where it goes back it
goes to one level up and it's going to
keep calling itself until I have trained
on all the folders which are present and all the images present
inside that folder as well. So once this is done what happens is
that it prints me that data has been prepared.

And then it also tells me
the total number of faces and the total number
of labels also present here as such finally
what I'm going to do is that I'm going to create
our LVH be faced a cognizer. So for this I'm going
to call the lbs be faced a cognizer function. So if you remember
we had discussed about three different
phase secondary functions, we're going to be using
the LBH be faced a cognizer function figure. The function has been defined then I'm going
to pass these faces so that my machine can learn and train itself to identify
these phases in future. Now, what I'm going to do is that I'm going to just create
a rectangle across their faces. So that becomes
a differentiating factor for them or helps them separate
where the faces with respect where and once
this is defined or once I have created a rectangle
across their face again, these XY heads that are the different
coordinates of the face, and I'm just going to draw
a rectangle across them.

And again, I'm going
to specify which color so this is your RGB value. So it's going to be
a green color box that's going to be defined
and I'm also going to print the name
of the person present here. So what it's going to do is that it's going to identify
which person it belongs to and it's going to print
it in hen seaplane. Okay. And what is going to do is that it's going to be printed
again in green color as well.

Now what I comes or now the most
important function comes which is prediction. Now in production, what I'm going to do is
that I'm going to pass an image the image copy
is going to be created. As we do not want to manipulate
or work on a single copy of an image because in case
of any challenge or any issues, we do not want to overwrite or lose the image
for that matter. Once this is done then
what I'm going to do is that I'm going to call
the detect phase function which in turn will help me
identify who the person is then what is going to do is that it's going to predict the
image using our face a cognizer and then it's also going
to print the confidence or how sure it is that this face matches.

Now what I want you
to understand here is that if my confidence
is low 30 that is if I'm not sure that this person's
image is correct or the phrase is detected then
what happens is if it is greater than 30
is going to draw a rectangle and then it's going to write
who the person belongs to and it's going to return
this image for me on the screen as well. Now why have two images that I'm going
to be passing here? If I just go onto my desktop images show
you first is abc dot jpg, and the second is wrong dot
one dot jpeg as well. So let me just show
you the images. So you can see here. I have drawn dot
one dot jpeg, which is an image of Ronaldo.

And I'm also going
to pass a b c dot jpeg which is an image of messy. Okay. So these are the two images
I want to identify and I will be passing
this to my program. Let me just run this program so that you get a full
fledged understanding of what we have written here. And you understand
how this works out as well. Okay. So once I've passed this image, then I'm going to call
the predict function so that it predicts whose face that this belongs to Two
or who's this face is as well. Once that's done. I'm going to destroy this now. I hope you've got
a simple understanding of this. If you are interested
in the code, please give us your mail ID.

We will be happy to share
the code with you as well. Now. Let me just execute this so that you get a clearer
understanding of this. Now, let me just zoom in
so that you know, so you can see it has started picking up
the faces for recognition. So you can see it starting
to prepare the data. It's checking out
all the images. It's reading the faces is trying
to detect the fuses for itself. Now you can see total faces are 22 wherein
it has identified 22 images and it also has started
to predict it and it's given me the confidence
of the face detection that it has taken place as well. Now the prediction
has completed for Ronaldo. It has successfully
predicted the face and it also has put in the text
and if you see for Messi also, it has done the same
but the text is very small here because the image has been
resized for that matter.

Okay, so it has successfully
predicted this it has detected. It also has recognized
it as well now. Has also told me who
this face belongs to as such for that matter. So this is how our face recognition
system works completed. Now, this is just one of a very my new door one of
the basics examples of this and if you want to create
a complete full fledged system, let me give you an idea
on that same as well. Now if you wish to have a very
great system out of something that's really effective
out there something that's not too hard
to build then this is something that you should really
consider place your camera, which is a wireless camera
on top of your door. Okay, use the Raspberry Pi
to detect the motion. What will happen here? Is that every time there is
a detection Raspberry Pi would detect this happens and then it would pass
on this information onto the cloud the reason
for doing this is that it becomes quite fast and it's way more effective in that matter as
well here the phase would be detected recognition
would happen all the information regarding these phases would
be present on the cloud itself.

And once it has identified that this is a valid
user then correspondingly. It will allow the door
to be opened as well. But what you need
to understand here is At this in turn can also be configured for you to have an application or a notification sent on
to your mobile application from the cloud as well. Because most of the mobile
application Epi is for pushing information is
very easily accessible and configurable on the cloud as such the Raspberry Pi has
become the most popular platform for exploring the no House
of Internet of Things.

It is redefining
the nuances for a new era of minimal operating software. And if it's
about operating systems, you can be sure to find Microsoft Windows just
around the corner. So we'll be talking
about the Windows 10 today, but not the one
on your desktops or laptops. In fact, not even the one
on your smartphones this Windows operating software
runs devices even smaller than any of those now, if you've been tinkering
with the Raspberry Pi you must try installing
the Windows 10 iot core on it and know the operating systems that come as a part
of the Windows 10 iot windows that is fairly popular amongst operating systems is
now available for Internet of Things is actually a revamp of the old operating
system Windows embedded but with iot taking the World by
storm the Windows 10 iot is now it's official operating
software for all everything's and systems.

Now the windows for Internet of Things comes
in three packages the Windows 10 iot Enterprise comes
for the embedded systems that draw more power
and require more resources like the bulkier systems
in high grade or industrial grade Machinery the Windows iot
mobile Enterprise comes for more minimal systems
like the ones in our televisions or handled it. Vices and the Windows 10 iot core comes for
the smallest embedded systems in iot like even minut
combinations of microcontrollers and microprocessors. So you can scale up or scale down these options
according to iot devices and the requirement now the Windows 10 iot code
is the smallest of the three operating systems
launched by windows for The Internet
of Things it in fact is the smallest operating system that Windows has ever had
and you will be happy to know that this one comes
for free now this windows for small devices is so minimal.

It's interface is unlike any of the other
Windows operating systems and it is almost like that
of a bear Windows kernel but it is just about enough to
power the things in iot run all of its applications and ensure the seamless flow
of data to and from the cloud. It also supports many other
words used in iot development, but we be focusing
on its installation on the Raspberry Pi today. Now, it's minimal interface is
for better convenience as whenever an application
gets deployed to run on the Windows iot core the
windows interface will disappear and all you'll be left
with is the application. Running on it. Now this is because the Windows
10 iot has been designed to run both headed and headless which essentially means
with and without a display.

So your device becoming the application
will reduce confusion while running headless. This also means that we can have only one active
application running at a time while there could be
other background applications running all that said
I think it's finally time. We went over the installation
of the Windows 10 iot core on the Raspberry Pi so I have a Raspberry Pi
3 here with me already and a class 10 SD card of 16GB upon which Be flashing
our operating system. And please make sure that you SD card is at least
class 10 and has a capacity of at least 8 GB without these you
might face compatibility issues with the windows iot
core operating system.

Now the Samsung Evo or the SanDisk Ultra
would be your best choices. So the first thing to do is
to format the SD card. I recommend using
the SD card format or software that is available
for free online. You could also use the default
format on your system, but I'd avoid using it as it
does not optimize the partition. Required by the operating system
and the storage on SD card and it compromises
on the entire capacity that is available. So go on with the SD
card for matter, so it is really easy to get
we start by opening a browser and typing SD card for matter
into it and hit enter so you can go to the first link.

And scroll down
once the website opens so you can see SD memory
card format a download for Windows and Mac since we need the Windows
operating system to flash the windows iot core or to
the Raspberry Pi will be going for the windows version of it. So click on it and you
download should be initiated. So once you download
is done find the setup file and install SD card format
Iran to system. I've already done that
so I will straight away go and open the app. And here it is. So you'll have to know which Drive is your SD card
mounted on for that. We can go to my PC or this PC. So in my case,
it is the F drive.

So I'll make sure that the card is wanting
to the F drive and I'll click on format. It will give you an alert saying that it is all data
on this card hit. Yes. There we go. Now we are ready for the windows
iot core download. So we go back to the browser
and we type windows iot. So the first website
is the official website for Windows 10 iot core. Once the web page loads go
to the download section and you can see there's
a download link saying download the Windows
10 iot core dashboard. So this is
what will be downloading. So we'll be installing
the operating system through this dashboard itself. Let's go to the download
folder find the setup file double-click on it. And click install.

So it's a 58 Point 1 MB file. So it is getting downloaded
on the Windows 10 iot core dashboard from
where we will be installing and flashing it
onto our SD card. So once the setup is done, the windows iot dashboard
should pop up automatically if it is not you can search it
on your system as iot dashboard and open it. So now with the dashboard
in our system, we can start installing
the windows iot core onto our SD card.

We can do that by setting
up a new device. Let's click on setup new device. So once you do that,
you can see a few columns that you will have to fill so
the first is device type. So I'm using a Raspberry Pi 3. So I'll choose Raspberry Pi 3. What? Was Bill do I want well, I want the Windows 10 iot core. So I'll click on that
which Drive is my SD card on its on the F drive. That's correct. And you can rename
your device from here. Let's say I'm gonna name it men win RPI and you'll have
to set a password for it. So I'm going to go
with our PI 3 win 10 have to repeat the same. Our PI 3 2010. So now that the passwords are
in place accept the license agreement and click
on download and installed.

So I'll give you a pop-up
about erasing the SD card click on continue. So you downloading has now
started so you might get another pop-up which is
the iot utilities trying to install on your system, press yes, then you should get
a command line window where the OS will be flashed
upon your SD card. So with that done, we finally have the operating
system on our SD card. There will be another prompt
asking you to format disk. Please hit cancel. This is very important to not
hit for my disc it on cancel. That's it. It says you guys
d card is ready. So go back to your mypcc. Make sure you eject
your SD card. Once it is safe to remove
take it out and put it back in your Raspberry Pi. So the next thing to do is
to connect all your peripherals to your Raspberry Pi and power it on now
most operating systems will require you to configure
some basic settings.

When you put them up
for the first time since the Windows 10 iot core is
the smallest version of Windows. It almost has negligible
settings to be configured. It will only ask you to set
up your default language and if you want to connect
to any Wi-Fi network, and that is it so now
upon starting the pie. You should see the windows logo. You can see the welcome screen
for the Windows iot 10 code now since it has been designed
for minimal and low-cost devices the configuration upon the first boot
has also been kept minimal so that does it for finally
booted into the settings of the windows iot core. So let us set the default
languages English and hit next after which it will ask you
to connect to a Wi-Fi network. Let us say we will skip
this step and You can also do it later
from the home screen or the desktop.

So that's it. You finally successfully
booted the windows iot core and it is ready for use. So here we have Katana
you can record your voice for better speech recognition. I'll skip this for now
and let's say got it. So this is your desktop for the Windows 10 iot core you
can see there's device info which is mainly a home screen. It tells you the IP
address and everything. There's a command line window. There's also a browser
and there are tutorials for you to make the most
of the windows iot code. This is settings button. There's a power button
as well other reason behind your desktop
being so minimal is that the windows iot
has been designed to run both headed
and headless applications so to develop applications, You can do it on your laptop
and then push it remotely it onto your Pi upon which the pie
will become their application. You can use the visual
studio for it. So now you can go back
to your iot dashboard. Now the iot dashboard also
offers some functionalities for you to remotely
control your pie or your windows iot core.

So you can go to the my devices
on your dashboard and you can see there's a Raspberry Pi
3 with the name mean when RPI the name that
we gave it in the start now. From here, you can open it in device portal
to our extended features. You can launch
a command line window. You can launch
iot Remote client. You can shut it down. You can restart it plus you
can add another pie to it. You can also connect it
to the Jour Cloud for intelligent analysis
and advanced cloud computing. And also there are
three packages which indirectly be deployed to your Raspberry Pi so you basically
won't need Visual Studio. You will not need much
of coding you can directly download these packages
and run them to die. The power of Windows iot core. So that's it. You can see the settings offers some basic preferences
this network in Wi-Fi. This blue to this. Katana is a command line window.

There's an internet browser and there are other
tutorials to make the most of Windows 10 iot core. So that will be all
I hope you followed how to install the Windows
10 iot code now looking at the rise in the Popularity
of Internet of Things. I've come up with this tutorial
to make sure you people pick or purchase the right
development boards for your iot projects. Now the adreno and the Raspberry Pi are you go
to votes for all things iot, but how are they any different and which one
should you be using? Well, don't worry by the end
of this session.

You could be educating
your friends on the same. But before we begin though, let me quickly tell you
what exactly I'll be covering in today's session. So for those of you that are still confused
on what these devices are. I'll briefly talk about
these integrated circuit board. Odes then we
compare their hardware and software specifications
understand their modes of operation check out
there available boards and finally conclude
with the purpose that each of these boats
have been designed for so without putting
it off any further.

Let's get started. The computers were
a breakthrough in the world of machines making
the operation of any device or machine smarter than ever and the motherboard
in a computer is what drove these operations either performing
logical instructions that have been fed to them or calculating outcomes based
on the information. They receive these
motherboards LED all parts of the computer communicate
and act by utilizing the CPU and the memory in fact
any peripheral connecting to the computer also
needs to connect to the motherboards
programmable input/output. Actors for their operation now these motherboards
are integrated circuits and with the world trying
to minimize the size of devices and make them more portable.

We now have a variety of
similarly capable circuit boards available to help us build
smart equipment of our choice and according to our needs. Only smartest development
boards today zero down to the Raspberry Pi and the Arduino
both these integrated circuit boards might have
a few things in common, but differ majorly
in the mode of operation and capabilities and if you've been experimenting
with the embedded systems, or if the onset of iot has got you playing with
these integrated circuit boards, then you must understand
the key differences between them and know the one that will be more suitable
for your iot projects.

So let me Begin by telling you that the Arduino is based
on a microcontroller and is mostly designed. To control the electrical
components connected to the circuit board
in any system. Whereas the Raspberry Pi
is based on a microprocessor that computes data and produces
valuable outputs and if required it controls
the electrical components and it's system based on
the outcome of its computation. So basically the Raspberry Pi
is a single-board computer with the Arduino is just
a single-board microcontroller. So let us start
with the comparison by learning more
about the hardware and software specifications of the latest models
of both these devices. Now the Arduino boards have a very simple hardware and
software structure the Arduino, you know runs on an 8-bit AVR atmega328
microcontroller on a chip, which has a ram of two kilobytes
upon an eeprom flash memory of 32 kilobytes and clocks are processing speed
of 16 megahertz on the contrary the Raspberry Pi boards
have a complex.

Lecture of hardware and software the
Raspberry Pi 3 B plus comes with a powerful
broadcom BCM to a37 b0 microprocessor on a chip as
its Central Processing Unit, which runs on a 64-bit
quad-core processor called the a arm cortex a53 featuring a static Ram
of 1GB running directly upon the SD card storage
at a clock speed of one point four gigahertz. Now this microchip also acts
as the graphics processing unit with the broadcom video
code for integrated graphics card building. It for low-power multimedia
processing now such a multi utility microchip
is being called a Soc or a system-on-a-chip these days and besides the processor
and the graphics card. They also house other
microcontrollers to control the electrical components. So there's plenty
of power packed into it. Even for many add-ons
or USB connections. Now most of the other Hardware, uh, pretty much the same
for both these devices like timers voltage
Regulators serial, peripheral interface bus has
into integrated circuit serial, you are and I/O pins, okay. Connectors but again, the I/O connectors
in Arduino are more capable than the I/O pins
in the Raspberry Pi which must depend on transistors
to drive external hardware.

I'll be Raspberry Pi is still
better logical processing which means it can compute even
complex mathematical operations enabling it to process and support audios videos images
and other gu eyes. So it's more like a computer
in contrast to the Arduino which can only control
path The device and would need additional circuit software and communication buses
to run audio video or any visual graphic at all. Plus the pie also
offers HDMI support. So all that you need
is just a screen or any display device removing
the need for connecting it to a computer all the time
like the Arduino now this is because the Arduino comes without any operating software
the only real software it has is for compiling code
to Machine level and allowing serial connection
for data transfer.

This is also why
it requires less power and could even get faster as it only needs
to compile code and use the chip directly
to control any component. Whereas the Raspberry Pi must enable all required
layers of software and utilize different programs to make any task
happen then again, it is also why the Pike
in multitask doing a variety of tasks at a time while the Arduino can perform
any single task multiple times. So the Arduino offers
an ID with the compiler and is the only one
that this device supports which means only the codes
written here will work and get compiled
on to its physical board this He uses basic C and C++ paradigms and breaks
down all its functions into accessible packages
making it quite easy to learn and operate however
with the Raspberry Pi which supports multiple
programming languages and software environments. You need to be proficient at coding to get
the most out of it. Also the pie now
comes with Bluetooth and Wi-Fi support
for remote connections.

In fact, its latest model
features faster Ethernet or dual band of 2.4 gigahertz
and 5 gigahertz wireless, LAN and an embedded web server while the we know features
Bluetooth on just one of its boards all the Arduino BT and will require
additional circuit for communication over
wireless networks or ethernet. Now these additional circuits
for the Arduino or called Shields and are attached to it
for extended functionalities similarly in the case of the Raspberry Pi
these extended circuits are called hats both are plenty of available housing
diverse functionalities sensors Motors actuators and software on them for interacting with
the physical world and driving external hardware according to It's
host devices capabilities. Okay. Now I can see
somebody has a question. So Debbie wants to know what is the most
popular programming language that is used for coding
with the Raspberry Pi.

So since the Raspberry Pi is essentially a computer
you can actually run code on it in almost
all programming languages. But the most popular one
in my opinion would be python as even the pies official
operating system comes with the default python ideally, which is the IDE for python. So I hope that clears you doubt
if there is Any more questions, please keep it coming. Okay. Meanwhile, I mean move on. So let me now tell you how you can identify the purpose
behind using either an Arduino or Raspberry Pi. So the Arduino being more
of a microcontroller motherboard is best suited for
repetitive tasks like reading and Reporting temperature
opening and closing of doors controlling lights or building motion
detecting alarms. It also works great for creating quick
and lightweight prototypes, but the Raspberry Pi is more
like a general purpose computer and is good at complex. Relations or performing
multiple tasks or processing a large amount of data.

So if you need
a full-fledged computer on a very small scale the pie is
what you should be looking at. So let us now move on
to the different boards that both have had over time and look at some
of its prominent ones. So the Arduino has been around
for quite a while now and has had multiple
boards over the years with different functionalities. Although the Arduino, you know, the Arduino Mega they
Do you know lily pad and the Arduino Bluetooth
have been the more popular ones? Similarly? The Raspberry Pi despite being relatively new is
on its third generation with each of its models
better than the previous ones the Raspberry Pi 3, B+ is its latest and most
powerful development board yet in the session.

We'll be talking
about the top seven projects which are outstanding
themselves in the Internet of Things domain now, let's talk about Each
of these projects. Let's start with number 7,
which is a biometric system. Now a biometric
system is something that we always encounter
on our daily basis as well because we always
either use a fingerprint sensor or we use an iris scanning. So it depends from
organization to organization. But how does this actually
work the system there? Let's take in case of this example has
a fingerprint scanner. Now the first time that I
am presenting my fingerprint, it scans the fingerprint and considers this as
part of an enrollment.

Us from this fingerprint
template what it does is that it extract
certain key features, which makes it different
from others and stores it into a database from then
forward every time that I place my finger on top
of this fingerprint scanner. It creates a template and Compares this
with all the templates that's present in the database if it matches
then correspondingly, let's it gives me an attendance
or lets me access at or if it does not then
it raises an alert with respect to that same now. This is just a foundation now as I said this biometric
system Fingerprint, it can be is scanning or it can be a combination of both as well as
voice recognition system is one of the key products
in the biometric domain next.

We have Smart irrigation system. Now I am someone who personally likes
gardening a lot. Now, this is something that would really
make my life easier because usually what I do is that on Sundays I spent about two hours just
watering and looking after my plants through
a smart irrigation system. What it does is that it checks the moisture
present in the environment or in the water lanes that I
have created now to help. You understand how it works. Usually there are two main
Internet of Things devices that are used here, which is the Arduino board
and the Raspberry Pi your Raspberry Pi becomes
the main processing unit. And I place an Arduino board
for each of my water channels.

These addressing modes
themselves are connected to multiple sensors which are part
of this water channel. So what these sensors do is that we check the moisture
present in these lanes are such so let's say a specifically in does not meet the minimum
required moisture then what it would do is that it will Send a signal to
the Raspberry Pi again.

All these devices are connected on the same
wireless router Network and the Raspberry Pi
would identify the lack of moisture and pass
the signal to the relay. The relay in turn
would initiate the water pump and water would be pumped now
in order to ensure that water is not wasted we
would create gate controls and only the gate where the moisture is less. Would the gate be open
once my sensor detects that the moisture level has gone beyond my required
level it would Against another signal to the Raspberry Pi asking
it to stop the pump as well.

So this in turn helps you
to save a lot of water and also makes your life
quite easier as well. So after this your only task in your garden would be is
either setting up new plans or creating new water channels
as such the next project in our list is a security camera
and door unlock system. Now, this is something
that's quite interesting and I have personally
tried this out and it's really something that you should try
out as well here.

What happens is
that you place a camera on top 40 Which in turn
clicks the photo of a person who comes into the frame now, this photo is again sent
to an analytical system which in turn Compares this
with all the photos that it possesses
in order to identify whether to let the user open
the door or not now and evolution to this is that if it does not find
the photo of that person it can notify the concerned person that so-and-so person
is trying to access this dough. Would you like to
authorize this person and address information
to the database or would you? I'd like to deny the access
to this person as well.

Usually this is used in areas where you have high
sensitive information stored in order to maintain
a strict control to the access to this information
as well another usage of the security camera and door unlock system
can be even at our homes when we can identify who's come at our home
when you're not there and either decide to give them
access to our homes or not. Now the next thing is something that we all really
decide to have which is a smart home system
a smart home system can be something
that really makes. Life quite easy starting
from energy management where the light control system
is the AC the appliances that we use the thermostat
all this is managed in short trying to cut
down the power consumption that's taking place by door management system
is also part of this.

My security system is also part of this my water management
system again becomes a part of this as well. Again, these are key things that really stands out
in the smart home system. But again, what I
would personally recommend is that a Smart Homes
limitations is where our imagination stops anything that you wish to automate
or make wish to make your life easier can be part
of a smart phone system as well. Now a smart home usually
is going to be a base for our next project which is a smart City
a smart city is an evolution of a smart home here. It's not just the sensors
of a single home that is connected here. It's correlation or a network or a connection
between various organizations various domains as well
as various segments of that city as a whole
as such Judo the life of every single dependent person in that City becomes easier
as a whole as well and in turn will really
help develop that City to Greater extent such now
the key factor here for a smart city is
a government support as well.

And if governments are
really willing to take this step then I hope we would see
a smart City completely built on internet of things maybe
the next 5 to 10 years as well. Now the next
project is something that really stands out
on a personal level this this is Zelda Ocarina controlled
home automation system. This is personally something that I feel is the closest
to a smart home system where most of the elements of the home is completely
controlled by an Ocarina what Alan pan has done here is that he's created
a node-based recognition system, which completely automates
his hope but rather than telling more about this. Let's just look at a quick video which will give you a glimpse
into how he has done this and what has he done. 7:27 p.m. Next on our list at number one. If you've not already guessed is Jarvis Jarvis is the
artificial intelligence system that Facebook's creator
Mark second Berg has built for his home automated system. I'm quite sure you've
already seen the video of Mars are kannberg interacting with Jarvis which has
Morgan Freeman's voice.

And if you've not, here's a quick glimpse
into the same. Good morning, Jarvis. Good morning Mark. It's Saturday. So you only have five meetings
room temperature is set to a cool 68 degrees
earlier this year. I started building a simple AI
to help run our home. I talked to Jarvis
using this app. I built it uses artificial
intelligence to understand me and figure out what to do
Max woke up a few minutes ago. I'm entertaining her. All right. Let's go check on her. Good morning. Let's practice our man.

Zhao Xiang Hao Jarvis
your Mandarin is so soothing she she Jarvis also helps
me get ready in the morning fresh shirt Byron home. Hell yeah, Jarvis knows when to
make me breakfast. Your toast is ready. All right, it's time
for my call with shrap. Can you get him
on the video conference line setting up the BC room. Now remember to check on the AI
guidance system for tequila. One of the best things about
Jarvis is it could recognize people at the gate let
them in automatically and then just tell me about it Mark your parents are coming in. Thanks Geoffrey. It's Jarvis and Jarvis can play
all of our favorite music.

Hey play some good. Go back songs. I'm sorry Mark. I'm afraid I can't do that. There are no good
Nickelback song Good that was actually a test. Okay. How about just play some songs that are whole
family likes what? I'm a dad. Now. This is what I listen to. No, what you need
to understand here is that internet of things
is not something that's just dependent
on a sensor or a few sensors, which is connected
to a Raspberry Pi on adreno put when I look at the entire
architecture of iot. This is a complete ecosystem where in my sensors
gather information, which is again stored
on a platform and then processed on this now if there have been
any issues or failures that have been reported
by these sensors, then I need to create
actionable items.

In order to ensure that this is never
really repeated again, but the information
wants to spin process the process data is then passed
into machine learning and artificial intelligence
in order to understand analyze and identify various patterns that's out there and help
pass this information on back to the sensor
this in turn helps. You have a better experience and also improve the system
as a whole a system where I come home every day at 8:30 start off
my Casey wait 15 minutes for it to cool down is
a tedious process. But it's a today my Internet
of Things platform identifies this pattern already switches
on the AC at 8:15. Then I just need to come home
and I can relax right away. This is just one
of the key examples of one of the key ideas that's out there today and the limitation here again
is just your imagination. It is so good to see that so many of you
are keeping up with the trends. Of technology today. So let us dig deeper
into these devices that Mark the beginning
of every iot ecosystem and look at the best ones in use
today in different domains.

But before we start
don't let me quickly run you along the outlines
of today's session so that you have
a clear idea on the topics that I'd be covering. So first I'll be telling you
how you can identify any object to be an iot device. Then I'll tell you what they
can do for you and cite some of the major use cases on it
and then I'll tell you how iot devices are shipping
the entire world and code some leading examples and then I'll tell you
how secure is. The device in iot and finally, I'll be telling you all
the important things that you need to know
to build an iot device. So without putting
it off any further, let us begin our session today.

Now these devices that play the role
of things in iot are what make the smartest
systems possible today be just a smart Appliance
or an entire Smart City. It could be complete
Computing devices designed keeping the portability in mind or tiny electronic
components operating on minimal device software
for data transfer and Activity without
any Computing abilities at all and there are also objects that are not made up of
any electronic Hardware at all and can still become
the things in iot by having these smart things attached
to them in summer the other way. So what I'm basically saying is that even we humans
can become a thing in the internet of things. But again, that is a contextual top
and you'll understand why as we move on with
the session today.

So for now we can just say that any device however puny or powerless with
the ability to receive or send data allowing
it to communicate over networks can be called
a thing or an iot. Ice also, it should be serving
a purpose like either collecting some information or
delivering some outcome. Now that is the least
any iot enabled device or thing in iot
will require today, even though the bigger devices
have diverse features and can be more powerful. It is a miniaturizing
of computer hardware that has truly given
the Internet of Things its Edge in the market today. It is made it possible for these iot devices to even
function and microscopic levels in the remotest corners
of our world. And as also Borden focus on more Target oriented features
specific to their goals, Plus with devices running
on incredibly low power levels and operating with
such minimal resources. The things in iot come
with the promise of implementing Solutions in the most cost effective way
possible without compromising on the system's accuracy.

This is because at the smallest
levels these things are embedded with just enough technology for them to communicate
over the internet and other networks to get
the data analyzed stored and processed over that Network or over the cloud rather
than physically housing. All those Technologies
on themselves. Also such low power levels
are perfect for the lead. Our chips sensors
and other low energy components that is devices used
for the operation. But like I said, there are substantial equipped
to connect wirelessly for exchanging data and Performing
actions based on them. Also such low energy modes
of connectivity make it easy for these things to operate
just about anywhere while letting us control
and monitor them remotely for almost any part
of the world.

So it is as if the British technology Pioneer Kevin Ashton
who coined the phrase internet of things back in the 1999
somehow knew of these potentials that I would have brings out. Devices today so
let us move on now. Let us see what things
can do for you. So one of the most popular
implementation of these things and their applications
have been in the sector of home automation today, the use of Internet of Things in this industry
has got the world closer to achieving a dream home
powered by the smartest systems using these iot devices and these systems
have been built such that all its devices can intercommunicate to allow
owners a customized access. To all aspects of your home like your lights your logs
or the inside environment or security cameras or even your total energy
consumption with the brand specific IOD platforms
and clouds behind them. These iot devices are
now capable of exhibiting ambient intelligence and also stay connected
to the internet for driving real-time operations. So let us get into some examples of iot devices used
in most Smart Homes today, and we must begin with the
tunable smart Lighting systems like Philips Hue
smart home lighting or the tp-link.

Color Smart Wi-Fi that can be easily controlled using your smart phones
with the option of creating custom
lighting automations from anywhere in the world
by just being connected to the internet
with smart lights like these you could turn
them on or off anytime and tune the color and the brightness of Lights
in your home's remotely no matter wherever
you are moving on. Did you know that locks and keys are getting
old fashion nowadays. It's not a joke. Smart locks are a part
of almost every smart home today and the August smartlock
third generation is one of the newest and the phones
on the market today. What makes it Stand Out
Among its peers is that it comes
with bluetooth support so that you won't need to worry, even if your internet is down
somehow with a device like this that attaches to your existing
that bolts you will always know if your door is
completely closed and locked with its doors and Technology.

It'll even remind you
to lock your doors when you leaving or tell you if they were properly closed
or not based on the location of your phone, you can even create
secure virtual or temporary keys for your neighbors and guess just in case now the next iot device is Nest
learning thermostat it is one of the best examples
of an iot device today as a part of your home automation system this intelligent device
Lawns your schedules and preferences over
the first couple of weeks too smart in the cooling
and heating systems in your home and then regulate
your home temperature automatically to save
electricity by 20% among a ton of other features. So to reduce your energy bills, it uses sensors and your phone's location
to realize the whether the time or the environment inside and when nobody's home it
will shift into energy saving.

Mode apart from the
thermostat Nest also provide smart cameras with smoke and carbon monoxide alarms to better manage
your home's atmosphere and Security Plus it
lets you manage and monitor each of them
through its dedicated app or even build your own
Revenue channels upon them. There is also one more device
that I think is worth the mention in the home
automation systems of today. It's mostly just a doorbell
for your front doors. Only a lot smarter
the video dogus by ring is a modest name
for all the things that it can do. It's like Always home as it lets you answer
your door from just about anywhere it will in fact, even a lot you of motion
within 30 feet of your door and stream its live footage
onto your phone. And if somebody rings
a bell you can let them know that you're not home and even have a word with them with its right Vision the wide-angle high-definition
recordings get simultaneously saved were Cloud
for your use anytime. Now before I tell you what else iot devices can do for
you virtual or home assistance like the Amazon Alexa
the Google Assistant Siri and Jibo are also attending
application of the internet of things and have made it big in the home automation
systems of today.

Now, other than making
your Home Smart iot devices are also capable of intelligent Lee
tracking your health and fitness and as far as Fitness
goes the Fitbit tracker or the Apple watch and other such smart watches
have been a revolutionary success and along
with your Fitness aspects. They also solve your day
to day Health Care needs like checking your heart rate
and perspiration levels and tracking your body
temperature to predict a cold or a flu on the Are you
will be amazed to know how the other iot devices
are saving more lives and making Health Care better like the Philips Healthcare is
medication dispensing service or the hero smart pills
dispenser are the most successful use cases today and exemplify the potential
of iot in the healthcare sector.

It is the perfect reminder
for your medications and is a convenient measure
for the elderly and the sick alike with the option to remotely
manage it with your smartphone. You could also
monitor the medication of your near and dear ones
and be notified upon running low on any Medication at all plus you could also get info
on the right medication for common health hazards. And now with how integral smart phones
and internet have become in our lives Health and Fitness Solutions
using iot will only get more and more prominent
in the recent years to come.

So apart from
the personal benefits that you can get as a consumer
or user iot also aims to impact the greater good the talk of smart cities
is prevalent these days where the waste management
system is more efficient. You shall in the environment
is checked and even the outdoor lighting and traffic signals are equipped with motion sensors
to ensure energy conservation by turning on only
upon detecting traffic updates and its route or upon sensing pedestrians
and Vehicles nearby.

Now, let us look at some
of the other sectors of service and Civic amenities that these iot devices are
powering to up the efficiencies of our world today. One of the most visible
Smart Systems in place is in the domain of transport
and Automotive today and along with more and more
connected car platforms today there has Also
been a lot of hype around smart and self-driving
Vehicles hitting the lines of Transport very
soon plus with the maps providing real-time Intel and the modern vehicles housing
numerous sensors in them. You could always tell
which way to go or what parts need to be looked at. Like say tracking the Fulton's
option altitude and maintenance issues of flights
in real time without waiting for it to land every time
can help in anticipating problems to schedule maintenance
prior to its arrival.

So that deal is
and mishaps are minimized in the aviation industry
another major area of Application for
iot devices isn't the field of Agriculture or sector that is often neglected. Despite. Its utmost importance can now
be brought up to speed with iot with several cheap
and minimal sensors that monitor the best climate
and soil quality for the right kind of crops
or other smart devices that ensure the efficiency
of automated irrigation systems, even the gardens in your home
or the trees in smart cities or even the plant life
and vegetation in agroforestry or wildlife habitats could be kept in check the most
Innovative iot devices to they include the smart
watering system Blossom, which can create
optimal wanting she Duels for all the plants in your home
based on real-time weather data and forecasts and will regulate
all your sprinkles accordingly and allows you complete control
over them through Bluetooth or the internet and also the clean grows carbon nanotube probe is one of
the best iot devices for farmers and gardeners all around the world today with
sensors to monitor the intake of nutrients in the crops to
better manage farming resources and improve the quality
of their fields farmers can now order Maturity rate and the color of props
for better yields and faster.

It's a production now. It might be a little ironical
of me to talk about one of the very first Industries
to be made smart on such a late note
in today's session, but I really just wanted
to save the best for last and believe me the sector
of retail and Logistics is where the internal things
promises the most astounding results with iot devices already
being extensively used in shopping restaurants
hospitality industries and many other
businesses to control the supply chain effectively. And obtain valuable
insights based on them and manage their logical
or merchandising expenses in the best possible ways. Now the Q hop is one of the leading examples
of internal things being used in the retail today typically designed to bring in
seamless autonomous check out Technologies to
all retail verticals by digitizing the checkouts
through RFID tags that only unlock
after its payment is processed.

The sole purpose behind it was to allow users
to sell check out in stores. Although it is mainly used
for security reasons today to inhibit Petty thefts. Doors, but guess what that was before the Inception
of Amazon go earlier this year. Now the technology inside this convenience store
will really seem like it was pulled out
from the future somewhere. Although it is so new that there are
only three locations with this feature
has six toes so far. So operate and are managed by
the online retailer Amazon. These stores can give
you a shopping experience unlike any you've ever had before with the idea
essentially being grab-and-go. These stores will just
need your Amazon go apps for you to enter
and then employees. Eurovision machine learning and Sensor Fusion
to automatically add items that you pick instantly on to your virtual card
will also remove them of just as promptly if you
keep them back now once you've grabbed
all the things on your shopping list and are
ready to exit all you need to do is just walk right
out of the store.

Yes, no more lining up
in busy cues of the usually limited checkout counters to
wait your turn for the purchase. You can exit the store without even having
to pull out any cash or a card and you will find
the amount for all the things that Walk out with the beaded
simultaneously from the balance in your Amazon account such
a smart system could also check the inventory regularly
to notify retailers on the need for restocking and even helps to manage
the supply chain and a better way.

Now, there are also other
promising areas in logistic that iot devices have started
to unpack like in the case of shipping cargo or Fleet
Management smart Bluetooth. Low energy tags are attached
to the items being moved for remotely tracking the exact
locations speed of transport and storage conditions. For instance. The things dot IO is
a simple iot platform that provides a dedicated
cloud-based dashboard for better Logistics
by enabling access to real-time and reliable inputs from it's
connected smart sensors and paired location trackers
irrespective of wherever they might be so although use cases and the respective
iot devices are things. We just went over
our only a select few of the countless applications
of the internet of things that can drive almost
any sector today and these iot devices
could be things themselves or even attached to someone or something to make
it a thing in iot. Like even a person with a heart rate monitor
could be a thing in iot as it collects
and provides information that can act as inputs to other Smart Systems
to operate on so the Baseline for anything to become
an iot device could be laid out as any object with a unique IP address
for communication over networks and the ability to gather
and transmit data or receive data and perform tasks based on it and the Ameri technology
in these devices are what interact with
either the internal States or the external environment.

To capture all data and drive decisions
made up on them. Now with the internet
of things being such a large community of different
devices the challenges of iot devices mainly start with
communication as the protocols and languages used
by each of them vary. Hugely due to the lack
of common standards for all of them yet and this lack of a uniform and secure standard
across all iot devices, which is great security risks making them highly unreliable
for most important. Missions are into
operations today. Also without customers
being assured of the privacy and security of the data. There is just no reason
for them to risk using or adopting such
insecure Solutions. Do you really understand
what the role of security and iot devices is today.

Well, let me tell you
about a major Cyber attack that happened back in October of
2016 a large distributed denial of service attack dubbed
Mirai affected DNS servers on the east coast
of the United States which disrupted Services
all across the world upon further investigations. This issue was tracked
back to the hackers that infiltrated smart networks through the iot devices
being used in them like the routers or the camera.

So that brings
about the situation. We're in our devices and data
are all remotely connected and stowed upon these networks and its security
gets compromised. We might even not know it
over the first few days or weeks and it might be just
too late by the time we do realize now the way in for these hackers were
undoubtedly a result of poor practice at some end like say the use of default
passwords rather than changing. Hence, the adoption
of better practices and the reinforcement of proper authentication
Network segmentations encryption and cryptography can
still make the things and its systems
quite secure given that we start making sure
of building them up securely from our end as well plus the issue of overall
connectivity is also a feat that our world is still
driving to achieve but hasn't been able
to accomplish it.

That brings us
to the last topic for today. So let me tell you
the important things that you should know
to build an iot device. So building an iot product or device or solution
must be done thinking about the relevant purposes that it can serve and the ways in which they
can be prepared to work for at least the next couple
of decades along with the option and space for
quick improvisations and upgrades and just like we saw in all
our examples today.

You must have understood
the two important categories that iot devices
are mainly made up of the first is the hardware
as And the underlying room is to aggregate the hardware
in the most minimal way. You can without compromising
on the primary features that you want
your device to use. Now. These features are mostly due
to Bluetooth low energy sensors or beacons connected
to the internet or a customized product with
probably a combination of these on a circuit board made up
of a semiconductor like Silicon and may also house
or the components like transistors resistors
receivers transmitters actuators and integrated circuit
or a microchip. So the most devices
like a smartphone or a result of such combinations
on a little more complex level with proper casing and with the second
most important aspect of these devices. So the second important category in iot devices is
the software aspect on the device level the size
of your software will depend on how minimal or bulky your device is.

And what are the components that your housing on it
on the most basic note. The device software only needs to be enough
for handling the operation of your device driving
components to collect data and converting them
into transmitters. Fun connecting two networks
driving the transmitter to send data and the receiver to receive
data to and from the network and converting it to the machine
understandable form for driving components to perform
some task or display. Some outcomes based
on the received instructions. Now all this will require
very minimal software unlike the software
on your phones that come with entire
mobile operating systems all the other important
software for intelligence and smartness in these devices would be provided by the
underlying Cloud infrastructure and even by the Mobile apps
or web dashboards. The software aspect
of iot devices is in fact what controls the hardware
aspects to sense some information or
perform an instruction while both aspects are the most
integral parts of an iot device.

You might also need
to overcome a few more hurdles before you iot device
is truly ready to implement smart Solutions and Power Smart Systems
of our world today. These hurdles could
be connectivity issues or compatibility problems or
security and privacy concerns, but don't let
the obstacles dishearten you in Just consult people
with knowledge on the same. While the Internet of Things
equips a multitude of domains and millions of devices
with connectivity every day. There are still a few domains, which I find a tad
more interesting than the others and they are iot in everyday
lives iot in healthcare in smart cities agriculture
Industrial Automation and finally in
disaster management first, we have Internet
of things in our daily lives. This is probably a Hallmark
in the iot industry as it's also One of the first industry is
to deploy iot at its service. So let me give you an example of how iot can service
in our daily lives consider a home appliance
such as your AC currently, what you do is that you go home you
turn on your AC and wait for it to reach a temperature that you like say about
25 degrees Celsius.

So does anybody
see a problem here? No one that's probably because there isn't
a problem here. This is a perfectly
functional setting. But what if it could be better what if when your car
was five minutes away your AC received a message. What if it was
connected to a cloud which had a dashboard containing
all the relevant information like the location of your car
the outside temperature and the temperature at which you liked your room
your AC could then turn on before you arrived
and create an Ambience that you like? Wouldn't that be something? Well, you can remove
all the waters from the previous scenario
as this no longer. Must just be a figment
of your imagination. Thanks to the internet of things
iot can connect your fitbit's to your vehicles
from your smart phones to your in-flight services from
home appliances like your ACS to whole entire cities. Maybe this is what Kevin Ashton meant
when he spoke of this concept where every area sensor man
and machine could be connected to one another. So I hope you all are
with me till here.

So next we have
iot in healthcare. I'm sure most of you have heard about the Smart Medicine
dispensers by now as the name suggests. It's basically a smart appliance that stores dispenses and
manages your medicines for you. Now. This is a very small piece of a very big picture
the health care and the general practice of medicine majorly
faces issues in one or more of these three things. We have your research
devices and care. Medical research has to rely
upon leftover data in control settings
for medical examination. It lacks real world data, which can solve
critical conditions iot could be the answer to all
these problems The Internet of Things opens ways to a sea of valuable
data through analysis and real-time testing Internet
of Things empowers Healthcare professionals and
improves the quality of care. Finally It ultimately
reduces the unsustainable. A high costs of medical devices. So here is an example. This is basically an outline
of how a care device Works a care device
has certain parameters that are considered safe. Once one of them is breached the sensor immediately
realize this message via a secure gateway
to a cloud now.

It is vital for this
gateway to be secure as it holds all your valuable
medical records the cloud then passes a remote signal
to a Mod device that is monitored
either by a nurse or a caretaker at home. The beauty of remote
patient monitoring is that patients can now
replace a long wait at the doctor's office
with a quick check-in data share and instructions on
how to proceed iot. Hence Bridges the gap
between reading devices and delivering Healthcare by creating systems rather than
just equipment with that said, let's move on to one
of the most talked about prospects of iot
the smart cities.

Now the thing
about a smart city. Is that a smart City solution is
very specific to that one city. The problems faced
in Bombay are very different than the problems
faced in Delhi. Even Global issues such as Waste Control
traffic management availability of finite drinking water housing and pollution impact different cities with
different intensities. So the only way to really
make a city smarter. Is to cater specifically
to its problem one such problem consistent among most
Urban cities is traffic. So imagine an intelligent device like a traffic camera a camera
that can monitor the road of traffic jams
accidents rains Etc and communicate that status
to a Gateway.

Now this Gateway also receives data from various
other cameras from all around the city this in itself could form
a Citywide traffic system. Now where can we use it? So let's say the municipal
Corporation has decided to repair a road which connects to a highway
for more than one city. Now this could cause a massive
congestion a smart camera could send this insight to the Citywide traffic system
now considering this is a smart traffic system
it quickly learns and predicts
patterns in traffic. It will analyze the situation
predict its impact and relay this information. Two other cities that connect to the highway via
their own monitoring systems. Now the traffic
Management Systems, then can derive routes
for cars around this projects live instructions could be sent
to drivers via radio channels and their respective
smart devices. What is a bonus is that if there is a school
or an office building which has no other way but to use that road
under construction, they can be automatically Ali
called and asked to reschedule this creates a network
of self dependent systems which leverage real-time control and this is just one example
of the potential benefits of iot applications.

So next we have a sector which is most neglected
despite the importance. It holds that is agriculture. However manual handling
often results in loss of energy labor cost
and other inaccuracies, which may call its Is
less effective internet of things here can provide with the number
of solutions Precision farming smart irrigation and smart Greenhouse
are a few to name. The first two cases are
pretty similar as in both cases. There are sensors
detecting various parameters at each level of the soil. We have moisture
content temperature and weather conditions one can tell the correct
depth to so the crops or the right time to water them, but One of the more
intriguing Solutions is the Smart Greenhouse a lot
of you might be wondering what is a greenhouse. So the greenhouse is
a farming technique where you can increase yield by
controlling natural parameters. So if we could use embedded
devices in these greenhouses, we could not only just
monitor it regularly, but we could practically
control the climate inside the greenhouse. So how the system works is that the sensor sends
various Toes and areas of issue inside the greenhouse.

They then relay the information
via a connection gateway to the cloud which then sends remote commands via the same Gateway
back to the sensors. So once these signals
are acknowledged they are passed on to the switch gear which then activate
the lighting pumps and turbines inside the greenhouse which then create artificial
sunlight and sometimes artificial precipitation. Inside the greenhouse what more
from the connection Gateway as you can see, there is a monitor through which 24/7 real time
monitoring has come into effect. Also, you could use any smart
device to remove the conditions inside your Greenhouse.

So with elimination
of irregularities and human errors, this creates a much
more efficient system. So with that we conclude
the role of Internet of Things in agriculture. So next we have another domain where iot could prove
to be a game-changer? This is one of those fields where both faster developments
as well as the quality of products are the critical factors for
a higher return on investment. I'm talking about the
Industrial Automation sector, but there are still
a few problems that need to be addressed in this sector. I think you all might
have already guessed. What I'm going to say. Well I OT comes to the rescue
Again The Internet of Things improves the line
of command immensely. It optimizes packaging and makes quality tests
so much easier to run what more you do not even have
to worry about the training cost of too much staff or a lot
of stuff going on a holiday because these factories
pretty much run on their own you can monitor
the supply chain in Real time while keeping an eye
on your inventories with iot applications one could
even re-engineer products and their packaging to deliver
better performance in both cost and customer experience.

So this brings me to the final
application for today that is disaster management. Now the iot cannot stop
disasters from happening, but it surely can help in preparedness and resilience
during one due to high. High population density
poor evacuation infrastructure and exposure to severe weather
events developing countries are more exposed to the risks
of natural disasters and often have limited means
to sustain the effects as a consequence according to a study
more than 95 percent of all deaths caused
by a disaster occur in developing countries
iot can compensate for this by prediction
preparedness response.

And Recovery to rescue
developing and emerging countries from their
vulnerable positions. Let me give you an example
of a forest fire where iot could be used as
a solution to be prepared for critical incidents. Like a forest fire sensors are
installed near the perimeters of the forest. They contribute to data feeds about temperature and carbon
emissions to a control room, which is common
to the entire town.

This is done
via a secure network. Gateway in real time, they anticipate problems
and put defenses in place to mitigate
that impact namely the police the nearby hospitals and most importantly
the fire brigade if such an emergency occurs
near urban areas people and communities are alerted via social media conventional
media channels and SMS. This brings me to the end
of all applications that I had listed now
that we've gone through a few. Applications of iot let's move
on to its future scope in just one year internet-connected devices went
from five million to billions, but there are still a few areas
that need work.

So the device is forming
the base of iot Are Wireless in nature and recite
at very remote places where energy is
a very vital issue. So with growing functionality
of each device, we need algorithms and Hardware
that are energy efficient. To avoid quick
draining of batteries. We need to make sure that sensors are active
for longer durations, like any other
advancement in technology, even in iot security
is a standout issue. This issue keeps getting bigger with more and more
devices being connected to one another we need
information seclusion methods to benefit end clients and secure that
data and privacy. No, it will be really tough
to implement the anytime concept of iot in reality, but this needs continuous work and the closest we
can get to this is only by reducing the complexity
of each existing time systems. We need continuous work
to reduce the gap between near real-time and actual real-time iot
applications promise to bring immense value into our lives.

In fact the number of Openings
for iot professionals is at an all-time high. So I think it is
the best time to begin exploring the true potential of
this technology from smartphones to Smart cards to that Fitbit
on your wrist iot represents millions of rupees
of potential for an industry as The Internet of Things
becomes more important for companies of all sizes. It professionals are beginning
to seek out roles. Related to this growing Niche. So before going
into the session, let's quickly look
at our agenda. So we'll start off
by discussing a little bit about the current scenario in iot market trends
current salary situation and projections in iot and how it compares to other sectors after which
we shall see the salary Trends in iot by both experienced
and functional areas. Also I shall be talking
about the companies that are hiring for iot
as well as the roles they offer then I shall Discuss
the skill set you must acquire before applying into the sector. And finally we will see
an outline of the training provided a Teddy Rekha. So without Much Ado, let's get straight
into the module.

So with the proliferation
of connected devices iot has ventured successfully across
all working areas in India and abroad India
is quickly becoming one of the largest hubs for iot across the globe companies
are viewing iot as a key enabler in various fields and are Come to integrating it
into existing infrastructure as the adoption
of iot has increased iot Market is also expected
to increase quite exponentially. So with that let's talk a little bit about the salary
Trends and projections. Now the median salary of iot professionals is
15 Point 2 lakhs per annum which is according
to the 2017 study this figure compared to the 8.65 lakh
per annum in the eye.

It sector gives about 76 percent more to iot professionals iot
being a relatively new entrant Professionals in this area
are commanding higher salaries. This number is predicted
to go up as much as Seventeen point five lakh by 2019. So let's see how iot does compared
to other contemporaries? Like I said before I
OT pay is 76 percent more than the it sector
interestingly only 33% of iot. Specials have salaries
under 6 lakh per annum as compared to 58% in the it sector
also we can see around 16 to 18% of iot Professionals in India
earn in a salary bracket of 10 to 25 lakhs
per annum almost 5% of iot professionals occupy. The largest salary bracket
that is 50 plus LP a while. In other domains barely two percent of the workforce
commands this figure with That said let's look
at the salary trends for it Professionals in India and the US according
to the current Financial year. So what I've done
is I've divided this into two parts salary is
according to functional areas and then according to
the experience level first up.

We have salary Trends
by functional area. Now as you can see, I've divided this
into four functional areas, which majorly command
the iot industry one is embedded systems
next system programming then we have the Engineering
design and finally application programming
in one end of the spectrum. We see application programming
being the highest paying job in India with an average
of 13 lakhs per annum whereas its us counterpart pays about sixty nine
thousand dollars per annum on the other side
of the spectrum. We have embedded Technologies, which pays an average
of eight point two lakh per annum in India,
but in u.s. It is the highest paid
in the sector with an average of $9,000 per annum
the system programming and engineering design sectors lie somewhere in between
with 11 point 6 lakh per annum and 10 lakh per annum respectively as for the
experience level more than 90% of freshers in the iot field
fall under the 6 lakh per annum salary bracket, which is not a bad
number for a fresher on the other end somebody who has a decade of work X
in this field can quote up to a 30 + L.

Your salary now. What is interesting here is that from each experience level
bracket to a higher one can lead to almost 50 percent jump
in the salary with this. I think we've covered
the salary aspect of this industry. Let's move on
to the career aspect of iot. I'm sure a lot
of you must be waiting for me to disclose
the names of companies and the roles they offer. So the concept of iot
has given rise to a new era of economic growth and companies are Looking
at it to transform their businesses now here
you can see two types of companies firstly there are
companies like Dell and IBM which have a vested interest
their core products and services are built
around delivering and facilitating iot, but there are also companies
like Verizon and Accenture where it is more
about preparing for the future.

Although iot hasn't completely
changed the face of it. It has definitely
created new opportunities for job seekers in the markets. I Be elaborating on this
in the following sections of the module which brings me to current roles
for iot professional. Now if you were to ask me
what field do you need to be in to land a job in iot the answer
would be many iot works on many layers software
plays a key role in usability and functionality Network layers are key to infrastructure and
Hardware defines capabilities and development opportunities
involved in an iot solution. Existing professionals
with transferable skills will definitely find progression
opportunities with iot. The iot is based
off of many technologies that it professionals
are already familiar with IP experts both software and Hardware engineers. And even UI designers could find
themselves to fit in somewhere in the industry. These companies could be ranging
from startups to Tech giants that are driving the industry, but with various domains that have adopted
the potential usage of industrial IO It has led
to a massive job creation. But unlike the other fields
iot job market is a complex one given the wide variety
of skill sets required in this place.

Here are some emerging job
profiles for iot professionals a few years down
the line first up. We have solution architects. Now, what a solution
architect does is that it takes an idea and converts it into a design
and then takes the design and converts it
into code now a solution. Architect may not be
a back-end developer, but it takes the requirements
of the company and then turns it into solution blueprints which brings me to another very important player
in this end-to-end execution, which is the product manager the responsibilities of
a product manager may be many but mostly it revolves
around making sure that the clients get
the solution they asked for on time moving on now when we talk about iot we talk
about huge amounts of data. And where there is
huge amounts of data, we have analytics on top of it. So this is a job profile
created specifically for the iot Industrial Field, which is the
industrial data scientist. These are data scientists that basically work
with sensor data and have expertise on it. Which brings me to another very important
industrial job profile, which is the
industrial Engineers.

Now as I've mentioned before Hardware plays a key role
in the development. Moment of connected
devices for that. We need material Specialists
who can work on semiconductors that are used
to make microcontrollers and microprocessors
in those connected devices. Next up. We have another role that is created specifically
for the iot field. Now iot has pushed
the developers to go beyond a full stack.

We need developers
at the back end who are not only proficient in software coding but So in
Hardware programming, hence, we have the full stack developer which brings me to our final
emerging role in iot as we have all known
and predicted very soon. Our shop floors are going
to be taken over by robots. So what do we need? We need a supervisor who can take care just in case
there is a miscalculation or a breakdown. This has created
the final job profile that I'm talking about today
the robot coordinator. With that said let's move
on to our next topic. So while iot is poised
to be the next great boom in the field of jobs lack of skill is citing the biggest
barrier for companies that are looking to implement
this technology to be considered for any of the rules mentioned
earlier the qualifications. You need are no different than an IT development
roll Proficiency in coding and fundamental in object design
are at least required for your resume to be looked But the skills you need here are
way more than that businesses who engage in iot
Technologies are businesses that are invested in the future.

They are seeking
forward-thinking professionals who not only meet
standards in academics, but also have soft skills and Innovative thinking I
am talking about people who can integrate deep knowledge
in embedded Technologies and concepts of cloud computing
and Edge Computing. These people are tipped
most Be in demand next up. We have networking
and communication protocol. These are very important as devices need to be connected
to one another at all times in real time.

Finally. We need professionals who can convey a complex idea in simple ways either speech
written communication or other abstract methods. So the iot job market
is the perfect platform for job Seekers
to Showcase their skills and for companies
to establish relationships with These professionals so this is the best time to get
into this technology and who better to guide you then
the iot trainers at Eddie Rekha. So Ed Eureka provides
an iot certification training and the outline of a syllabus
look something like this. This training course
is tailored specifically by industry experts and a takes you through Concepts
such as iot framework ecosystem and solution architecture it also teaches you networking
protocols and application. Our in-depth you
shall be working with Raspberry Pi and sends hats and will gain hands-on
experience with Azure iot Hub and Alexa voice.

This course also
has a real life demo and case studies which will help you master
the iot technology. So concluding I
would like to say that iot is amidst an explosion
this definitely suggest optimistic future for
professionals looking to dive into this industry. So grab this opportunity
while you still have it. Thank you and have
a great day ahead. I hope you have enjoyed
listening to this video. Please be kind enough to like it and you can comment any
of your doubts and queries and we will reply them at the earliest do look out
for more videos in our playlist And subscribe to any Rica
channel to learn more.

Happy learning..

Categories
Technology

How To Use NBMiner | Step-by-step Guide

hey everyone and welcome back to 
another mining chamber video in   today's video i'm going to walk 
you through how to use nb miner   we're going to first go through a quick 
setup so you guys can get going right away   and then we're going to get into more details 
and how you should download it and all that   information that you need to know so now let's go 
ahead and get into the video right after the intro first we're going to start off with the overview 
on nb miner if you guys want to jump to a specific   point of this video feel free to look in the 
descriptions below everything will be time   stamped below so nb miner is a cryptocurrency 
miner that can be running on windows or a linux   based mining operating system if they support it 
so the coins that you can mine with nb miner are   all these coins that are mentioned right here or 
in general any coin that follows these algorithms   that are showing on this table so there's a vast 
majority of the popular coins that you can mine   here including ethereum raven coin and then coin 
flux as well you can also mine ethereum classic   and multiple other coins in these algorithms here 
so as for the developer fee the fees on this miner   you'll be paying one percent if you're mining 
ethereum or ethereum classic so anything on ether   or atc hash will take from you one percent and 
then for raven coin you guys can see here on kapow   you will be paying two percent and on octopus 
which is cone flux you will be paying three   percent you also have the other algorithms in 
here with their percentage as well so just keep   that in mind when you're using this miner now nb 
miner supports the vast majority of the gpus so   usually you won't have any troubles trying to 
use it on newer hardware or older hardware but   you can come back here and double check so this 
will all be in the readme section of the nb miner   i will leave the links for all this in the 
descriptions below so here you guys can see   different algorithms as well as the coins 
and then the compute compatibility so this   applies to nvidia cards although i was not able 
to find amd cards compatibility so to look at   these compute compatibility you just want to look 
for the number here and then you can go to this   compute compatibility reference link and then from 
there you guys will find the number and then with   the gpus that are included in that number so for 
example for the rtx 3000 series they are on the   8.6 so if we go back here you'll see that 8.6 
is supported on almost all the algorithms now   as for the vram i don't think this is updated 
since in ethereum now you do need more than 4   gigabytes to mine ethereum so just follow the vram 
information based on the dac size of the coin that   you're trying to mine now to download this miner 
you want to go to releases and then from releases   you can download the latest one so you guys can 
see here there's different versions and then   if you go lower you'll find the older versions 
with all the fixes they added so in the time of   this video the latest one is 36.1 so you guys can 
download the most recent version if it's different   than this one now if you scroll down a little 
bit you will find here the assets for this miner   and then you have here the linux installation as 
well as the windows installation and then where it   says dot shot 256 that is the check sums for the 
miner so we will compare those later on after we   install the miner and then you have all the source 
code in here as well so it's an open source miner   which gives it credibility and it makes it secure 
for yourself to use it for mining so now since   we're on windows and we're going to test it on 
windows i'm going to install this nb miner 36.1   winzip if you're on hiveos or any mining specific 
operating system you won't have to do anything   you'll just find it in the list of miners and you 
can use it directly from there so to download it   just click on the zip file and then you can save 
it anywhere you want but just remember that your   antivirus might flag it as a virus and then you'll 
just have to whitelist it from your antivirus   now what i did is i just have a folder named 
miners in my desktop and then that folder i have   it whitelisted from windows defender so that every 
time i install a miner in there it doesn't delete   it for me right away thinking it's a virus it's 
all just false flags so don't worry about them at   all now if you have no idea how to do that i have 
a video on mining on your pc and then i go into it   with details in that video i will leave the link 
for that video in the descriptions below so now   let's go ahead and save it here and then after 
we save it here you guys can see on the bottom   left i got a dangerous so brave has blocked it now 
this is normal like i said it's just a false flag   and all you need to do is you want to click on 
show all and then on show all you want to go   ahead and hit on keep dangerous file so after that 
you will see that it finished installing and then   you can do show in folder and then you'll be able 
to find the miner in your folder so now the first   thing you want to do before extracting your miner 
you want to make sure it's an authentic version   of nb miner like we've seen recently with the 
news that phoenix miner was recently compromised   so please make sure to do this step just to make 
sure that you have an authentic version of the   miner and it matches the checksums which is like a 
fingerprint for the folder of the miner to do that   all you will need to do is go ahead and open up 
the command prompt to open up a cmd and then from   there you can go ahead and navigate to the miners 
folder so if you have no idea how to navigate   in command prompt you can look it up it's not 
really that complicated i will give you a simple   explanation here so you just want to do cd to 
change directory and then from there you want to   go to wherever this miner is so now i'm currently 
in my so canon user and then in that user i have   downloads documents and all these folders right 
here so i want to go to desktop so i would say cd   desktop and then from there i can just hit enter 
and that will put me in the desktop folder so now   after the desktop folder i have my miners folder 
so now i need to go to cd and then miners and   after that i am in the folder where i have nb 
miner installed so i can go ahead and type out   dir which will show all the stuff that's in this 
folder so here i have nb miner 36.1 win.zip so now   i want to make sure that this is authentic through 
the checksums and to do that all you need to do is   type out cert util and then dash hash file and 
then you want to put the name of that folder so   what you can do is just type out nb and then hit 
tab it should automatically fill it out for you   just make sure that it's the zip and then after 
the zip you want to go ahead and say the algorithm   so you want to say sha 256 and the reason that 
we're saying shot 256 is because here at nb minor   they have the shot 256 one so we can go ahead and 
hit enter and then you guys will see here there's   a long string that comes out and that string will 
be in this file right here so i'm going to install   this file as well now and then i can go ahead 
and save this to the same folder and now after   you save it you just want to go ahead and do open 
with and then select notepad and open this file   with notepad so now once you have that open you 
will see here a string and then the matching zip   file so if we go back to our command prompt we can 
compare them and then they are matching exactly   the same so that means that the nb miner that we 
have is authentic and we're good to go so now i'm   going to go ahead and delete this shot 256 file 
and then i'm going to extract nb miner within my   miners folder and now here we have the extracted 
folder so usually what i like to do when i   install any miner i don't like to have to click on 
two different folders to reach the items so what i   will do is i will just drag all these files in 
here back to the other folder the first folder   and then like that i can go ahead and delete the 
second folder so now once i open up nb miner 36.1   i don't have to open up two different folders to 
reach the files for the miner so that's for the   installation of the miner and now you're all set 
and you have that miner installed on your system   securely without any issues or anything you need 
to worry about so now the first thing i want to   go over after installing the miner is showing you 
guys a quick start to get going right away without   any extra information and then after that we're 
jumping into details with this miner and talking   about different commands that can help you out 
later on so let's go ahead and get started with   the quick start so the first thing you're going to 
see when you download your folder for nbminer you   will see all these different files right here so 
all these are different batch files and they all   say start and then the coin so here you have start 
adc start eth and the o follows simple principle   so all you need to do is just go ahead right click 
on it and then do edit and then you might get this   pop-up right here just do one more info and then 
run anyways and then after that you will see some   information like this now when you're here all 
you need to do is change the address here for   your own wallet address now if you don't know 
how to get a wallet address you guys can come to   miningchamber.com platforms and then here you will 
find some wallets that i do like and i use so you   guys can't download any of those and then get your 
ethereum address from there so since this is for   start eath then you will be putting your ethereum 
address here and then you're also going to be   changing the pool based on what works best for 
you so there's multiple different pools out there   you guys can use ethermine it's a good choice and 
then just put the server that's close to you and   the port number and then you're all set after that 
you just close this file make sure that you save   it first and then you run that file you don't need 
to run it as an administrator because you're not   doing any overclocks there so you can just double 
left click on it and then it will start kicking in   and start mining for you so that also applies for 
all these other ones so if you go for raven coin   for example if you have a four gigabyte card you 
just go ahead hit edit and then same thing run   anyways and after that change the raven address 
and then the raven pool and that's all you need   to do to get started super quickly now if you 
want to learn more about the different commands   please stick around and then we're going to go 
into details on all these commands so that you can   learn how to use these miners efficiently so now 
that we covered a quick start let's go ahead and   jump into details with the commands so there is 
a huge list of commands but we're not going to go   over all of them i'm just going to pick the ones 
that i think are very important to know so the   first one i want to start off with is dash a and 
that's the first command in your script so dash   a or dash dash algo and what that does is selects 
your mining algorithm so if you're mining ethereum   you would do dash a e and then that would be the 
ethereum algorithm so eth and if you're mining   ravencoin or anything like that you would select 
a specific algorithm that that coin runs on so   it's a fairly simple command and you guys will be 
able to find all the algorithms that supports it   in the requirements list here and then one other 
command that goes hand by hand with this one is   for example let's say ethas when ethereum classic 
used to also be on ethash and now it has its own   algorithm which is etc hash so back then when 
there was ethereum and ethereum classic running   on the same algorithm you would have to use the 
command dash dash coin so dash dash coin would   set a coin for ether algo whether it's eth or etc 
so if you wanted to an ethereum classic you would   do dash dash coin etc and the default is ethereum 
but now since ethereum classic is not in ethash   anymore you guys don't need to worry about this 
command if you're trying to mine ethereum classic   all you need to do is just change that algorithm 
to etc hash now they don't mention etc hash here   in the algorithms but you guys can give 
it a try and see if it works out for you   now if using the etc hash method doesn't work 
you can try doing eth and then dash dash coin   and ethereum classic so after dash a and dash 
dash coin the next important command to know is   dash o or dash dash url so what that does is 
basically specifies your mining pool url you   guys can select any mining pool you want i have a 
full video on mining pools so if you have no idea   how mining pools work feel free to check out that 
video the link will be in the descriptions below   and with the dash 0 there is also dash 01 or 
02 and what that does is you specify a backup   mining pool so if mining pool number 1 goes down 
mining pool number 2 will kick in and then etc the   maximum that you can specify is three pools so you 
have dash o and then dash 01 and dash o2 so after   the mining pools you have your user and your user 
is your wallet address so here you see the isu or   dash dash user and this is usually your wallet 
address now in some scenarios you would make a   username and password with your mining pool and in 
that case you can use your username and password   but most of the time all you need to do is just 
put your wallet address if you don't have a   username and password with the mining pool that 
you're trying to mine to and this also goes back   to u1 and u2 so you can have backup users for your 
backup pools now the next important command would   be dash d or dash dash devices and what that does 
is basically you specify the gpus that you want to   use for mining so let's say you have two gpus in 
your mining rig you can do dash d0 and then that   would select only the first gpu that's on your 
mining rig that also goes with your main pc so   if you're trying to mine with just one gpu you can 
do dash d0 and then you would select the first gpu   or you can do dash d1 and that would select the 
second gpu now note that it starts from zero so   the counting would start zero one two three and 
that would be for the first four gpus so just   keep that in mind when you're trying to disable 
one of your gpus just like the devices command   there is also the dash dash platform command and 
what that does is it chooses for your platform   so whether it's nvidia or amd now the default is 
both of them but you can do one to choose nvidia   cards only and you can do number two to choose amd 
cards only meaning that if you do one you'll only   be mining with your nvidia cards and if you do two 
you'll only be mining with your amd cards and then   there's also the dash dash feed command and then 
this command basically changes the percentage of   your fee for the miner so you can set it to zero 
to turn off your dev fee or you can keep it the   way it is and not change anything the only thing 
about this is if you do set it to zero it reduces   your performance now i'm not sure exactly what 
comes out to be more profitable either turning   off the defeat or lowering your performance but 
honestly i would say just keep it on and then use   it the way it is if you want to give it a test and 
turn off your death fee then feel free to do that   and another really useful command is temperature 
limit temperature limit sets a limit for your gpu   in celsius and if that exceeds it will stop the 
gpu for 10 seconds so that means if your card is   overheating it will stop mining for 10 seconds 
so it cools down a little bit and then it will   kick back in and now the last command i want 
to cover is dash dash mt or dash dash memory   tweak so what that does is basically modifies 
your nvidia cards memory specifically the 1080   and 1080 ti so before with the 1080s and 1080tis 
you have to run the pill before running the miner   which would increase your hash rate up to 40 or 
45 mega hash but now you can do it through this   command instead so this command ranges from 1 
to 6 so that means you can do mt and then 1 or   mte2 and keep going until 6 so you can try all 
of these numbers and see which one works best for   your gpu the one that gives you the highest hash 
rate will be the better one for your gpu now that   is it for the commands for nb miner we covered the 
most important ones that i think you guys should   know if you guys have any other commands that 
you think people should know please leave it in   the comments below and then from there everybody 
can read it and learn from it so now that we've   covered the commands let me tell you guys a couple 
of things that you can do with this miner as well   so first you can monitor your rig through the 
web monitor using your port number and if you   are a developer you can also use this to build on 
it applications now i'm not going to get into this   in this video but this is just something that you 
can keep in mind or go more into details with it   if you are more technical and there are also the 
config files that you can run which will save your   settings and then from there you can open it in a 
different computer that's also a good choice to do   but with how simple the bat files are in nb miner 
you don't really need to worry about that as well   so now before i wrap up the video let me give 
you guys my conclusion on nb minor i think it's   a pretty good miner it does come at a one percent 
fee for eth which is a bit high so comparing to   phoenix miner which has point sixty five percent 
fee it is considered a bit higher but all around   nb miner is not a bad choice at all if you're 
looking for a simple nfs mining software for amd   and video together now one of the things i wish nb 
miner had is being able to overclock through the   command line arguments that would be pretty nice 
so you can just put your overclocks in nb miner   and then it will automatically apply them as soon 
as you run the minor we can do that in phoenix   minor but not in nb minor so hopefully eventually 
they will apply it to here that is unless i missed   it and i didn't figure out how to do it so if 
you guys know a way to apply your overclocks   with nbminer please let me know in the comments 
below now that wraps up the video guys i hope   you enjoyed this video if you have any questions 
or feedback let me know in the comments below now   the next mining softwares i'm going to be covering 
are team redminer as well as t-rex miner so if you   haven't subscribed yet make sure to subscribe so 
you can get notified when these come out and drop   a like on this video if you guys enjoyed it thank 
you again and i hope you have a wonderful day you

Categories
Technology

PS5 Teardown Surprise!

This is the PlayStation 5 and we are going to break it scream So now that we’re going to see what’s inside the box, but we’re also going to tear this thing. Apart, Look at the size of this box, Okay, wow.

What a nice unboxing experience! So, if you’ve, actually seen we’ve done an entire video on the DualSense already And we may or may not have broken that one as well.

Oh, is that a bad luck that all the PlayStation videos we do it? Just ends in destroying things Ken: It works, though box rattling.

This makes the fat PS3 look reasonable.

Are you kidding me? I hope you got room’cause it’s big.

I almost called it a big chungus, but I didn’t’cause.

I’ve used my chungus quite enough today.

So for the obligatory size comparison, we have the Xbox series, S Austin laughs, Which is funny, And then we also have the series X.

So the PlayStation 5 is big, But why is it so big? Well, there’s only one way to find out watching the official PlayStation tear down video.

The second best way to find out is to continue watching this video. As I wreck a PS5 ding, Oh yeah, that’s, why you need the stand? Huh Woo look at that Look I’m, not gon na, be the guy who tells you that size, doesn’t matter’cause.

It definitely matters if you’re a PlayStation 5 One of the things that’s interesting about the PS5 is that it’s supposed to be easy to open up the side.

Panel machine clinks, Austin laughing Okay, so the PlayStation 5 is very easy to remove the side panel.

I definitely just scratched it.

Oh my god.

Do you see the size of that scratch? I just put on Look at that.

Well, this is going well, isn’t it.

As you can see.

The side panel of the PS5 is very easily user removable, So easy Tool, less Brainless as well.

Obviously, Oh look at that. That is how to do it gently Grasping So immediately it’s clear that they’re going for a different cooling approach compared to the series X.

So you can see that we have what I believe is a 120 mil fan, but you actually have clearance on both sides, So you can see it’s open on this side as well as this side.

So if you compare this to something like the Xbox series X, which uses honestly just a much more complicated way of cooling off the console, So you have dual motherboards, you have a mid plate.

You have vapor chambers, It’s very complicated, Whereas with the PS5 it seems like Sony’s opted to go for a cheaper and simpler approach And the downside there is just simply the console is bigger.

Now you might wonder why has Sony made it so easy to remove the side panels of the PS5? Well, the big reason for that is that not only can you clear out dust from these little traps, but importantly, you can also upgrade the SSD.

So, behind this little panel we should see that there is an M2 slot So right here we have a slot for a PCI 4 point, O SSD.

Now, as of recordings, this video – you can’t, do anything here yet So the idea will be a long term once it gets a firmer update at some point that you will be able to easily upgrade the storage of your PS5 without needing to buy some Kind of proprietary memory card, like you do on the Xbox The main downside to upgrading your PS5, as I accidentally screw my hand, is that you need a very fast SSD, So you need to be not only PCI 4 point O, but in theory at least you Need it to by Sony compatible, So we actually can’t test it since it doesn’t work right now, But stayed tuned to make sure to subscribe to the channel, because we will be taking a closer look at what kind of SSD options and how You can upgrade the storage on your PS5, All right, let’s plug it in and see.

Can you actually run it without the sides on machine beeping? Oh, I see Oh yeah that fan’s spinning You can absolutely do this, Should you Probably not, But as far as the PlayStation’s concerned, it doesn’t care or doesn’t even know.

I guess if you have the sides on What’s interesting is so I can definitely feel it is definitely pushes all that air which it sucks in through this way, through the fan and out the back.

There’s like a good little breeze back here. So what it seems like for the cooling solution is that all of the cooling is happening on the top half of the console, Which kinda makes sense because on the bottom half you mostly have the disc drive and I assume the power supply.

Oh yeah, That works.

Okay, So if your PS5 is overheating, you can take the side panels off, You might get dust in there and it’s probably not recommended, but technically that works.

You know, kids are gon na.

Do that Matt? How much are you actually gon na tear this apart? Yes, is the answer.

Matt There’s, probably a very elaborate way to do this.

I’m just gon na start, unscrewing things All right.

There we go.

One T is void There.

We go So a little note if you decide to tear your own PSI apart. They have a lot of screws and they’re all different.

Like all of’em.

I’m 12 screws.

In now.

Let’s remove the fan tool: whirring Riveting content watching Austin Evans label each individual screw, so he’s not an idiot and knows how to put it back together.

So I think those are all the screws So Well that comes out easily.

Now the fan – oh wow – that just comes Whoa – that’s cool Out Wow.

I can just feel the breeze I mean I feel like this fan weighs like half an Xbox series S, So the fan basically is pushing that air right through those heat pipes.

So far so good, Let me pull this little cable loose.

The shroud has given up and we have more shroud Austin laughs. Here we go Okay, So the optical drive should just come loose now That That’s actually a very oddly large drive.

So, of course, this is what you use to watch Blu Ray’s, 4K, Blu Ray’s as well as their proprietary hundred gig format or whatever they use for PS5 discs.

Do you see this Look? How tiny this little bit of the heat sync is.

Look it just pops out on this side, So next I’m going to remove these.

What I assume are antennae for wifi, probably like Bluetooth.

I guess we can start undoing the oh, my god That’s a lot of screws All right.

If these are all different sizes, I’m gon na be labeling screws all night long, Let’s Get started.

Shall we upbeat music? These are famous last words.

I will say so far.

This has been fairly easy to get into. At no point have I felt like I was about to break something: Okay.

Well, I’m just gon na take it apart That’s literally dangling, So you mean I’m almost done.

I hear nothing but positive things right now, Matt! This is what a PS5’s supposed to look like, I think So, after removing a couple of dozen screws, we finally have the heat shield off or the shield Shield off Wait That’s not part of the heat sync at all.

They have a separate heat pipe on the back, So this also serves as a heat sync for the back of the PS5.

So taking a look around here, this looks to be the SSD, or at least that’s.

What I assume is the SSD.

It’s fairly close to the M2 slot And then, if we slide things over a little bit, you can get a little bit of a better look at the GDR6 memory, specifically 16 gigs of it on the PS5.

Now something else interesting.

I believe, if you can see this little guy right here, I believe that is the wifi chip And something unique about the PS5 is that this actually has wifi 6.

Unlike the PlayStation 4 And, of course, the Xbox series X and series S, all of which have the older wifi 5, Just a nice little feature Now. I think the board should just come out.

Oh, I’ve got a lot more screws to undo don’t.

I Yeah you do Yes, you do.

That is a bizarre looking heat sync, So you actually have these like cross heat pipes.

Do you even PlayStation bro? So what’s left inside the chassis is almost entirely the power supply, Which is 370 watts, so that’s actually a pretty beefy power supply.

I can’t.

Imagine the PS5 actually needs that, But you can see the overall volume of the PS5.

The power supply takes up a pretty huge chunk of that It’s.

Fine, it’s.

Fine, it’s not going anywhere Fine. We can pretty quickly undo the last couple of screws.

The only problem is, it likely is going to be terminal.

So on the underside of this heat sync, there is thermal compounds specifically known as liquid metal.

Liquid metal is something which has never really been used before.

In certainly a game console and really in most electronics, And basically we can’t really put it back on.

So, if I take this off right now, we’re probably never going to have this PS5 up to the same cooling.

I might try some normal thermal compound to see, but this is the point of no return tool whirring As soon as I flip, this over liquid metal might go everywhere.

That is still firmly attached, So the back half of the board is free, Whatever they’re.

Doing to keep that liquid metal attached is absolutely what’s holding the board in right now, mumbling in distance.

Okay got it Yep, Okay, That my friends, oh no don’t leak. Don’t leak.

There we go all right, So that is the inside of PS5, So the main star of the show here is absolutely that liquid metal.

So if you see, if I lean it in it actually runs, do you see that Look at that? That is liquid metal? So, essentially that is what is interfacing between the SOC of the PS5 and this heat sync, which is of course, on the other side.

I’m not gon na flip this over’cause.

It will absolutely go everywhere, So, interestingly, what they’re doing.

So one of the main disadvantages of using liquid metal and one of the main reasons why it’s not typically used is because it is literally liquid metal.

So if it goes everywhere, it would short things out cause tons of problems.

So you can see when I opened it up, the liquid metal actually went all off to one side That foam barrier kept it from actually reaching the board, Because if this liquid metal touches any of this, you are in major trouble.

I just so happen to have an Xbox series X, SOC don’t ask, And if I put that side by side, you can see the difference in the PS5 SOC versus the Xbox series X.

This just simply is bigger, which makes sense, because, essentially, how they’re getting the performance out of the PS5 is they are throwing liquid metal at it. They’re, throwing this huge heat sync at it, just to try to keep it cool because they’re running at such high clock speeds That my friends is what is inside a PlayStation 5, Make sure to subscribe to the channel for more PlayStation content.

Where probably fewer PlayStation’s will be harmed And if you’ll excuse me, I am now going to go, spend all night putting this back together.

I labeled these right.

.

Categories
Technology

How to Use an iPhone as a Webcam – Elgato EpocCam Set Up

Hi, I'm Steggy from Elgato, and in this video I'm going to show you how to turn your iPhone into a webcam using Elgato EpocCam. EpocCam is an iOS app that let's you use your iOS device as a webcam, whether it's wired or wireless. That means you get to take advantage of your iPhone or iPad's amazing camera for your livestreams or video calls. And to set this up, is extremely easy. First, download and install EpocCam from the iOS app store. EpocCam requires iOS 14, so for a list of all iOS device models that support iOS 14 check out the link in the description panel below. Next, launch the app and tap begin. Here, we see instructions on how to set up the computer driver for EpocCam. EpocCam works with both Windows and Mac operating systems, so simply choose your platform and follow the instructions to download and install the driver on your computer.

Please note if you are using Windows, you will need to download and install Apple iTunes in order for EpocCam to work. If you're setting up EpocCam to be used in wireless mode, you can simply hit next. Just make sure that your iOS device is connected to the same network that your computer is connected to. If you want to set up EpocCam in wired mode, before you tap next connect your device to your computer using a lightning or USB-C cable. Please note if you're using a third-party cable, that it's properly rated to send and receive data. As some inexpensive cables are for charging only which won't work in this case. Now all that's left to do is enable some permissions on the iOS device by following the prompts on the app. And now you should be able to see a preview of what your iOS device is capturing.

And then on your computer's side, EpocCam will now show up as a webcam device in your favourite app. Simply choose it and your webcam will show up. All the controls for EpocCam are on the iOS app itself. You can flip to your front or back camera, change to your different zoom levels, and access this menu to change your bitrate, your connection mode, and your chroma key settings. Now one thing to note is EpocCam has both a free and a pro version. So if you're interested in additional features, such as 1080p capture, smart HDR capture, chroma keying or more, be sure to unlock the pro version for a one-time cost of $7.99 USD. Now you have a super high-quality webcam thanks to Elgato EpocCam. If you have any questions feel free to leave a comment down below and don't forget to check out the rest of our videos on EpocCam on our YouTube channel. And be sure to get subscribed so you don't miss our new videos that will help you unlock the full potential of your Elgato products.

Once again, I'm Steggy from Elgato, and until our next video, good luck and have fun..

Categories
Technology

15 Windows Settings You Should Change Now!

Even if you've been using Windows forever,
there are probably a lot of settings that you never realized were on by default, and
should probably change. These might be settings for privacy, convenience,
or just usefulness in general. So in this video we're going to go over a
bunch of settings in Windows, specifically Windows 10, that I think you should change
right off the bat, including stuff you should disable, and even features that are good,
but aren't enabled by default.

And I believe there are about 15 of them,
so you'll hopefully learn at least a couple new ones. Let's go. First up let's head to the Windows Update
settings. To get to the main settings Window, you just
click the start menu, then click the gear. Go to Update & Security, then look for "Advanced
Options", and then click "Choose how updates are delivered". Here you'll want to make sure the setting
at the bottom is set to "PCs on my local network", and NOT the other one with PCs on the internet.

What that would do is download parts of updates
from other people who have the update, to supposedly make the downloads faster. But it would also send parts of your updates
to other people, using up bandwidth. On your local network it doesn't really matter,
but you can disable this altogether by switching the toggle above to off. Next let's change some WiFi settings. Back in the main settings window go to Network
& Internet, then the Wi-Fi tab. Under WiFi services, you'll see two options
talking about suggested open hotspots. I would disable both of those. Suggested hotspots are supposed to be hotspots
that Microsoft has deemed "legit", and this would allow your computer to connect to them
automatically. But open hotspots are inherently insecure,
so you never want your computer to connect to any network without asking you first, it's
just ridiculous. Below are settings for Hotspot 2.0 which is
a relatively new technology, but you can leave that on. I'm not going to get into that in this video. Now we can go through a bunch of privacy settings
and get those out of the way all at once.

So start out going to Settings, then Privacy. First we'll start out in this general tab. You'll definitely want to uncheck the first
box, and probably the second box as well. These basically allow websites and apps to
track you based on a unique "Advertiser ID", in order to learn more about you and show
you more relevant ads. The next one about your language list might
not matter, but I just have it disabled. If you use a language other than English,
maybe keep that enabled. The third setting is also something you may
or may not want to disable. It basically keeps track of which programs
you launch most frequently, so you can have a "most used" list in the start menu. If you don't care about that, disable it. The next tab we're going to look at is "Speech,
Inking, and Typing".

This feature basically keeps record of everything
you type or say to cortana, the virtual assistant, and apparently uses it to "get to know you",
and make better suggestions. For those of you who don't use Cortana, it's
definitely something you want to disable, so just turn that off. Moving on, head to the Location tab. Very straight forward, if you don't want Windows
apps using your location, turn this off. If you have some apps you DO want to allow,
you can turn the feature on, and individually enable and disable apps in the list after
scrolling down.

The next tab is "Feedback and Diagnostics",
which adjusts how Windows will track how you use Windows, and then send it back to Microsoft. Unfortunately, Microsoft doesn't make it easy
to disable completely, and that's beyond the scope of this video. But you'll at LEAST want to change this from
Full to Basic, to minimize what they collect. Otherwise, look what it tracks. Browser usage, like what websites you visit
probably, "feature usage" which could mean anything, "inking and typing data" which is
literally anything you type.

So yea, you REALLY want to not have it on
Full. And maybe disable the toggle below about tailored
experiences too. And finally for privacy settings, these actually
are for cortana specifically. To access these click the Cortana button,
then the Gear. Or search for "Cortana settings" in the start
menu. If you don't use cortana, you basically want
to turn all of these off. If you DO use Cortana, you can go through
these and change what you want it to track. But I definitely suggest disabling Cortana
on the lock screen, otherwise some person might be able to access a lot of your data
even when the computer is locked.

Alright, now let's do something about all
those annoying notifications Windows seems to give you all the time. So head to Settings, System, Notifications
& Actions. I personally wouldn't disable notifications
altogether because they can be useful, but if you see one app that is particularly annoying,
you can scroll down and disable it's ability to show notifications. Back up top, you probably want to disable
the option to show notifications on the lock screen. As you know, a notification can sometimes
show private information, like emails for example. Also, I'd enable the one that says Hide notifications
when duplicating the screen. Say you go to do a presentation, and you hook
the computer up to a projector, you again don't want some notification popping up on
the screen with sensitive content for all to see. Now you don't have to worry about that. Finally, you can disable notifications for
tips and tricks, which could be annoying. Speaking of annoying, let's disable the obnoxious
"suggested apps" you see in the start menu, which are essentially advertisements.

In settings go to Personalization, Start,
and disable where it says "Occassionally show suggestions in start". Next up, there's a setting we want to change
under Settings, Gaming, Game DVR. You almost definitely want to disable the
one that says "Record in the background while I'm playing a game". Leaving this on means any time you're playing
a game, it will constantly be recording video even if you don't save it, which will use
up resources and could severely affect performance. One setting you might want to ENABLE in gaming
is Game Mode, which will only show up if you have the latest creators update version of
Windows. This setting supposedly might free up system
resources for your games if your computer is really crappy. Though another tech channel, LinusTechTips
did some tests, and found it made little difference on reasonably powered computers, and might
actually decrease performance in that case. So probably keep this disabled unless you
have a really old computer, then it might help.

Alright now we've disabled a lot of stuff
so far, so how about we actually find some neat features to ENable. First up is a super cool feature called "Night
Light" which can be found in Settings, System, then the Display tab. But this feature will only show up if you
have the latest so-called creators update. What this feature does is change the color
of the screen at night so that it's much easier on the eyes, and won't disrupt your sleep
schedule as much.

And it does this by cutting out blue light,
which is what keeps us up at night longer than we want to be. In Night Light settings, you can adjust the
strength of the effect, and what time you want it to activate, including sunset to sunrise. But you will need location services enabled
if you want to do that. If I were you, I would literally set it to
the strongest setting. It might look jarring at first, but I can
almost guarantee you'll get used to it at night. Here are a couple more settings to enable
for Windows Explorer. Just open up any explorer tab, like My Computer
or whatever. At the top click View, and then check the
two boxes that say "File Name Extensions" and "Hidden Items". If for some reason those don't show up, you
can find the same settings by hitting Options, then going to the View Tab. What the first check box does is makes sure
that for every file on your computer, it will include the file extension with the file name.

So it shows the ENTIRE file name. This is REALLY important for a lot of reasons. For example, maybe you download a suspicious
file that claims to be a video, but with this, you can see that it's actually an exe file,
an executable! Guess what, that file is almost certainly
a virus. The virus maker may even add their own fake
file extension like "virus.mp4", but now you can see that the real name is "virus.mp4.exe". Another example is if you have a folder full
of files with the same icon from being opened by the same application. This way you can still see what kinds of files
they are if you know you're looking for a video as opposed to a picture or something.

That other check box we selected was for Hidden
Items. You may or may not have known this, but there
are file and folders on your computer that are not visible to you by default. These might be settings files for certain
programs, or log files, that sort of thing. Most of the time you won't need them, but
occasionally you might come across a tutorial showing you how to fix a program, and it will
refer to a file that's hidden. If you don't have this enabled, you might
think that file is gone. Also, a lot of times viruses will create hidden
files for obvious reasons, so the average user will have almost no chance of being able
to remove it all by themselves.

So it's at least good to know that these files
exist. And I think that covers just about everything. I hope you guys found this video helpful,
and maybe learned a thing or two to make windows better. I'm sure there are some I didn't mention so
if you have any more to add, let us know down in the comments section. If you want to keep watching, here are some
more videos you'll like, such as some hidden Windows features and programs you might not
know about. And if you want to subscribe, I make new videos
every tuesday thursday saturday. I'm looking forward to hearing from you, so
thanks for watching, I'll see you next time, have a good one..

Categories
Technology

Introducing Logitech Capture

Looking for an easy way to start creating content with your Logitech c922 – webcam. Then, Logitech capture is the perfect choice for you. Logitech capture allows you to record video, take snapshots and can be used as a virtual camera in your favorite video chat software. You can download logitech capture from logitech.com/capture Once you've installed, let's add some sources. You can add two sources to logitech capture. These sources can be any combination of Logitech webcams or capturing a desktop from your PC. Once you've added a webcam, you can customize the settings such as adding a colored border. The streaming preset will set your priority to framerate and is useful if you be recording something with high motion on your desktop. The video calling preset will focus on exposure or lighting. And is good, if you're using logitech capture in conjunction with video chat software. When using the zoom feature, you can use the pan and tilt to adjust the framing of your camera.

You can also adjust a variety of settings on your camera such as focus, white balance, brightness, sharpness, contrast and saturation. If you have a green or a blue backdrop, you can activate chroma key to remove the background. In the Advanced Settings, you can enable camera mirroring. If you add a desktop as a source, you can also apply a border chroma key and mirror the desktop Now that you've added your sources you can use this section to switch between or layer your sources. If you are layering your sources you can position and adjust the size of the smaller source. You can start a recording or take a snapshot here. But let's look at the sayings first. In the recording sayings, you can apply a filter to your sources. Your resolution can be set to either landscape or portrait if you decide to make snapshots or videos for mobile. Next, select your recording quality frame rate and video encoder. Select where your recordings and snapshots will be saved.

Some advanced features, include a countdown for a recording on snapshot is taken taking enhance snapshots and excluding logitech capture from desktop capture. The audio menu, lets you select your audio input and out devices. Audio input captures audio from your microphone and audio output captures audio from your PCs playback device. The transition menu, lets you select from a variety of effects along with the duration. You can set hot keys to switch sources, pip shots, start/stop recordings take snapshots and mute, unmute audio input or output. You can save your settings to a profile. Logitech capture is a great tool to get starting creating content. If you'd like more features in the ability to stream with your logitech webcams. we recommend checking out xsplit broadcaster..

Categories
Technology

Plugged In, Not Charging Windows 10 Solution (2 Methods)

Open PC settings and click on 'Update & Security' Click on 'Troubleshoot' from the left side panel. Search for 'Power' and run troubleshoot Wait for few seconds. It will take some time. If there will any issues, troubleshoot will fix these. If the issue is not solved then follow the steps in method 2 Click on start and search for 'Device Manager' and open it. Expand batteries options Right click on each driver and check for update. If drivers are outdated, then Windows will automatically fix this. Now, check the update for second driver. Now the issue will solved. If still there is an issue, then uninstall the drivers Now, restart the PC after uninstalling Subscribe to our channel for the latest uploads..