TO: Professor Ellis
FROM: Amir Radoncic
DATE: 09/17/2019

SUBJECT: 500-Word Summary on how “cryptographers scramble to protect the internet from attackers”

This article is by Adrian Cho who explains how quantum computers are a huge importance in the future. This article also covers the importance of how we can build and protect these future quantum computers. He explains how hackers are going to be a big problem to quantum computers etc.

The main points of the article are about how we can create ways of protection for quantum computers such as Cryptographers are looking for ways to ensure the protection of public and secret keys between two senders so that valuable information is not stolen by an outside entity. For example, there is a popular public key scheme called RSA, which scrambles a message by multiplying it by itself a number of times. Researched has been conducted on ways to develop algorithms and schemes in order to ensure the protection of the information on the quantum computers.  There is no guarantee that quantum computers are un-hackable, so it is extremely important that cryptographers implicate new ways in combination with current schemes, to ensure the safety and security of users.

The article is solid on why we need quantum computers and why. Although in my opinion quantum, computers could be the technological breakthrough that we have been looking for. There has been educated guesses such as NIST could standardize two or three algorithms each for encryption and digital signatures as early as 2022, says Dustin Moody, a mathematician at NIST in Gaithersburg, Maryland. The agency wants options, he says. “If some new attack is found that breaks all lattices, we’ll still have something to fall back on.” There are a bunch of educated/professional people who have tried to invent new algorithms which are really smart although not enough.

ChoAug, A., MalakoffAug, D., EscobarAug, H., NordlingAug, L., PennisiAug, E., Reilly, S., … GalvisAug, S. (2019, August 21). Cryptographers scramble to protect the internet from attackers armed with quantum computers. Retrieved from https://www.sciencemag.org/news/2019/08/cryptographers-scramble-protect-internet-hackers-quantum-computers

Fernando Ortega’s 500 word Article Summary

TO:Prof. Ellis
SUBJECT:500-Word Summary of Weinberg’s “Law and Technology- Biometric Identity”

Jonathan T. Weinberg discusses about the biometric technology being implemented in some places like India and Pakistan and how it’s had a positive impact. Trying to make slight improvements with keeping data organized, secured, and easier for the government and people. Though that is the case for these places, the U.S. made the decision to drop the idea on biometrics and Weinberg then goes on about what improvements India and Pakistan have started, that could have benefited the U.S and possibly some issues. In the article, “Law and Technology- Biometric Identity” by Jonathan T. Weinberg, he gives valid points that could change the use of ids to biometric technology.

Biometric id card would link the person’s biometric data such as fingerprints, iris scans, and a photograph making it difficult to replicate that information. To ensure the card belongs to the card holder, a biometric verification test would be done to guarantee the card indeed belongs to the card holder. India plans to use their people’s biometric data to then link that to any governmental data given in a card for uses in work, ATMs, and health benefits keeping all that data in their protected databases. This policy would be much helpful for the U.S. to link biometric id to the people to check whether the person has any criminal record, has work authorization, and reduces identity fraud. 

According to Weinberg, “talks about Pakistan using the biometric data in voting registration, to track down people that have voted more than one time in voting election to then de-duplicating them.”  In addition, mentions about uncovering many workers that are “ghost worker”, government having more of an organized place, and being able to reduce less fraud and trust between people. Another positive talked about biometrics is having an unborn baby registered since many poor countries don’t get paper documentation it would be beneficial to use biometric technology instead. 

Issues mentioned in the article would be the U.S. having people frightened on the idea of biometrics because it would contain vulnerable information on them of whether being noncitizen or citizen. Meaning that noncitizen people would be limited from doing anything like traveling, working, or even having health insurance and having the information whether they can be arrested or deported. Even the idea of the government taking control of people’s personal biometric data, is a problem since that limits them to anything because people have in trusted the government with all their sensitive information. Furthermore, something much worse would be the databases not being secured as people would of think that it would have been, hackers having very sensitive data very much like India databases.

Biometrics is a topic that can be easily understood and can make life’s easier for traveling, for keeping something protected, and make things faster. It is a topic that is interesting that Weinberg made valid points to believe in the biometrics technology and keep on using it. It is something that can lead to a brand-new technology or idea if done correctly, just like technology that help humanity.


Weinberg, J. T. (2016). Biometric Identity. Communications of the ACM59(1), 30–32. https://doi-org.citytech.ezproxy.cuny.edu/10.1145/2846082

Hector Dextre’s 500-Word Article Summary

TO: Prof. Jason W. Ellis

FROM: Hector Dextre

DATE: September 17, 2019

SUBJECT: 500-Word Summary of Katare, Padihar and Qureshi’s “Challenges in the Integration of Artificial Intelligence and Internet of Things”

To understand better the challenges in the integration of Artificial Intelligence (AI) and Internet of Things (IOT), it is important to know what these technological terms are. According to the authors, “Internet of Things (IOT) (‘Thing’ refers to a device which is connected to the internet and transfers the device information to other devices.)” and “Artificial Intelligence (AI) is the intelligence which is not natural but used by machine in some order based on instructions” (Katare, Padihar and Qureshi, 2018, p.10). IOT, usually located at an early stage of development due to the limited capacities of its processor, needs an AI’s speed injection to allow the increase of the capabilities of IOT. Knowing more about IOT and their applications, AI and its uses cases and their challenges will permit individuals to comprehend the rapid development of technology.

Internet of Things are the access to objects with the use of internet. The authors stated, “the main goal of development of IOT is to connect the internet with physical world and the environment with wireless networks” (Katare, Padihar and Qureshi, 2018, p.10). In other words, IOT is basically a network of physical gadgets and it is a system of apparatuses equipped with information gathering technologies so they can interact and interchange data with one another. There are many applications of IOT, but just to indicate some of them that are applicable in agriculture, poultry, farming, health care, environment, education, technology, manufacturing, housing, finance, sports, energy and transportation.

Artificial Intelligence, according to John McCarthy, the father of AI, is “the science and engineering of making intelligent machines, especially intelligent computer programs” (Katare, Padihar and Qureshi, 2018, p.11). In other words, AI is the method of making a robot controlled by computing machine or software that thinks intelligently. The applications of AI are machine learning and deep learning with the capacity to automatically acquire and enhance performance from experience. The correlation between these two applications is that deep learning is a subcategory of machine learning which is made up of algorithms that train it to do every task like face recognition using large amounts of data. AI uses cases, just to indicate some of them, are image recognition, warehouse optimization, credit verification and medical diagnosis.

When IOT and AI connect, the challenges become more complex. First, in terms of security, it is indispensable to make sure that data is secure and in reliable hands. Second, in terms of compatibility and complexity, many devices that have many different technologies may cause many difficulties after merging all these devices in one. Third, in terms of artificial stupidity, the incapacity of AI program to do basic tasks perfectly. Fourth, in terms of lack of confidence, the concern of consumers and businesses about security to protect IOT devices. Fifth, in terms of cloud attacks, the unwished attention from detrimental viruses has been drawn by the quick growth of cloud computing technologies. Finally, in terms of technology, the biggest challenge is the competition of all technologies; however, we have many more challenges and having these challenges and giving competition to every technology is a very tough operation.

The integration of AI and IOT tends to arise rapidly, which will make the internet more useful. AI and IOT will change the future of humans but it requires the support and patience of us. Connecting them together will give a valuable innovation and experimental technology which will benefit companies and user by supplying good and efficient products.

References Katare, G., Padihar, G., Qureshi, Z. (2018). Challenges in the Integration of Artificial Intelligence and Internet of Things. International Journal of Systems and Software Engineering, 6(2), 10-15. Retrieved from http://search.ebscohost.com.citytech.ezproxy.cuny.edu/login.aspx?direct=true&db=aci&AN=134633037&site=ehost-live&scope=site

Jeremy Corona’s 500 word Article Summary

TO: Prof. Jason W. Ellis
FROM: Jeremy Corona

DATE: 09/17/2019
SUBJECT: 500-Word Summary of Wiedemann’s “Research for Practice: The DevOps Phenomenon”

If you are in the realm of Information Technology, then you most likely have heard of the term “DevOps”. DevOps stands for Development Operations. A lot of people even IT professionals have a hard time defining this term. Is it a career? Is it a concept? What is a DevOps Engineer? DevOps is all of those and more, it is best to think of it as a culture. DevOps is a method of software development and delivery. It is method organizations are taking advantage of in order to improve the efficiency of their software development, deployment pipeline. In this article “Research for Practice: The DevOps Phenomenon” by Wiedemann, Forsgren et al. takes a closer look at this new methodology on producing stable, feature rich software applications with high customer satisfaction.

The traditional “Waterfall” method of delivering a software product has been around for years. While it does have its advantages there is a giant gap between the software developers and the operations team. DevOps is the methodology to bridge that gap. During the Waterfall method once the project is done, the application is handed off to the Operations team. They are responsible for the day to day maintenance and stability of the application. They are on the forefront when interacting with customers and bugs are being found. Developers do not usually see this going on in the background because as far their concerned they have delivered the product. This can cause a conflict within the two teams because when the new features roll out, the operations team is worried about more instability and bugs.

With the DevOps methodology, organizations bring those two teams together to develop and produce software that continuously creates value. There are many ways to implement this concept. Collaboration is key. Operations people will start doing some development work to see how things get done and how the teams’ function. Developers would start maintaining some of the products that have created as well. Some organizations implement cross training and job shadowing. This puts employees on the same page when brainstorming new products or developing and delivering new meaningful features to an existing product. “For organizations hoping to capture market share and deliver value faster (or even just deliver software more safely and securely), DevOps promises both speed and stability.” (Forsgren,  2018, p. 45.)

This doesn’t mean that DevOps is easy to implement in an organization. Organizations may be hesitant to change their software development cycle. Implementing DevOps may cause some employees to gain more responsibility, and that can always be alarming. Strong leader-ship is needed to adopt this mind set. DevOps isn’t a strict structure. It is a very flexible concept that organizations implement in their own ways. DevOps teams doesn’t just only have to include developers and operations members, some organizations include stakeholders as well. The goal is for the organization to not fall short in deploying fast, high quality software products.

DevOps has many different definitions to different organizations. To some it’s a position to bridge the gap between two teams, to others it is a collaborative team with one common goal. DevOps It is a guideline, and a set of principles for organizations to follow. Organizations across the globe are having great success with this methodology. Implementing DevOps can be challenging, but with strong leadership and inclining employees’ organizations can reap the benefits of DevOps. 


Wiedemann A., Forsgren N.,  Wiesche M., Gewald H. & Krcmar H. (2019).Research for Practice: The DevOps Phenomenon. Communications Of The ACM, 62(8), 44-49.

Huzaifa Anas 500 word article summary

TO: Prof. Jason W. Ellis

FROM: Huzaifa Anas

DATE: September 17

SUBJECT: 500-Word Summary of Hassabis et al “Neuroscience-Inspired Artificial Intelligence”

Hassabis et al in Neuron argues that the field of neuroscience and AI (artificial intelligence) have a symbiotic relationship, but it’s in jeopardy, because of decreasing communication and collaboration. The contention states neuroscience provides a productive source of inspiration for algorithms and architecture, which is “independent of and complementary to the mathematical and logic-based methods and ideas that have largely dominated traditional approaches to AI” and “neuroscience can provide validation of AI techniques that already exist.” (Hassabis et al, 2017, p. 1). Moreover, they believe the progress in AI will eventually pay dividends to neuroscience by being a good test field. Within this article, past breakthroughs are examined to support this argument, while looking at how continued collaboration and communication can benefit both fields.

Two of AI’s backbones originate from neuroscience, which’s deep learning and reinforcement learning. Deep learning has revolutionized AI through dramatic advances in its neural and capable networks of learning freely from unstructured or unlabeled data. Reinforcement learning, the second pillar of modern AI, is a powerful tool enabling AI researchers to create software agents that act in an environment maximizing some sort of reward. In the 1940s artificial neural networks were developed, which could compute logical functions and ultimately “learn incrementally via supervisory feedback (Rosenblatt, 1958) or efficiently encode environmental statistics in an unsupervised fashion” (Hasabis, 2017, p. 2). This is the foundation for deep learning. Soon after backpropagation algorithms were made, which allowed learning to occur in networks of multiple layers whose value was recognized in 1986 by cognitive and neuroscientists working on Parallel distributed processing or PDP, which better-represented human-like behavior than serial logical processing, which AI researchers were focusing on. PDP has been applied to machine translation through the idea that “words and sentences can be represented in a distributed fashion (i.e., as vectors)” (Hasabis, 2017, p. 2). Deep learning ultimately became a field independent of PDP. Reinforcement learning comes from animal learning research, which Pavlov and Skinner pioneered. Reinforcement learning is used in robotic control, skillful play in backgammon and go.

If someone looks closely, AI research is still heavily inspired and guided by Neuroscience through AI work on attention, while eventually pivoting towards efficient learning and more independent behavior like transfer learning and imagination. The goal of AI is to form human-like behavior, and it’s practical an accurate biological framework as a reference. Attention is a critical issue currently because not all information is equal and therefore unlike before where all information was treated equally in neuroscience now information is being given different values, which allows for more efficient computing power usage. For the future, we want to decrease the computing power and a large amount of data needed for AI as currently. Humans can learn from a few examples, which AI can’t, and researchers are trying to apply developmental psychology ideas here. For imagination and transfer, learning neuroscience is still pioneering this part, but in the future, it’ll hopefully provide practical insights for AI work. All things considered, both fields can provide feedback to each other by having neuroscience provide ideas, and AI proves as a testing ground for these ideas. This isn’t compulsory, but just an effective and logical symbiotic relationship.

Article Cited APA format

Hassabis, D., Kumaran, D., Summerfield, C., & Botvinick, M. (2017). Neuroscience-inspired artificial intelligence. Neuron, 95(2), 245-258.

I’m not sure if restructuring definitions is considered plagiarism.

Alpha Barry’s 500-Word Article Summary

To: Professor Ellis

From: Alpha Barry

Date: 9/17/19

Object: 500-Word Summary of Bill Nye on “Cultural Identity and Racism”

Throughout the course of the history of America, there have been numerous events occurred that affected the country in good ways as well as bad ways. There have been past major events that include Louisiana Purchase, Manhattan Project, Vietnam War, Assassination of John F. Kennedy, The American Revolution and the Civil War. The past events had a major impact on the country as well as the nation. America is a country with diverse cultures from all part of the world. People that migrate to America have only one purpose that they can find a better life which they have not been blessed by their country before. So, why is racism growing in an unexpected rate? And where did this type of behavior in the people of America begin?

 For instance, the campus racial incident that occurred in Penn State University on November 12, 2016 when a student received unknown group request named as “GroupMe” and it contained racist materials. Amy Guttmann, president of the University of Pennsylvania, quickly took action and stated “We are absolutely appalled that earlier today Black freshman students at Penn were added to a racist “GroupMe” account that appears to be based in Oklahoma. The account itself is totally repugnant: it contains violent, racist and thoroughly disgusting images and messages that totally change the mindset of one person to another in different ways (www.jbhe.com). Once an individual has been exposed to racism, his mentality and lifestyle changes accordingly. Even if it is not noticeable but has a major impact on the society as it gets worst. One of the ways racism affects the society is that members of racial and ethnic oppressed groups continue to struggle for equal access and opportunity, there main target is basically minorities and they show hatred towards them. Other than simply getting a job, getting and keeping a house in some states is often a difficult task for those of color. The job of a landlord is to rent out houses to reliable people or families, though a racist landlord could make it difficult for a family of color to find a home. The “Voting Rights Act”, gutted by the Supreme Court, is a good example of a law against racism. Other laws against racism include the Equal Employment Opportunity Commission laws against racial discrimination in employment. Widespread housing discrimination against Americans of color in U.S. neighborhoods is sometimes referred to as a national problem. Racism is still alive in this country which people thought has been ended after the laws against racism was passed, it did not change the people who consider themselves superior as compared to others. “Many people fail to believe that race isn’t a biological category, but an artificial classification of people with no scientifically variable facts,” said Bill Nye, an American science educator and television presenter. Just because of this issue, educational and economic opportunity, political representation, income, health and social mobility of people of color is changing our country which is bad for our future.

All in all, racism is something that should have not happened, and it’s sad that it did. But America has gone through believing in racism to pretty much getting rid of racism. Though it went through many stages, America has progressed in trying to get better and showing everyone that each and every single person is equal, and has the exact same rights as everyone else, it doesn’t matter if you’re White, Black, Asian, etc. We are all the same and have the exact same rights as everyone else.




Long Jie Mai 500-Word Article Summary

TO: Prof. Jason Ellis

FROM: Mai Long Jie

DATE: Sept 17, 2019

SUBJECT: 500-Word Summary of Wallden and Kashefi “Cyber Security in the Quantum Era”

Cyber Security in the quantum era is an article written by Petros Wallden and Elham Kashefi and published in Communications of the ACM journal. The article mainly points out the fast-growing trend of quantum computing. Companies such as Google, IBM, Intel, Alibaba among others are embracing quantum computing. The fast rising of quantum technologies comes with negative effects if associated with the adversaries but turns out to be positive if used by honest parties. The large use of quantum computing increases risks and threats in cyber security. Even though, if the issues are addressed through quantum cyber security, it will be easy to cope with quantum technologies in the future. The article gives detailed research information on quantum cyber security which can be approached from three different views. These views being; Post- quantum, quantumly enhanced and quantumly enabled. Additionally, the myths are addressed as to what people understand about quantum computing and facts are stated to cleat the myths.

Research has been carried out to help in achieving quantum cyber security, and this is divided into three categories; Post-quantum being the first category of the research on quantum cyber security which involves classical computation and classical communication as the resources required from the honest parties. This focuses on the hard problems for the quantum computers, security definitions and proof techniques to counter quantum adversaries. Quantumly enhanced approach uses small quantum device for quantum communication and used by the honest parties. This approach is limited only to the quantum technologies that are currently available. Quantum technologies can be used positively in cyber security research. This is possible if they are included in protocols improving on security as it is not based on any computational assumption. This research is done on QKD (Quantum Key Distribution). Quantumly enabled category stretches to the future expansion of large quantum computers and examines the security and protocols that are enabled on existing quantum computers. This uses approaches such as post-quantum computational secure protocol and having clients interact with the quantum server thus mimicking the quantum channel and avoiding information leakage (Wallden & Kashefi, 2019).

The article gives a good description of quantum computing for easy understanding before going deep into the positive and negative effects of large quantum computers. It persuades people to use quantum technologies for their advantage rather than allow cryptographic attacks threating cyber security. It clearly shows the myths and misconceptions of quantum computing and how people believe that constructing quantum computers will solve anything quickly. Also, it states the reality against the myths stated to help in understanding how quantum computing can affect cyber security if not managed. The article offers explanation on adversaries that need to be addressed to ensure that quantum security is achieved in the future, with both large quantum computers and classical communication networks. The list of all research carried out on quantum cyber security may not be exhausted in the article but it captures well the effects of quantum technologies for cryptographic attacks. Clearly, people have a long way in ensuring quantum cyber security is achieved and putting this research into consideration will greatly help in using quantum computers to improve cyber security.


Wallden, P., & Kashefi, E. (2019). Cyber security in the quantum era. Communications Of The ACM, 62(4), 120-120. doi: 10.1145/3241037

Liuming Chen’s 500-Word Article Summary

           Wang et al. published an article about some of the key technologies of 5G cellular network in IEEE communications magazine, titled “Cellular architecture and key technologies for 5G wireless communication networks”. Major technologies discussed in the articles include a new heterogeneous 5G cellular architecture, some key technologies that can be implemented into 5G to improve performance, and some future challenges.

           The article proposes the next-generation wireless communication technology 5G needs to be constructed in a new type of heterogeneous cellular architecture to achieve maximum, seamless coverage and high mobility. The new architecture will be separate indoor and outdoor access point because of the short-range RF (Radio Frequency) spectra of 5G. Outdoor base stations will be equipped with large antenna arrays. These antennae will connect to wireless access point inside buildings for indoor users. This will solve the short-range and penetration loss through walls issue. Not just stationary wireless communication has issues that need to be addressed, high mobility wireless communication also. According to Wang et al., “High-speed trains can easily reach 350 up to 500km/h, while 4G networks can only support communication scenarios up to 250 km/h” (Wang et al., 2014, p.123). The MFemtocell (Mobile Femtocell) concept, which combines the concepts of mobile relay and femtocell, is proposed to accommodate high mobility uses such as users in vehicles and highspeed trains. Access points can be deployed inside highspeed transportation. Instead of communicating directly to outdoor base stations, devices will be connecting to access points inside of these highspeed transportations.

           Some key technologies have mentioned in the article that can improve the performance and power efficiency of 5G system. They are the following. Massive MIMO (Multiple Input Multiple Output) systems, by adding more antennae to a MIMO system to increase performance, reliability, spectral efficiency, and energy efficiency. SM (Spatial Modulation), a MIMO technique for low-complexity implementation of MIMO system. It can mitigate interchannel interference, interantanna synchronization, and multiple RF chains in conventional MIMO systems. This technique can be used in MIMO system with any number of transmit and receive antennae, even unbalanced MIMO system. CR (Cognitive Radio) network, an innovative software technology to improve the utilization of the RF spectrum. A large portion of the radio spectrum is underutilized most of the time, a CR network can detect, share, and use these spectrums when the system is loaded. Another viable technique that helps mitigate spectrum bottlenecks in RF communication is VLC (Visible Light Communication), which uses LED light as a signal transmitter. It can be implemented using the current lighting infrastructures.

           Many technologies have proposed and discussed in this article, but there are still many challenges needs to be addressed. Such as realistic channel models for 5G wireless systems, reducing signal processing complexity for Massive MIMO, interference management for CR networks, and more importantly, green communications. A tremendous amount of base stations will be deployed in the 5G era because of the short-range signal. Performance is admittedly important, but it also needs to be energy efficient to reduce CO2 emission.


Wang, C. X., Haider, F., Gao, X., You, X. H., Yang, Y., Yuan, D., … & Hepsaydir, E. (2014). Cellular architecture and key technologies for 5G wireless communication networks. IEEE communications magazine, 52(2), 122-130.

Julia Shin’s 500-Word Article Summary

TO: Prof. Jason W. Ellis

FROM: Julia Shin

DATE: Sept. 17, 2019

SUBJECT: 500-Word Summary of Andrea Zanella’s et al “Internet of Things for Smart Cities”

Andrea Zanella et al discusses the implementation of IoT (Internet of Things) in order to develop a smart city in the article “Internet of Things for Smart Cities” from the IEEE Internet of Things Journal. The concept of the Smart City was created to be more efficient and to provide better services all while reducing costs. The IoT will be the key to turning this concept into a reality. There are, however, some concerns regarding the IoT that may pose as a threat. Despite this, the “Padova Smart City” project provides an example of a possible application of urban IoT network and could act as a catalyst for the whole process. 

One major problem concerning the use of the IoT is its complexity. There are many layers involved in this whole network that must be considered in order to produce the best results. For instance, some key characteristics include its “capability of integrating different technologies with the existing communication infrastructure in order to support a progressive evolution of the IoT” as well as easy accessibility by both the citizens and the authorities (Zanella et al, 2014, p. 25). The different elements of the IoT system will be responsible for protecting these key characteristics. 

There seemed to be a pattern of spotting issue with what is used today. For example, HTTP (HyperText Transfer Protocol) is not suitable for constrained devices due to its limiting nature. CoAP (Constrained Application Protocol) will combat the issues of HTTP and provide a more reliable service. A HTTP-CoAP intermediary will be the key in allowing transparent communication between the two protocols as well as devices that utilize HTTP. All of this effort, and more, is put into creating a unified system that will work with the devices that exist today while simultaneously working towards the goal. 

In contrast to the intricate details that go into the IoT system, the goals are quite simple. The use of devices like sensors will play an important role to improve services such as smart lighting and monitoring energy consumption. These sensors will be responsible for collecting data that will be stored and processed by the backend servers. For instance, the smart lights will know when to provide light and how much in accordance to the time of day and weather conditions. In the case of the Padova Smart City project, the street lamps were equipped with photometer, temperature, humidity, and benzene sensors. After analyzing the data collected from these sensors over the course of a couple of days, it was observed that generally the light, temperature, and humidity measurements reached saturation levels during the day and dipped back down for the night. Benzene levels also typically decreased during the night as a result of less traffic. 

Realizing the dream of creating a Smart City is no easy task; it is the combination of all these complex systems that make it work. However, the project that took place in Padova, Italy showcases the potential of implementing such a concept. The authors not only acknowledged a lot of the issues that critics may have, but also provided possible solutions. This shows that although the reality of a Smart City may not be perfect yet, it is still worth investing time into. For so long, advancements of technology have caused major environmental problems, but the use of the IoT systems may be what we are all looking for. The future for a Smart City truly looks bright.


Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet of things for smart cities. IEEE Internet of Things Journal, 1(1), 22–32.

Daniel.L 500-Word Summary

To: Jason Ellis

From: Daniel Lawrence

Date 9/17/19

Subject: 500-Word Summary by Wood, Nagpal and Wei “Flight of the Robo-bees”

  Finding an article or news piece of what has been done already is one thing, but what’s more interesting is the news stories on what is to come. The purpose of this memo is to provide readers feedback of this academic journal entry. Members from Harvard University report on their status and hopes for creating a network hive of robotic bees under the article title “Flight of the Robo-bees” in Scientific American. This memo is to discuss How it works, Complications on creating a larger scale of a hive network and mainly their brain behind its creation. 

After reading the article published by Scientific American the University went down an interesting path of looking how actual flies operate with their sensory capabilities in hopes of doing something similar with these robotic bees. This aspect posing one of the most significant problems was thought to have been avoided by programing a visual system into the bees brain to map out 3-D map of its environment. Based on the article, the plan for creating the sensory component was concluded to use hardware accelerators that will allow for the bees to complete specific pre-desired task. Including something of this magnitude however may cause issues with the individuals bee miniscule body. It’s evident that the group attempting this invention thinks outside the box based on the different avenues that has been explored for the creation of the brain.

Proceeding forward now realizing the difficulty of effectively programing one robo-bee, the team takes on creating a whole hive or network of bees. The path through this the team choose was to create a programing language thats viable for colonies. One way they choose to do so was to create an impromptu language incorporating something called the Karma system. This kind of system is something thats new to me, apparently it’s best described as the stimuli taken from each individual thats sent to the hive in order to adjust the hive’s behavior.

 “Swarms of small, agile and potentially disposable robots can enable many new applications — pollination, for example, or search and rescue in a disaster scenario — that are not possible with individual robots.” ( Wood, Nagpal and Wei. Mar2013. p60-65). This quote from the report really reenforce the limitless applications for undergoing a project like this. Not only for the purpose rescue in disaster scenarios as was mentioned, in addition these bees could be beneficial in the medical field or transportation in a drastic way. However as of now things for the team are just getting started and those applications may prove to be to much for right now. Progress made on the other hand appears to be moving forward as the team holds an open view on different ways the bees can be effective. 

So far the teams tangible goal for these bees is to pollinate fields based on the report. So for now they are focused on the communication between bees.

This article proved beneficial because it showed that projects as unique as this aren’t stoping however are tackled by members of a university.

References; Wood.R , Nagpal.R , Wei.G. (Mar 2013). Flight of the RoboBees. Scientific American, Vol. 308 Issue 3, p60-65. Retrieved from http://web.a.ebscohost.com.citytech.ezproxy.cuny.edu/ehost/detail/detail?vid=7&sid=5a682085-463c-41aa-b27b-f80504de1789%40sessionmgr4007&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#anchor=AN0085941834-17&AN=85941834&db=a9h