Skip to main content

Posts

Showing posts from July, 2020

Quantum Computing | Qubit, Basic Structure, Difference with Classical Computers, Applications and More

Computational problems, Yes, the Solution of computational problems, that can never be solved in a feasible time period by the existing supercomputers is the basic need of a Quantum computer.  Quantum Computers use quantum-mechanical phenomena like Superposition and Entanglement to perform computation. Superposition refers to the presence of a quantum particle like an atom or a photon in two states simultaneously, exactly it is not simultaneous but it spins so quickly that it appears to be in both positions at the same time. Entanglement is a physical phenomenon in which a group of quantum particles, interact, share spatial proximity in such a way that their quantum states remain dependent on one other even if they get separated by larger distance. Such particles show wave-like properties, and when frequency and waveform of these particles become identical, they are said to be in Coherence. Coherence is a mandatory condition to perform computing. In a Quantum System, Superposi...

Cell Phones | Working Principle, Radio Waves

Cell phones are basically full-duplex radio transmitters and receivers , that are capable of transmitting and receiving radio signals using an  antenna . Full duplex means both the sender and recipient can talk at the same time but at different frequencies. A cell phone uses two frequencies per call, one for speaking and one listening. Digital Cell phone Radio waves occupy the range of  30 Hz to 300 GHz with wavelengths of 10000 km to 1 mm respectively in the electromagnetic spectrum. Why Radio waves are used in communication? Radio waves are transmitted easily through the air. They don't cause damage to the human body. These waves can be easily reflected to change their direction. How cell phones work? Your phone converts the radio waves into electrical signals and then into voice, similarly, voice is converted into electrical signals and then into radio waves . Cell phones operate within the cells . Each cell has a hexagonal shape . A typical cell occupies an area of 26 s...

5G Technology | Bands, Millimetre Wave 5G, Beam Steering, Applications

What is 5G? 5G or Fifth Generation technology standard for Mobile Networks enables users to use ultra-high-speed data transmission facility, a peak speed of 20 Gbps with a maximum latency of 4 milliseconds . 5G Cellular Network Such high-speed data transmission is attained by higher-frequency radio-waves . The higher frequency radio waves have a shorter range (c   = f • λ ), so to provide a wide range  5G network requires more number of cells. 5G network technologies operate on bands like Low band 5G (600-700 MHz, a little faster than 4G) Mid band 5G (2.5-3.7 GHz, download speed   100-900  Mbps ) High band 5G (25-39 GHz, download speed 1 Gbps) Millimeter Waves 5G (30-300 GHz, download speed 20 Gbps) How much faster than 4G LTE (Long Term Evolution) The bandwidth of 4G LTE is  600-700 MHz  with a peak speed of 5-12 Mbps while the bandwidth of 5G is 25-300  GHz with a peak speed of 20Gbps The peak latency of 4G LTE is 20ms while 5G gives us the ma...

Third-Party Apps | Meaning, Download Risks and Security Measures

What are Third-party apps? Third-party apps are apps developed by someone other than your phone manufacturer( Apple, Nokia, Motorola...) or Operating system provider(Android, iOS...).                                                                                       Third-party Apps Such apps are often downloaded by us to get any specific task done but they can be a threat to the security of our phones and even to our bank accounts. Because these apps always ask us to grant permissions like using Storage, Contacts, Microphone, Location, etc. Using these permissions they can easily access our private information such as passwords, user IDs, documents, media files, etc. How third-party apps are dangerous to our phone's security? These apps are often embedded (attached f...

How was Twitter hacked in 2020?

How Twitter hacking 2020 happened?   Recently Twitter accounts with a blue tick( shows the authenticity of a public interest account ) of big voices of the world like US Presidential election candidate Joe Biden, billionaire Elon Musk, tv star Kim Kardashian, former US President Barack Obama , and several others got hacked.  Twitter Hacking News 2020. The Hackers targeted their accounts and tried to reset their login credentials, and succeeded as well. Nowadays we can easily transfer money just by using simple Twitter posts using the following Steps The sender creates a voucher to @bank in the format #Pay Receiver's Twitter account Amount   You will receive a passcode from @bank  The sender shares the passcode with the Reciever. The Receiver will receive a tweet from @bank and informing the Reciever that someone wants to send money to him with a link in the tweet. The Reciever must need to authenticate himself by verifying his twitter User ID and account password. N...

How artificial intelligence can help in fighting with coronavirus pandemic?

This is not the first time we are confronting with coronavirus. It all started in 2002 when SARS COV 2 outbroke, people started to get infected exponentially(2,4,8,16...).  COVID 19 , SARS COV 2 , and MERS , all are caused by different variants(mutants) of coronavirus. To get rid of this epidemic, Researchers started the process of discovering the vaccine. In order to discover the vaccine, they conducted tests and researches. The outcomes and facts derived from these researches are consolidated in the form of Research papers. After years of research and study work, more than 28000  papers were written. How Research papers are useful in order to make the COVID-19 vaccine? Researchers need to read and study these papers thoroughly to find a pattern in the genetic code of the virus obviously with the possibility of human error.  Yes, you have guessed correctly it's a longlasting and hectic task for the researchers and scientists. Once the pattern is identified, the process o...

Self Driving Cars Technology | Machine Learning Algorithms, Sensors, SLAM, SAE levels

What are Self Driving cars? Self Driving cars are those vehicles that don't require human intervention to drive although human beings can drive such vehicles by using"Human Override Mode". Autonomous cars are equipped with various sensors to map their environment and navigate appropriately.   Autonomous Vehicle Self Driving cars Technology Sensors Radar   uses radio waves to determine the range,      velocity, and angle of the objects moving around. Lidar makes 3D images of the objects using laser light reflection. Sonar uses sound wave propagation to navigate, sonar helps the control systems to identify different sounds coming from the objects in the surrounding. GPS sensors help in traffic analysis location sensing. Inertial Measurement System determines the body's specific force, angular rate, and orientation using Magnetometer, Accelerometers, and Gyroscopes. All this sensory data  is sent to the control systems of the vehicle where a Com...