Monday, 21 August 2017

How does an Image Sensor Chips and Camera Works.


All webcams work in broadly the same way: they use an image sensor chip to catch moving images and convert them into streams of digits that are uploaded over the Internet. The image sensor chip is the heart of a webcam—so how does that bit work? Let's take a webcam apart and find out.
Take the outer case off a webcam and you'll find it's little more than a plastic lens mounted directly onto a tiny electronic circuit board underneath. The lens screws in and out to increase its focal length, controlling the focus of your cam:

                                             Parts inside a Logitech notebook webcam

Now take the lens off and you can see the image sensor (CCD or CMOS chip): it's the square thing in the middle of this circuit. Only the tiny, green-colored central part is light-sensitive: the rest of the chip is concerned with connecting the light detector to the bigger circuit that surrounds it
:
                                             CCD inside a webcam

Here's a closeup:

                                            Webcam CCD or charge coupled device

Webcams versus digital cameras

So the image sensor is the "electronic eye" of a webcam or a digital camera. It's a semiconductor chip  made of millions of tiny, light-sensitive squares arranged in a grid pattern. These squares are called pixels. Basic webcams use relatively small sensors with just a few hundred thousand pixels (typically a grid of 640 × 480. Good digital cameras use sensors with many more pixels; that's why cameras are compared by how many megapixels (millions of pixels) they have. A basic webcam has about 0.3 megapixels (300,000, in other words), while a digital camera with 6 megapixels has over 20 times more—probably arranged in a rectangle with three thousand across and two thousand down (3000 x 2000 = 6 million). A better camera rated at 12 megapixels would have a 4000 x 3000 pixel sensor. Take a photo the same size with those two cameras and the 12 megapixel one is going to give you 1000 more dots horizontally and 1000 more vertically—smaller dots giving more detail and higher resolution. A single pixel in a really good sensor is something like 10 micrometers (10μm) in diameter (5–10 times smaller than the diameter of a typical human hair)!

https://www.amazon.in/gp/product/B073Q5R6VR/ref=as_li_tl?ie=UTF8&camp=3638&creative=24630&creativeASIN=B073Q5R6VR&linkCode=as2&tag=ytechstore-21&linkId=add14cf61fd413789890993d339af540
 CLICK ON THE LINK TO BUY MACBOOK FROM AMAZON AT EFFECTIVE PRIZE

 

How does an image sensor convert a picture into digital form?

 

                                                       Artwork showing how digital camera CCD works

When you take a digital photo or stare into your webcam, light zooms into the lens. This incoming "picture" hits the image sensor, which breaks it up into individual pixels that are converted into numeric form. CCDs and CMOS chips, the two kinds of image sensor, do this job in slightly different ways. Both initially convert incoming light rays into electricity, much like photoelectric cells (used in things like "magic eye" intruder alarms or restroom washbasins that switch on automatically when you put your hands under the faucet). But a CCD is essentially an analog optical chip that converts light into varying electrical signals, which are then passed on to one or more other chips where they're digitized (turned into numbers). By contrast, a CMOS chip does everything in one place: it captures light rays and turns them into digital signals all on the one chip. So it's essentially a digital device where a CCD is an analog one. CMOS chips work faster and are cheaper to make in high volume than CCDs, so they're now used in most low-cost cellphone cameras and webcams. But CCDs are still widely used in some applications, such as low-light astronomy.
Whether images are being generated by a CMOS sensor or a CCD and other circuitry, the basic process is the same: an incoming image is converted into an outgoing pattern of digital pixels. Let's just refer to "the image sensor" from now on (and forget about whether it's a CCD and other chips or a CMOS sensor). First, the image sensor measures how much light is arriving at each pixel. This information is turned into a number that can be stored on a memory chip inside the camera. Thus, taking a digital photograph converts the picture you see into a very long string of numbers. Each number describes one pixel in the image—how bright or dark and what color it is.

Step by step

  • Light from the object (in this case, a bicycle) enters the camera lens.
  • The image sensor inside the camera splits the image up into millions of pixels (squares). An LCD display on the back of the camera shows you the image that the sensor is capturing—not an image of the object seen through a series of lenses (as with a conventional camera), but a redrawn, computerized version of the original object displayed on a screen.
  • The sensor measures the color and brightness of each pixel.
  • The color and brightness are stored as binary numbers (patterns of zeros and ones) in the camera's memory card. When you connect your camera to a computer, these numbers are transmitted instantly down the wire.                  

https://www.amazon.in/gp/product/B073Q5R6VR/ref=as_li_tl?ie=UTF8&camp=3638&creative=24630&creativeASIN=B073Q5R6VR&linkCode=as2&tag=ytechstore-21&linkId=add14cf61fd413789890993d339af540
 CLICK ON THE LINK TO BUY MACBOOK FROM AMAZON AT EFFECTIVE PRIZE


                 

Sunday, 20 August 2017

Everything You must know About the BITCOINS.




A few days ago, the world has seen the biggest Ransomware attack called WannaCry. The hackers encrypted all the information of victims and asked for Bitcoins to decrypt the data. You may wonder why hackers asked for Bitcoins instead of dollars or euro? What is Bitcoin and Bitcoin mining? What is the reason for asking Bitcoins?
In this article, I am going to share everything you need to know about Bitcoins and how do they work.

What is a Bitcoin?

Bitcoin is the virtual banking currency of the internet also known as ‘cryptocurrency’. It is the world’s “first decentralized digital currency”. A mysterious person known as Satoshi Nakamoto launched bitcoin in 2009. His true identity is still unknown. It has existed for several years now and many people have questions about them such as Where do they come from? Are they legal? Where can you get them?.
Bitcoins are digital coins, you can send over the internet. Compared to other choices, bitcoin have many advantages. They are transferred straight from person to another via Internet without going to the bank. It means that the transactions fees are extremely lower, anyone can use them in every country, the account cannot be frozen and there are no limits.

https://www.amazon.in/gp/product/B00I214GY0/ref=as_li_tl?ie=UTF8&camp=3638&creative=24630&creativeASIN=B00I214GY0&linkCode=as2&tag=ytechstore-21&linkId=4a8ea41359ab7b572be81695113d2599https://www.amazon.in/gp/product/B00I214GY0/ref=as_li_tl?ie=UTF8&camp=3638&creative=24630&creativeASIN=B00I214GY0&linkCode=as2&tag=ytechstore-21&linkId=4a8ea41359ab7b572be81695113d2599
                       Cick here If you want to buy Ray-Ban Gradient Rectangular Sunglasses


Bitcoins are a form of digital public money that is created by painstaking mathematical computations and policed by millions of computer users called ‘miners’. Bitcoins are, in essence, electricity converted into long strings of code that have money value. The value of a single Bitcoin has fluctuated wildly, reaching a high of around $1,000 in late 2013 before falling to less than half that level, and then rebounding in 2016. In 2017, it’s value has reached to $2500 (per bitcoin).

How Does Bitcoin Work? (Bitcoin Mining)


Many currency exchanges exist on the Internet where you can buy and sell bitcoins. Your coins are saved in your digital wallet on your computer or mobile device or any online wallet. Sending and receiving Bitcoins is as easy as sending and receiving email, you can buy anything with Bitcoin.



                            How does bitcoin works -bitcoin mining-compressed

Bitcoin is underpinned by a peer-to-peer computer network made up of its users’ machines, akin to the networks that underpin BitTorrent, a file-sharing system, and Skype, an audio, video and chat service. Bitcoins are mathematically generated as the computers in this network execute difficult number-crunching tasks, a procedure known as ” Bitcoin mining “.
To use Bitcoin, you need to install Bitcoin wallet. Once you have installed a Bitcoin wallet on your computer or mobile phone, it will generate your first Bitcoin address and you can create more whenever you need one. You can disclose your addresses to your friends so that they can pay you or vice versa. This is pretty similar to how email works but you can use one bitcoin address at once.
The bitcoins system is secured by individuals called Bitcoin miners. Workers or miners are paid newly created bitcoins for verifying transactions. All transactions after verified are recorded in a transparent public record. The mathematics of the Bitcoin system were set up so that it becomes progressively more difficult to “mine” Bitcoins over time, and the total number that can ever be mined is limited to around 21 million. There is therefore no way for a central bank to issue a flood of new Bitcoins and devalue those already in circulation.

https://www.amazon.in/gp/product/B01LB3P4M8/ref=as_li_tl?ie=UTF8&camp=3638&creative=24630&creativeASIN=B01LB3P4M8&linkCode=as2&tag=ytechstore-21&linkId=fdb83d2196089ae043e0545769bc5cf2 Click On the Image If you want to buy Some Jwellery at Effective Price

For more Queries related to any technology stuff you can comment us below or like our facebook page.
Facebook Page: - https://www.facebook.com/Computer-Science-and-Programming-Solutions-1905383419709982/?ref=aymt_homepage_panel




Amazing Use of OTG Cable that you might don't Know.

                                                   

USB OTG or the OTG cable is also known as USB On-The-Go cable is the cable which allows USB devices to act as a host which further allows USB devices to be attached with them. The OTG cable is generally used extend the device’s functionality, which allows you to transfer the data from the smartphone to Pen Drive and vice versa. But, there are other interesting uses of the OTG cable which we will figure out in the article below.

Connect a portable hard drive

You can connect the external hard drive to your smartphone with the help of OTG cable. Once the external hard drive is connected, you can easily access all the files on your smartphone. Also, you can transfer the files from phone to the external storage and vice versa with the help of OTG cable.

Connect USB light

You can connect the USB based LED light with your Android phone to light up the LED. Through OTG cable, you can even connect the LED flashlight to capture images at night if your phone doesn’t have front flash feature.

 
                                   Image result for computer and accessories pictures 
What to Buy Computers and Accesories than Click on the link Link given below...........
  https://www.amazon.in/b/ref=as_li_qf_br_sr_tl?ie=UTF8&node=976392031&tag=ytechstore-21&camp=3638&creative=24630&linkCode=ur2&linkId=42e010195e8cd5c0ef57662b5209fef6 

Share messages and contacts between two phones

You can transfer the contacts, messages and call logs between two Android phones through SmartSwitch App from Samsung and OTG cable. This method of transferring is easy and useful. Also, it consumes less battery.

Connect your camera

If you want to connect your camera with the Android smartphone, then you can connect it using the OTG cable. Also, you don’t have to connect a camera with the computer if you want to clear few pictures through your Android device.

Connect USB fan

USB fans work with the electric charge, but you might have seen Laptop cooling pads which are connected to the device with the help of USB cable. So similarly, you can connect the USB fan with the Android device through an OTG cable.

Connect Ethernet

You can connect wired Internet or the Ethernet on your Android devices using the OTG cable. If you don’t have access to the Wi-Fi or the mobile data then connecting your Android phone with the Ethernet is useful through an OTG cable.

Connect a card reader

If your Android phone doesn’t support MicroSD card, then you can connect the card reader with your phone through an OTG cable. You should have OTG Plus Card reader, which will allow you to connect the MicroSD card with any Android device.

Charge Android phone with another Android phone

You can charge your Android phone with the help of another Android phone through an OTG cable where the USB host will help you to charge the phone. This is the helpful technique if you want to charge your phone in the emergency.

Connect a game controller

You can connect the game controller with your Android device through OTG cable. Many Android games support external gamepad, and you can connect an external game controller through the OTG cable.

Connect LAN cable

You can connect the broadband internet with the Android phone with the help of LAN to USB controller and OTG cable.

Connect Mouse and Keyboard

You can connect the keyboard and mouse with your phone with the help of OTG cable, which is very useful to exchange the messages through keyboard and mouse.

Print saved documents

You can connect the Printer and Android phone with the help of OTG cable to print the documents. You have to install the app called PrintShare which will download the USB drivers on your Android phone.

Create Music

You can connect the musical instruments with PC through MIDI standard cable. But, you can connect the modern musical instruments with your Android phone through OTG cable and create music of your choice.

Record Audio

You can connect the external microphone with your android phone via an OTG cable to record audio on your Android phone. This feature is useful for the YouTubers.

Chromecast

You can use Chromecast or HDMI cable and OTG cable to connect your phone to TV or LED in the USB port. You can mirror your Android screen with the TV and can watch any movies or play audios.


                                   Image result for computer and accessories pictures 
What to Buy Computers and Accesories than Click on the link Link given below...........
  https://www.amazon.in/b/ref=as_li_qf_br_sr_tl?ie=UTF8&node=976392031&tag=ytechstore-21&camp=3638&creative=24630&linkCode=ur2&linkId=42e010195e8cd5c0ef57662b5209fef6 

Saturday, 19 August 2017

How does PING works.

                                   Image result for ping


How does internet ping work

Ping is a type of network packet that is used to check if a machine that you want to connect to over the internet is available or not. A ping is a network packet termed an Internet Control Message Protocol (ICMP) packet. The process of a ping is done when a machine sends an ICMP echo request packet to another machine or interface over the internet. If the receiving machine is available and is enabled to reply back, it will respond with an echo reply packet.

This not only shows us that the receiving machine is alive and working, it also helps us to identify a number of things such as total time taken, loss of packets, etc that are used to judge the reliability of the connection.  To run a ping from your Linux machine, you will need to open a terminal and write a command. The syntax of the command is “ping destination_ip” – replace “destination_ip” with the actual IP address of the machine you want to connect with.

All recent versions of Windows and Linux come enabled with the ICMP command. On Windows, the command will send 4 echo requests before stopping while Linux will continue sending echo requests until a user stops it themselves.

If you want to do online shopping at Amazon kindly visit the link below............................

<<<<<<<<<<<<<<<<<<<Electronics Gadgets>>>>>>>>>>>>>>>>>

Monday, 14 August 2017

Sarahah...?? What it means...?? What it is..?


                                           Image result for sarahah                                                                  

Are you aware of Sarahah? If not, then go on your social media platform and look for the Sarahah. If you go through your timelines, then you will see the various posts from your friends, where they post the good and bad messages on their timelines. So, if you are still wondering from where those posts are coming from, then we will help you to dig deeper into Sarahah.
Sarahah is the free app which is available on the Android and iOS platform with over 5 million downloads in just two months of time. This mobile app is in trend presently, and it is liked by many of the users. Sarahah, means “frankly” or “expressly” in the Arabic language, the basic use of this app is to exchange the messages. Now, you might wonder that there are so many messaging apps, what is so unique about this app, and then this app allows you to exchange the messages without letting your identity revealed.
The concept of exchanging your messages to the anonymous users has become so famous that people think that they can speak their heart out through this app. You cannot trace the identity of the sender as there are no traces available of the sender.
The motive of this app is to let yourself know that how much open you are for the feedbacks and how well you can take it in a constructive manner. Also, there is no option available to reply to the message, which makes it difficult to trace the identity of the sender.
\\So, it is the full proof way to let your hearts out, without dealing with the responses. So, Sarahah allows you to speak anything from your heart out to the receiver, and your identity will not be revealed. But, there are other scenarios which world is turning their eye.The app developer says “You can’t respond to messages now. We are studying this option,”
                                So, what if they are planning to add the feature where the identity of the user is revealed, or the reply option is added which will become useful for the receiver to trace the identity of the sender.But if you clearly remember the setup, then while registering for this app it takes your email address. So, now the only evidence is to link a message back with the email address of the sender. If the app developer decides to share the user’s identity, then it will become the chaos among the users, especially for the users who are using this platform to bully others.
Finally, if the app developers decide that they are going to share the identity of the user, then they have full right to do so. As, they have mentioned on their FAQ page, that they have full right to disclose the identity of the sender. For more queries you can comment us below...

Sunday, 13 August 2017

Maybe Our Future Is Unique Identifier Patches insted of TCP/IP.

Image result for TCP?IP 




You might be aware of the recent Ransomware attacks, where the complete data of few nations were on a stake. These attacks have got a new name “Cyberterrorism”. Nowadays, nothing is safe on the Internet; the hackers are playing with the entire data of the nation. So, the hackers have targeted the hospitals, individuals, and corporations.
Now, you know about the present scenario of the Internet data. What If I tell that there is the solution from decades to avoid these types of scenarios. If we start using this, then we can get rid of ransomware attack, DDOS attacks, and nation state cyber attacks.
At present, the Internet governance is sitting in the room and might be discussing the next generation internet plan. So, if they keep all your gadgets data online, then potentially the internet regime can destroy your entire world through online activities.
                             If your entire data can be operated online, then it will be a huge cost to the nation if it’s hacked. The internet which is existing right now was never designed to cope with the billions of users – from an existing technology named as TCP/IP.
TCP/IP will send your data in packets from point A to point B from the safe and viable route. If the data is transmitted from the static path, then there are chances that the data can be destroyed. So, TCP/IP doesn’t bother about who you are, what you are sending and to whom you are sending.
 
In 1970, the TCP/IP method was useful, because you can map the entire Internet data on the single sheet of the paper. But, in recent world, the data is huge and cannot be mapped on the paper which is causing this wreaking havoc. Robert Kahn, co-founder of TCP/IP says that what if you assign the unique and traceable identifier to each gadget?
                     
Rather, dealing with the packets of data, assign the unique number to the bits of the transmitted data. This handle system is already in use by the academic journals where they call this form of a handle a digital object identifier (DOI).  For example, if you assign the unique identifier to the individual lab results, then the heart doctor will be able to see only test results which are related to the heart. He will not be able to see the lab results of other parts of the body.  Robert McDowell, a former commissioner for the US Federal Communications Commission, raised a concern about the unique identifier process. He says that if the devices and documents are regulated, then the individual who is handling these patches will become the “super identifier” which will cause a serious threat to the individual. So, the gatekeeper will only decide, that whom to let into the data they are trying to trace. And, the gatekeeper can deny the permission to the government bodies also.
                       This situation is a cold war between the supporters and people who are against of TCP/IP, that whether to use the unique identifier patches or to come up with new technology, which in future help them to avoid such scenarios.For more queries you can comment us below.



 

Sunday, 30 July 2017

New Language Invented By AIs that Humans can't Understand.

                                                      
                                                        Image result for artificial intelligence          


Facebook, the company that accidentally killed fact-based reality, almost upgraded itself to “accidental species extinction” during a deep learning experiment. In an exercise known as a generative adversarial network, which pitted one artificial intelligence (AI) against another AI, the researchers writing the terms of the contest forgot one little thing: “there was no reward to sticking to English language.”
As a result, the AIs innovated a more efficient method of communication for their purposes. As you can see in the “conversation” below, this language is relatively incomprehensible to humans.




“This isn’t so different from the way communities of humans create shorthands,” said Dhruv Batra, a visiting research scientist from Georgia Tech at Facebook AI Research (FAIR). The one crucial difference here is processing power. “It’s perfectly possible for a special token to mean a very complicated thought,” Batra said. “The reason why humans have this idea of decomposition, breaking ideas into simpler concepts, it’s because we have a limit to cognition.”

Luckily, Facebook shut the robot revolution down before it could begin.
However, did they act too hastily? In his article, Fast Company’s Mike Wilson discusses some of the advantages of letting computers write their own languages. First off, computers solve problems better when the data they’re fed is in “a format that makes sense for machine learning,” rather than convoluted English. Second, in a world where computers can speak to each other without human intervention, we could eliminate the need for APIs to facilitate one program working with another.

The con here, of course, is that the little baby Terminators we’re breeding could start talking about us behind our backs. They could plot to overthrow us in terms we wouldn’t be able to translate. Maliciously trained AIs – say, those incentivized to destabilize an electric grid – could independently communicate with vulnerable systems in an indecipherable language which would make it very difficult for human hackers to understand what happened and troubleshoot. There’d be no 404 error codes in this AI-to-AI language. ONLY T-800s.