Showing posts with label Science. Show all posts

Try it, which animal do you see first?

The first animal you see would determine your personality

Our minds play tricks on us all the time and they see things the way we want them to see it. The image you see first, therefore, says a lot about who you are based on your choice.
Our personalities are quite complex and there are multiple traits which come into play to create the personality which we reflect. Our personalities have multiple sides and there are numerous dimensions of our personality which come together in a cumulative way to describe our overall attitude.

Image Source: Pixabay
Image Source: Pixabay

That being said, we do have some primary traits which form the backbone of our personalities. While we add different dimensions to our thoughts with our experience and knowledge, the central qualities which define us rarely change. And these traits are the ones which help us decide the kind of people we become and the choices we make.

Image Source: Pixabay
Image Source: Pixabay


Your mind, therefore, tricks you into seeing things the way you want to see them and your personality has a lot to do with your choice. The animal, for example, you see first in the picture below does, therefore, reveal a lot about your choices and the personality you have. Try it, which animal do you see first?

Which animal do you see first?
Which animal do you see first?


#1 A Butterfly


A Butterfly
A Butterfly


A butterfly is the most well-known symbol of beauty and change. It transforms from a cocoon to one of the most elegant of all nature's creation. If the butterfly was the first thing you saw, you most probably reflect the same traits. You are adaptable, flexible and you can change yourself based on your needs and can do whatever needs to be done. You may also find yourself in the ugly pictures of life (in your cocoon) but rest assured, you have the personality to break out and be the beautiful person you are meant to be.

#2 An Eagle


An Eagle
An Eagle


Wild, free and built for the skies, an eagle is one of the ultimate predators of nature. If you spotted the eagle first, it shows that you too are focused and completely driven towards what you want. You never waiver in your decisions and once you have got the target locked, the thing that you want most in life, you would swoop down to grab it and fly away with it, high into the skies, beyond anyone's reach.

#3 A Praying Mantis


A Praying Mantis
A Praying Mantis


A praying mantis is a master of the senses and patience. It can keep still for hours, waiting for its prey and acts without warning to hunt it. If a praying mantis was the first creature you saw, then you have really strong instincts. Your inner voice guides you and you are clearly in touch with your primal self. You go by your guts and more often than not, you get what you want. You are the master of your domain and just like the mantis, there's a fighting spirit driving you from within. 

#4 A Dog


A Dog
A Dog


Loyal, brave, protective and truly selfless, everyone knows the traits associated with a dog but there are truly very few who actually imbibe these traits. If the dog was the first thing you saw, you can rest assured that you are one of the very few people who can be all of the above at the same time. You can be loyal but fierce, selfless and loving, protective and playful at the same time. You are a blend of most rare and incredible traits in the world and no wonder, you are loved by everyone who has the opportunity to know you.

#5 A Wolf


A Wolf
A Wolf


A lone warrior who walks in a pack. The wolves are known to live in a pack but they are also lonely creatures, wandering the wild alone, fearless and fierce. If it was the wolf that you saw first, chances are that your inner self is as fierce and fearless as that of a wolf's. You may walk in a crowd, but your personality will always stand out. To be a wolf can be both an exhilarating experience as well as a lonely affair but you are built to handle it all. 

#6 A Crab


A Crab
A Crab


Hard on the outside, soft from within, you share this trait with the crab if it was the first creature you saw in the picture. Crabs are also known to be extremely loyal. It goes without saying, therefore, that if you look within yourself, you would find that you have always been loyal (whether you know it or not). You have always placed the needs of your loved ones ahead of your own and never in your wildest thoughts have you considered cheating/betraying those who trust you. 

#7 A Rooster


A Rooster
A Rooster


If a rooster was the first image you saw, the primary characteristic of your personality is perseverance. A rooster is not meek by any standards, it is quick, smart, persistent and despite the small body, roosters are known to be fierce creatures. You, like them, may look harmless by the looks of it but when it matters, there are few who can fight back, like you.

#8 A Stallion


A Stallion
A Stallion


If the stallion was the first thing you saw, you are indeed one of the ambitious kind. Wild, free and raw, you are driven to succeed and to be free no matter what. You never shy away from an honest day's work and you are not the one to stay away from a fight. You are in touch with your inner-self which is ready to stand out and be counted. Your personality is the same, exemplary, honest and driven.

#9 A Dove


A Dove
A Dove

A symbol of peace and eternal love, a dove is one of the most beautiful creations of nature. If a dove was the first creature you saw, you probably are a wise soul. You are calm, patient, nurturing and at peace with yourself. It is one of the most difficult things to attain in life (peace from within) and you are well placed to attain peace with least effort from your side. You'll always be a symbol of hope for someone.

What Is A DNA computer? How Can It Beat The World’s Fastest Supercomputers?

Short Description: The concept of DNA computing was first introduced in 1994. It deals with the “bio-chips” made of DNA that are able to perform billions of calculations at once by multiplying themselves in number. In other words, a DNA computer grows as it computes. In a recent development, the researchers from the University of Manchester have shown that the creation of this conceptual computer is possible in real life.
   I
ntel is struggling to increase the speed of their CPU's due to the limitations of Moore’s law. The other processor makers are also working hard to beat the speed records. There’s no denying the fact that researchers and scientists need to look for silicon alternatives for faster computing. The silicon-based computers have a finite number of processors and, thus, their capabilities are also finite.

What is a DNA computer? How does it work?

Long back in 1994, the concept of computing with DNA was first proposed to make calculations faster even with a small footprint. Its major highlight was the ability to multiply itself and carry out numerous calculations simultaneously. In other words, unlike a normal computer that performs calculations one after another, a DNA computer does those calculations at once by making multiple copies of itself.
Coming back to the introduction of the concept of DNA computing in 1994, it was invented by the famous cryptographer Leonard Adleman who used DNA to solve the “traveling salesman” problem. The problem aimed at finding out the shortest route between a number of cities by going through each city only once. Adleman showed that billions of molecules in a drop of DNA had so much computational power that can simply overpower silicon and the powerful human-based computers.
In his experiment, the strands of DNA represented 7 cities. The sequences of genetic alphabets A, T, C, and G represented cities and the path. After this, when the DNA molecules were mixed in a test tube, some DNA strands stuck together and the chains of strands were the possible answers. Using some chemical reactions, wrong molecules were removed. You can read more about the process in detail in this paper written by Adleman himself.
These DNA molecules are able to store billions of times more data as compared to tradition storage devices. Due to an abundance availability of DNA, it’s a cheap resource. Also, a DNA computer will be environment-friendly and compact in size.

What’s the latest progress? Is DNA computing going to be a reality very soon?

In 1997, the researchers at the University of Rochester developed basic DNA logic gates, which was seen as a breakthrough. Recently, a major development in the field of DNA computing was made by the researchers from the University of Manchester, which is famous for creating first stored memory electronic computer.
The researchers have shown that it’s possible to build a DNA computer that’ll grow as it’ll compute. This concept is also being called a nondeterministic universal Turing machine (NUTM).
As the DNA molecules are very tiny, a desktop “DNA” computer can utilize more processors than all the electronic computers in the world combined. “And therefore outperform the world’s current fastest supercomputer, while consuming a tiny fraction of its energy,” according to Professor King of Manchester’s School of Computer Science.
In a research paper, they have described the physical design for an NUTM that implements a universal Thue system. This design uses the DNA’s ability to replicate to execute an exponential number of paths. Their paper shows that this design works using in vitro molecular biology experimentation and computation modeling. You can read the research paper to know more details.
Currently, the field of DNA computing is in its nascent stage, and it’ll take a long time to develop a working DNA computer. But, whatever might be the rate of progress, the concept surely sounds exciting.
For more Updates Visit: amadahmad.blogspot.com

Most Popular Programming Languages, Frameworks, Libraries, And Databases | 2017


Stack Overflow has released its much-anticipated Developer Survey 2017. This year, over 64,000 developers took part in the survey and shared their preferences. The survey revealed that for the fifth time in a row, JavaScript was the most commonly used programming language, followed by SQL and Java.
Stack Overflow is the world’s largest online community for programmers where they can learn languages, share code, and help each other. The website also releases its annual developer survey which gives a pretty solid idea of current programming trends, the work lives of developers, their habits and preferences, etc.
Since 2011, Stack Overflow is conducting this survey each year. This year’s survey is the biggest in Stack Overflow’s history with 64,000 developers taking part. Over the course of next few days, I’ll be telling you about some of the major highlights of this survey.

Most popular programming languages:

For the fifth time in a row, JavaScript has topped the list of the most commonly used programming languages. JavaScript is followed by SQL and Java.
The growth of Python is notable. It has overtaken PHP for the first time in five years. Here’s the list of the most popular programming languages:

Most popular frameworks, libraries:

In this category, Node.js and AngularJS continue to be the most commonly used technologies:

Most popular databases:

For the first time in its survey, Stack Overflow asked the developers what databases they were using. MySQL and SQL Server turned out to be the biggest databases:

For more Updates Visit: amadahmad.blogspot.com

Who's Tracking Your Smartphone?


 Safety should always be our top priority. With the help of just a few short codes, you can find out more about the settings of your phone and work out whether or not your messages and information are protected and whether you’re being tracked.

We has gathered together some of the most useful and important codes for smartphones all in one article, together with some instructions for those who’re worried about being tracked.

With this code, you can find out whether your calls, messages, and other data are being diverted. The status of the different types of diversions that are taking place along with the number the information is being transferred to will be displayed on your phone’s screen. This function is most often set up by either jealous partners or parents who are trying to protect their kids from spam or criminals. Elderly people often become victims of this practice when they lend their phone to a stranger to make a single call. If they do so, they risk having information about where they live, who their friends and family are, their habits and daily activities, and even their financial circumstances passed on to criminals.
Dial this code if you want to find out where calls, messages, and data are being redirected to if it seems that no one can get through to you. The chances are in this case that your voice calls are being redirected to one of your cell phone operator’s numbers.
This is a universal code for switching off all forms of redirection away from your phone. It’s a good idea to use this before you have to use roaming. In this case, money won’t be taken from your account for calls that are redirected by default to your voice mail.
With the help of this code, you can find out your IMEI (International Mobile Equipment Identifier). If you know this number, you can find your phone if someone steals it. When switched on, its location is automatically conveyed to the network operator even if a different SIM card is inserted. If someone knows your IMEI number, they can find out the model and technical characteristics of your phone.
Special codes exist that allow someone to track your location and also to determine whether someone is following you. For this, you need the utility net-monitor. Type in one of the following codes:

for iPhone: *3001#12345#* 
for Android: *#*#4636#*#* or *#*#197328640#*#*

Step 1. Go to the section called UMTS Cell Environment, then UMTS RR info, and write down all the numbers under Cell ID. These numbers are the basic stations located nearby. Your phone will connect by default to the one that emits the best signal.

Step 2. Go back to the main menu, and click on the MM info tab, then on Serving PLMN. Write down the numbers under Local Area Code (LAC).

Step 3. With the help of these two numbers and an ordinary website (the fourth tab to the left), you can determine the location on the map of the basic station that your phone is connected to.

The ones to be suspicious of are mobile basic stations — this could be a truck or small bus with a large antenna. These kinds of vehicles are used at rock festivals and in places where Internet coverage is poor. If there’s one of them nearby, seemingly without any logical reason, it’s just possible that someone is engaged in spying.
If you use Android, you should periodically check your phone for viruses. Place Raiders one of the most dangerous ones that can infect your device. Developed by American experts, it was meant to show how vulnerable our devices are. Once it gets onto a phone, this Trojan takes a series of photographs of the surrounding area, creates a 3D model of the building you’re in, and then takes advantage of any Internet connection to send the data that it’s gathered, adding along with it all the data on the phone and your passwords.
  • National security agencies in virtually all countries now cooperate with cell phone operators, who often provide the former with access to information on any of their customers provided they have a warrant from a court. As a minimum, they provide data from the last three months.

  • If your phone has been tapped by a security agency, the chances are you won’t even notice. If a phone makes odd noises during a conversation, loses battery power rapidly, overheats, or unexpectedly restarts, this is merely an indication that you need to get it repaired rather than a telltale sign that you’re being listened to.

  • People generally don’t reveal all that much in phone conversations, so from the point of view of those who want to listen in it’s much more worthwhile to set up special devices ("bugs") in someone’s home. Radio wave detectors can be used to work out whether such bugs are present in a building.
  • Use messaging apps that are completely closed to outsiders, such as Telegram, Chare, Wickr, or Signal.

  • Determine what information it’s safe to make accessible to all. Should everyone really be able to find out your phone number or have access to information about your family, loved ones, or your lifestyle? Be very careful when posting photographs of children.

  • Don’t install unknown programs on your phone, keep close track of the apps you have installed, and use multiple security locks wherever you can. Don’t click on unsafe links, and don’t connect your phone to suspicious "free" charging points.

  • Only your cell phone operator should ever offer you tracking services, and they should only turn them on with your explicit agreement. Websites and applications that offer to find out the location of other people are almost certainly acting with criminal intent. Be careful!

For More Visit : www.amadahmad.blogspot.com

Our Education System

6 Single Letter Programming Languages You Should Know About


Short Description: C and R are one of the most popular single letter programming languages. There are other lesser-known one-letter programming languages that solve specific problems. While F was developed as modern Fortran, K can be used to write elaborate programs in just a few characters. There exist other one letter programming languages like D, J, and M.
A
part from C, other single letter programming languages are aimed at performing specialized tasks. Many of them have a cult following in the developer community, thanks to their ability to solve tricky problems.

Just like C, another popular single letter programming language is R. It’s used to study numbers and create graphs with intricate data. Earlier, R was called S. In this article, I’ll be telling you about some more single letter programming languages. Let’s take a look:

6 Lesser Known Single Letter Programming Languages

D Programming Language

D is an object-oriented multi-paradigm system programming language with C-like syntax and static typing. It was developed by re-engineering C++ programming language. Apart from inheriting the C++ features, this single letter programming language also has some characteristics of other languages like C#, Java, Ruby, and Python. dlang.org

F Programming language

F was developed as modern Fortran. It’s a minimal subset of the language with about one hundred intrinsic procedures. It’s a compiled, modular, numeric programming language that’s designed to work with legacy Fortran 77 code. F was first included in g95 compiler.Fortran.com/F

J Programming language

J is a single letter programming language with a normal character set that offers the power of APL. It’s a high-level, high-performance, general purpose programming language that runs on 32/64-bit Windows/Linux/Mac, iOS, and Android. Its applications include mathematical, statistical, and logical analysis of data. Since 2011, J is free and open source under GPLv3 license. Jsoftware.com

K Programming Language

K is a proprietary language from array processing. Originally developed in 1993, this single letter language is a variant of APL and infuses the elements of Scheme. After its commercialization by Kx Systems, its open source fork Kona came into the picture. K lets one write detailed algorithms to deal with arrays with the help of just a few keystrokes. Kx.com

M Programming Language

M, or alternatively MUMPS (Massachusetts General Hospital Utility Multi-Programming System), is a general purpose programming language. Its key feature is an inbuilt database that enables high-level access to storage, using simple symbolic program variables and subscripted arrays to access the main memory. M uses the same basic syntax to access volatile memory and non-volatile storage, providing a high-performance data access. Today, it’s used in many large hospitals for data processing. MUMPS

P Programming Language

P is Microsoft’s programming language for asynchronous event-driven programming and Internet of Things applications. It’s a domain specific language that compiles to and interoperates with C. Microsoft has used this single letter programming language to implement and validate the USB device driver stack that comes with Windows Phone and Windows 8. Earlier this year, P was open sourced by Redmond. P on GitHu

Scientists Might Have Just Resolved The Mystery Of The Bermuda Triangle


Scientists may have got a breakthrough in the mystical case of the Bermuda Triangle. They believe that methane gas explosions may be linked to the mystery of the Bermuda Triangle where until now as many as 8,127 people have disappeared.
For the one and a half century, numerous ships and airplanes have disappeared in Bermuda Triangle area, usually under mysterious circumstances. But a new research from the scientists at Arctic University in Norway takes cues from the multiple giant craters on the floor of the Barents Sea.
A massive deposit of methane gas may have exploded in the craters surrounding the seabed caused by gas leaking from oil and gas deposits buried deep in the sea floor.
In the past two years, scientists have also documented methane gas bubbling up from the seafloor off the some parts of the west and the east coasts of the United States. One of the topics that need further analysis is whether methane gas explosions on the seabed could threaten the safety of ships.
Multiple giant craters exist on the sea floor in an area in the west-central Barents Sea … and are probably a cause of enormous blowouts of gas. The crater area is likely to represent one of the largest hotspots for shallow marine methane release in the Arctic.
Researchers at the Arctic University of Norway say.
This is not the fist time the possibility of methane gas eruptions in the Bermuda Triangle has been suggested. Last year a group of researchers led by Igor Yelstov of the Trofimuk Institute in Russia said that the mysterious disappearances in the Bermuda Triangle were the effects of hydrant gas reactions. When the craters start to actively decompose, methane ice is transformed into gas.
If the theory of methane gas explosions being the cause of so many disappearances in the Bermuda Triangle proves to be correct, then we can chalk one up for science. But would the theory explain the magnetic anomalies associated with the area? It will be interesting to hear.
         For more Visit Us: amadahmad.blogspot.com

Amazing Women Who Totally Rocked the Science World



Women have been making noteworthy contributions to the world of science since the earliest known times. Many women have displayed their endeavors by defying the restrictions and have overcome the difficulties in their own ways. Nowadays the situation is somehow better and women don’t face the problems they used to face in the past.
On the occasion of International Women’s Day, fossBytes is sharing you an enriching infographic of the women who totally rocked at science. 😀
If you want to encourage the women in your life to pursue a career in science and tech, it’ll surely inspire them. These women have excelled in their work and accomplished so much to become distinguished.
In world-famous writer Virginia Woolf’s words:
“Lock up your libraries if you like; but there is no gate, no lock, no bolt that you can set upon the freedom of my mind.”
These women are from different fields of science like biology, nuclear physics, biophysicists, space scientists and more.
Take a look at the infographic:
For more Visit Us: amadahmad.blogspot.com

Pakistani scientist develops device to diagnose cancer rapidly

PHOTO: University of Texas at Arlington

Pakistani electrical engineer at the University of Texas at Arlington has developed a new cancer cell detection method that will be able to  improve early diagnosis of cancer.
Samir Iqbal, an associate professor in the Electrical Engineering Department, detailed his team’s results in a recent Nature’s Scientific Reports paper called “Effects of Nanotexture on Electrical Profiling of Single Tumor Cell and Detection of Cancer from Blood in Microfluidic Channels.”
The tool works by tracking cellular behavior in real time using nanotextured walls that mimic layers of body tissue.
Iqbal has worked on the project with Young-tae Kim, a UTA associate professor in the Bioengineering Department;  Muhymin Islam,  a STEM doctoral candidate; and engineering students Mohammad Motasim Bellah, Adeel Sajid and Mohammad Raziul Hasan.
Iqbal said his team observed the many layers of tissue in the human body and decided to develop something that would mimic that layering.
“The answer was in creating a nanotextured wall that fools blood samples into thinking its actual tissue,” Iqbal said. “We used inherent properties of the cell walls to create a diagnostic tool. The cancer cells behave differently as they come into contact with the nanotextured walls. They dance,” he added.
Identifying those “dancing cells” will help doctors pinpoint cancer cells and start treatment earlier than allowed with current technology.
“Discovering the cancer earlier, before it metastasizes, is essential to surviving cancer,” Iqbal said. “Our device has the potential to do that.”
The published results stem from a 2014 $480,000 National Science Foundation funding that sponsored the design and creation of the device. Iqbal has received nearly $1.4 million in grants since his arrival at UTA in 2007.
Those grants included an NSF CAREER grant to create a nanoelectronic microfluidic biochip to detect biomarkers. He also directs the UTA Nano-Bio Lab and is an affiliated faculty for the UTA Bioengineering Department.
Iqbal also is an adjunct professor in the Department of Urology at UT Southwestern Medical Center. In addition to his numerous research accolades, Iqbal is a senior member of IEEE-USA, a member of Biomedical Engineering Society, American Physical Society, American Society of Mechanical Engineers and Biophysical Society.
In 2013, Tau Beta Pi inducted him as an Eminent Engineer. Khosrow Behbehani, dean of the UTA College of Engineering, said Iqbal’s research is groundbreaking. “Dr. Iqbal and his colleagues are bringing engineering innovation to meet the challenge of early cancer detection,” Behbehani said.
“The research aligns with UTA’s Strategic Plan, particularly the focus on Health and the Human Condition. Dr. Iqbal’s device could greatly improve cancer survival rates, which is good news for humanity. There are very few people around the world whose lives have not been touched by this dreadful disease.”
Iqbal did his bachelors from NED University of Engineering and Technology in Karachi in 1996 after which he did his PhD from Purdue University in Indiana.