0

Use of dual cameras in smartphone

dual_camera

The phone having two rear camera on the back side of the phone is called Dual camera. the phone with Dual camera is actually the Dual-lens camera which is also called Stereo camera which helps to click the photo with more details and vivid.

The stereo camera can be defined as the camera having two or more camera lenses with a separate image sensor or film frame for each lens. This allows the camera to take photos in three-dimensional images for conveying the depth, a process called stereo photography.

The first company to introduce the dual camera is HTC in its product HTC EVO 3D.

HOW DO THE DUAL CAMERA WORK?

The main object of the dual camera is the depth sensor. In this dual camera system, the second camera is for accomplishing the primary camera whose main function is to make 3D the area in front of the camera. the secondary camera can give us the information to separate the foreground subject from the background, it tells how far the object is from the camera.

This technique is used to create the shallow depth of the field effect, it first figures out the border of the background subject and then applies a blur effect on everything in the background, which gives the picture an illusion of shallow depth of field.

Until your subject is a cardboard cutout, it will apply depth to the picture and because this depth is not as much as the depth between the foreground and the background, the camera occasionally ends up blurring the edges of the subject as well.

TYPES OF DUAL CAMERAS

1. the monochrome camera

2.the wide angle camera

3. the telephoto camera

You may also like : Xiaomi Mi9 design has been leaked | Specification – Price

ADVANTAGE OF DUAL REAR CAMERA

1.The image is going to be more 3D

2.The photo can be click with Bokeh effect

3.Augmented reality

4.The photo will contain more details 

5. The photo can be click in poor light condition

6.Zooming will loss less details

BEST DUAL CAMERAS PHONES

1. honor 8 pro

2. oneplus 6 

3.oneplus 6T

4.SAMSUNG GALAXY NOTE 9

5.Samsung galaxy note 8

1

Xiaomi Mi9 design has been leaked | Specification – Price

xiaomi-M9

Xiaomi is going to launch its new flagship smartphone Mi9 in Beijing on 20th February 2019. It is the most anticipated smartphone currently. It is going to launch on the same date on which Samsung galaxy S10 is going to be launched. Both will provide a tough competition to each one, with their features and price.

Recently, the Xiaomi Mi9 has been leaked because of its launch, it also comes to known that Xiaomi will be launching an explorer edition of the headset as well.

As reported by GSMArena , the Xiaomi Mi9 will launch in five versions,6GB RAM with 64 GB ROM price at Rs 34,000 ; 8GB RAM with 128 GB ROM Price at 36,900 ; 8GB RAM with 256 GB ROM Price at 39,000 ; Transparent Edition 8GB RAM with 256GB ROM Price at 52,700 ; Explorer Edition with 12 GB RAM Price at 63,300.

Full Phone Specification

The main feature of this phone is it comes with triple rear camera with 16-megapixel 117-degree ultra-wide angle lens featuring f/2.2 aperture, 6P lens, 4cm macro and 1.0μm pixel size,a 12-megapixel telephoto lens with f/2.2 aperture, 6P lens, 2x lossless zoom, 1.0μm pixel size and very high 48-megapixel primary rear camera backed by f/1.75 aperture, 1/2.0″ Sony IMX586 sensor, 6P lens, 4-in-1 pixel binning, 0.8μm pixel size . The phone comes with powerful Snapdragon 855 processor, it is claimed that the phone will come with 6.4-inch Full HD+ AMOLED Display with water-drop notch design, the phone is going to run on 3,500 mAh battery with 27W fast charging and wireless charging support while the Mi9 will run on MIUI 10 based on Android 9.0 pie,it has turbo charge technology , in-display fingerprint scanner and face unlock.

You may also like: Most used social media

Other features are as follows:-

NETWORK :- GSM / CDMA / HSPA / LTE

BODY:- 155757.6 (6.102.950.30 inch ) ; front/back glass ( gorilla glass 5 ), aluminium frame ( 7000 series ) ; Dual SIM.

DISPLAY :- super AMOLED captive touchscreen , 16 m color ; size 6.39 inches ,101.9 cmcm ( ~87.7% screen to body ratio ); resolution 10802280 pixels ,19/9 ratio ( 395 ppi density ) ; protection corning gorilla glass 6 ( HDR10 , DCI-P3 )

PLATFORM:- Android 9.0 pie, MIUI 10, Qualcomm SDM855 snapdragon 855 (7 nm ), Octa-core ( 12.84 GHz Kryo 485 &32.42 GHz Kryo 485 & 4*1.8 GHz Kryo 485 ), Adreno 640

Rear camera has dual led flash , HDR , Panorama

video recording has [email protected]/60fps , [email protected]/120/240fps , [email protected]

selfie camera comes with 24 MP, HDR, [email protected]

the phone has active noise cancellation with dedicated microphone

WALAN :- WiFi 802.11 a/b/g/n/ac, dual band Wifi Direct , DLNA , hotspot

Bluetooth :- 5.0 , A2DP , LE

GPS:- Dual band GPS, BDS, GALILEO, QZSS, GLONASS

Sensors are Fingerprint (under display), accelerometer, gyro, proximity, barometer, compass

0

Types of Computer Virus|Best Antivirus software – wiki

antivirus

Antivirus software, sometimes known as anti-malware software, is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, Trojans, adware, and more.

The great antivirus programming is important for clients to have introduced and forward-thinking on the grounds that a PC without antivirus programming security will be contaminated close to interfacing with the web.

The bombardment of antivirus is constant, that means antivirus software companies have to update their antivirus detection software regularly to deal with the more than 60,000 new pieces of malware created daily.

Today’s malware changes appearance automatically and quickly to avoid detection by older software, definition-based antivirus software. Viruses are programmed to cause damage to your device, prevent a user from accessing data, or to take control over your computer. Anti-virus software searches the hard disk drive and external media attached to the computer for any potential viruses or worms.

what is computer virus?

what is computer virus? A computer virus is a malicious program that self-replicates itself by duplicating itself to another program. As such, the PC infection spreads without anyone else into other executable code or archives.

The purpose of making a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data s. Hackers design and create computer viruses with malicious intent and prey on online users by tricking them.

One of the best methods by which viruses spread is through emails – opening the attachments in the email, visiting a website which is infected, clicking on an executable file which is infected, or viewing an infected advertisement can cause the virus to spread to your computer system.

Besides that, virus also spread while connecting with already infected removable storage devices, such as USB drives.

It is quite easy and simple for the viruses to get into a computer by dodging the defense or antivirus systems. A successful breach of a virus can cause many serious issues for the user such as infecting other resources or system soft wares, modifying or deleting key functions or applications and encrypt data.

There are two types of ways in viruses operate, as soon as they land on a new device they begin duplicating itself, while the second type plays dead until a specific trigger makes the noxious code to be executed. Thereby, it is highly important to stay protected by installing the best quality antivirus program.

Types of Computer Virus

  1. Boot Sector Virus.
    Even though this computer virus has now become obsolete, it still pops out in one way. This virus got attention when floppy disks were used to boot a computer or device. In new generation computers, this virus could appear on the “Master Boot Record”. In the divided stockpiling gadget of your PC, it is the main division to happen. But, thanks to the fact evolution of the Internet, the threat of this virus is now mitigated.
  2. Multipartite Virus
    Some computer viruses only spread in a way, but these ones spread in many ways. Their actions usually depend on the way of the operating system we use, some programs on our computer or our use of specific files. It can have many actions, thus it is the most frustrating viruses to deal with.
  3. Browser Hijacker
    Browser Hijacker. When we faced a problem where the homepage of our web page gets automatically directed to a particular site, well, that is the common way by which this virus hijacks our browser. While its visual effects might optimize the threat, this hijacker is nothing more than a way to increase income from online ads.
  4. Direct Action Virus
    Direct Action Virus Since, it was once the worst form of a virus, this type is not in the past. It is only active when we execute the file or program it is attached to. When the program gets into rest, the virus no longer runs its operations. Most security programs are great at distinguishing these sorts of infections.
  5. Web Scripting Virus. Same as to the hyperlinks that we used in Microsoft Word, so many websites rest on codes to provide content to their users. These codes can even be exploited and it is much troublesome to note that this exploitation has taken place on some very notable sites. The website which contains that code, every hacker have to do it to leave a comment in the Comments Section. Thus, even without the knowledge of Webmaster about it, the code gets into the site.
  6. Polymorphic Virus                                                                        Polymorphic Virus These viruses are difficult to detect. This is why because security programs scan coding to identify the viruses, but these viruses both encrypt and change their coding. They continuously change their operations over time, which may affect the programs we use.
  7. Macro Virus This will be appearing in the form of a word document which seemingly links the user to pornographic websites, Melissa is one of the most common Micro Virus. This virus not only exploits the user but also his/her friends by mailing the copies of the infected virus document to the contact list.
  8. File Infector It is one of the most common types of computer viruses is a file infector. The virus attaches to host files, so this means they usually get stick to files we use often. when we open the file, the virus is running. It can take over the file completely.
  9. Memory Resident Virus                                                                    Memory Resident Virus This form of computer virus is very dangerous and destructive. It gets itself in the computer’s memory to carry out operations. This implies at whatever point you run your working framework, the infection is working. It has shifting impacts, however, it will clear up space on your PC for its very own utilization by undermining and erasing your records.

How antivirus works

During the process of scanning, it compares the content of each and every computer programs with the library of viruses. If there is any program found that matches with a signature which is defined as a virus, an alert is made to the user about that program and further actions can be taken as per the user’s choice.

Broadly the approaches can be differentiated into these two categories –

1) Signature-based detection:-
Signature-based detection is a simple and easy form of detection because it only compares the traffic with the signature database. If a match is found then the alert is sent to the user, if a match is not found then the traffic flows without any interruption.
In signature-based detection, it is based on comparing the traffic with the known signatures of virus for possible attacks. They can detect known threats and hence, are inefficient in detecting unknown threats. To detect an attack, the signature of virus matching has to be precise, otherwise, even if the attack has a small variation from the known threat signature, then the system will be unable to detect.

2) Suspicious behavior-based detection:-
Advanced malware detection solutions or suspicious behavior based detection observe and evaluate in context every line of code executed by the malware. They analyze requests to get access to a specific file, processes, connections, or services. This includes each and every instruction executed at the operating system level or other programs that have been invoked, including low-level code hidden by rootkits.

You may also like :How VPN works? Free VPN 2019

BEST ANTIVIRUS SOFTWARE

ESET NOD32 Antivirus

WEBROOT SECURE ANYWHERE

Kaspersky Internet Security

AVG Protection

Avira Antivirus

1

Technology for blinds – wiki

blind_people

There is a lot of work and research being done to find ways to improve life for partially-sighted and blind people. Reading and recognition devices could make smartphones, tablets, and smart glasses into indispensable aids for the visually impaired.

blind_people

The statistics on blindness vary because there is no universal definition. In the United States, it is defined as “central visual acuity of 20/200 or less in the better eye with the use of a correcting lens.” Solid statistics are hard to come by, but the National Federation of the Blind estimates that there are around 7 million Americans with a visual disability.

According to the World Health Organization, there are 285 million visually impaired people worldwide. That’s a lot of people who could stand to benefit from some clever technology.

Braille ebook reader

technology_for_blind_people

A braille e-book is a refreshable braille display using electroactive polymers or heated wax rather than mechanical pins to raise braille dots on a display. Blind people should also be able to read books and they have designed this blind ebook for them. Provide text for blind users, voice two ways of reading, simultaneously provide text scanning, Bluetooth ebooks transmission, text two kinds of transmission. Lose the way, make the blind better read.

You may also like: Remix os for android-latest 2019

They cannot read newspapers like ordinary people. However, in real life, more than 99% of textual information is presented in the form of paper materials that cannot be read by visually impaired persons. Therefore, the lack of visual ability makes them unable to obtain information in the most intuitive way.

The blind reader is a device that converts the contents of prints into sound signals for visually impaired people to obtain information so that they can easily obtain paper text information without the help of normal people.

This idea first surfaced a few years back as a concept on Yanko Design. Why not create a tactile digital reader device for Braille readers, like a Kindle for the blind? Braille literacy has been in steady decline since the 1960s for various reasons.

There’s still a debate raging about the importance of Braille and the potential problems with talking computers after research revealed a link between Braille literacy and employment.

The Anagraphs project took up the idea and began to work on plans for a device that would employ thermo-hydraulic micro-actuation to activate Braille dots by infrared laser radiation via a micro-mirror scanning system.

It’s easier to imagine it as a kind of wax material, which can go from solid to liquid with heat and be easily reshaped to create Braille dots. Unfortunately, the EU funding has run out and the project needs more cash to be realized.

Assisted Vision Smart Glass

technology_for_blind_people

The scientist from Oxford university invented it.“What we’re trying to do with the project is produce a pair of glasses that can enable someone who has got very little sight to allow them to walk around unfamiliar places, to recognize obstacles, and to get a greater independence,“ Dr Stephen Hicks from the University of Oxford, recently explained to The Royal Society .

These smart glasses are designed to make the most of that remaining sight. They are made of transparent OLED displays, two small cameras, a gyroscope, a compass, a GPS unit, and a headphone. All incoming data can be utilized in various ways, for example, brightness can be used to show the depth of objects close to the wearer.

You may also like: How VPN works? Free VPN 2019|wiki

A host of other information can also be processed by the system and output the information via the included headphones. The cameras could also work with the computing module and the right software to recognize the number on an approaching bus or to read a sign.

The GPS module can be used to give directions. The gyroscope helps the glasses to calculate changes in perspective as the wearer moves. All of the information is spoken aloud through the built-in earpiece.

Professor Phil Torr wants to bring machine learning into the equation, which is all about “trying to understand patterns and classify them into different types.” This could enable the system to recognize objects, like your favorite coffee mug.

It could also help you navigate inside a building by guiding you toward the exit and then recognizing and highlighting the door handle as you approach.

It’s easy to imagine how augmented reality could tie in here.

The researchers are still working on reducing the size of the glasses and plan to distribute an initial batch of 100 to blind and partially sighted people before the year is out. If the trial goes well, and there’s interest from a manufacturer, then larger scale production could be on the cards.

Brainport v100

techology_for_blind_people

American scientist Dr. Paul Bach-y-Rita invented it. The BrainPort V100 records its wearer’s surroundings with the help of a video camera attached to a pair of sunglasses and then converts these image into electrical signals. These signals are then transmitted to a flat, electrode-studded mouthpiece, allowing the user to perceive the pictures in the form of a tingling sensation on the tongue.

People who are blind have a new tool to use with their cane or guide dog; it is called BrainPort V100.

The FDA approved the new device earlier in June 2015.  The device is placed in the person’s mouth and it receives feedback from a glasses cam.  Bubbles form on the user’s tongue and the users are trained to read the bubbles; like Braille for the tongue.

This device does not replace a cane or a guide dog.  It is designed to improve spatial awareness, object recognition and assist in mobility.  Europe approved the BrainPort V100 in 2013.  

The approximate price to purchase the BrainPort V100 is $10,000, but with more adults losing their vision this might be an item that will be in demand.  According to the National Eye Institute more than 1.2 million Americans, over 40-years old, are blind and by 2030 the number is expected to double.

You may also like: Sbh into Sbi – A journey with you

 

2

Remix os for android-latest 2019

Remix os for android

After the invention of new technology, many new discoveries took place. When the world first computer built. Its size is about a room. Continue reading to know more about Remix os for android.

But in today’s world computer are fit to the human hands.

Remix os for android

With the help of an emulator, people can easily use any android application into their operating system. Whether it is Mac, Windows or Linux. But today we can learn How to use a laptop in your smartphone.

Leena Desktop UI (Multi-window)

An application available on Google Play named Leena Desktop had released their beta version for the people who want to convert their smartphone into desktop.

This application gives a beautiful feature to the user that you can connect mouse and keyword with your smartphone without rooting or break any android rule.

This application is downloded by approx 1 million user.

You may also like: How Vpn works? Free Vpn 2019

So lets Convert your smartphone into laptop:

Remix-os for-android
  1. Step: Open Google Play in your smartphone.
  2. Search Leena Desktop UI (Multiwindow). This app has both free and pro version. Select as per your need.
  3. After that click on install Accept terms and condition and you are ready to go.