
7 minute read
BIONIC EYES
- HARI VARADAN V.LA, 2 nd YEAR
This catchy title may have caught your attention quickly, but the actual name is visual prosthesis. But it is often referred to as bionic eyes. As you can see from the title, it is an artificial eye made to bring back vision for those who lack it. It is an electrical prosthesis surgically implanted into the eye to allow transduction of light or the change of light from the environment into impulses that the brain can process.
Advertisement
Many of you may confuse this with a bionic contact lens, which is not yet universal, but you might have heard of it. According to rumours, it provides the virtual reality experience we see in movies. It consists of a conventional contact lens with added bionics technology in the form of augmented reality. The gaming industry will cherish this peak of virtual technology.
Let us get back to the topic. The bionic eye is a device that intends to restore vision for people with blindness, both partial and profound. There have been many similar devices developed. For example, consider the case of a cochlear implant, which aids people with hearing loss. This technique allows the patients for improved speech understanding. It has been in practice since the middle of the 1980s.
Let’s get into the topic deeply. The retina is the light-sensitive tissue found within the inner eye that transforms light from the environment into neural impulses, which are then passed to the thalamus through the optical nerve and finally to the primary visual cortex. It comprises a camera, transmitter, and microchip. The camera is mounted on a pair of eyeglasses. The stimulator microchip contains an array of electrodes surgically implanted into the retina. The radio waves emitted by the camera and transmitter are received by the stimulator, which then fires electrical impulses, resulting in vision.
It may sound like an easy process, but it isn’t. It highly depends on the nature of the lack of vision. The most benefited people by bionic eyes are middle-aged or elderly with poor eyesight associated with age-related degeneration or hereditary diseases that destroy the rod and cone cells in the retina. People who have lost their vision due to the deterioration of photoreceptors are the best candidate for treatment. The most prevalent prosthesis under development is the retinal prosthesis. For people born with blindness, l inking nerves to the brain, also known as neuroplasticity, has to be done before treatment.
References
Quantum physics seems strange at first glance. It tries to describe the infinitesimally small world of individual particles and the indivisible units of light and radiation. We live in an enigmatic world where our intuition doesn’t work at first Yet, but it is possible to understand and model it, and the predictions of quantum physics have turned out to be correct.
The majority of information manipulation is digital, therefore bits are used to process, store, and transmit data. Depending on what is being done with the data, the two states of a conventional data bit—are encoded in suggestive quantum notation as |0> and |1. These bits can take many different forms, including two different voltages across a transistor on a chip, magnetic domain orientations on a disc or tape, voltages propagating down a wire, light pulses traveling down an optical fiber, and so on. Although bits change positions as data is processed or memory is re-inscribed, scarcely is never in state |0> or state |1> at any given moment. A qubit, which is a quantum equivalent of a normal bit, has more freedom. It can be placed anywhere in a two-dimensional Hilbert space – picture it as the surface of a sphere.
The exact characteristics that distinguish quantum mechanics from our everyday experience of the classical world also support its potentially revolutionary implications for IT. In theory, interference between all the amplitudes in a multi-qubit processor may be set up to provide answers to some jobs that we won’t be able to complete with even the best conventional supercomputers in the future. This is known as massively parallel quantum computing. Using photon qubits and open communications, two correspondents and Two interested parties can communicate with guaranteed security, thanks to the irreversibility of quantum quantification. Hackers with their quamtum technology, still cannot detect plain text (message) using quantum cryptography techniques.
Richard Feynman and others planted the seeds for quantum computing in the early 1980s, and David Deutsch was the first to thoroughly examine how quantum physics’ implicative implications affected the theory of computation. David Deutsch and Richard Jozsa developed an algorithm in 1992 that demonstrated a definite quantum advantage. Better yet, Peter Shor and LovGrover’s factoring and probing algorithm, which give a significant edge over their classical counterparts, gave the topic its real boost in the middle of the 1990s.
QPublic key cryptography, which is nearly unbreakable and relies on factoring a very big number into its two component primes, is used in a major portion of today’s “secure” communications. The development of a multi-thousand-qubit quantum computer would destroy the global communications network. Quantum computers could also do a much better job of simulating quantum systems than conventional IT, and so would open up new research capabilities in many fields. The quantum computational advantage results from the fact that during the evolution stage, several calculations can occur concurrently (and, in theory, exponentially). Simple number crunching does not gain an exponential advantage because quantum measurements are required to obtain the results. Instead, issues that make use of parallelism through interference can gain a huge advantage. The factoring algorithm employs exponential resources and a Fourier transform to determine the (extremely large) periods of oscillatory functions.
The theory of quantum teleportation was developed in 1993 by Charles Bennett, Gilles Brassard, Claude Crepeau, Richard Jozsa, Asher Peres, and Bill Wootters. The rudimentary concept is that if two communicating parties share a dyad of entangled qubits, they can be used as resources to provide a teleportation shelter. Say a sender receives an unknown qubit from a customer and on it and qubit we run a 2-qubit gate and measure both. The sender sends the result (2 bits) to the receiver over the traditional communication channel. The results identify the receiver’s single one of qubit manipulations. After performing the identified operation on qubit B, it remains in the state of the customer-supplied qubit. There is no instantaneous signaling, So relativity cheers, and all records of the state on the sender’s side are discarded, so no quantum copy was made. This way quantum teleportation works the sender knowing the location of the receiver’s qubits.
To secure and transmit data in a way that cannot be intercepted is a universal data confidentiality goal. Data is encrypted and protected using cryptography so that only those with the proper secret key may decrypt it. In contrast to conventional cryptographic systems, quantum cryptography uses physics rather than mathematics as the primary component of its security concept. Quantum cryptography is a system that cannot be broken into without the transmitter or the message’s receiver being aware of it. It is therefore impossible to copy or read data encoded in a quantum state without disclosing the act to the sender or recipient. Quantum cryptography ought to be impervious to quantum computer users as well. Data is sent across optic fiber wires using individual light particles, or photons in quantum cryptography. Binary bits are represented by photons. Quantum physics is a key component of the system’s security.
The conceptual underpinning of quantum cryptography is the 1984 model. The simulation assumes that two individuals who want to communicate securely start the conversation by handing the reciever a key. A stream of photons that only travel in one direction holds the secret. Only one bit of information, a 0 or a 1, makes up each photon. However, these photons are also vibrating or oscillating in addition to their linear motion. After the photons have been through a polarizer the sender, starts the transmission. A polarizer is a type of filter that allows certain photons with the same vibrations to flow through while blocking the passage of other photons with the same vibration. The po- larizer states could be diagonal (45 bits), vertical (1 bit), horizontal (0 bit), or 45 degrees left or right (0 bit). Any of the methods she suggests has the transmission have one of two polarizations, either a 0 or a 1, signifying a single bit. The photons are currently travelling through an optical fiber from the polarizer to the receiver. This method determines the polarization of each photon using a beam splitter. Since the reciever does not know the correct polarization of the photons when he receives the photon key, he picks a polarization at random. The sender IPconstitute the key. Consider the possibility that eavesdroppers might be present. Eve makes an effort to listen in using Bob’s equipment. Reciever has the advantage of communicating with sender to learn the type of polarizer that was applied to each photon.
Quantum cryptography uses and examples: Compared to conventional cryptography, quantum cryptography enables users to communicate more securely. There is little worry that a hostile actor may decode the data without the key once keys have been shared amongst the interested parties. Although this form of cryptography has not yet been fully developed, it has been successfully used in the following applications: Using the BB84 quantum cryptography protocol, the University of Cambridge and Toshiba Corp. developed a high-bit rate QKD system. The Defense Advanced Research Projects Agency Quantum Network was a 10-node QKD network created by Boston University, Harvard University, and IBM Research that operated from 2002 to 2007.
The numerous advantages of quantum cryptography include - Secure communication (Quantum cryptography, a more advanced and secure kind of encryption, is based on the rules of physics rather than hardto-crack numbers.) It also Identifies listeners vis a vis The quantum state changes whenever someone tries to decode the data, changing what consumers might expect to happen. However no single cryptography method is flawless quantum cryptography may have some drawbacks and restrictions, such as the following:

Modifications to error rates and polarization during transit, photons may undergo polarization changes, thereby increasing error rates. another comprimise is the range of Quantum cryptography , With the exception of Terra Quantum, the maximum range of quantum cryptography has often been in the range of 400 to 500 km. Fiber optic connections and repeaters are often needed as part of the infrastructure for quantum cryptography. Moreover in a quantum channel, keys cannot be sent to more than two sites, only bipolar communication channels can be enabled.