Wooden Transistor: A Breakthrough in Sustainable Technology
World’s First Electrical Transistor Made of Wood Developed by Linköping University and KTH Royal Institute of Technology Researchers
Modulation of electrical current in a wood-based electrochemical transistor.
A team of researchers from Linköping University and KTH Royal Institute of Technology have created the world’s first wood-based electrical transistor, according to a study published in PNAS. The development of wood-based electronics could lead to new possibilities for controlling electronic plants and advancing the field of wood-based electronics. While the wood transistor is slow and bulky, it represents an innovative breakthrough in electronic technology.
New transistor made of wood can regulate electricity flow continuously without deteriorating, according to researchers at Linköping University. Previous wood transistors could only regulate ion transport and stop functioning when ions run out. The researchers used balsa wood and a conductive polymer called PEDOT:PSS to create their transistor. Removing the lignin and filling the channels with the polymer created an electrically conductive wood material.
Researchers at Linköping University have developed a wood transistor that can regulate electric current and provide continuous function without deteriorating. The transistor can switch power on and off, with a delay of about five seconds to switch it on and a second to turn it off. This technology could potentially be used to regulate electronic plants and tolerate a higher current than organic transistors. However, the researchers emphasize that their work is basic research without any specific applications in mind and hope that it will inspire further research.
Reference: “Electrical current modulation in wood electrochemical transistor” by Van Chinh Tran, Gabriella G. Mastantuoni, Marzieh Zabihipour, Lengwan Li, Lars Berglund, Magnus Berggren, Qi Zhou and Isak Engquist, 24 April 2023, Proceedings of the National Academy of Sciences. DOI: 10.1073/pnas.2218380120
Wavefront Shaping: Improving Medical Imaging with Astronomical Technique
Caltech researchers have developed a new method for improving medical imaging using wavefront shaping, inspired by astronomical techniques. This approach is used to correct optical distortion caused by scattering of light in biological tissue, which can make images of microscopic structures appear distorted. The researchers drew inspiration from wavefront shaping techniques used to correct for atmospheric distortion in astronomical imaging.
Researchers at Caltech have made progress in medical imaging by adapting wavefront shaping techniques from astronomy to counteract the distortion caused by biological tissue. By using a “magic mirror” made of a photo-refractive crystal, the team achieved high-speed, high-energy gain, and high control degrees of freedom. Biological tissue is also a scattering medium, making microscopic images appear cloudy. The “magic mirror” cancels out distortion caused by tissue, potentially improving cancer detection below the skin. This new process of medical wavefront shaping has the potential to sharply focus on tissue to detect cancer below the skin.
The research on high-gain and high-speed wavefront shaping through scattering media was funded by the U.S. National Institute of Health (NIH). The authors of the study are Zhongtao Cheng, Chengmingyue Li, Anjul Khadria, Yide Zhang, and Lihong V. Wang, and the study was published in the journal Nature Photonics on January 23, 2023, with a DOI of 10.1038/s41566-022-01142-4.
NASA’s Snake Robot: Searching for Life on Saturn’s Moon
NASA is developing a snake-like robot called the EELS that can explore locations that are otherwise unreachable on Earth, the moon, and other planets in the solar system.
The EELS is being developed to autonomously map, travel, and explore thin and inhospitable locations, such as Enceladus’ surface vents, in search of underground waters. The robot uses eight stereo cameras and lidar to build a 3D map of its surroundings and navigation algorithms to choose its safest course.
The EELS will contain 48 tiny motors in its finished configuration, providing it with a great deal of flexibility, but also making things more complicated for the hardware and software teams.
Additionally, built-in force-torque sensing in many of these actuators will allow the EELS to “feel” how much force is being applied to the area, functioning like a thin layer of skin.
Empowering the Next Generation: Cybersecurity Skills at K-12 Levels in the National Cybersecurity Strategy, Insights from Cyber.org Executive Director
“Cybersecurity Education for K-12 Schools: Insights from Cyber.org Executive Director on the Importance of National Cybersecurity Strategy”. Learn from Laurie Salvail how Cyber.org is helping schools build a stronger cybersecurity workforce and how students can acquire the necessary cybersafety skills as early as kindergarten, in response to the recent federal attention paid to online security.
What impact is the National Cybersecurity Strategy having on K–12 schools?
The National Cybersecurity Strategy is providing clear approaches and guidelines for schools to follow to protect student data. IT directors must balance convenience and security by implementing best practices like regular password updates. By teaching students to protect themselves, we can create a culture of cybersecurity awareness that will benefit them as they move between schools and states.
Why is it so important to teach these cybersecurity skills at the K–12 level?
To use technology safely and become active citizens, students need to learn cybersecurity skills, even if their future job title does not include “cybersecurity”. These skills are important for protecting the US and ourselves, so it’s a real-life skill for students. By integrating cybersecurity into every classroom in small ways, such as 10-minute discussions periodically, we can help students develop this skill.
As teachers integrate these skills into every classroom, how can they teach cybersecurity to very young elementary students?
Even kindergarteners are using devices now, so it’s important to teach them age-appropriate cybersecurity skills to protect them from malware attacks and phishing scams. As they interact with avatars and cartoon characters, they often see them as computers or friends from their games, so we need to help them understand what information they should or should not share. By teaching these skills in a way that gets them excited about technology, we can prepare them to become our future cybersecurity workforce.
How can schools maintain this excitement about cybersecurity with older students and teach them age-appropriate skills?
Salvail explains that cybersecurity topics are very concrete and students can practice these skills safely through virtual environments like Cyber.org Range. By analyzing what makes a good password and running password strength testers, students can see how easy it is for malicious actors to get access to their personal information. Schools can also allow students to earn industry certifications at an early age, giving them a head start in their future careers.
Secure kids from hackers
Will the National Cybersecurity Strategy lead to more funding for K–12 cybersecurity training and solutions?
SALVAIL explains that by raising awareness about cybersecurity, we can prioritize its importance and provide funding for it. However, the cost of implementing cybersecurity education can be a barrier for some school systems. Luckily, Cyber.org offers grants to schools so that they can provide professional development and resources for cybersecurity education at no cost. This removes the cost barrier and helps diversify the future cybersecurity workforce.
Many top Universities and popular learning digital platform that offering free courses are available and Youtube lectures as well on academic earth website.
The website provides Certification after completion of Video based courses online for free. It can help you in Jobs and starting skills for new job plus some certificates in resume.
Below are Steps to Secure your Amazon Hacked Account or any other shopping hacked account. Account can compromised by attackers very easily however, the approach to safe your account is more important before you loss your amount from your bank. It is very important to read below steps and watch the vidoe explained how to work against attack to secure account.
Call You Bank First
Call you Bank and provide all the details to block your card from a specific website transactions. They will help and block account. Also Freeze your ATM card from Mobile app until account restored.
Go to Email and Follow Amazon Steps
Amazon or any other website may send you steps to follow to verify your account. You can provide details to upload and verify account.
Write a Simple Letter and provide details
The Amazon or any other website will ask to provide details to upload to verify your identity. Please follow below sample to write an application on Microsoft Word and then save that word file as a pdf on desktop and upload for your identity document.
1. Your name and billing address
2. Phone number (if included in your billing statement)
3. Last 4 digits of the card or account number
Application sample: Hi, I cannot write direct application to you. Someone logged into my Amazon Account without my notice. Someone changed the Shipping Address, someone used one of above my saved card details to start shopping that is very dangerous attack of account compromised. I appreciate that Amazon cancelled this order due to payment method or new address found for shipping. Please reset my account: youremail@gmail.com password and remove my all-saved cards and shipping address. Also, remove all the orders placed that cancelled due to payment method by attacker. If you require any further information, please contact with email where I am able reply to your team. You do not have any direct email to contact for account compromised issues. Kind regards, Your Name
Wait for Verification email
Once you receive verification email, login to your account and follow the all necessary security steps.
Follow Below steps to make necessary changes to secure account
Set your password strong including Capital Small Alphabets, numbers and special characters. i.e. mBgd54!3Y Password must long at least 8 characters
Two Step Verification: Must set One time password for login to your account to keep secure account. as as well additional setup google authenticator app setup to stop direct login.
Update All settings in Profile
Once you login to your account, Update all the necessary settings including PIN setup and address, Name, Email and other settings to secure account and easy verification. Remove all the unknown address, number and other.
All Done
You’re happy to use your account and successfully secured account and restore from attacker control. You completed an Incident response team job to be like a professional cyber analyst. YahoO!
If you find this articles/ Post helpful please write in comment below and share with friends to safe them if you care them. If you do not understand the steps please watch below video