Image Stabilization Technology

LEARN MATH FOR WHAT? FOR AVOIDING BLURRY VIDEO! Have you ever recorded a video and found that it was shaking so much that you can’t even finish it? If so, it’s likely that your phone doesn’t have good image stabilization technology! The use of image stabilization in filming devices is very important. Without it, all the videos we watch now would make us feel dizzy. Currently, there are mainly two methods of image stabilization: optical image stabilization (OIS) and electronic image stabilization (EIS). In this article, we will focus on electronic image stabilization technology. OIS technology will be discussed in more detail in the next article.

Read More

RSA encryption method and Why Quantum computers are threatening its security

LEARN MATH FOR WHAT? FOR SECURING YOUR COMMUNICATION! (PART 2)

Intro

You can read the Part 1 of the series here Continuing the series of articles on cryptography, today I will introduce you to a very famous type of encryption, which is RSA encryption, created by 3 people Rivest-Shamir-Adleman. RSA was first publicly described in 1977 and has been widely used. However, there is a “devil” that has the potential to attack this encryption algorithm, which is the Quantum Computer. We will explore how the RSA algorithm works, and why quantum computers are now threatening the security of this algorithm.

Asymmetric cryptography

_config.yml RSA is an asymmetric encryption or public-key cryptography: Data will be encrypted with a public key, but can only be decrypted with the private key of the recipient.

Read More

What is Computer Science

It is the Computer science is the study of computation, information, and automation. Computer science spans theoretical disciplines (such as algorithms, theory of computation, and information theory) to applied disciplines (including the design and implementation of hardware and software). Though more often considered an academic discipline, computer science is closely related to computer programming.

Read More

Introduction to Cryptography

LEARN MATH FOR WHAT? LEARN MATH TO SECURE YOUR COMMUNICATION!

Intro

Since ancient times, humans have had high demand for communicating and exchanging information with others, a large part of which we want to communicate privately with certain people. This is why Cryptography was born! The series of articles on Cryptography will come to readers in the near future. In this first article we will briefly learn about the history of cryptography, and some classical encryption methods.

Read More

Problem Geometry 1 in IMOSL 2022

G1. Let \(ABCDE\) be a convex pentagon such that \(BC=DE\). Suppose there exists a point \(T\) inside the pentagon satisfying \(TB=TD, TC=TE, \angleTBA=\angleAET\).

Read More

Geometry 3 IMOSL 2017

My solution for this problem using “computational method”, by that I mean transforming all geometric properties into computing the ratios of segments, trigonometric functions. There are other solutions using different approachs such that Humpty point’s properties, inversion, or complex numbers.

Read More