Monday, March 30, 2026

Ultra-thin nanotubes and nano-technical lasers can boost a 6G network.



“Researchers have introduced an ultrathin carbon nanotube coating that can precisely control terahertz radiation, a part of the spectrum expected to play a major role in future 6G technologies. Credit: Stock” (ScitechDaily, New Carbon Nanotube Coating Could Supercharge 6G Technology)

Ultra-thin nanotubes and nano-technical lasers can boost a 6G network. And photonic- or non-electronic computer development. There are actually three main types of non-electric computers. 

A) Optical computers that use lasers or photons as data transporters. 

The first thing means that system transmits information using laser rays as a whole. When the laser shuts down, the value is zero. When the laser is on, the value is one. 

B) The photonic computer that uses quantum photon technology for storing and transmitting data. 

The second thing means. That. The system uses quantum technology, which packs information into single photons. 

C) Systems that transmit information in the form of radio or terahertz radiation. 




“DTU researchers have invented a nanolaser constructed in a semiconductor membrane that causes electrons and light to gather in a small area (blue shadow). By using light instead of electrical signals on microchips, data speed can be increased and energy loss reduced. Credit: Yi Yu” (ScitechDaily, Scientists Create Tiny “Nanolaser” That Could Revolutionize Future Computers)


Carbon nanotubes can absorb terahertz radiation. And that thing can boost the 6G technology. Additionally, it can boost high-power computing technology. The nanotube-based film. It can act as an insulator in high-speed data transportation. The system can transmit information through those nanotubes in the form of coherent radio. Or optical areas. The nano-sized lasers can send their laser beams through those nanotubes. 

Nanotube-based technology can also boost optical computing technology. Basically. An optical binary computer is similar to an electronic computer. The system shoots photons to the light meter. A certain light level is one. And below that level, light gives a value of zero. The binary photonic computer is sometimes mistakenly mixed with quantum computers. In quantum computers, there is more than one value. But in optical binary computers, there are only two values, 1 and 0. 

There are two ways. To make an optical or photonic computer. 

1) Fully photonic computer. There, the microchips and all components use photonic data transportation systems. 

2) Semi-optical systems. There are only wires that connect microchips. Or integrated microcircuits are replaced by optical data transportation tools. And internal data transportation or data processing in those microcircuits. Happens by using the electric method. In this case, the optical computer uses nano-scale lasers to transmit data. And nano-sized photovoltaic cells receive that information. 

But the problem with optical computers is the system that transmits information. Lasers are effective tools, but they need power. Theoretically, a photonic- or optical computer is more energy-efficient. Than the electric computers. The main problem is that. The photonic computers are not a useful solution. To computer energy problems. If the energy that the photonic system saves. Goes to high-performance cooling systems. But nanotechnology can be the answer. To that problem. Nano-sized lasers are much easier to cool than full-size lasers. 

Another answer could be the so-called wireless computer. The system can use radio waves. Or. Terahertz rays. The system must protect that information from eavesdropping and outside effects. In that system. The system uses nano-sized radio transmitters to transmit data. In the computer. And that makes nanotubes useful tools for. Those kinds of systems. 


https://scitechdaily.com/new-carbon-nanotube-coating-could-supercharge-6g-technology/


 https://scitechdaily.com/scientists-create-tiny-nanolaser-that-could-revolutionize-future-computers/


Saturday, March 28, 2026

Multi-dimensional light can offer secure data storage.



"Researchers developed a holographic data storage approach that stores and retrieves information in three dimensions by combining the amplitude, phase, and polarization properties of light. Credit: Xiaodi Tan, Fujian Normal University in China" (ScitechDaily, This Multidimensional Holographic Breakthrough Stores Massive Data Inside Light Itself)

Holograms, or multidimensional light, are tools that can store and transport information. The hologram stores information in multiple layers. And then the image recognition system observes that data. This is one way to secure communication. Secured communication requires multiple variables. The wavelength. Or the colour of the image, the image itself, and sub-images in the image are things that can be used for secure communication. The image can act as the bit. 

We can say that the image of Donald Duck. It can have a value of 0 or goofy. It can have a value of zero. The system can send those images in a series of other images. And. The receiving system picks only images that mean zero or one. 







"The image shows (a) the holographic data storage system schematic diagram, (b) a schematic diagram illustrating the complex plane for double-phase decomposition of complex amplitude and (c) an example of a checkerboard pattern for two phase values m and n. Also shown are (d) an example of the intensity distribution at the image plane and (e) an example of phase distribution at the image plane. In (f), the first (I) and second (II) records are shown, with the readout shown in (g). Credit: Xiaodi Tan, Fujian Normal University in China"(ScitechDaily, This Multidimensional Holographic Breakthrough Stores Massive Data Inside Light Itself)


The system can also use different images as flashes, and then. The system can measure the time the image is visible. The system must see. A certain image. At a certain time, it accepts the bit. The system that tries to break the code must have all information about the key that the system uses to open the messages. 

In this model, the time the image is visible. It is the thing that determines the value of the bit. If the system sees the image in 2 seconds, the value of the image in the computer memory is 1. And if the time is shorter, the value is 0, for example. The image that the system sees can also include a word or letter. And that makes it possible. To create an encryption process that is very flexible and effective. 

https://scitechdaily.com/this-multidimensional-holographic-breakthrough-stores-massive-data-inside-light-itself/

Friday, March 20, 2026

Quantum encryption took a big step. Because of the Talbot effect.




“ Researchers at the University of Warsaw have demonstrated a new approach to quantum key distribution that leverages high-dimensional encoding and a classical optical phenomenon known as the Talbot effect. By exploiting time-bin superpositions of photons, the system can transmit more information while relying on a surprisingly simple experimental setup built from commercially available components. Credit: Shutterstock” (ScitechDaily, Scientists Harness 19th-Century Optics To Advance Quantum Encryption)

Quantum cryptography is a new tool for enhancing the security of communication. In that model, the system connects information to a physical object. It can share information on different routes. And that makes eavesdropping difficult. It can use a certain color. Or a certain image. As. The key that allows the receiving system to access information. 

 But it's also vital for cases where the binary system wants to transform data into a quantum mode. Without quantum cryptography, the system cannot exchange information between binary and quantum states. The thing called. The Talbot effect is the tool. That can make quantum cryptography more effective.  The quantum network can share information to travel on different routes. It can use certain images to encrypt and decrypt information. In a Talbot-effect-based quantum network, it is possible to create quantum superposition and entanglement between quantum dots. And that makes it possible to create a quantum network. But there are also many other ways to benefit from the Talbot effect. 





“Detection of time-bin superpositions with the temporal Talbot carpet. Credit: Maciej Ogrodnik, University of Warsaw” (ScitechDaily, Scientists Harness 19th-Century Optics To Advance Quantum Encryption)

“The Talbot effect is a diffraction effect first observed in 1836 by Henry Fox Talbot. When a plane wave is incident upon a periodic diffraction grating, the image of the grating is repeated at regular distances away from the grating plane. The regular distance. It is called the Talbot length. And the repeated images are called self-images or Talbot images. “ (Wikipedia, Talbot effect)

Furthermore, at half the Talbot length, a self-image also occurs, but phase-shifted by half a period (the physical meaning of this is that it is laterally shifted by half the width of the grating period). At smaller regular fractions of the Talbot length, sub-images can also be observed. At one-quarter of the Talbot length, the self-image is halved in size, and appears with half the period of the grating (thus twice as many images are seen). At one eighth of the Talbot length, the period and size of the images are halved again, and so forth, creating a fractal pattern. Of sub-images with ever-decreasing size, often referred to as a Talbot carpet. Talbot cavities are used for coherent beam combination of laser sets.” (Wikipedia, Talbot effect)





“The optical Talbot effect for monochromatic light, shown as a "Talbot carpet". At the bottom of the figure, the light can be seen diffracting through a grating, and this pattern is reproduced at the top of the picture (one Talbot length away from the grating). At regular fractions of the Talbot length, the sub-images form.(Wikipedia, Talbot effect)

The second image introduces the Talbot-effect, and there could be  millions of possibilities in the encryption key. As we see, the possibilities. It could be the number of quantum dots. The system is used for encryption. Also. Things like a wavelength (color). And the time at which the image remains could be the thing. That helps to create an encryption key. Also. The system can calculate. How many times? In a time unit, the image blinks can be used to create ultra-secure encryption keys. Also, the time between blinks can be a participant. In quantum encryption. The system can also share information between multiple data lines. And then it can collect that information in the points. Of those quantum dots. 

When we talk. About the effectiveness of quantum cryptography, the diversity of methods. It keeps those things safe. If the system uses multiple different ways to encode messages and other data. AI-based intelligent systems can use multiple things. And ways to secure data. In that kind of encryption, the image that the system transmits could be a teddy bear. Then the receiving system sees the dataset that matches the teddy bear image. When the system receives other information that is not delivered in the image form of a teddy bear, it denies that information. This means the image acts as a key that allows the receiving system to open the message. 


https://scitechdaily.com/scientists-harness-19th-century-optics-to-advance-quantum-encryption/


https://en.wikipedia.org/wiki/Talbot_effect


Sunday, March 15, 2026

The new Chinese radars can be a threat to stealth.


"Representative image of a Chinese Shenyang J-31, circa 2014." (Interesting Engineering)

The gallium oxide diodes can make it possible to create compact radars for stealth fighters. This system enables the creation of new shapes for stealth fighters' profiles. This allows free aerodynamic planning and the use of more accurate shapes.  But these kinds of systems. Makes it possible. To create more advanced radar systems than before. The simplest way is to install more radars on aircraft. Those radars and other sensors can observe the area around the craft. Those kinds of systems. They can search for incoming enemy missiles and aim the weapons. Into positions where they came. 

The system. It can be created by using multiple radar arrays. This means that the new jet-fighters can have radar systems. Those are like mosaics. Each of the pieces of the mosaic structure is an independently operating radar. This means that radar. This means that some of those radars can operate in passive mode. When some other radar illuminates that plane, those systems can track it. The problem with jammers is this. They must operate at the same frequency as radars. 

"By improving detection capabilities against drone swarms, the technology could strengthen air-defense networks."(Interesting Engineering)

That they must jam. So if the system sees that it’s jammed. It can shut down transmitters. And then the passive system. That is the radar receiver antenna. It can be used to track the jammer. In the same way. The radar-warning systems can have a triangular measurement system. That system can point the radar’s location with a very high accuracy. 

The mosaic-based arrays can scan an area using many radio frequencies. At the same time. Those kinds of systems can be more immune to jammers than old-fashioned radars. The radar operates as an entirety. The AI connects the data that the radar group gets. Then that AI. It can connect that data with the data flow. Which comes from other sources. Like optical sensors. Those sensors. They can be in other aircraft. Ground-based, or drones. 

Or they can operate onboard the plane. This means that those systems can get more data than ever before. And that makes those systems more intelligent and more effective than before. Those systems are based. On network-based solutions, which connect the entire battlefield. Into one entirety. The system shares data between multiple systems. 

The new radar systems use AI algorithms to analyze and sort information flow. Those new systems can detect drone swarms and then separate decoy drones from real drones. But the problem is that all drones can carry explosives. And they can all be devastating. The system. That AI can search and identify targets with new accuracy. The AI algorithms can also analyze threats with new accuracy. This thing makes the attackers and defenders deadlier than ever before. 


https://interestingengineering.com/innovation/chinas-semiconductor-enable-compact-radar


https://interestingengineering.com/military/chinese-radar-identify-decoy-drones-real-targets

Saturday, March 7, 2026

The new quantum devices offer more secure communication.



"Quantum computers typically require extreme conditions, including temperatures near absolute zero, which makes them difficult and expensive to operate. Researchers at Stanford have developed a nanoscale optical device that works at room temperature, using specially structured materials to link the spins of photons and electrons. Credit: Stock" (ScitechDaily, Room-Temperature Quantum Device Could Transform Future Communications)

Information plays a critical role in modern society. And this is why securing information is urgent. Without trusted and secure information. It’s impossible to share and receive trusted information. If someone can hack  mission-critical systems, it can cause complete chaos. Can you imagine a scenario where someone hacks the traffic lights? In the city? The hacker simply turns all traffic lights green. That causes complete chaos. Or what if somebody raises the lift bridge up? 

That is one of the things that can cause bad things. Because that blocks roads from ambulances and other emergency vehicles. And in a critical moment. Those kinds of roadblocks. They can be dangerous. Things like disinformation. Often delivered on the net. Disinformation is one of the reasons why we also need physical data security. We can, of course, transport information on USB sticks. But there is always a possibility. 

That somebody drops that stick from their pocket. The USB sticks are used to transport the decryption keys. The system that decrypts codes requires the right code key. That. It can calculate. Calculations. The encryption process is used backwards. The encryption system uses long binary numbers to encode data. So, the decryption system requires those binary numbers.

Another big problem is that the USB sticks are slow systems. Of course, we could encrypt data. Into those sticks in physical form. If we have the right systems, we could share every single file into the four parts. And store those parts in four different memory sticks. This means we can send those memory sticks with four couriers. The decryption process requires that the user have all four memory sticks. And then the decryption requires that those sticks be in the right order. 

Quantum encryption means. The system can send information using many physical routes. This means that the system can send data using different data transportation lines. Or it can simply use different frequencies. 

The problem with encryption and decryption is that without those things. The GSM telephones and the entire internet. They will not work. The encryption. It makes it possible. For multiple systems to communicate on the same frequency. Every data package. That travel in the net has an identifier in front of it. Before data transmission starts, the devices change those identifiers or keys. If those identifiers are wrong, the system denies those data packages. 

If that process does not work. The thing that the user hears is the white noise. The situation turns into a case. Lots of people. Talk with each other in a small space. Suddenly, the case happens. That people start to yell at each other. The ability to separate words becomes impossible. 


https://scitechdaily.com/room-temperature-quantum-device-could-transform-future-communications/


Sunday, February 8, 2026

Neuroscientists say that it's possible to engineer dreams.


“A powerful way to investigate memory consolidation during sleep utilizes acoustic stimulation to reactivate memories. In multiple studies, Targeted Memory Reactivation (TMR) using sounds associated with prior learning improved later memory, as in recalling locations where objects previously appeared.” (APAPsycNet, Targeted memory reactivation during sleep to strengthen memory for arbitrary pairings). 

Reseachers say that the purpose of dreams is to analyze things that happened during the daytime, or wake-up time. Friedrich August Kekulé von Stradonitz (1829 – 1896) was the chemist who uncovered. The structure of benzene. Saw in a dream. Where the snake. To bite its tail. When he woke up, Kekulé von Stradonitz realized that benzene is composed of a ring of carbon atoms. Same way. Compositors are seen. When a devil or angel. Who played some composition. In dreams. 

The most well-known case is the case of Giuseppe Tartini (1692–1770), who saw. The devil played violin in his dreams, and then Tartini created his Devil's Trill Sonata by following. The things that he saw in his dreams. 

Those things support the theory that dreams are made. For solving problems. The problem with the dream analysis is that people don’t remember their dreams. But. A technology called targeted memory reactivation (TMR). The TMR uses acoustic waves to activate memory blocks after sleep. The opposite system is TMD, targeted memory deactivator. TMD deactivates memory. 

That system might. Help people. To remember their dreams. The TMR technology has uncovered that.

 “Seventy-five percent of participants reported dreams that contained elements related to the unsolved puzzles. Problems that appeared in dreams were later solved at a much higher rate than those that did not (42% vs 17%)”. (ScitechDaily, Can You Engineer a Dream? Neuroscientists Say Yes – and It Boosts Creativity) 




"Tartini's Dream" by Louis-Léopold Boilly (1761-1845). Illustration of the legend behind Giuseppe Tartini's "Devil's Trill Sonata". Caption: TARTINI'S DREAM. It is said that Tartini saw in a dream the Devil who offered him his services, and that, at his command, he performed a sonata on the violin, which Tartini had never heard before and which he tried to recall upon waking. He then composed that singular sonata that is still known today under the name of the Devil's Sonata.” (Wikipedia, Devil's Trill Sonata)

That means that dreams are meant to solve problems. Or they can help to solve them. The ability to send information into human brains just before people sleep. It can make people more productive. Maybe, things like AI can someday turn our dreams into mode. That we could project them on the computer screen. Things. Like a brain-computer interface, BCI systems. Which can also. Connect human creativity. Into a model that the AI can control and use in its training. The problem is how to send the right information. Into the brain. In the right moment. 

The BCI can also read those things from the electrodes or brain implants. The ability to control dreams makes people more creative. Or, the problem is. How we remember things. That we saw while we sleep. “Targeted Memory Reactivation (TMR) is a noninvasive technique from cognitive neuroscience that allows researchers to selectively influence which recent memories are strengthened during sleep. The method is based on the brain’s natural process of consolidating memories while a person is resting”. (Biologyinsights, How Targeted Memory Reactivation Works and Its Uses)


https://biologyinsights.com/targeted-memory-reactivation-how-it-works-and-its-uses/


https://www.eneuro.org/content/11/5/ENEURO.0285-23.2024


https://psycnet.apa.org/record/2019-01081-001


https://www.sciencedirect.com/science/article/abs/pii/S0028393218304482?via%3Dihub


Can You Engineer a Dream? Neuroscientists Say Yes – and It Boosts Creativity


https://en.wikipedia.org/wiki/August_Kekul%C3%A9


https://en.wikipedia.org/wiki/Devil%27s_Trill_Sonata

Thursday, January 29, 2026

Physicists have discovered a new method for stabilizing quantum chains using crystals.




"NV qubits aligned along a dislocation in diamond. Credit: UChicago Galli Group" (ScitechDaily, Physicists Discover a New Way To Connect Qubits Using Crystal Imperfections)

“The nitrogen-vacancy center (N-V center or NV center) is one of numerous photoluminescent point defects in diamond. It consists of a nearest-neighbor pair of a nitrogen atom, which substitutes for a carbon atom, and a lattice vacancy.” (Wikipedia, Nitrogen-vacancy center)

“NV centers enable nanoscale measurements of magnetic and electric fields, temperature, and mechanical strain with improved precision. External perturbation sensitivity makes NV centers ideal for applications in biomedicine—such as single-molecule imaging and cellular process modeling.”(Wikipedia, Nitrogen-vacancy center)

“In crystallography, a vacancy is a type of point defect in a crystal where an atom is missing from one of the lattice sites. Crystals inherently possess imperfections, sometimes referred to as crystallographic defects.” (Wikipedia, Vacancy defect)

The image of Bravais lattices explains how electrons interact around the atom. There is, of course, a ball-shaped field around atoms, but between electrons. There is also a straight energy string. Those strings are energy flows that travel between those electrons. The atom’s shell pulls those electrons into it. And that keeps electrons and atoms. In one entirety. And the energy bridges between them, the electromagnetic push between negative electrons tries to push those electrons away. 




“The seven lattice systems and their Bravais lattices in three dimensions” (Wikipedia, Bravais lattice)


In natural diamonds, the NV centers form randomly. But. There is a possibility of creating artificial NV centers. And putting them in line. This allows information to travel through that line. Those NV centers can be used as the transmitters in the quantum radars. This means that the diamonds there have the NV state line in them. Those NV-states can be used in high-resolution quantum Doppler radars. The system transmits electricity to those NV states. And then they act as the transmitting dipoles. 

In the image above, a method is introduced for stabilizing the qubit chain in the diamonds. Qubits, or their nitrogen vacancy (NV) states, are chained in the diamond.  The diamond presses that qubit chain, and keeps it in form. When information is transported into the qubit’s transmitting side, it allows the wave to travel through those NV states. In a qubit chain, the qubits form an energy staircase. There, they can transport information. Step by step. The system can adjust energy levels on those stairs. Very accurately. This means that lasers can be used to transport energy into those NV states or NV steps. The system can transport information in the static NV-state system. 




“Simplified atomic structure of the NV center”. (Wikipedia, Nitrogen-vacancy center)


When we think of this system as the tool that transports qubits through air or quantum channels, we must remember that diamond can be used as a phonon. First, the system makes the phonon. That creates the acoustic tunnel through the air. Then the information is sent to the NV states. The NV states send that wave movement into the receiver, and there, the receiving NV state starts to resonate. Another version is that the diamond takes the one NV state to its sharpest point. The system can use the corners of the pyramid-shaped diamond. To make the energy tweezers that lock the ion in front of that NV state line. Then the qubit line stores information in that NV state. And the higher energy level in that system pushes the qubit through the quantum channel. These types of systems are very interesting. They can be used to transport information in a highly secure mode. 

“Natural NV centers are randomly oriented within a diamond crystal. Ion implantation techniques can enable their artificial creation in predetermined positions as follows.” (Wikipedia, Nitrogen-vacancy center)

“Nitrogen-vacancy centers are typically produced from single substitutional nitrogen centers (called C or P1 centers in diamond literature) by irradiation followed by annealing at temperatures above 700 °C. A wide range of high-energy particles is suitable for such irradiation, including electrons, protons, neutrons, ions, and gamma photons. Irradiation produces lattice vacancies, which are a part of NV centers. Those vacancies are immobile at room temperature, and annealing is required to move them. Single substitutional nitrogen produces strain in the diamond lattice; it therefore efficiently captures moving vacancies,[producing the NV centers.” (Wikipedia, Nitrogen-vacancy center)


https://scitechdaily.com/physicists-discover-a-new-way-to-connect-qubits-using-crystal-imperfections/


https://en.wikipedia.org/wiki/Bravais_lattice



https://en.wikipedia.org/wiki/Nitrogen-vacancy_center



https://en.wikipedia.org/wiki/Vacancy_defect

Ultra-thin nanotubes and nano-technical lasers can boost a 6G network.

“Researchers have introduced an ultrathin carbon nanotube coating that can precisely control terahertz radiation, a part of the spectrum exp...