Saturday, December 14, 2013

Scientific Computing: Bioinformatics

Bioinformatics is the use of computer science to maintain, analyse, store biological data, and to assist in solving biological problems. Applications of Bioinformatics include sequencing mapping of biomolecules, molecular modelling of biomolecules, prediction of functional gene product, and identification of nucleotides sequence of functional genes. The term "Bioinformatics" was invented by Paulien Hogeweg in 1979, and it was referred to as to study the processes of information technology into biological systems. [1]

Bioinformatics uses software tools, which include Java, C#, XML, Perl, C++, Python, R, SQL, CUDA, MATLAB, and other spreadsheet applications to store and organize biological data. Analyzing the data involves algorithms in artificial intelligence, image processing, data mining, and simulation. To put it in simple terms, studying Bioinformatics isn't a simple task and is a subject that requires more work and dedication to the field to produce results. However, this field of study can be applied to various research topics and has made an impact on human health, the environment, energy, agriculture, and biotechnology. [2]

There is a vast amount of data from genome sequencing projects which requires computer programs to interpret and analyze the data. In fact, the biggest issue that the Bioinformatics community faces is the intelligent and efficient storage of this vast amount of data. It is essential that the software tools used provide easy and reliable access to the data. The three central biological processes around which Bioinformatics tools must be developed are that DNA sequence determines protein sequence, protein sequence determines protein structure, and protein structure determines protein function.

For more information about the field of Bioinformatics, please click here or here.

Saturday, December 7, 2013

Computer Graphics: Making Its Way Onto the Big Screen



Buzz Lightyears ahead: Pixar's digital rendering techniques had much improved by 2000, when it released the critically acclaimed Toy Story
Pixar's Toy Story
Nowadays, we see many movies ranging from genres like Fantasy, Science Fiction, Action, Drama, and Children use computer graphics to entertain the audience with a visual stimulating sensation. We probably take computer graphics in movies for granted knowing that we have seen it develop into something visually stunning over the past two decades. Over the years, we have seen movie makers use computer graphics to make beautiful explosions, detailed unknown alien life forms, mesmerizing environments/landscapes, and enhanced animated movies intended for all audiences. Now we are starting to see movie makers use computer graphics to make altered versions of actual human beings, whether its purpose is to show a younger or older version of an actor or a specific version of the actor that would have been too costly or time-consuming to use make-up.

CGI version of a younger Arnold Schwarzenegger in "Terminator Salvation"
There was a time when computer graphics was just starting out in the movie industry. Movies like Star Wars (1977) and Future World (1976) made use of computer generated special effects, but it was the movie Tron (1982) that helped influence the use of graphics extensively. Although Tron wasn't as successful as other movies that used computer graphics back in the early days, it obviously influenced movie makers with the idea of using graphics for more than just a couple of scenes in the movie industry. Computer graphics have gone on to save time and money for some movie companies as they are able to reuse models or programs for sequels. Movie companies are no longer limited to the amount of resources available before computer graphics were introduced to help bring a director's idea to life (or on the big screen).

With technology evolving, the potential of how far computer graphics can be used in the movie industry is unknown at the moment, but we are seeing more movies using computer graphics to look more realistic and becoming difficult to distinguish what is real or computer generated.

Notable movies that are based on computer graphics include the Matrix Trilogy, Avatar (2009), and the brilliant Pixar Movies (Toy Story, The Incredibles, Finding Nemo, WALL-E, etc). 

Sunday, December 1, 2013

Communications and Security


With computers being a necessity for most people nowadays, there is an even bigger risk for people to lose their personal information that is stored on their computers due to viruses and hackers. Just like buying a house, you would need some type of protection to make sure intruders do not invade your personal space. Most people would say that if you were to buy a computer, you would also need to buy or download a computer security program to have your computer safe from virus attacks. Most new computers come with an anti-virus program installed, but there are probably better alternatives on the internet with some of them being free to download. We have all heard or read stories of people having their personal information stolen and used against them.

Computer security has advanced since the early days of the computer and there are many options to choose from. You must update your computer security programs to be sure that the latest viruses or malware being made do not harm your computer. Just because you have a good anti-virus program doesn't necessarily mean you are 100% safe. It is up to the computer user to maintain the security of the data stored on his or her computer. For example, you want to have strong user passwords for anything that stores your personal information, evaluate user rights to access the system, set up a WEP (Wired Equivalent Privacy) password for any wireless connections you have connected to the computer, and uninstall any unused software or software with known vulnerabilities. [1]

In order to avoid security breaches to your computer, you must be alert and realize what needs to be done on your part and not just rely or expect a software program to protect you from incoming attacks.