Table of Contents

Issue 4

Issue 4

March 2021

Switch to PDF View
Issue 4

Letter from the Journal

Dear readers,
The fourth issue of the Youth Science Journal is here! It has been long-coming but it is worth it as it is filled with fruitful articles from various fields like Artificial Intelligence and Psychology. As you might notice, we have changed our format once more to eliminate themes from the issue we release. This is due to the high number of articles we have received from submissions and the want of our writers to write in diverse fields. It was only inevitable to allow the journal to thrive with the various fields. Furthermore, as we announced in our previous issue, we are open for submission for future issues. You can now publish your article on our website about any topic in science through: www.ys-journal.com/publish. Publishing a review article about a specific topic will not only let you learn about it more, but also share awareness for that topic! All you have to do is to make sure that your article is following our guidelines that are available on our website. We are excited to say that we have received our first international submission to the journal. We thank Mandavi for being the first to submit their article on our journal, and we are looking forward for more articles in the future. Finally, we thank you for taking a look at this issue, and hope you have an enjoyable read. Best Regards,
Youth Science Journal Community

Biomedical Applications of Artificial Intelligence

Abstract Artificial intelligence as a concept is used in many uncountable fields. From the essential fields that AI is used in is the biomedicine field. AI can recognize the stresses in the muscles of the body, predict the overload, predict the blood pressure, predict the body temperature, and many other beneficial uses. In the coming sections many related concepted are defined as the uses and examples about these applications, how these technologies are used and some other beneficial information about this field.

I. Introduction

Artificial intelligence has been used in many beneficial fields. One of those fields is the biomedical field. The first AI application in the medical field was in the 1970s, when the field of AI was 15 years old. Early AI in medicine (AIM) researchers had discovered the applicability of AI methods to life sciences. The general AI research community was fascinated by the applications being developed in the medical world, noting that significant new AI methods were emerging as AIM researchers struggled with challenging biomedical problems. In fact, by 1978, the leading journal in the field (Artificial Intelligence, Elsevier, Amsterdam) had devoted a special issue [7] solely to AIM research papers. Over the next decade, the community continued to grow, and with the formation of the American Association for Artificial Intelligence in 1980, a special subgroup on medical applications (AAAI-M) was created. Field of (AIM) is been developing all over the years and it is coming better.

II. AI in biomedical information process

Information processing in biomedicine had many breakthroughs by using traditional information processing ways. As a result, there should be a step forward to make these processes as fast as it can. Inthe area of biomedical question answering (BioQA), the aim is to find fast and accurate answers to user formulated questions from a reservoir of documents and datasets. To begin with, the biomedical questions must be classified into different categories in order to extract appropriate information from the answer. ML can categorize biomedical questions into four basic types with an accuracy of nearly 90% [3] . Next, an intelligent biomedical document retrieval system can efficiently retrieve sections of the documents that are most likely to contain the answers to the biomedical questions [1]. For biomedical information collected from different sources over an elongated period of time, many important tasks can dominate; these are clinical information merging, comparison, and conflict resolution [2]. These have long been time consuming, labor-intensive, and unsatisfying tasks performed by humans. To improve efficiency and accuracy, AI has been demonstrated to be capable of performing these tasks with results as accurate as professional evaluator can do [4]. Also, natural language processing of medical narrative data is needed to free humans from the challenging task of keeping track of temporal events while simultaneously maintaining structures and reasons [6]. ML can be used to process high-complexity clinical information (e.g., text and various kinds of linked biomedical data), incorporate logic reasoning into the dataset, and utilize the learned knowledge for a myriad of purposes [5].

III. AI in biomedical research

In addition to being able to act as an ‘‘eDoctor” for disease diagnosis, management, and prognosis, AI has uncharted usage as a powerful tool in biomedical research [8]. In medical research, AI is most commonly employed to analyze and identify patterns in large, complicated datasets. This data can be analyzed in a meaningfully precise, faster, and more cost-effective way than traditional analytical methods, reducing spend and improving outcomes. AI can be used to search through huge troves of scientific literature to find related studies, as well as combining different datasets. Researchers at the institute of cancer have developed a unique cancer database that is able to combine patients’ clinical and genetical data with independent chemistry, biology, patient, and disease information.

IV. Disease diagnostic and prediction

The most urgent need for AI in biomedicine is in the diagnostics of diseases. AI allows health professionals to give earlier and more accurate diagnostics for many kinds of diseases [10]. Propper image processing, appropriate selection of features and AI methods can support medical diagnostic. This topic has been the subject of much research in recent years. One main class of diagnosis is based on in vitro diagnostics using biosensors or biochips. For instance, gene expression, which is a significant diagnosis tool, can be analyzed by ML, in which AI interprets microarray data to classify and detect abnormalities [9], [12] . One new application is to classify cancer microarray data for cancer diagnosis [11] .

V. Health care

AI nowadays had many approaches like predicting the health status of the body rabidly. Using AI, we could predict and measure blood pressure, heartbeats, body temperature, and more health care status that are significant. Blood pressure (BP): many people are daily tracking their blood pressure. Mostly measured to get insights into their health condition or to communicate with their doctor for follow up. Nowadays they measure their BP with a sphygmomanometer, a tool with inflatable cuffs, but it is not a good choice, as it is not a user-friendly measuring tool, also faults may be caused by wrong placement, and it is only a single moment measurement. “experts stress the importance of accurate blood pressure screenings “. Varheart wanted to create an AI-solution that could work with dataset of one sensor. This to fit into the already known applications like smartwatches. It also makes it a lot easier to implement in future applications.

VI. Conclusion

AI was first used in 1950s; it entered the biomedical field in 1970s. AI in biomedical fields had many approaches and beneficial applications. AI can be used in biomedical information process. In the BioQA, the aim is to find an answer in a reservoir of documents. AI helped making the process of searching for these questions easier than earlier. AI is also used in biomedical research in analyzing and identifying patterns in large, complicated datasets. This data can be analyzed in a meaningfully precise, faster, and more cost-effective way than traditional analytical methods, reducing spend and improving outcomes. From the most relevant uses of AI in biomedical fields is the diagnosis and prediction of disease. AI allows health professionals to give earlier and more accurate diagnostics for many kinds of diseases. Also, it can measure health status of the body as heart rates, body temperature and body pressure.

VII. References

AI-assisted Online Child Protection

Abstract No one can deny the internet’s great effect on the progress that we see around us. Despite all the benefits of the internet, it has its dark side, when misused the internet represents a threat, especially for children. Lacking child internet safety is a hazardous problem that people usually ignore or simply underestimate. According to the Center for Cyber Safety and Education, 53% of kids in grades 4-8 revealed their number to a stranger, and about 11% have met a stranger [1]. These statistics are skyrocketing, which is scary. In this research paper, a prototype for an online child safety software that utilizes AI to identify obscene photos. The reasoning behind writing this research is to explore one of the ways that a child protection software can be created and to explore and empathize the importance of maintaining child privacy while protecting them. The software here will mainly focus on limiting the threats from these sources. The algorithm is designed to block all unwanted websites with any unfriendly or aggressive content that does not suit children. Unblocked websites are continuously analyzed, where users receive the results of these updates periodically. As for the videos, AI can recognize and analyze videos to ensure the safest online experience for the child. The chatrooms are the last approach we are taking into consideration in our project. We are scanning the chats to recognize any obscene or immoral content, when any prohibited content is detected the parents are alerted at once.

I. Introduction

In recent years children’s usage of the internet has skyrocketed now that 80-98% of American children aged 3-18 have internet access in their homes. This presents parents with a problem that has been getting more dangerous over the years, child internet safety. Child internet safety has been listed as the 4th “biggest problem” according to a survey done by the C.S Mott children hospital in Michigan, going up from the 8th most prominent problem in the year prior, and this makes sense, as more and more children get their hands-on electronic devices that can access the internet.

Table 1
Table 1: The percentage of children exposed to sexual content
As a result of the high percentage of children with access to the internet exposure to sexual content has also risen. It was shown in two surveys conducted in the UK that the percentage of children exposed to sexual content has risen across the years as shown in [Table 1].

This shows the need to both start educating parents on the dangers of unsupervised internet usage and to start creating and implementing online child protection solutions. The main challenge that would face any developer trying to achieve such a goal is to maintain the privacy of the children while allowing the parents to easily supervise the children’s usage. As a result, a low information-to-results ratio had to be achieved to make sure not too much of the child’s information is accessed and still gets the required results. After that, the second challenge is maintaining the overall privacy of the information, something which would require the software to be either disrupted according to a Software as a service model or to be locally hosted, a combination of both approaches was selected for this prototype. The third problem would be the number of places that a child’s safety can be compromised, this problem comes as a result of the many places a child can interact with strangers, from anonymous chatrooms to online game lobbies, this limits the places this A.I can help. The last problem is the many platforms that children use, this problem is not as big as the others, but it still increases the work required to integrate the A.I with different platforms like Android, IOS, and Windows.

II. Implementation methods

In the creation of the software, already existing ideas and code modules were used in combination with new ideas to maximize efficiency. The project is separated into three main parts, general internet content moderation, video caption analysis, and predatory behavior chat scanning.

III. Main programming languages and programs used.

In the project, Python was used as the primary programming language due to its versatility when it comes to A.I and algorithms, quick integration with other programming languages, and the wide range of already existing modules and programs. This allows for more development time to be dedicated to adding features and optimizing them instead of making custom versions of these programs (i.e. the image detection algorithm). In professionally developed software, it is of course preferred to use custom-made software though to allow for deeper integration and optimization.

IV. General Internet Content Moderation

This is the first and simplest part of this project, the moderation algorithm is very simple but quite effective. On the first run, the program presents a list of other child safety measures that they can deploy to enhance their child’s safety, for example, it recommends users to use a DNS that offers a family plan or a child safety blocklist (i.e. OpenDNS Family Shield, Cloudflare 1.1.1.1 For Families, etc.) which simplifies the work needed for the project because they already block a majority of adult content, the program also recommends users to make sure they are using Google SafeSearch to prevent explicit images from popping out in Google’s image search. Using a simple extension that grabs the URLs of the webpages that the child visits and sends it to the python extension so it can look to see if this website is part of a trusted website list that includes sites like Wikipedia, government websites, etc. which we are sure don’t include adult content, if the website isn’t a part of that list the program it’ll search through the website’s content to see if it has any of the blacklisted words that exist in a list defined by the child’s parent and this list includes terms like references of pornography, swear words, etc., if it doesn’t find any matches it deletes the entry and waits for another link, if it finds any of these words the program it fetches the URLs of all images in the website using the Beautiful Soup module for python and sends them to the explicit image detection algorithm to scan these photos to check if the website has any explicit photos, after it checks the photos on the website it saves all the results of this scan (all blacklist matches, explicit photo scan results) to a file sent with the alert that is sent to the parent when the website the scan is done. The program also saves these URLs to an online open-source database that can be community checked to improve the program.

V. Video Caption Analysis

When the HTML parser finds that the domain name is YouTube it instead calls for the video caption analysis, the video caption analysis program first gets the unique video ID given to all videos uploaded to YouTube, it then uses the YouTube API to fetch the captions for the video which it then sends to Google’s Natural Language Processing API and it calls its content classification to classify the themes in the captions to figure out whether the video contains any age-inappropriate subjects (i.e. gambling), after it receives the themes from the API it saves them in a text file with the video title and ID. This is not an arguably bad way to analyze YouTube videos, but it has a flaw that is being slowly fixed. auto-generated captions, while a very useful feature to have, it makes mistakes all the time which can affect the results for videos that do not contain human-written captions and while a lot more channels are starting to add captions to their videos, we still include the name of the video so the parents can check the watch history to review the video again.

VI. Predatory Behavior Chat Scanning

Now that this is the hardest part of the program due to how there are no existing resources on this except ChildSafe.ai which is still not even in beta, but this also means that there is a whole new field of child safety that is barely explored. While currently there is no open-source solution available, one can be made with enough resources as is going to be discussed here. First, we propose training an NLP API to detect specific behaviors that connect with online exploitation (i.e. persuasion, manipulation,deception, etc.) and that gets easier due to the abundance of chat logs that the Pervert-Justice foundation has compiled over 15 years of decoy operations that allowed them to achieve over 623 convictions, only one of which was from research, that means that we have over 600 full chat logs of actual convicted online predators which when paired with the multiple research papers available on the techniques that online predators utilize to lure young children one can train a very reliable model by feeding these chat logs and tagging them with appropriate tags, secondly the proposed A.I have to have a predator identification and police reporting algorithm which tries to look up the predator using the given username, altering the parents and reporting the case to local authorities immediately and giving them easy access to the results of the lookup if there are any, finally, there has to be a database that records these chatlogs anonymously with the parent’s permission to be available to further help development in this area of child safety, the database should be available to researchers, physiologists to help research newer behaviors and techniques that these predators are using, it should also be possible to A.I researchers so they can feed these into their models to improve them.

VII. Conclusion

As internet use is extending to younger children, there is an increasing need for research focusing on the risks young users are experiencing, as well as the opportunities, and how they should cope. The Internet represents a significant threat to children because many children lack the simplest protection ways. Approximately 34% of students report experiencing cyberbullying during their lifetime. Over 60% of students who experience cyberbullying reported that it immensely impacted their ability to learn and feel safe while at school. We chose our approach to solve the problem, which is using AI to limit the threats caused by the internet, especially Chatrooms, websites, and videos. We use algorithms to recognize any spam and any unfriendly or immoral content. Any source that was found to fulfill these conditions will be prohibited immediately, and parents shall be alarmed. By working on decreasing these threats, we are helping in solving this terrible problem. We are providing a safer climate for children to use the internet without any fear. There are 71% of teens have hidden their online behavior from their parents so we provide parents with a program that will make them feel comfortable and rest assured that their children are in safe hands. We are working for a better future.

VI. References

Academic procrastination in high school juniors learning Mathematics

Abstract Academic procrastination is a big problem having noticeable effects on both student’s mental health and academic development. Mathematics is really hard and is confusing to a big portion of high school students, along with other factors that are responsible for academic procrastination while learning the subject. These factors are either personal or are caused by the person like mood, unlike external factors which are mainly caused by the surrounding learning environment. studying these causes can help us find a solution to prevent the consequences.

I. Introduction

Mathematics is a relatively difficult subject to learn or study for a lot of students especially in high school years. Problem-solving, reasoning and proof, communication, connections, and representation are five standards used in the process of studying as described by the National Council of Teachers of Mathematics [1], it is not that easy to understand some concepts of Mathematics more than 95% of junior high school students in Indonesia are having trouble reaching mid-levels of Math according to the results of the 2011 Trends in International Mathematics and Science Study (TIMSS) research in the fields of mathematics and science for the second graders of junior high schools. This low level can result from various factors, including the behavior of delaying tasks which are also known as “academic procrastination”, procrastination is the act of delaying or postponing any type of work (i.e., school tasks) in favor of doing an activity (i.e., going out with friends). These students procrastinating do not understand the importance of given tasks as some may find it not useful or not worth the hassle, some others see that these tasks are difficult or that they need a huge amount of time and power to finish.

II. Personality and Emotion

Academic procrastination has some impacts as well as causes. Perfectionism and a negative self-image are personally related factors while lack of knowledge and study skills and regulation of low self-esteem are competence-related, and there are many other factors like anxiety, boredom, lack of motivation, physical and mental health, and poor management skills. Factors like the quality of teachers, culture, and conditions of the school, and peer influences are external factors. A study was done to conclude a reason for the act of procrastination focusing on Mathematics as a subject for junior high school students [2] . This study tested the previous factors related to procrastinating by surveying six schools in Indonesia involving 154 students. The questionnaire asking students about their habits doing tasks resulted in 72 (46.8%) saying that they never delay or postpone a task, 58 (37.7%) had put off tasks before, and 24 (15.5%) always put off or postpone tasks. This means that about 53.2% of these students have experienced academic procrastination while studying mathematics, fewer than half of the students complete tasks on time, it is proven that some cheats tasks doing it in class before the session starts. The most noticeable problem was that most students were unaware of the importance of these tasks, complaining that it is time and power-consuming with no real benefit besides the fact that they are boring and confusing, and saying that they delayed it due to personal reasons like bad mood or stress from these tasks, this results in them to look for other activities to entertain them and try to escape from the reality and to reduce their stress, this is also caused by emotional discomfort from feelings like fear of failure and learning stress. These students often experience some form of depression or being overwhelmed doing school assignments. Surprisingly, academic procrastination is not only experienced by lower-performing pupils higher performers start to gain a feeling of perfectionism while doing tasks resulting in a perfectly answered assignment but turned in late blaming the time to finish the task. While this may seem better than other procrastinators who do not submit their tasks, it is still considered a form of academic procrastination. this indicates that some students may have bad time-management skills and low self-regulating.

III. Learning Environment and external factors

Not only that academic procrastination is caused and affected by personal factors, but it can also be affected by external factors like lack of social support or social networks, and the quality of teachers and the learning environment and culture. For example, inconducive studying or learning from home can cause academic procrastination as parents aren’t usually strict or discipline of learning at home and not paying enough attention to whether the child is doing his school tasks or not, they only see the child’s learning improvement and level from exam grades. This is not always the case as some families pay great attention to their child’s education. Parents can be a great factor while students are at home, the same goes for teachers at school. A good teacher controlling the class and paying attention to tasks can prevent some procrastinating, this discipline act is supported by the teacher encouraging students to complete their work and giving advice about time-management. On the other hand, teachers that do not discipline along with no motivation or competence can be troublesome causing students to go lazy finishing tasks. From the six schools included in the survey, two schools were not disciplined enough, these two had the highest levels of procrastination as they were not able to create a culture of achievement. Forty-seven (57.3%) of the eighty-two that did procrastinate were from these two schools. This level of academic procrastination results in noticeably lower grades, students procrastinating had an average of 7.40 in mathematics while students who never postpone their work averaged at 8.10.

IV. Conclusion

Academic procrastination is caused by many factors like the students’ unawareness considering the importance of given tasks, complaining about the difficulty of the work, or the time offered to finish. Perfectionism, lack of self-regulation, self-esteem, ineffective learning environment, and indiscipline teachers are also main causes. Knowing these factors can help find a solution for each of them and take action, inventing new learning strategies is a great solution and can cover many factors as it isn’t always the same. For example, since mathematics is really hard and confusing, it can be implemented into activities to make its learning process more fun exterminating boredom. Other effective strategies can be used to prevent procrastination like coordinating with students’schools. Also, parents’ contribution is as important, students spend most of the time finishing tasks at home. If these solutions were to be implemented, it will mostly result in lower academic procrastination.

References

Quantum Computing and Its Effect on Cryptography

Abstract Programmable computers have been around for more than 7 decades. They have almost reached their maximum potential because computer parts are becoming too small. More than two decades ago, researchers theorized the first quantum computer: a computer that uses different mechanics than digital computers and is way faster than them. This unimaginable power might lead to breaking current cryptography algorithms, which led researchers and field experts to work on new post-quantum cryptography algorithms to counter quantum computers' ability.

I. Introduction

The first freely programmable computer was created by German Konrad Zuse between 1936 and 1938 [1]. Later, ENIAC—or Electronic Numerical Integrator and Computer—was designed. ENIAC is the first programmable general-purpose digital computer ever created. It normally handled signed 10-digit numbers in the decimal system, but it was so well-constructed that it could handle operations with as many as 20 digits [2]. Less than 30 years later, in 1970, Intel introduced the first single-chip microprocessor, which had 2,600 manually placed transistors at 100 kHz [3] . Ever since, computers have evolved exponentially, getting smaller and more powerful rapidly. The number of atoms needed to represent a bit—short for binary digit—kept decreasing. Gordon Moore first observed this in 1965 and became known as Moore's Law: the power of computers doubles every year or two [4]. However, it has slowed down since then, and some industry and field experts say it does not apply anymore [5]. Now, Intel announced its Intel® Core™ i9-10900K Processor in 2020, which has 10 cores, 20 threads, and a max frequency of 5.3GHz [6]. However, computer parts are approaching sizes so small that our computers might reach their maximum potential [7].

II. How Modern Processors Work

1. CPU

A central processing unit (CPU) gives instructionsthat make up programs. It performs logic, arithmetic operations, input, and output. CPUs are generally composed of a memory unit consisting of ROM, RAM, Cache—, a Control Unit (CU), and an Arithmetic Logic Unit (ALU). These contain logic gates: electronic circuits that change one or more input to an output.

2. Logic Gates

There are 7 logic gates, and each has a different function: AND, OR, NOT, NAND, NOR, XOR, and XNOR.

  1. AND gate:
  2. Figure 1
    Figure 1: AND gate [8]
    The output of this logic gate is only true if both inputs are true. (fig. 1)
  3. OR gate:
  4. Figure 2
    Figure 2: OR gate [8]
    The output of this logic gate is true if one or more inputs are true. (fig. 2)
  5. NOT gate:
  6. Figure 3
    Figure 3: NOT gate [8]
    The output of this logic gate is the opposite of the input (for example, if the input is true, the output will be false). (fig. 3)
  7. NAND (NOT + AND) gate:
  8. Figure 4
    Figure 4: NAND gate [8]
    The output of this logic gate is the opposite of the output of the AND gate (for example, if one input is false and one is true and we use the AND gate, it will be false, but since we use NAND, it will be the opposite of false which is true). (fig. 4)
  9. NOR (NOT + OR) gate:
  10. Figure 5
    Figure 5: NOR gate [8]
    The output of this logic gate is the opposite of the output of the OR gate (for example, if one input is false and one is true and we use the OR gate, it will be true, but since we use NOR, it will be the opposite of true which is false). (fig. 5)
  11. XOR (Exclusive + OR) gate:
  12. Figure 6
    Figure 6: XOR gate [8]
    The output of this logic gate is similar to the OR gate's output, except that if all of the inputs are true, it will be false. (fig. 6)
  13. XNOR (Exclusive + NOR) gate:
  14. Figure 7
    Figure 7: XNOR gate [8]
    The output of this logic gate is similar to the NOR gate's output, except that if all of the inputs are true, it will be true. (fig. 7) [8]

These logic gates are made by combining diodes, resistors, and transistors: semiconductor devices are considered one of the basic building blocks of modern electronics.

3. Transistors

CPUs can contain up to billions of transistors. A transistor can work either as an amplifier or as a switch:

  1. As an amplifier, it transforms a weak electric current into a stronger current. This is not commonly used in computers.
  2. It can be switched on or off as a switch, storing two different numbers: zero and one—which stand for off and on respectively—to either block or allow information coming through. These numbers are called bits, which stands for binary digits, the smallest unit of information used in electronics.
Figure 8
Figure 8: Quantum Tunneling [10]
Today, transistors are typically 14nm. For reference: Eukaryotic cells normally range between 10-100µmin diameter [9] , or 714 to 7143 times larger than a transistor. This gives electrons the ability to penetrate the transistors' barriers, a phenomenon known as quantum tunneling. The smaller the size of transistors get, the easier it is for electrons to quantum tunnel (fig. 8) [10] [11].

III. Quantum Computing

In 1985, David Deutsch attempted to define a device that can efficiently simulate an arbitrary physical system. Because physics laws are ultimately quantum mechanical, he considered computing devices based upon quantum mechanics, which lead to our modern conception of a quantum computer [7]. A traditional digital computer uses bits in one of two states, on or off, 1 or 0, true or false. So, a 4-bit computer can hold any one of 16 (24) possible numbers (0000, 0001, 0010…1111). However, quantum computers do not use bits. They use qubits or quantum bits (quantum binary digits). Qubits do not work the same as bits, they can be 0 or 1, but they can also be in proportions of each (between 0 and 1). This is what we call "superposition": a qubit cannot be defined as a specific value unless we measure it at a very specific point, that is, when it is either 0 or 1. A qubit can be any two-level quantum system: spin, magnetic field, or a single photon. A qubit, unlike bits, can be all these 16 possible numbers at once. This number grows exponentially with each qubit, where a 30-qubit computer would be comparable to a digital computer performing 10 trillion floating-point operations per second, or TFLOPS—comparable to our current supercomputers [12]. In 2020, IBM announced that they are working on a 1,121-qubit quantum computer and expect to finish in 2023 [13]. Quantum computers need only the square root of time required by standard computers to find something in a database. This is known as Grover's law (O(√𝑛)) [14] . In February 2021, China launched its first quantum computer operating system.

IV. Cryptography

Figure 9
Figure 9: Caesar Cipher [15]
Cryptography, which means "secret/hidden writing" in Greek, is a technique used nowadays to provide privacy for individuals and organizations at a high level. Billions of people use cryptography to protect data and information. It has evolved throughout the age, from Julius Caesar's Caesar cipher—where plaintext letters are replaced by other letters with a fixed shift number (fig. 9)—to today's block ciphers and hash functions [15].

V. How quantum computers might affect cryptography

Many IT security aspects rely on encryption and public-key cryptography, which are essential forbusiness, e-commerce, protecting secret and confidential information. These are based on algorithms that are difficult to trick with modern computers and cannot be attacked by brute force like elliptic curve cryptosystems (ECCs) [16] . However, quantum computer algorithms like Shor's algorithm—a polynomial-time algorithm that can factor an integer—can heavily reduce the time required for computers to break these algorithms [17]. However, scientists are working on algorithms that can resist quantum computers, known as quantum-resistant algorithms, which post-quantum cryptography will depend on. In August 2015, the U.S. National Security Agency (NSA) declared its plan to turn to quantum-resistant algorithms. Later at PQCrypto 2016, a conference for post-quantum cryptography, NIST called for quantum-resistant schemes, leading the way to new public key standards. These efforts were later followed by SAFEcrypto, supported by the European Union Horizon 2020 project, and CryptoMathCREST, supported by Japan Science and Technology Agency [16] .

VI. Conclusion

Quantum computers are the next technological step for humanity. Digital computers are reaching their maximum potential because of their very small size and Moore's law became almost obsolete. Although digital computers are enough for our daily life, quantum computers will be used for accurate and fast simulations important in many fields, drug development, space exploration, artificial intelligence, solving difficult problems, and many more. However, quantum computers can also be used in breaking algorithms and ruining IT security, but scientists and field experts are working on creating quantum-resistant algorithms.

IX. References

Solar Panels: Thorough Review and its uses

Abstract Fossil fuels are non-renewable sources and cause pollution. Hence, it is mandatory to utilize another source of energy that is renewable and does not cause pollution. The energy from the sun is non-exhaustible and a better choice to make our future bright. If they can operate a massive spacecraft for so many years, they can replace fossil fuels soon. So, in this study, each aspect of solar panels has been discussed to get fundamental knowledge of solar panels.

I. Introduction

Have you ever wondered why some solar panels are black while others are blue? The hue of the solar panels totally depends on the type of silicon crystal they are made of. Solar cells convert solar energy into electrical energy. Solar cells contain multiplelayers to perform this function. Usually, silicon is used in the manufacturing of solar cells, but their efficiency is very low. To boost the efficiency of solar panels, other semiconductors like gallium and germanium have been introduced to manufacture solar cells. Solar panels have seen a great improvement in their technology from the time they were invented.

II. How are solar cells made?

Figure 1
Figure 1: Structure of the solar cell
Solar panels are made up of small blue squares called solar cells. Solar cells may look like a single sheet, but it consists of multiple layers. The outermost layer of the solar cells is made up of glass. Since glass is an insulator, it does not allow heat to pass through it. Only photons are passed to the next layers (as glass is transparent). The next layer is an anti-reflection coating (Ethylene Vinyl Acetate). Since the silicon layer beneath the EVA sheet is a very reflecting surface, more than 30% of sunlight will be reflected in the absence of this anti-reflecting layer, which will minimize the efficiency of the solar panel. But how does this layer prevent sunlight from reflecting? As we know that reflection occurs at both surfaces in a transparent material, the reflection at the upper surface and the lower surface is aligned. But the thickness of an anti-reflecting surface is so perfect that it allows the reflected rays to bend at an angle at which the upper reflected ray and the lower reflected ray misaligned and very little reflection occurs. The EVA sheet also plays an important role in preventing water and dirt from infiltrating into solar modules as well as protecting the cell from shocks and vibrations. Next, there are two layers made of silicon. To make these layers, first, the silicon is extracted from sand.
Figure 2
Figure 2: The process of transferring sand into a solar cell
The sand from which the silicon is extracted is called silica sand or silicon dioxide which is made from crushed quartz rocks. The silica sand is then purified by extracting the unwanted oxygen and results in 99% pure silica. This process is called Carbon Arc Welding. It is then processed further to get 100% pure silica. This crystalline silica is cut into wafers to be converted into solar cells [1] .
Figure 3
Figure 3: The barrier formed by positively charged phosphorus atoms and negatively charged boron atoms
As silicon has four electrons in its valence shell, each silicon atom is bonded with four other silicon atoms in the wafer. These bonds cannot be broken down by the sunlight. So, electric current cannot be generated here due to the absence of free electrons. To generate an electric current, some atoms of phosphorus are doped between silicon atoms (it is called N-type silicon), to get extra electrons that can move around. Since phosphorus has five electrons in the valence shell, four of them make bonds with silicon atoms, and the extra one is excited by the sunlight and jumps from the valence band to its conduction band (now the electron is free to move). The motion of these electrons is random, but electrons need to move in a single direction to produce an electric current. So, one more wafer is introduced, which is doped with boron (it is called P-type silicon), to produce electric fields. Boron has 3 valence electrons and one hole (empty orbital). Although Aluminum is at the immediate left of silicon, the Aluminum atom is not preferred as it is too large to fill the gap between silicon atoms. As the N-type silicon comes in contact with P-type silicon, the extra electrons in Phosphorus atoms fill the holes in the boron. Positively charged phosphorus atoms and negatively charged boron atoms form a barrier on the two sides (see in fig. 3) forming a depletion layer (all the atoms in this layer are electrically neutral).

When the photons strike the depletion layer, the electrons in the valence band of silicon jumps to its conduction band and the electron-hole pair generates. This is known as the Photoelectric Effect which is given by the formula: E = hv where, E =energy of photon, h =Planck’s constant (The Planck's constant, is the quantum of electromagnetic action that relates a photon's energy to its frequency. v =frequency of light The electric field (formed due to opposite charges on the two sides) drives the electrons towards the positive side while the holes towards the negative side and a strong potential difference are created.

Figure 4
Figure 4: A diagram showing the electrons flow in the wires
Since all the free electrons are in N-type silicon (which is a semiconductor), the electrons cannot move easily in this layer. A conductor is needed for the better flow of electrons. So, the two silicon layers are sandwiched between the metal plates (the upper plate is gridded to allow sunlight to reach the underlying layers). When a bulb (or any load) is connected through a wire to these plates, the electrons start flowing in the circuit and the bulb glows (as shown in figure 4).

Now, it is to be noted that the N-type silicon layer (being placed above the P-type silicon layer) is always a thinner P-type silicon layer so that the sunlight reaches the depletion layer. All the solar cells are connected by silver (due to its highest conductivity) to make a solar panel. Then, solar panels are joined to make solar arrays.

III. Types of solar panels

There are three types of solar panels-

  1. Monocrystalline solar panels
  2. Polycrystalline solar panels
  3. Thin-film solar panels

Monocrystalline- These types of panels are called “monocrystalline” because they are made up of single-crystal silicon. Silicon is formed into bars and cut into wafers to make the solar cells. Since they are made from single-crystal silicon, the electrons that generate a flow of electricity have room to move. Therefore, monocrystalline panels have the highest efficiency. Polycrystalline- Such panels are made by the melting of many fragments of silicon to form the panels. Polycrystalline panels are also known as “multicrystalline” because each solar cell is composed of many crystals of silicon. So, electrons do not get much freedom to move. As a result, these are less efficient than monocrystalline solar panels [2] Thin-Film- These panels are made up of thin films of semiconductors deposited on glass, plastic, and metal. These are about 20 times thinner than the other two types of solar panels. This makes them flexible and lightweight [3]

Table 1

IV. Why Solar Panels have so low efficiency?

Figure 5
Figure 5: A graph that shows the spectral intensity against wavelength
You might have noticed that the efficiencies of solar panels are very low. Even the best type of solar panels (that are monocrystalline solar panels) have a maximum efficiency of only 33%. What is the reason for it? William Shockley and Hans-Joachim Queisser made a discovery that solar panels with only one layer suffer efficiency limitations as they are unable to absorb solar light to its fullest. This discovery is now called the Shockley- Queisser limit. He noticed that photons from different parts of the spectrum have different natures (as shown in figure 5). [4]

It is shown in the figure that 19% of the pink color of the spectrum does not get absorbed by the solar cells. This is because the photons in this part of the spectrum have too low energy to emit the electrons (energy must be equal to or higher than the bandgap energy). 33% of the blue color (photons) is lost inthermalization (conversion of the absorbed energy into heat). This happens when photons having energy much higher than the bandgap of a semiconductor strikes the solar cells. All the energy, above the bandgap, is converted into heat. The orange color spectrum (15%) is lost due to material imperfections. All these losses contribute to lower the efficiency of the solar cells. Shockley- Queisser [5] limit led to the invention of Tandem Solar Cells which has comparatively higher efficiency.

V. Tandem Solar Cells

Figure 6
Figure 6: A diagram that shows how tandem solar cells absorb energy photons
In Tandem solar cells [6] , two cells are stacked one on top of the other, where the top cell is semi-transparent, which efficiently converts large energy photons into electricity, while the bottom cell converts small energy photons into electricity. The top cell is made up of a semiconductor that has high band energy while the bottom cell has low band energy.

Let us take an example of a tandem solar cell that is the perovskite-crystalline silicon tandem. Perovskite is a material that has the same crystal structure as the mineral calcium titanium oxide. Generally, perovskite compounds have a chemical formula ABX3, where ‘A’ and ‘B’ represent cations and X is an anion that bonds to both. They are used to create semiconductors to manufacture solar cells. They are used as an alternative to silicon as they have a large bandgap.

Figure 7
Figure 7: An illustration of the difference between four-terminal tandem cell and the two-terminal tandem cell
In figure 7, the perovskite cell is placed above the crystalline silicon cell. The bandgap of perovskite is 1.56 eV, and the bandgap of silicon is 1.1eV. As this solar cell contains two cells with different bandgaps, the photons of different parts of the spectrum can be absorbed (1.56 eV and 1.1eV corresponds to different wavelengths of the spectrum). In this way, the efficiency of tandem will increase because more parts of the spectrum can be absorbed and converted into electricity.

VI. Multi-junction solar cells

The solar cells with one P-N junction are called single-junction solar cells while multi-junction solar cells have multiple P-N junctions of different semiconductors. Multi-junction solar cells are a type of tandem cells (with multiple cells stacked one upon another). Every cell in a multi-junction solar cell has a traditional design that includes one P-N junction. Each cell is made up of a different semiconductor (having different band gaps), with each material tuned to absorb different parts of the solar spectrum.

Figure 8
Figure 8: A diagram showing the parts of the multi-junction solar cells
You can see in the figure that the blue material (GaInP) has a high bandgap so it will absorb high-energy photons (like UV and a portion of visible light of spectrum). The yellow material has a lower bandgap (1.3-1.4 eV), so it will absorb the middle portion of the spectrum. The red material has the lowest bandgap (0.67eV), so it will absorb the least energetic part of the spectrum (infrared rays). In this way, multi-junction solar cells cover the whole spectrum, and a very less portion of it is lost which makes them most efficient. The more the number of layers (p-N junctions), the higher the efficiency of the solar cell. Theoretically, a two-layer solar cell has 42% while three-layer solar has 49% efficiency.

A solar cell with 5-6 layers may have an efficiency of up to 70%. Multi-junction solar cells [7] are made using materials like GaInP (gallium indium phosphide) for the top layer, GaAs (gallium arsenide) for the middle layer, and Ge(germanium) for the bottom. A tunnel junction is placed between two layers (as shown in the above figure) to allow the electrons to flow between the cells and keep the electric fields of the two cells separate. Multi-junction cells focus on gallium arsenide because it has a desirable bandgap [8]. It can better absorb high-energy photons, making it efficient and suitable for solar energy conversion. These multi-junction solar panels are used in spacecraft due to their highefficiency.

VII. Solar Panels in space

Due to the absence of atmosphere in space, sunlight is an abandoned form of energy. Solar panels have proved to be a reliable source of electricity for Spacecrafts. Until the early 1990s, crystalline silicon was used to make solar arrays for Spacecrafts. But after that period, crystalline silicon saw a replacement with Gallium Arsenide because silicon was not able to withstand excessive heat and cold and solar radiation in space.

Figure 9
Figure 9: A graph showing the relative array efficiency against temperature
In space, solar panels have to face extreme conditions [9]. Degradation of solar panels occurs due to temperature fluctuations. When the panel is facing the Sun, the temperature reaches up to 150°C while the temperature is as low as -100°C when it is not facing the sun (in the shade of the Earth).

Panels expand and contract due to this variation. As a result, cracks appear in the silicon crystal over the years. Gallium Arsenide is preferred over crystalline silicon solar cells due to its higher efficiency. Gallium Arsenide is one of the main components of a multi-junction solar cell, which is used in spacecraft. Multi-junction solar panels have higher efficiency which means smaller panels will be used for the same amount of power. This will be helpful in reducing the size and weight of the spacecraft. Moreover, gallium arsenide based solar cells degrade slowly in the space radiation environment as compared to silicon solar cells. There are four sources of space radiations:

  1. Earth's radiation belt
  2. Galactic cosmic rays (high energy protons and heavy ions from outside our solar system)
  3. Solar wind
  4. Solar flares

These radiations play a vital role in degrading the efficiency of solar panels. But the degradation rate depends on the shielding technology of solar cells. Borosilicate glass panel covering see an efficiency loss of 5-10℅ per year while this loss is only 1℅ in the case of fused silica and lead glass covering.

VIII. Conclusion

Gallium arsenide based solar cells have the following advantages over silicon solar cells:
  1. Highly Efficient
  2. Gallium arsenide has the highest efficiency than any other solar material. It can produce a larger amount of electricity per square area.
  3. Lightweight and flexible
  4. It has high efficiency even when thin layers of gallium arsenide are used while silicon solar cells have to be thick to produce large amounts of electricity.
  5. Great resistance
  6. Gallium arsenide solar cells can withstand solar radiation and thermal fluctuations in space. Hence, it is good for the spacecraft.
  7. Low light performance
  8. It can work efficiently even when the light is low.

Although gallium arsenide-based solar panels are highly efficient, silicon solar panels are still used for household and commercial purposes due to the high cost of gallium arsenide solar cells.

IX. References

Contact Us

Reach to us about ideas, suggestion or any questions you have!

Website Managers: Mikhael Mounay | Mohanad Elagan

© 2020-2024 All Rights reserved | Youth Science Journal