PinnedIlakkuvaselvi (Ilak) Manoharan211. Decoded Humans: An Object-Oriented Look at Our BiologyUnveiling Similarities Between Our Biology and ProgrammingMar 3012Mar 3012
PinnedIlakkuvaselvi (Ilak) Manoharan217. Decoding the Cosmos: How Fading Light Reveals the Universe’s SecretsUnveiling Distances, Stellar Phenomena, and More with the Inverse Square LawMar 316Mar 316
PinnedIlakkuvaselvi (Ilak) Manoharan221. The Mystery of Thought 💭 : Where Do Our Ideas Live?Telepathic Dreams or Neural Networks? Can We Share Thoughts with Others?Apr 213Apr 213
PinnedIlakkuvaselvi (Ilak) Manoharan225. The Illusion of Influence: Unpacking Probability in Coin FlipsUnderstanding Randomness: Why Every Flip Starts FreshApr 29Apr 29
PinnedIlakkuvaselvi (Ilak) Manoharan1.An example block diagram of a self-driving electric car system with computer vision using IoT…Here is a simplified block diagram of a self-driving electric car system with computer vision using IoT AIOS:Nov 15, 20238Nov 15, 20238
Ilakkuvaselvi (Ilak) Manoharan311. Petition: Replace Driving with Lazy Rivers for a Greener, Safer, and More Relaxing Commute!To: Local, State, and National Government Representatives1d ago1d ago
Ilakkuvaselvi (Ilak) Manoharan310. Defending the Right to a Suitable Job: A Meritocratic ApproachPhoto by Hester Qiang on Unsplash2d ago12d ago1
Ilakkuvaselvi (Ilak) Manoharan309. Understanding Two-Factor Authentication (2FA)Introduction5d ago5d ago
Ilakkuvaselvi (Ilak) Manoharan308. Understanding Firewalls: A Comprehensive Guide for Cybersecurity EngineersIntroduction5d ago5d ago
Ilakkuvaselvi (Ilak) Manoharan307. Understanding Different Kinds of Cyberattacks: Examples, Patterns, and SafeguardsCyberattacks are malicious attempts to disrupt, damage, or gain unauthorized access to computer systems, networks, or data. As digital…5d ago5d ago