Hacking and computer security. Read today's research news on hacking and protecting against codebreakers. New software, secure data sharing, and more.
Updated: 54 min 32 sec ago
One of the most basic components of any communications network is a power splitter that allows a signal to be sent to multiple users and devices. Researchers have now developed just such a device for terahertz radiation -- a range of frequencies that may one day enable data transfer up to 100 times faster than current cellular and Wi-Fi networks.
Topological insulators behave like insulators at their core and allow good conductivity on their surface. They owe their characteristics to a new quantum state within the material discovered in 2007 and 2009 for 2-D and 3-D materials, respectively. Scientists studying the surface of ring-shaped, or toric, topological insulators, have just discovered some characteristics that had only previously been confirmed in spheres.
A crowdsourced collaboration/competition known as DREAM 9 set out three years ago to develop ideas for computational tools that would help treat patients with acute myeloid leukemia.
Global patterns of adoption spreading are induced by local adoption cascades initiated by multiple spontaneous adopters arriving at a constant rate, amplified by a large number of adoptions induced by social influence, and controlled by individuals who are immune to the actual adoption. This study shows that the structure of real-world adoption clusters is radically different from previous expectations. Vulnerable adoptions, induced by a single adopting neighbor, appear to be important only locally. Instead stable adopters, who are initially resisting to be exposed, are actually responsible for the emergence of global social adoption.
Poor weather can often make the operation of rescue helicopters a highly risky business, and sometimes even impossible. A new helmet-mounted display may in the future be able to help pilots detect hazards at an early stage, even when their visibility is severely impaired: the information required to do this is created in an on-board computer and imported into digital eye glasses.
A team of engineers is looking to capitalize on the sense of smell in locusts to create new biorobotic sensing systems that could be used in homeland security applications.
A math professor has developed a scientific model to address the various ways the Zika virus proliferates. The study reveals that mosquito control should remain the most important mitigation method to control the virus. However, the study reveals that Zika is a complicated virus and sexual transmission increases the risk of infection and prolongs the outbreak.
A group of physicists in Russia has learned to use a personal computer for calculations of complex equations of quantum mechanics, usually solved with help of supercomputers. This PC does the job much faster.
Two biologists have developed a mathematical model of the way social networks arise in animal populations. Though relatively simple, their model generated networks that faithfully recapitulated important properties of networks observed in field-collected data from four very different animal populations: spotted hyenas, sleep lizards, rock hyrax and bottlenose dolphins.
Camera-equipped smartphones, laptops and other devices make it possible to share ideas and images with anyone, anywhere, often in real-time. But in our cameras-everywhere culture, the risks of accidentally leaking sensitive information are growing. Computer scientists have developed software that helps prevent inadvertent disclosure of trade secrets and other restricted information within a camera's field of view by letting users specify what others can see.
Engineers have devised a computer model of how slits in the spleen filter blood. The model shows that these slits determine the size, shape, and flexibility of red blood cells.
Handheld, mobile phone-based microscopes can be used in developing countries after minimal training of community laboratory technicians to diagnose intestinal parasites quickly and accurately.
Common statistical methods used to analyze brain activity through images taken with MRI scanners cannot be trusted, shows a new study.
Using a language-learning game called 'Crystallize,' created by computer science faculty and students, researchers found that when players are required to work together they learn more words -- and enjoy the game more.
The era of quantum computers is one step closer. New research demonstrates a new way to pack a lot more quantum computing power into a much smaller space and with much greater control than ever before. The result is important for the development of quantum computers that can do computations that are impossible today for uses including cryptography and electronic data security.
A team of investigators has developed a suite of computer algorithms that can accurately predict the behavior of the microbiome -- the vast collection of microbes living on and inside the human body.
Artificial intelligence recently won out during simulated aerial combat against US expert tacticians. Importantly, it did so using no more than the processing power available in a tiny, affordable computer (Raspberry Pi) that retails for as little as $35.
Sometimes all it takes to get help from someone is to wave at them, or point. Now the same is true for robots. Researchers have completed work on a project aimed at enabling robots to cooperate with one another on complex jobs, by using body language.
The growth and evolution of the electronic environment in health care is taking a toll on US physicians. That's according to a national study of physicians that shows the use of electronic health records and computerized physician order entry leads to lower physician satisfaction and higher rates of professional burnout.
A scientist has helped develop an innovative mathematical model for exploring why some individuals evolve to be genetically programmed to be nice, while others stay nasty.