Mathematics and Computer Science at The University of Virginia's College at Wise
Syndicate content Computers & Math News -- ScienceDaily
Hacking and computer security. Read today's research news on hacking and protecting against codebreakers. New software, secure data sharing, and more.
Updated: 54 min 32 sec ago

Key power-splitting component for terahertz waves

Wed, 06/29/2016 - 16:58
One of the most basic components of any communications network is a power splitter that allows a signal to be sent to multiple users and devices. Researchers have now developed just such a device for terahertz radiation -- a range of frequencies that may one day enable data transfer up to 100 times faster than current cellular and Wi-Fi networks.

Surprising qualities of insulator ring surfaces

Wed, 06/29/2016 - 16:56
Topological insulators behave like insulators at their core and allow good conductivity on their surface. They owe their characteristics to a new quantum state within the material discovered in 2007 and 2009 for 2-D and 3-D materials, respectively. Scientists studying the surface of ring-shaped, or toric, topological insulators, have just discovered some characteristics that had only previously been confirmed in spheres.

Crowd-sourced competition to create 'big data' diagnostic tools

Wed, 06/29/2016 - 14:58
A crowdsourced collaboration/competition known as DREAM 9 set out three years ago to develop ideas for computational tools that would help treat patients with acute myeloid leukemia.

Skype data of 500 million people reveals the real patterns of social adoption

Wed, 06/29/2016 - 14:02
Global patterns of adoption spreading are induced by local adoption cascades initiated by multiple spontaneous adopters arriving at a constant rate, amplified by a large number of adoptions induced by social influence, and controlled by individuals who are immune to the actual adoption. This study shows that the structure of real-world adoption clusters is radically different from previous expectations. Vulnerable adoptions, induced by a single adopting neighbor, appear to be important only locally. Instead stable adopters, who are initially resisting to be exposed, are actually responsible for the emergence of global social adoption.

Vision through the clouds

Wed, 06/29/2016 - 13:48
Poor weather can often make the operation of rescue helicopters a highly risky business, and sometimes even impossible. A new helmet-mounted display may in the future be able to help pilots detect hazards at an early stage, even when their visibility is severely impaired: the information required to do this is created in an on-board computer and imported into digital eye glasses.

Engineers to use cyborg insects as biorobotic sensing machines

Tue, 06/28/2016 - 18:14
A team of engineers is looking to capitalize on the sense of smell in locusts to create new biorobotic sensing systems that could be used in homeland security applications.

Doing the math on Zika and sex

Tue, 06/28/2016 - 17:11
A math professor has developed a scientific model to address the various ways the Zika virus proliferates. The study reveals that mosquito control should remain the most important mitigation method to control the virus. However, the study reveals that Zika is a complicated virus and sexual transmission increases the risk of infection and prolongs the outbreak.

No need for supercomputers

Tue, 06/28/2016 - 16:28
A group of physicists in Russia has learned to use a personal computer for calculations of complex equations of quantum mechanics, usually solved with help of supercomputers. This PC does the job much faster.

Animals 'inherit' their social network from their mothers, study shows

Tue, 06/28/2016 - 16:27
Two biologists have developed a mathematical model of the way social networks arise in animal populations. Though relatively simple, their model generated networks that faithfully recapitulated important properties of networks observed in field-collected data from four very different animal populations: spotted hyenas, sleep lizards, rock hyrax and bottlenose dolphins.

Video privacy software lets you select what others can see

Tue, 06/28/2016 - 15:46
Camera-equipped smartphones, laptops and other devices make it possible to share ideas and images with anyone, anywhere, often in real-time. But in our cameras-everywhere culture, the risks of accidentally leaking sensitive information are growing. Computer scientists have developed software that helps prevent inadvertent disclosure of trade secrets and other restricted information within a camera's field of view by letting users specify what others can see.

How the spleen filters blood

Tue, 06/28/2016 - 01:44
Engineers have devised a computer model of how slits in the spleen filter blood. The model shows that these slits determine the size, shape, and flexibility of red blood cells.

Mobile, phone-based microscopes work well in the field with minimal training

Mon, 06/27/2016 - 20:09
Handheld, mobile phone-based microscopes can be used in developing countries after minimal training of community laboratory technicians to diagnose intestinal parasites quickly and accurately.

Softwares for fMRI yield erroneous results

Mon, 06/27/2016 - 20:09
Common statistical methods used to analyze brain activity through images taken with MRI scanners cannot be trusted, shows a new study.

Want to learn a new language? Get a partner and play this video game

Mon, 06/27/2016 - 17:28
Using a language-learning game called 'Crystallize,' created by computer science faculty and students, researchers found that when players are required to work together they learn more words -- and enjoy the game more.

New, better way to build circuits for world's first useful quantum computers

Mon, 06/27/2016 - 17:28
The era of quantum computers is one step closer. New research demonstrates a new way to pack a lot more quantum computing power into a much smaller space and with much greater control than ever before. The result is important for the development of quantum computers that can do computations that are impossible today for uses including cryptography and electronic data security.

New tool for forecasting behavior of the microbiome

Mon, 06/27/2016 - 16:53
A team of investigators has developed a suite of computer algorithms that can accurately predict the behavior of the microbiome -- the vast collection of microbes living on and inside the human body.

New artificial intelligence beats tactical experts in combat simulation

Mon, 06/27/2016 - 16:51
Artificial intelligence recently won out during simulated aerial combat against US expert tacticians. Importantly, it did so using no more than the processing power available in a tiny, affordable computer (Raspberry Pi) that retails for as little as $35.

Robots come to each other's aid when they get the signal

Mon, 06/27/2016 - 13:56
Sometimes all it takes to get help from someone is to wave at them, or point. Now the same is true for robots. Researchers have completed work on a project aimed at enabling robots to cooperate with one another on complex jobs, by using body language.

Electronic medical practice environment can lead to physician burnout

Mon, 06/27/2016 - 13:48
The growth and evolution of the electronic environment in health care is taking a toll on US physicians. That's according to a national study of physicians that shows the use of electronic health records and computerized physician order entry leads to lower physician satisfaction and higher rates of professional burnout.

What makes individuals nasty or nice? Mathematical model explains

Fri, 06/24/2016 - 19:47
A scientist has helped develop an innovative mathematical model for exploring why some individuals evolve to be genetically programmed to be nice, while others stay nasty.