Hacking and computer security. Read today's research news on hacking and protecting against codebreakers. New software, secure data sharing, and more.
Updated: 5 hours 40 min ago
Through a computational algorithm, a team of researchers has developed a neural network that allows a small robot to detect different patterns, such as images, fingerprints, handwriting, faces, bodies, voice frequencies and DNA sequences.
The X-29, an American experimental aircraft has inspired quantum computing researchers in a development which will bring the technology out of the lab.
A new study looks at how teachers and students use technology inside and outside the classroom. It turns out that members of today's younger Net Generation aren't more tech savvy than their teachers just because they were born into a world full of computers. In fact, if it weren't for the coaxing and support of their educators, many students would never use their electronic devices for more than playing games or listening to music, say experts.
A fast and inexpensive way to make facial prostheses for eye cancer patients has been developed using facial scanning software and 3-D printing, according to researchers. Their novel process can create more affordable prosthetics for any patients who have hollow sockets resulting from eye surgery following cancer or congenital deformities.
Using a tablet screening app could prove to be an effective method to aid in the effort to reduce the incidence of avoidable blindness in populations at high-risk for glaucoma with limited access to health care, according to a study. In this study, researchers used a free peripheral vision assessment app to screen approximately 200 patients in Nepal for glaucoma using an iPad®. The results show promise for screening populations that have limited or no access to traditional eye care.
A smartphone-based tool may be an effective alternative to traditional ophthalmic imaging equipment in evaluating and grading severity of a diabetic eye disease, according to a study. The results of the research indicate the lower-cost method could be useful for bringing the service to patients in isolated or underserved communities.
Smartphone technology is a widely available resource which may also be a portable and effective tool for imaging the inside of the eye, according to results of a study. Researchers are successfully using an iPhone® application as an inexpensive, portable and effective tool for imaging the inside of the eye, including in patients who are challenging to photograph by traditional methods.
People with severe mental illness such as schizophrenia, schizoaffective disorder or bipolar disorder use a popular social media website like YouTube to provide and receive naturally occurring peer support, researchers report.
People who play action video games such as Call of Duty or Assassin's Creed seem to learn a new sensorimotor skill more quickly than non-gamers do, psychology researchers have found.
Computer chips with superconducting circuits -- circuits with zero electrical resistance -- would be 50 to 100 times as energy-efficient as today's chips, an attractive trait given the increasing power consumption of the massive data centers that power the Internet's most popular sites.
Computer simulations have been used to show how bacteria are able to destroy antibiotics -- a breakthrough which will help develop drugs which can effectively tackle infections in the future.
Today’s smartphone user can obtain a lot of data about his or her health, thanks to built-in or separate sensors. Researchers now take this health monitoring to a higher level. Using the system he developed, the smartphone also acts as an ‘activity coach’: it advices the user to walk or take a rest. In what way the user wants to be addressed, is typically something the system learns by itself.
A new computational model may help illuminate the conditions surrounding tumor dormancy and the switch to a malignant state. The so-called cellular automaton model simulated various scenarios of tumor growth leading to tumor suppression, dormancy or proliferation.
Despite the growing popularity of using computer simulation to help teach college anatomy, students learn much better through the traditional use of human cadavers, according to new research.
Researchers used supercomputer simulations to dispel a popular misconception about magnesium-ion batteries that should help advance the development of multivalent ion battery technology.
The familiar interfaces of online social networking sites might be adapted to allow us to interact more efficiently with our networked devices such as cars, domestic appliances and gadgets. The concept would also extend to the idea of those devices connecting with each other as necessary to improve efficiency of heating and lighting, make our home entertainment systems smarter and much more.
Unwanted intruders are finding it more and more difficult to hack computer systems and networks thanks to today's advanced detection technologies. With the help of emulation-based technologies, many attacks can be detected at an early stage. However, even these technologies are not watertight.
The use of electronic health care services (versus more traditional methods) to reduce the high incidence of heart disease in China will be debated by leading cardiologists from around the world. “Clearly there is an urgent need to do something to reverse the trend in China where one in five people have cardiovascular disease and smoking and obesity are major issues,” said one expert.
New ways of documenting and sharing artifacts are being explored in recent study. Archaeologists are now using the tools of the 21st century to explore the past, researchers say, and are exploring how structured light 3D scanning can capture both the surface and geometry of artifacts. This technology will eventually help put artifacts that have been excavated in pieces back together again, they hope. The same technology can produce three-dimensional models of artifacts, allowing researchers around the world to study pieces online.
Two professors are figuring out the most effective ways we’re influenced to give away personal information online and what warnings would be most effective to get us to stop.