id
stringlengths
1
169
pr-title
stringlengths
2
190
pr-article
stringlengths
0
65k
pr-summary
stringlengths
47
4.27k
sc-title
stringclasses
2 values
sc-article
stringlengths
0
2.03M
sc-abstract
stringclasses
2 values
sc-section_names
listlengths
0
0
sc-sections
listlengths
0
0
sc-authors
listlengths
0
0
source
stringclasses
2 values
Topic
stringclasses
10 values
Citation
stringlengths
4
4.58k
Paper_URL
stringlengths
4
213
News_URL
stringlengths
4
119
pr-summary-and-article
stringlengths
49
66.1k
0
New York City's Vaccine Passport Plan Renews Online Privacy Debate
When New York City announced on Tuesday that it would soon require people to show proof of at least one coronavirus vaccine shot to enter businesses, Mayor Bill de Blasio said the system was "simple - just show it and you're in." Less simple was the privacy debate that the city reignited. Vaccine passports , which show...
New York's City's mandate that people must show proof at least one coronavirus vaccine shot, or vaccine passport, to enter businesses has revived the debate of whether these digital certificates undermine online privacy. The applications may enable location tracking, and privacy researchers are worried about digital su...
[]
[]
[]
scitechnews
None
None
None
None
New York's City's mandate that people must show proof at least one coronavirus vaccine shot, or vaccine passport, to enter businesses has revived the debate of whether these digital certificates undermine online privacy. The applications may enable location tracking, and privacy researchers are worried about digital su...
1
Facebook Disables Accounts Tied to NYU Research Project
Facebook Inc. has disabled the personal accounts of a group of New York University researchers studying political ads on the social network, claiming they are scraping data in violation of the company's terms of service. The company also cut off the researchers' access to Facebook's APIs, technology that is used to sha...
Facebook has disabled the personal accounts of New York University (NYU) scientists studying political ads on the social network, alleging their extraction of data violates its terms of service. Facebook's Mike Clark said the company also blocked their access to Facebook's application programming interfaces, used to sh...
[]
[]
[]
scitechnews
None
None
None
None
Facebook has disabled the personal accounts of New York University (NYU) scientists studying political ads on the social network, alleging their extraction of data violates its terms of service. Facebook's Mike Clark said the company also blocked their access to Facebook's application programming interfaces, used to sh...
2
Teenage Girls in Northern Nigeria 'Open Their Minds' with Robotics
KANO, Nigeria, Aug 2 (Reuters) - Teenage girls in the northern Nigerian city of Kano are learning robotics, computing and other STEM subjects as part of an innovative project that challenges local views of what girls should be doing in a socially conservative Muslim society. In a place where girls are expected to marry...
The Kabara non-governmental organization (NGO) in northern Nigeria is helping teenage girls in the city of Kano to learn robotics, computing, and other science, technology, engineering, and math subjects. Founded in 2016 by engineer Hadiza Garbati, Kabara has trained over 200 girls, with plans to extend its reach to ot...
[]
[]
[]
scitechnews
None
None
None
None
The Kabara non-governmental organization (NGO) in northern Nigeria is helping teenage girls in the city of Kano to learn robotics, computing, and other science, technology, engineering, and math subjects. Founded in 2016 by engineer Hadiza Garbati, Kabara has trained over 200 girls, with plans to extend its reach to ot...
3
3D 'Heat Map' Animation Shows How Seizures Spread in the Brains of Epilepsy Patients
For 29 years, from the time she was 12, Rashetta Higgins had been wracked by epileptic seizures - as many as 10 a week - in her sleep, at school and at work. She lost four jobs over 10 years. One seizure brought her down as she was climbing concrete stairs, leaving a bloody scene and a bad gash near her eye. A seizure ...
University of California, San Francisco (UCSF) neuroscientists used an algorithm to visualize in three dimensions hundreds of electroencephalography (EEG) traces in the brain, resulting in an animated heat map of seizures in epileptic patients. UCSF's Robert Knowlton said the tool "makes it much easier to define where ...
[]
[]
[]
scitechnews
None
None
None
None
University of California, San Francisco (UCSF) neuroscientists used an algorithm to visualize in three dimensions hundreds of electroencephalography (EEG) traces in the brain, resulting in an animated heat map of seizures in epileptic patients. UCSF's Robert Knowlton said the tool "makes it much easier to define where ...
4
Endlessly Changing Playground Teaches AIs to Multitask
What did they learn? Some of DeepMind's XLand AIs played 700,000 different games in 4,000 different worlds, encountering 3.4 million unique tasks in total. Instead of learning the best thing to do in each situation, which is what most existing reinforcement-learning AIs do, the players learned to experiment - moving ob...
Alphabet's DeepMind Technologies has developed a videogame-like three-dimensional world that allows artificial intelligence (AI) agents to learn skills by experimenting and exploring. Those skills can be used to perform tasks they have not performed before. XLand is managed by a central AI that controls the environment...
[]
[]
[]
scitechnews
None
None
None
None
Alphabet's DeepMind Technologies has developed a videogame-like three-dimensional world that allows artificial intelligence (AI) agents to learn skills by experimenting and exploring. Those skills can be used to perform tasks they have not performed before. XLand is managed by a central AI that controls the environment...
5
CISA Launches Initiative to Combat Ransomware
About the Author Chris Riotta is a staff writer at FCW covering government procurement and technology policy. Chris joined FCW after covering U.S. politics for three years at The Independent. He earned his master's degree from the Columbia University Graduate School of Journalism, where he served as 2021 class presiden...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) officially launched the Joint Cyber Defense Collaborative (JCDC), an anti-ransomware initiative supported by public-private information sharing. CISA director Jen Easterly said the organization was created to develop cyber defense strategies and exchange ...
[]
[]
[]
scitechnews
None
None
None
None
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) officially launched the Joint Cyber Defense Collaborative (JCDC), an anti-ransomware initiative supported by public-private information sharing. CISA director Jen Easterly said the organization was created to develop cyber defense strategies and exchange ...
7
Apple to Scan iPhones for Child Sex Abuse Images
"Regardless of what Apple's long term plans are, they've sent a very clear signal. In their (very influential) opinion, it is safe to build systems that scan users' phones for prohibited content," Matthew Green, a security researcher at Johns Hopkins University, said.
Apple has unveiled a system designed to scan U.S. customers' iPhones to determine if they contain child sexual abuse material (CSAM). The system compares photo files on each handset to a database of known CSAM gathered by the National Center for Missing and Exploited Children and other organizations. Before an iPhone c...
[]
[]
[]
scitechnews
None
None
None
None
Apple has unveiled a system designed to scan U.S. customers' iPhones to determine if they contain child sexual abuse material (CSAM). The system compares photo files on each handset to a database of known CSAM gathered by the National Center for Missing and Exploited Children and other organizations. Before an iPhone c...
8
Information Transfer Protocol Reaches Quantum Speed Limit
Even though quantum computers are a young technology and aren't yet ready for routine practical use, researchers have already been investigating the theoretical constraints that will bound quantum technologies. One of the things researchers have discovered is that there are limits to how quickly quantum information can...
Joint Quantum Institute (JQI) scientists have developed a quantum information transfer protocol that reaches theoretical speed limits for some quantum operations. The protocol is engineered for quantum devices in which interactions between quantum bits (qubits) weaken as they recede from each other, covering a range of...
[]
[]
[]
scitechnews
None
None
None
None
Joint Quantum Institute (JQI) scientists have developed a quantum information transfer protocol that reaches theoretical speed limits for some quantum operations. The protocol is engineered for quantum devices in which interactions between quantum bits (qubits) weaken as they recede from each other, covering a range of...
10
Security Flaws Found in Popular EV Chargers
Image Credits: Getty Images U.K. cybersecurity company Pen Test Partners has identified several vulnerabilities in six home electric vehicle charging brands and a large public EV charging network. While the charger manufacturers resolved most of the issues, the findings are the latest example of the poorly regulated wo...
Analysts at U.K. cybersecurity firm Pen Test Partners have identified flaws in the application programming interfaces of six home electric vehicle (EV) charging brands, as well as the Chargepoint public EV charging station network. Pen Test analyst Vangelis Stykas found several vulnerabilities that could enable hackers...
[]
[]
[]
scitechnews
None
None
None
None
Analysts at U.K. cybersecurity firm Pen Test Partners have identified flaws in the application programming interfaces of six home electric vehicle (EV) charging brands, as well as the Chargepoint public EV charging station network. Pen Test analyst Vangelis Stykas found several vulnerabilities that could enable hackers...
11
ForCE Model Accurately Predicts How Coasts Will Be Impacted by Storms, Sea-Level Rise
Coastal communities across the world are increasingly facing up to the huge threats posed by a combination of extreme storms and predicted rises in sea levels as a result of global climate change. However, scientists at the University of Plymouth have developed a simple algorithm-based model which accurately predicts h...
An algorithm-based model developed by researchers at the University of Plymouth in the U.K. predicts the impact of storms and rising sea levels on coastlines with greater than 80% accuracy. The Forecasting Coastal Evolution (ForCE) model can predict the evolution of coastlines and assess their resilience to erosion and...
[]
[]
[]
scitechnews
None
None
None
None
An algorithm-based model developed by researchers at the University of Plymouth in the U.K. predicts the impact of storms and rising sea levels on coastlines with greater than 80% accuracy. The Forecasting Coastal Evolution (ForCE) model can predict the evolution of coastlines and assess their resilience to erosion and...
12
AI Algorithm to Assess Metastatic Potential in Skin Cancers
DALLAS - August 3, 2021 - Using artificial intelligence (AI), researchers from UT Southwestern have developed a way to accurately predict which skin cancers are highly metastatic. The findings , published as the July cover article of Cell Systems, show the potential for AI-based tools to revolutionize pathology for can...
A new artificial intelligence (AI) algorithm can predict highly metastatic skin cancers. The University of Texas Southwestern Medical Center (UTSW) researchers who developed the algorithm used AI to identify differences between images of melanoma cells with high and low metastatic potential, then used reverse engineeri...
[]
[]
[]
scitechnews
None
None
None
None
A new artificial intelligence (AI) algorithm can predict highly metastatic skin cancers. The University of Texas Southwestern Medical Center (UTSW) researchers who developed the algorithm used AI to identify differences between images of melanoma cells with high and low metastatic potential, then used reverse engineeri...
13
Do You Hear What I Hear? A Cyberattack.
Cybersecurity analysts deal with an enormous amount of data, especially when monitoring network traffic. If one were to print the data in text form, a single day's worth of network traffic may be akin to a thick phonebook. In other words, detecting an abnormality is like finding a needle in a haystack. "It's an ocean o...
Carnegie Mellon University's Yang Cai and colleagues have designed a method of making abnormal network traffic audible by rendering cybersecurity data musically. The researchers explored several sound mapping algorithms, converting numeral datasets into music with diverse melodies, harmonies, time signatures, and tempo...
[]
[]
[]
scitechnews
None
None
None
None
Carnegie Mellon University's Yang Cai and colleagues have designed a method of making abnormal network traffic audible by rendering cybersecurity data musically. The researchers explored several sound mapping algorithms, converting numeral datasets into music with diverse melodies, harmonies, time signatures, and tempo...
15
LLNL Optimizes Flow-Through Electrodes for Electrochemical Reactors with 3D Printing
To take advantage of the growing abundance and cheaper costs of renewable energy, Lawrence Livermore National Laboratory (LLNL) scientists and engineers are 3D printing flow-through electrodes (FTEs), core components of electrochemical reactors used for converting CO 2 and other molecules to useful products. As describ...
Lawrence Livermore National Laboratory (LLNL) scientists three-dimensionally (3D) printed carbon flow-through electrodes (FTEs) for electrochemical reactors from graphene aerogels. The researchers demonstrated the ability to customize FTE flows and drastically enhance reactant transfer from electrodes onto reactive sur...
[]
[]
[]
scitechnews
None
None
None
None
Lawrence Livermore National Laboratory (LLNL) scientists three-dimensionally (3D) printed carbon flow-through electrodes (FTEs) for electrochemical reactors from graphene aerogels. The researchers demonstrated the ability to customize FTE flows and drastically enhance reactant transfer from electrodes onto reactive sur...
16
Scientists Share Wiring Diagram Tracing Connections for 200,000 Mouse Brain Cells
Neuroscientists from Seattle's Allen Institute and other research institutions have wrapped up a five-year, multimillion-dollar project with the release of a high-resolution 3-D map showing the connections between 200,000 cells in a clump of mouse brain about as big as a grain of sand. The data collection, which is now...
A multi-institutional team of neuroscientists spent five years and $100 million developing a high-resolution model detailing the connections between 200,000 mouse brain cells. Created under the federally-funded Machine Intelligence From Cortical Networks (MICrONS) program, the dataset encompasses 120,000 neurons and ab...
[]
[]
[]
scitechnews
None
None
None
None
A multi-institutional team of neuroscientists spent five years and $100 million developing a high-resolution model detailing the connections between 200,000 mouse brain cells. Created under the federally-funded Machine Intelligence From Cortical Networks (MICrONS) program, the dataset encompasses 120,000 neurons and ab...
17
Census Data Change to Protect Privacy Rattles Researchers, Minority Groups
A plan to protect the confidentiality of Americans' responses to the 2020 census by injecting small, calculated distortions into the results is raising concerns that it will erode their usability for research and distribution of state and federal funds. The Census Bureau is due to release the first major results of the...
The U.S. Census Bureau will use a complex algorithm to adjust 2020 Census statistics to prevent the data from being recombined to disclose information about individual respondents. The bureau's Ron Jarmin said it will use differential privacy, an approach it has long employed in some fashion, which involves adding stat...
[]
[]
[]
scitechnews
None
None
None
None
The U.S. Census Bureau will use a complex algorithm to adjust 2020 Census statistics to prevent the data from being recombined to disclose information about individual respondents. The bureau's Ron Jarmin said it will use differential privacy, an approach it has long employed in some fashion, which involves adding stat...
18
Robot Apocalypse Hard to Find in America's Small, Mid-Sized Factories
CLEVELAND, Aug 2 (Reuters) - When researchers from the Massachusetts Institute of Technology visited Rich Gent's machine shop here to see how automation was spreading to America's small and medium-sized factories, they expected to find robots. They did not. "In big factories - when you're making the same thing over and...
Although analysts have warned that millions of blue-collar jobs in the U.S. industrial heartland will soon be displaced by robots, that is not yet the case at small and medium-sized factories. Massachusetts Institute of Technology (MIT) researchers studied 34 companies with 500 or fewer employees in Ohio, Massachusetts...
[]
[]
[]
scitechnews
None
None
None
None
Although analysts have warned that millions of blue-collar jobs in the U.S. industrial heartland will soon be displaced by robots, that is not yet the case at small and medium-sized factories. Massachusetts Institute of Technology (MIT) researchers studied 34 companies with 500 or fewer employees in Ohio, Massachusetts...
19
Insulator-Conductor Transition Points Toward Ultra-Efficient Computing
For the first time, researchers have been able to image how atoms in a computer switch move around on fast timescales while it turns on and off. This ability to peer into the atomic world may hold the key to a new kind of switch for computers that will speed up computing and reduce the energy required for computer proc...
A team of researchers has imaged the movement of atoms in a computer switch turning on and off in real time, which could help lead to super-efficient computing. Researchers at the U.S. Department of Energy's SLAC National Accelerator Laboratory, Stanford University, Hewlett Packard Labs, Pennsylvania State University, ...
[]
[]
[]
scitechnews
None
None
None
None
A team of researchers has imaged the movement of atoms in a computer switch turning on and off in real time, which could help lead to super-efficient computing. Researchers at the U.S. Department of Energy's SLAC National Accelerator Laboratory, Stanford University, Hewlett Packard Labs, Pennsylvania State University, ...
20
AI Carpenter Can Recreate Furniture From Photos
An algorithm developed by University of Washington (UW) researchers can render photos of wooden objects into three-dimensional (3D) models with enough detail to be replicated by carpenters. The researchers factored in the geometric limitations of flat sheets of wood and how wooden parts can interlock. They captured pho...
[]
[]
[]
scitechnews
None
None
None
None
An algorithm developed by University of Washington (UW) researchers can render photos of wooden objects into three-dimensional (3D) models with enough detail to be replicated by carpenters. The researchers factored in the geometric limitations of flat sheets of wood and how wooden parts can interlock. They captured pho...
21
Developers Reveal Programming Languages They Love, Dread
Programmer online community Stack Overflow's 2021 survey of 83,439 software developers in 181 countries found the vast majority (86.69%) named Mozilla's Rust their "most loved" language. Those respondents cited Rust as the language they worked with the most in the past year, and with which they most want to work with n...
[]
[]
[]
scitechnews
None
None
None
None
Programmer online community Stack Overflow's 2021 survey of 83,439 software developers in 181 countries found the vast majority (86.69%) named Mozilla's Rust their "most loved" language. Those respondents cited Rust as the language they worked with the most in the past year, and with which they most want to work with n...
22
Apps That Are Redefining Accessibility
Some estimate less than 10% of websites are accessible, meaning they provide assistance in accessing their content to people with visual disabilities. Some companies are tackling the issue by rolling out apps that can be used by anyone, regardless of visual capabilities. One example is Finnish developer Ilkka Pirttimaa...
[]
[]
[]
scitechnews
None
None
None
None
Some estimate less than 10% of websites are accessible, meaning they provide assistance in accessing their content to people with visual disabilities. Some companies are tackling the issue by rolling out apps that can be used by anyone, regardless of visual capabilities. One example is Finnish developer Ilkka Pirttimaa...
23
Security Bug Affects Nearly All Hospitals in North America
Researchers from the IoT security firm Armis have discovered nine critical vulnerabilities in the Nexus Control Panel which is used to power all current models of Translogic's pneumatic tube system (PTS) stations by Swisslog Healthcare. The vulnerabilities have been given the name PwnedPiper and are particularly concer...
Researchers at security firm Armis identified nine critical vulnerabilities in the Nexus Control Panel that powers all current models of Swisslog Healthcare's Translogic pneumatic tube system (PTS) stations. The Translogic PTS system is used in 3,000 hospitals worldwide and 80% of major hospitals in North America to de...
[]
[]
[]
scitechnews
None
None
None
None
Researchers at security firm Armis identified nine critical vulnerabilities in the Nexus Control Panel that powers all current models of Swisslog Healthcare's Translogic pneumatic tube system (PTS) stations. The Translogic PTS system is used in 3,000 hospitals worldwide and 80% of major hospitals in North America to de...
24
Platform Teaches Nonexperts to Use ML
Machine-learning algorithms are used to find patterns in data that humans wouldn't otherwise notice, and are being deployed to help inform decisions big and small - from COVID-19 vaccination development to Netflix recommendations. New award-winning research from the Cornell Ann S. Bowers College of Computing and Inform...
An interactive machine learning (ML) platform developed by Cornell University scientists is designed to train nonexperts to use algorithms effectively, efficiently, and ethically. Cornell's Swati Mishra said, "If we design machine learning tools correctly and give enough agency to people to use them, we can ensure thei...
[]
[]
[]
scitechnews
None
None
None
None
An interactive machine learning (ML) platform developed by Cornell University scientists is designed to train nonexperts to use algorithms effectively, efficiently, and ethically. Cornell's Swati Mishra said, "If we design machine learning tools correctly and give enough agency to people to use them, we can ensure thei...
25
Robotic Police Dogs: Useful Hounds or Dehumanizing Machines?
HONOLULU (AP) - If you're homeless and looking for temporary shelter in Hawaii's capital, expect a visit from a robotic police dog that will scan your eye to make sure you don't have a fever. That's just one of the ways public safety agencies are starting to use Spot, the best-known of a new commercial category of robo...
Police departments claim to use robotic dogs as simply another tool to keep emergency responders out of danger, but privacy advocates say the robots are secretly being deployed without safeguards against aggressive, invasive, or dehumanizing uses. The New York Police Department acquired a Spot robotic canine last year ...
[]
[]
[]
scitechnews
None
None
None
None
Police departments claim to use robotic dogs as simply another tool to keep emergency responders out of danger, but privacy advocates say the robots are secretly being deployed without safeguards against aggressive, invasive, or dehumanizing uses. The New York Police Department acquired a Spot robotic canine last year ...
26
EU Fines Amazon Record $888 Million Over Data Violations
Luxembourg's CNPD data protection authority fined Amazon a record $888 million for breaching the EU's General Data Protection Regulation (GDPR). The EU regulator charged the online retailer with processing personal data in violation of GDPR rules, which Amazon denies. The ruling closes an investigation triggered by a 2...
[]
[]
[]
scitechnews
None
None
None
None
Luxembourg's CNPD data protection authority fined Amazon a record $888 million for breaching the EU's General Data Protection Regulation (GDPR). The EU regulator charged the online retailer with processing personal data in violation of GDPR rules, which Amazon denies. The ruling closes an investigation triggered by a 2...
27
AI Can Now Be Recognized as an Inventor
In a landmark decision, an Australian court has set a groundbreaking precedent, deciding artificial intelligence (AI) systems can be legally recognised as an inventor in patent applications. That might not sound like a big deal, but it challenges a fundamental assumption in the law: that only human beings can be invent...
Australia's Federal Court has granted artificial intelligence (AI) systems legal recognition as inventors in patent applications, challenging the assumption that invention is a purely human act. The decision recognizes DABUS (device for the autonomous bootstrapping of unified sentience), an AI system whose creators hav...
[]
[]
[]
scitechnews
None
None
None
None
Australia's Federal Court has granted artificial intelligence (AI) systems legal recognition as inventors in patent applications, challenging the assumption that invention is a purely human act. The decision recognizes DABUS (device for the autonomous bootstrapping of unified sentience), an AI system whose creators hav...
29
Unfolding the Hippocampus
A new technique developed at Western University to visually iron out the wrinkles and folds in one region of the brain may provide researchers a more accurate picture to understand brain disorders. The hippocampus is a region of the brain often looked at by clinicians and researchers for clues to understand disease pro...
Understanding disease progression and response to treatment for brain disorders by digitally unfolding the hippocampus is the goal of a new technique developed by researchers at Canada's Western University. The method employs data from magnetic resonance imaging to digitally render the hippocampus' three-dimensional fo...
[]
[]
[]
scitechnews
None
None
None
None
Understanding disease progression and response to treatment for brain disorders by digitally unfolding the hippocampus is the goal of a new technique developed by researchers at Canada's Western University. The method employs data from magnetic resonance imaging to digitally render the hippocampus' three-dimensional fo...
30
Wearable Devices Could Use Your Breathing Patterns Like a Password
By Chris Stokel-Walker The way we breathe could keep wearables like headphones and smartwatches paired securely to your phone Delmaine Donson/Getty Images Wearable electronic devices, such as earphones and smartwatches, are currently paired to smartphones and similar tech through a secure Bluetooth or near-field commun...
Cleveland State University's Jafar Pourbemany and colleagues have developed a protocol that generates a 256-bit encryption key every few seconds based on the way a user breathes; the key can then be sent to a wearable device to keep the two in sync. The protocol employs a respiratory inductance plethysmography sensor t...
[]
[]
[]
scitechnews
None
None
None
None
Cleveland State University's Jafar Pourbemany and colleagues have developed a protocol that generates a 256-bit encryption key every few seconds based on the way a user breathes; the key can then be sent to a wearable device to keep the two in sync. The protocol employs a respiratory inductance plethysmography sensor t...
31
Like Babies Learning to Walk, Autonomous Vehicles Learn to Drive by Mimicking Others
Self-driving cars are powered by machine learning algorithms that require vast amounts of driving data in order to function safely. But if self-driving cars could learn to drive in the same way that babies learn to walk - by watching and mimicking others around them - they would require far less compiled driving data. ...
Engineers at Boston University aim to teach autonomous vehicles to drive safely by having them mimic others, similar to the way babies learn to walk. Their machine learning algorithm estimates the viewpoints and blind spots of other nearby cars to generate a bird's-eye-view of the surrounding environment, in order to h...
[]
[]
[]
scitechnews
None
None
None
None
Engineers at Boston University aim to teach autonomous vehicles to drive safely by having them mimic others, similar to the way babies learn to walk. Their machine learning algorithm estimates the viewpoints and blind spots of other nearby cars to generate a bird's-eye-view of the surrounding environment, in order to h...
33
Model Helps Map the Individual Variations of Mental Illness
The diagnosis of mental illnesses such as major depression, schizophrenia, or anxiety disorder is typically based on coarse groupings of symptoms. These symptoms, however, vary widely among individuals as do the brain circuits that cause them. This complexity explains why drug treatments work for some patients, but not...
Two new studies applied a novel computational psychiatry framework developed by Yale University scientists that maps individual variations of mental illness to neural circuits. One study employed advanced statistics to identify sets of symptoms that specify patients more accurately than traditional mental illness diagn...
[]
[]
[]
scitechnews
None
None
None
None
Two new studies applied a novel computational psychiatry framework developed by Yale University scientists that maps individual variations of mental illness to neural circuits. One study employed advanced statistics to identify sets of symptoms that specify patients more accurately than traditional mental illness diagn...
34
Scientists Invent Information Storage, Processing Device
Advance Holds Promise for Artificial Intelligence A team of scientists has developed a means to create a new type of memory, marking a notable breakthrough in the increasingly sophisticated field of artificial intelligence. "Quantum materials hold great promise for improving the capacities of today's computers," explai...
A team of scientists at New York University (NYU), the University of California, San Diego, and France's University of Paris-Saclay have created a method for engineering a new type of memory device. NYU's Andrew Kent said the research taps the properties of quantum materials to design "a new structure for computation."...
[]
[]
[]
scitechnews
None
None
None
None
A team of scientists at New York University (NYU), the University of California, San Diego, and France's University of Paris-Saclay have created a method for engineering a new type of memory device. NYU's Andrew Kent said the research taps the properties of quantum materials to design "a new structure for computation."...
35
AI Helps Improve NASA's Eyes on the Sun
U.S. National Aeronautics and Space Administration (NASA) scientists are calibrating images of the sun with artificial intelligence to enhance data for solar research. The Atmospheric Imagery Assembly (AIA) on NASA's Solar Dynamics Observatory captures this data, and requires regular calibration via sounding rockets to...
[]
[]
[]
scitechnews
None
None
None
None
U.S. National Aeronautics and Space Administration (NASA) scientists are calibrating images of the sun with artificial intelligence to enhance data for solar research. The Atmospheric Imagery Assembly (AIA) on NASA's Solar Dynamics Observatory captures this data, and requires regular calibration via sounding rockets to...
36
As Cyberattacks Surge, Security Startups Reap the Rewards
"We could have raised $1 billion in capital," Mr. Beri said. Recent cyberattacks around the world have taken down operations at gasoline pipelines , hospitals and grocery chains and potentially compromised some intelligence agencies. But they have been a bonanza for one group: cybersecurity start-ups. Investors have po...
Security startups have seen venture capital flooding in as cyberattacks ramp up. Research firm PitchBook estimates investors have injected over $12.2 billion into startups that offer cloud security, identify verification, and privacy protection so far this year, compared to $10.4 billion during all of 2020. Capital is ...
[]
[]
[]
scitechnews
None
None
None
None
Security startups have seen venture capital flooding in as cyberattacks ramp up. Research firm PitchBook estimates investors have injected over $12.2 billion into startups that offer cloud security, identify verification, and privacy protection so far this year, compared to $10.4 billion during all of 2020. Capital is ...
38
Q-CTRL, University of Sydney Devise ML Technique Used to Pinpoint Quantum Errors
July 29, 2021 - Researchers at the University of Sydney and quantum control startup Q-CTRL today announced a way to identify sources of error in quantum computers through machine learning, providing hardware developers the ability to pinpoint performance degradation with unprecedented accuracy and accelerate paths to u...
Researchers at Australia's University of Sydney (USYD) and quantum control startup Q-CTRL have designed a method of pinpointing quantum computing errors via machine learning (ML). The USYD team devised a means of recognizing the smallest divergences from the conditions necessary for executing quantum algorithms with tr...
[]
[]
[]
scitechnews
None
None
None
None
Researchers at Australia's University of Sydney (USYD) and quantum control startup Q-CTRL have designed a method of pinpointing quantum computing errors via machine learning (ML). The USYD team devised a means of recognizing the smallest divergences from the conditions necessary for executing quantum algorithms with tr...
39
Biden Directs Agencies to Develop Cybersecurity Standards for Critical Infrastructure
U.S. President Joe Biden this week directed federal agencies to formulate voluntary cybersecurity standards for managers of critical U.S. infrastructure, in the latest bid to strengthen national defenses against cyberattacks. In a new national security memo, Biden ordered the Department of Homeland Security (DHS) 's cy...
[]
[]
[]
scitechnews
None
None
None
None
U.S. President Joe Biden this week directed federal agencies to formulate voluntary cybersecurity standards for managers of critical U.S. infrastructure, in the latest bid to strengthen national defenses against cyberattacks. In a new national security memo, Biden ordered the Department of Homeland Security (DHS) 's cy...
40
Phone's Dark Mode Doesn't Necessarily Save Much Battery Life
When Android and Apple operating system updates started giving users the option to put their smartphones in dark mode, the feature showed potential for saving the battery life of newer phones with screens that allow darker-colored pixels to use less power than lighter-colored pixels. But dark mode is unlikely to make a...
Purdue University researchers found in a recent study that putting a smartphone in dark mode is unlikely to save significant battery life. The researchers built tools to measure more accurately how much power the phones' pixels draw, and examined six of the most-downloaded Android phone applications on Google Play; the...
[]
[]
[]
scitechnews
None
None
None
None
Purdue University researchers found in a recent study that putting a smartphone in dark mode is unlikely to save significant battery life. The researchers built tools to measure more accurately how much power the phones' pixels draw, and examined six of the most-downloaded Android phone applications on Google Play; the...
41
Stanford ML Tool Streamlines Student Feedback Process for Computer Science Professors
This past spring, Stanford University computer scientists unveiled their pandemic brainchild, Code In Place , a project where 1,000 volunteer teachers taught 10,000 students across the globe the content of an introductory Stanford computer science course. While the instructors could share their knowledge with hundreds,...
Stanford University researchers have developed and tested a machine learning (ML) teaching tool designed to assist computer science (CS) professors in gauging feedback from large numbers of students. The tool was developed for Stanford's Code In Place project, in which 1,000 volunteer teachers taught an introductory CS...
[]
[]
[]
scitechnews
None
None
None
None
Stanford University researchers have developed and tested a machine learning (ML) teaching tool designed to assist computer science (CS) professors in gauging feedback from large numbers of students. The tool was developed for Stanford's Code In Place project, in which 1,000 volunteer teachers taught an introductory CS...
42
First Test of Europe's Space Brain
The European Space Agency (ESA) operated a spacecraft successfully using a next-generation mission control system. Current missions are being converted to the European Ground System-Common Core (EGS-CC), which will function as the "brain" of all European spaceflight operations by 2025. Freely available to all European ...
[]
[]
[]
scitechnews
None
None
None
None
The European Space Agency (ESA) operated a spacecraft successfully using a next-generation mission control system. Current missions are being converted to the European Ground System-Common Core (EGS-CC), which will function as the "brain" of all European spaceflight operations by 2025. Freely available to all European ...
43
Malware Developers Turn to 'Exotic' Programming Languages to Thwart Researchers
Malware developers are increasingly turning to unusual or "exotic" programming languages to hamper analysis efforts, researchers say. According to a new report published by BlackBerry's Research & Intelligence team on Monday, there has been a recent "escalation" in the use of Go (Golang), D (DLang), Nim, and Rust, whic...
Cybersecurity service provider BlackBerry's Research & Intelligence team has found that malware developers are increasingly employing "exotic" coding languages to foil analysis. A report published by the team cited an "escalation" in the use of Go (Golang), D (DLang), Nim, and Rust to "try to evade detection by the sec...
[]
[]
[]
scitechnews
None
None
None
None
Cybersecurity service provider BlackBerry's Research & Intelligence team has found that malware developers are increasingly employing "exotic" coding languages to foil analysis. A report published by the team cited an "escalation" in the use of Go (Golang), D (DLang), Nim, and Rust to "try to evade detection by the sec...
44
Supercomputer-Generated Models Provide Better Understanding of Esophageal Disorders
Gastroesophageal reflux disease, more commonly known as GERD, impacts around 20 percent of U.S. citizens, according to the National Institutes of Health. If left untreated, GERD can lead to serious medical issues and sometimes esophageal cancer. Thanks to supercomputers, advances in imaging the swallowing process of GE...
Northwestern University researchers used the San Diego Supercomputing Center (SDSC) 's Comet and the Pittsburgh Supercomputing Center's Bridges-2 supercomputers to simulate the swallowing mechanism of gastroesophageal reflux disease, which affects about 20% of U.S. citizens. Their research yielded the FluoroMech comput...
[]
[]
[]
scitechnews
None
None
None
None
Northwestern University researchers used the San Diego Supercomputing Center (SDSC) 's Comet and the Pittsburgh Supercomputing Center's Bridges-2 supercomputers to simulate the swallowing mechanism of gastroesophageal reflux disease, which affects about 20% of U.S. citizens. Their research yielded the FluoroMech comput...
45
Smartphone Screens Sense Soil, Water Contamination
Researchers from the University of Cambridge have demonstrated how a typical touchscreen could be used to identify common ionic contaminants in soil or drinking water by dropping liquid samples on the screen, the first time this has been achieved. The sensitivity of the touchscreen sensor is comparable to typical lab-b...
A smartphone touchscreen could identify common ionic contaminants in soil or drinking water, according to researchers at the U.K.'s University of Cambridge. The team ran simulations, then validated them using a standalone touchscreen similar to those used in phones and tablets. The researchers deposited different liqui...
[]
[]
[]
scitechnews
None
None
None
None
A smartphone touchscreen could identify common ionic contaminants in soil or drinking water, according to researchers at the U.K.'s University of Cambridge. The team ran simulations, then validated them using a standalone touchscreen similar to those used in phones and tablets. The researchers deposited different liqui...
46
Disagreement May Make Online Content Spread Faster, Further
Disagreement seems to spread online posts faster and further than agreement, according to a new study from the University of Central Florida. The finding comes from an examination of posts labeled controversial on social news aggregation site Reddit. To perform the study, the researchers analyzed more than 47,000 posts...
An analysis of posts designated as controversial on social news aggregation site Reddit suggests disagreement may cause posts to spread faster, and to a greater extent. Scientists at the University of Central Florida (UCF) reviewed over 47,000 posts about cybersecurity in a Reddit dataset compiled by the U.S. Defense A...
[]
[]
[]
scitechnews
None
None
None
None
An analysis of posts designated as controversial on social news aggregation site Reddit suggests disagreement may cause posts to spread faster, and to a greater extent. Scientists at the University of Central Florida (UCF) reviewed over 47,000 posts about cybersecurity in a Reddit dataset compiled by the U.S. Defense A...
47
Less Chat Can Help Robots Make Better Decisions
New research that could help us use swarms of robots to tackle forest fires, conduct search and rescue operations at sea and diagnose problems inside the human body, has been published by engineers at the University of Sheffield.
Robot swarms could cooperate more effectively if communication among members of the swarm were curtailed, according to research by an international team led by engineers at the U.K.'s University of Sheffield. The research team analyzed how a swarm moved around and came to internal agreement on the best area to concentr...
[]
[]
[]
scitechnews
None
None
None
None
Robot swarms could cooperate more effectively if communication among members of the swarm were curtailed, according to research by an international team led by engineers at the U.K.'s University of Sheffield. The research team analyzed how a swarm moved around and came to internal agreement on the best area to concentr...
49
Cybersecurity Technique Keeps Hackers Guessing
ADELPHI, Md. -- Army researchers developed a new machine learning-based framework to enhance the security of computer networks inside vehicles without undermining performance. With the widespread prevalence of modern automobiles that entrust control to onboard computers, this research looks toward to a larger Army effo...
Development Command's Army Research Laboratory (ARL) has designed a machine learning-based framework to augment the security of in-vehicle computer networks. The DESOLATOR (deep reinforcement learning-based resource allocation and moving target defense deployment framework) framework is engineered to help an in-vehicle...
[]
[]
[]
scitechnews
None
None
None
None
Development Command's Army Research Laboratory (ARL) has designed a machine learning-based framework to augment the security of in-vehicle computer networks. The DESOLATOR (deep reinforcement learning-based resource allocation and moving target defense deployment framework) framework is engineered to help an in-vehicle...
50
How Olympic Tracking Systems Capture Athletic Performances
This year's Olympic Games may be closed to most spectators because of COVID-19, but the eyes of the world are still on the athletes thanks to dozens of cameras recording every leap, dive and flip. Among all that broadcasting equipment, track-and-field competitors might notice five extra cameras - the first step in a de...
This year's Olympic Games in Tokyo use an advanced three-dimensional (3D) tracking system that captures athletes' performances in fine detail. Intel's 3DAT system sends live camera footage to the cloud, where artificial intelligence (AI) uses deep learning to analyze an athlete's movements and identify key performance ...
[]
[]
[]
scitechnews
None
None
None
None
This year's Olympic Games in Tokyo use an advanced three-dimensional (3D) tracking system that captures athletes' performances in fine detail. Intel's 3DAT system sends live camera footage to the cloud, where artificial intelligence (AI) uses deep learning to analyze an athlete's movements and identify key performance ...
51
Gaming Graphics Card Allows Faster, More Precise Control of Fusion Energy Experiments
Engineering | News releases | Research | Science | Technology July 22, 2021 Nuclear fusion offers the potential for a safe, clean and abundant energy source. This process, which also occurs in the sun, involves plasmas, fluids composed of charged particles, being heated to extremely high temperatures so that the atoms ...
University of Washington (UW) scientists formulated a technique for using a gaming graphics card to control plasma formation in an experimental fusion reactor. The team utilized a Tesla graphics processing unit (GPU) from NVIDIA, which is engineered for machine learning applications. The card enabled the team to refine...
[]
[]
[]
scitechnews
None
None
None
None
University of Washington (UW) scientists formulated a technique for using a gaming graphics card to control plasma formation in an experimental fusion reactor. The team utilized a Tesla graphics processing unit (GPU) from NVIDIA, which is engineered for machine learning applications. The card enabled the team to refine...
52
Wearable Camera Reduces Collision Risk for Blind, Visually Impaired
July 22 (UPI) -- A wearable computer vision device may help reduce collisions and other accidents in the blind and visually impaired, a study published Thursday by JAMA Ophthalmology found. When used in combination with a long cane or guide dog, the technology, which detects nearby movement and objects with an on-board...
A wearable computer vision device developed by Harvard Medical School scientists may help reduce collisions and other accidents for the blind and visually impaired. The device includes a data recording unit enclosed in a sling backpack with a camera on the strap, and two Bluetooth-connected wristbands. The researchers ...
[]
[]
[]
scitechnews
None
None
None
None
A wearable computer vision device developed by Harvard Medical School scientists may help reduce collisions and other accidents for the blind and visually impaired. The device includes a data recording unit enclosed in a sling backpack with a camera on the strap, and two Bluetooth-connected wristbands. The researchers ...
53
Bipedal Robot Learns to Run, Completes 5K
CORVALLIS, Ore. - Cassie the robot, invented at Oregon State University and produced by OSU spinout company Agility Robotics, has made history by traversing 5 kilometers , completing the route in just over 53 minutes. Cassie was developed under the direction of robotics professor Jonathan Hurst with a 16-month, $1 mill...
An untethered bipedal robot completed a five-kilometer (3.10-mile) run in just over 53 minutes. The Cassie robot, engineered by Oregon State University (OSU) researchers and built by OSU spinout company Agility Robotics, is the first bipedal robot to use machine learning to maintain a running gait on outdoor terrain. T...
[]
[]
[]
scitechnews
None
None
None
None
An untethered bipedal robot completed a five-kilometer (3.10-mile) run in just over 53 minutes. The Cassie robot, engineered by Oregon State University (OSU) researchers and built by OSU spinout company Agility Robotics, is the first bipedal robot to use machine learning to maintain a running gait on outdoor terrain. T...
54
Lost in L.A.? Fire Department Can Find You with What3words Location Technology
The Los Angeles Fire Department (LAFD) has entered into a partnership with digital location startup What3words, which assigns a unique three-word name to each of 57 billion 10-foot-square spots on Earth. The department had been testing the application since last year, using it to locate places that emergency crews need...
[]
[]
[]
scitechnews
None
None
None
None
The Los Angeles Fire Department (LAFD) has entered into a partnership with digital location startup What3words, which assigns a unique three-word name to each of 57 billion 10-foot-square spots on Earth. The department had been testing the application since last year, using it to locate places that emergency crews need...
55
High-Speed Projectors Power Virtual Air Hockey With Shape-Changing Paddles
If you've spent any time at a modern arcade you've probably seen air hockey tables upgraded with glowing pucks and paddles that make the game more visually appealing. Researchers from Tohoku University in Japan have taken those upgrades one step further in a version of air hockey that replaces the pucks and paddles wit...
Scientists at Japan's Tohoku University have invented a virtual version of air hockey that uses shapeshifting virtual projections of paddles and pucks. The MetamorHockey system replaces the traditional air hockey table surface with a semi-transparent rear-projection screen, which enables an underside projection to show...
[]
[]
[]
scitechnews
None
None
None
None
Scientists at Japan's Tohoku University have invented a virtual version of air hockey that uses shapeshifting virtual projections of paddles and pucks. The MetamorHockey system replaces the traditional air hockey table surface with a semi-transparent rear-projection screen, which enables an underside projection to show...
56
QR Codes Are Here to Stay. So Is the Tracking They Allow.
Restaurants that use QR code menus can save 30 percent to 50 percent on labor costs by reducing or eliminating the need for servers to take orders and collect payments, said Tom Sharon, a co-founder of Cheqout. Digital menus also make it easier to persuade people to spend more with offers to add fries or substitute mor...
Quick response (QR) codes that facilitate touchless transactions have become a permanent part of life, adopted by many varieties of commercial establishments. QR codes can store digital data including when, where, and how often a code-scan occurs, enabling businesses to integrate more tracking, targeting, and analytics...
[]
[]
[]
scitechnews
None
None
None
None
Quick response (QR) codes that facilitate touchless transactions have become a permanent part of life, adopted by many varieties of commercial establishments. QR codes can store digital data including when, where, and how often a code-scan occurs, enabling businesses to integrate more tracking, targeting, and analytics...
57
Flexible Computer Processor Is Most Powerful Plastic Chip Yet
The newest processor from U.K. chip designer Arm reportedly can be printed directly onto paper, cardboard, or cloth. Arm's James Myers said the 32-bit PlasticARM chip can run various applications, although it presently uses read-only memory, and so can only execute the code with which it was built. The processor featur...
[]
[]
[]
scitechnews
None
None
None
None
The newest processor from U.K. chip designer Arm reportedly can be printed directly onto paper, cardboard, or cloth. Arm's James Myers said the 32-bit PlasticARM chip can run various applications, although it presently uses read-only memory, and so can only execute the code with which it was built. The processor featur...
58
Companies Beef Up AI Models with Synthetic Data
Companies rely on real-world data to train artificial-intelligence models that can identify anomalies, make predictions and generate insights. But often, it isn't enough. To detect credit-card fraud, for example, researchers train AI models to look for specific patterns of known suspicious behavior, gleaned from troves...
Companies are building synthetic datasets when real-world data is unavailable to train artificial intelligence (AI) models to identify anomalies. Dmitry Efimov at American Express (Amex) said researchers have spent several years researching synthetic data in order to enhance the credit-card company's AI-based fraud-det...
[]
[]
[]
scitechnews
None
None
None
None
Companies are building synthetic datasets when real-world data is unavailable to train artificial intelligence (AI) models to identify anomalies. Dmitry Efimov at American Express (Amex) said researchers have spent several years researching synthetic data in order to enhance the credit-card company's AI-based fraud-det...
59
Extracting More Accurate Data From Images Degraded by Rain, Nighttime, Crowded Conditions
Novel computer vision and human pose estimation methods can extract more accurate data from videos obscured by visibility issues and crowding, according to an international team of scientists led by researchers at the Yale-National University of Singapore College. The research team used two deep learning algorithms to ...
[]
[]
[]
scitechnews
None
None
None
None
Novel computer vision and human pose estimation methods can extract more accurate data from videos obscured by visibility issues and crowding, according to an international team of scientists led by researchers at the Yale-National University of Singapore College. The research team used two deep learning algorithms to ...
61
Ancient Printer Security Bug Affects Millions of Devices Worldwide
Cybersecurity researchers have helped patch a privilege escalation vulnerability in the printer driver for HP , Samsung, and Xerox printers that managed to evade detection for 16 years. SentinelOne, which unearthed the high severity vulnerability, believes it has been present since 2005, and likely affects millions of ...
Cybersecurity researchers at SentinelOne have identified a highly severe privilege escalation vulnerability in HP, Samsung, and Xerox printer drivers. The vulnerability appears to have been present since 2005. The researchers said millions of devices and users worldwide likely have been impacted by the buffer overflow ...
[]
[]
[]
scitechnews
None
None
None
None
Cybersecurity researchers at SentinelOne have identified a highly severe privilege escalation vulnerability in HP, Samsung, and Xerox printer drivers. The vulnerability appears to have been present since 2005. The researchers said millions of devices and users worldwide likely have been impacted by the buffer overflow ...
63
Test of Time Award Bestowed for Data Privacy Paper
UNIVERSITY PARK, Pa. - A 2011 paper on data privacy co-authored by Dan Kifer, professor of computer science and engineering at Penn State, received the 2021 Association for Computing Machinery's Special Interest Group on Management of Data (ACM SIGMOD) Test of Time award . The paper, No Free Lunch in Data Privacy , was...
ACM's Special Interest Group on Management of Data (SIGMOD) has named Dan Kifer, professor of computer science and engineering at Pennsylvania State University, and Duke University's Ashwin Machanavajjhala, recipients of its 2021 Test of Time award. The 2011 paper explored how an individual's information can be incorpo...
[]
[]
[]
scitechnews
None
None
None
None
ACM's Special Interest Group on Management of Data (SIGMOD) has named Dan Kifer, professor of computer science and engineering at Pennsylvania State University, and Duke University's Ashwin Machanavajjhala, recipients of its 2021 Test of Time award. The 2011 paper explored how an individual's information can be incorpo...
64
Russia Disconnects from Internet in Tests as It Bolsters Security
MOSCOW, July 22 (Reuters) - Russia managed to disconnect itself from the global internet during tests in June and July, the RBC daily reported on Thursday, citing documents from the working group tasked with improving Russia's internet security. Russia adopted legislation, known as the "sovereign internet" law, in late...
Russia reportedly disconnected from the global Internet during tests in June and July, according to a report by the RBC daily that cited documents from the working group responsible for strengthening Russia's Internet security under the 2019 "sovereign Internet" law, which aims to prevent Russia from being cut off from...
[]
[]
[]
scitechnews
None
None
None
None
Russia reportedly disconnected from the global Internet during tests in June and July, according to a report by the RBC daily that cited documents from the working group responsible for strengthening Russia's Internet security under the 2019 "sovereign Internet" law, which aims to prevent Russia from being cut off from...
65
Simulator Helps Robots Sharpen Their Cutting Skills
Researchers from the USC's Department of Computer Science and NVIDIA have unveiled a new simulator for robotic cutting that can accurately reproduce the forces acting on a knife as it slices through common food, such as fruit and vegetables. The system could also simulate cutting through human tissue, offering potentia...
A new robotic cutting simulator developed by researchers at the University of Southern California (USC) and NVIDIA replicates the forces acting on a knife slicing through foods. To simulate cutting, the researchers put springs between the two halves of the object being cut, represented by mesh; over time, the springs a...
[]
[]
[]
scitechnews
None
None
None
None
A new robotic cutting simulator developed by researchers at the University of Southern California (USC) and NVIDIA replicates the forces acting on a knife slicing through foods. To simulate cutting, the researchers put springs between the two halves of the object being cut, represented by mesh; over time, the springs a...
66
A Smart City Future for Virginia's Amazon HQ2 Neighborhood
Developer JBG Smith has partnered with AT&T to build the first "smart city at scale" in National Landing in northern Virginia. The plans include building a 5G network from the ground up in a four-mile zone featuring office, residential, and retail space, as well as Amazon's new second headquarters. The 5G network would...
[]
[]
[]
scitechnews
None
None
None
None
Developer JBG Smith has partnered with AT&T to build the first "smart city at scale" in National Landing in northern Virginia. The plans include building a 5G network from the ground up in a four-mile zone featuring office, residential, and retail space, as well as Amazon's new second headquarters. The 5G network would...
67
TSA Issues Cybersecurity Rules for Pipeline Companies
A U.S. Transportation Security Administration (TSA) directive imposes new rules requiring pipeline operators to strengthen their cyberdefenses. The order coincides with the first-ever disclosure by the Department of Homeland Security and the Federal Bureau of Investigation that Chinese state-sponsored hackers targeted ...
[]
[]
[]
scitechnews
None
None
None
None
A U.S. Transportation Security Administration (TSA) directive imposes new rules requiring pipeline operators to strengthen their cyberdefenses. The order coincides with the first-ever disclosure by the Department of Homeland Security and the Federal Bureau of Investigation that Chinese state-sponsored hackers targeted ...
68
Training Computers to Transfer Music from One Style to Another
Can artificial intelligence enable computers to translate a musical composition between musical styles - e.g., from pop to classical or to jazz? According to a professor of music at UC San Diego and a high school student, they have developed a machine learning tool that does just that. "People are more familiar with ma...
Translating musical compositions between styles is possible via the ChordGAN tool developed by the University of California, San Diego (UCSD) 's Shlomo Dubnov and Redmond, WA, high school senior Conan Lu. ChordGAN is a conditional generative adversarial network (GAN) framework that uses chroma sampling, which only reco...
[]
[]
[]
scitechnews
None
None
None
None
Translating musical compositions between styles is possible via the ChordGAN tool developed by the University of California, San Diego (UCSD) 's Shlomo Dubnov and Redmond, WA, high school senior Conan Lu. ChordGAN is a conditional generative adversarial network (GAN) framework that uses chroma sampling, which only reco...
70
A Metric for Designing Safer Streets
A new study published in Accident Analysis & Prevention shows how biometric data can be used to find potentially challenging and dangerous areas of urban infrastructure before a crash occurs. Lead author Megan Ryerson led a team of researchers in the Stuart Weitzman School of Design and the School of Engineering and Ap...
A study by University of Pennsylvania (Penn) researchers demonstrated that biometric data can identify potentially problematic and hazardous components of urban infrastructure prior to their involvement in collisions. The team's approach involved assessing the effect of different infrastructure designs on the cognitive...
[]
[]
[]
scitechnews
None
None
None
None
A study by University of Pennsylvania (Penn) researchers demonstrated that biometric data can identify potentially problematic and hazardous components of urban infrastructure prior to their involvement in collisions. The team's approach involved assessing the effect of different infrastructure designs on the cognitive...
71
Fujitsu Uses Quantum-Inspired Algorithm to Tackle Space Waste
The University of Glasgow has worked with Fujitsu and satellite service and sustainability firm Astroscale on a quantum-inspired project to remove space debris. The project, carried out as part of the UK Space Agency grant , Advancing research into space surveillance and tracking , was developed over six months. It mak...
Researchers at the U.K.'s University of Glasgow, Fujitsu, and the satellite service and sustainability firm Astroscale together developed an artificial neural network (ANN) -based rapid trajectory design algorithm to address the removal of space debris. Powered by Fujitsu's Digital Annealer, the quantum-inspired system...
[]
[]
[]
scitechnews
None
None
None
None
Researchers at the U.K.'s University of Glasgow, Fujitsu, and the satellite service and sustainability firm Astroscale together developed an artificial neural network (ANN) -based rapid trajectory design algorithm to address the removal of space debris. Powered by Fujitsu's Digital Annealer, the quantum-inspired system...
73
Dubai Police Will Use Citywide Network of Drones to Respond to Crime
Dubai is creating a network of pre-positioned drone bases so police can respond to incidents with drones anywhere in the city within a minute, down from 4.4 minutes currently. Israel's Airobotics will supply the quadcopters, which will operate from the base stations beginning in October, during Expo 2020 Dubai. The dro...
[]
[]
[]
scitechnews
None
None
None
None
Dubai is creating a network of pre-positioned drone bases so police can respond to incidents with drones anywhere in the city within a minute, down from 4.4 minutes currently. Israel's Airobotics will supply the quadcopters, which will operate from the base stations beginning in October, during Expo 2020 Dubai. The dro...
74
Hackers Got Past Windows Hello by Tricking Webcam
Biometric authentication is a key piece of the tech industry's plans to make the world password-less . But a new method for duping Microsoft's Windows Hello facial-recognition system shows that a little hardware fiddling can trick the system into unlocking when it shouldn't. Services like Apple's FaceID have made facia...
Researchers at the security firm CyberArk uncovered a security feature bypass vulnerability in Microsoft's Windows Hello facial-recognition system that permitted them to manipulate a USB webcam to unlock a Windows Hello-protected device. CyberArk's Omer Tsarfati said, "We created a full map of the Windows Hello facial-...
[]
[]
[]
scitechnews
None
None
None
None
Researchers at the security firm CyberArk uncovered a security feature bypass vulnerability in Microsoft's Windows Hello facial-recognition system that permitted them to manipulate a USB webcam to unlock a Windows Hello-protected device. CyberArk's Omer Tsarfati said, "We created a full map of the Windows Hello facial-...
75
Public Database of AI-Predicted Protein Structures Could Transform Biology
A team of researchers says it has used a new artificial intelligence (AI) algorithm to forecast the three-dimensional structures of 350,000 proteins from humans and 20 model organisms. The team at U.K.-based AI developer DeepMind (which is owned by Alphabet, the parent of Google) developed the AlphaFold computer model,...
[]
[]
[]
scitechnews
None
None
None
None
A team of researchers says it has used a new artificial intelligence (AI) algorithm to forecast the three-dimensional structures of 350,000 proteins from humans and 20 model organisms. The team at U.K.-based AI developer DeepMind (which is owned by Alphabet, the parent of Google) developed the AlphaFold computer model,...
76
Total Artificial Heart Successfully Transplanted in U.S.
Surgeons at the Duke University Hospital recently transplanted a total artificial heart (TAH) into a 39-year-old man who experienced sudden heart failure. Unlike conventional artificial hearts , this TAH mimics the human heart and provides the recipient more independence after the surgery, the university said in a pres...
Duke University Hospital surgeons successfully transplanted a total artificial heart (TAH) developed by France's CARMAT into a 39-year-old patient who had suffered sudden heart failure. The TAH both resembles and functions like the human heart. Actuator fluid carried in a bag outside the body is responsible for the hea...
[]
[]
[]
scitechnews
None
None
None
None
Duke University Hospital surgeons successfully transplanted a total artificial heart (TAH) developed by France's CARMAT into a 39-year-old patient who had suffered sudden heart failure. The TAH both resembles and functions like the human heart. Actuator fluid carried in a bag outside the body is responsible for the hea...
77
Kaseya Gets Master Decryption Key After July 4 Global Attack
Florida-based software supplier Kaseya has obtained a universal key that will decrypt all businesses and public organizations crippled in the July 4 global ransomware attack. The Russia-affiliated REvil syndicate released the malware, which exploited Kaseya's software and immobilized more than 1,000 targets. Kaseya spo...
[]
[]
[]
scitechnews
None
None
None
None
Florida-based software supplier Kaseya has obtained a universal key that will decrypt all businesses and public organizations crippled in the July 4 global ransomware attack. The Russia-affiliated REvil syndicate released the malware, which exploited Kaseya's software and immobilized more than 1,000 targets. Kaseya spo...
79
Algorithm Flies Drones Faster Than Human Pilots
To be useful, drones need to be quick. Because of their limited battery life they must complete whatever task they have - searching for survivors on a disaster site, inspecting a building, delivering cargo - in the shortest possible time. And they may have to do it by going through a series of waypoints like windows, r...
An autonomously flying quadrotor drone has for the first time outraced human pilots, using a novel algorithm designed by researchers at Switzerland's University of Zurich (UZH). The algorithm calculates the fastest trajectories for the aircraft and guides it through a series of waypoints on a circuit. UZH's Davide Scar...
[]
[]
[]
scitechnews
None
None
None
None
An autonomously flying quadrotor drone has for the first time outraced human pilots, using a novel algorithm designed by researchers at Switzerland's University of Zurich (UZH). The algorithm calculates the fastest trajectories for the aircraft and guides it through a series of waypoints on a circuit. UZH's Davide Scar...
81
U.K. Companies Lead Expansion in Quantum Computing
LONDON, July 20 (Reuters) - More than 80% of large companies in Britain are scaling up their quantum computing capabilities, making the country a leader in deploying the nascent technology to solve complex problems, according to research by Accenture (ACN.N) . In the past couple of years the technology has started to m...
Multinational professional consultancy Accenture said, based on its research, that over 80% of large U.K. companies are expanding their quantum computing capabilities. Accenture Technology's Maynard Williams said the pandemic had forced companies to adopt technology more quickly and to be more willing to innovate. Acce...
[]
[]
[]
scitechnews
None
None
None
None
Multinational professional consultancy Accenture said, based on its research, that over 80% of large U.K. companies are expanding their quantum computing capabilities. Accenture Technology's Maynard Williams said the pandemic had forced companies to adopt technology more quickly and to be more willing to innovate. Acce...
82
Water-Powered Robotic Hand Can Play Super Mario Bros
By Matthew Sparkes This 3D-printed robot hand can play Mario University of Maryland A 3D-printed robotic hand controlled by pressurised water can complete the first level of classic computer game Super Mario Bros in less than 90 seconds. Ryan Sochol and his team at the University of Maryland 3D-printed the hand in a si...
University of Maryland (UMD) researchers used three-dimensional (3D) printing to produce a water-controlled robotic hand capable of completing the first level of the computer game Super Mario Bros in less than 90 seconds. The hand is composed of hard plastic, a rubbery polymer, and a water-soluble "sacrificial" materia...
[]
[]
[]
scitechnews
None
None
None
None
University of Maryland (UMD) researchers used three-dimensional (3D) printing to produce a water-controlled robotic hand capable of completing the first level of the computer game Super Mario Bros in less than 90 seconds. The hand is composed of hard plastic, a rubbery polymer, and a water-soluble "sacrificial" materia...
83
Algorithm May Help Autonomous Vehicles Navigate Narrow, Crowded Streets
It is a scenario familiar to anyone who has driven down a crowded, narrow street. Parked cars line both sides, and there isn't enough space for vehicles traveling in both directions to pass each other. One has to duck into a gap in the parked cars or slow and pull over as far as possible for the other to squeeze by. Dr...
An algorithm developed by researchers at Carnegie Mellon University (CMU) could enable autonomous vehicles to navigate crowded, narrow streets where vehicles traveling in opposite directions do not have enough space to pass each other and there is no knowledge about what the other driver may do. Such a scenario require...
[]
[]
[]
scitechnews
None
None
None
None
An algorithm developed by researchers at Carnegie Mellon University (CMU) could enable autonomous vehicles to navigate crowded, narrow streets where vehicles traveling in opposite directions do not have enough space to pass each other and there is no knowledge about what the other driver may do. Such a scenario require...
84
Will AI Grade Your Next Test?
This spring, Philips Pham was among the more than 12,000 people in 148 countries who took an online class called Code in Place. Run by Stanford University, the course taught the fundamentals of computer programming. Four weeks in, Mr. Pham, a 23-year-old student living at the southern tip of Sweden, typed his way throu...
Stanford University researchers have developed an artificial intelligence (AI) system designed to provide automated feedback to students taking the online Code in Place course. The researchers trained a neural network to analyze computer code using examples from a decade's worth of midterm exams featuring programming e...
[]
[]
[]
scitechnews
None
None
None
None
Stanford University researchers have developed an artificial intelligence (AI) system designed to provide automated feedback to students taking the online Code in Place course. The researchers trained a neural network to analyze computer code using examples from a decade's worth of midterm exams featuring programming e...
85
Crypto Experts in Demand as Countries Launch Digital Currencies
Demand for cryptocurrency consultants continues to grow as countries accelerate efforts to launch their own digital tenders. For example, Israeli crypto consultant Barak Ben-Ezer designed the SOV (sovereign), a bitcoin-like tradable cryptocurrency, for the Marshall Islands archipelago nation. China has jumpstarted othe...
[]
[]
[]
scitechnews
None
None
None
None
Demand for cryptocurrency consultants continues to grow as countries accelerate efforts to launch their own digital tenders. For example, Israeli crypto consultant Barak Ben-Ezer designed the SOV (sovereign), a bitcoin-like tradable cryptocurrency, for the Marshall Islands archipelago nation. China has jumpstarted othe...
86
iPhone Security No Match for NSO Spyware
Spyware made by Israeli surveillance company NSO has been used to hack Apple iPhones without users' knowledge. An international probe uncovered 23 Apple devices compromised by Pegasus spyware, which circumvented their security systems and installed malware. The hacked smartphones included an iPhone 12 with the latest A...
[]
[]
[]
scitechnews
None
None
None
None
Spyware made by Israeli surveillance company NSO has been used to hack Apple iPhones without users' knowledge. An international probe uncovered 23 Apple devices compromised by Pegasus spyware, which circumvented their security systems and installed malware. The hacked smartphones included an iPhone 12 with the latest A...
87
Researchers Pulling Movements from Microfilm with Digital History
Four years into World War II, 7,434 Black soldiers from 60 domestic units sat down to Survey 32. It was one of over 200 surveys administered by social and behavioral scientists assigned to gather feedback on morale and the efficiency of the Army, for the organization's research branch. But Survey 32 was focused primari...
Virginia Polytechnic Institute and State University (Virginia Tech) historians and computer scientists are using digital technologies to bring archived historic content to life for public access. Their goal is to provide technology-enhanced experiences for users, to enable them to control interactive platforms that can...
[]
[]
[]
scitechnews
None
None
None
None
Virginia Polytechnic Institute and State University (Virginia Tech) historians and computer scientists are using digital technologies to bring archived historic content to life for public access. Their goal is to provide technology-enhanced experiences for users, to enable them to control interactive platforms that can...
88
Computer Science Professor Wins 'Test of Time' Award for Influential Paper
Shang-Hua Teng , a University Professor and Seely G. Mudd Professor of Computer Science and Mathematics, has been honored with a Symposium on Theory of Computing (STOC) Test of Time Award . Teng, with Daniel A. Spielman of Yale University, received the award from the ACM Special Interest Group on Algorithms and Computa...
ACM's Special Interest Group on Algorithms and Computation Theory named the University of Southern California Viterbi School of Engineering Seely G. Mudd Professor of Computer Science and Mathematics Shang-Hua Teng, and his collaborator, Yale University professor of applied mathematics and computer science Daniel A. Sp...
[]
[]
[]
scitechnews
None
None
None
None
ACM's Special Interest Group on Algorithms and Computation Theory named the University of Southern California Viterbi School of Engineering Seely G. Mudd Professor of Computer Science and Mathematics Shang-Hua Teng, and his collaborator, Yale University professor of applied mathematics and computer science Daniel A. Sp...
89
China Spy Agency Blamed by U.S., Others of Using Contract Hackers
U.S. President Joe Biden said he expected to receive a report Tuesday detailing how China's Ministry of State Security has employed contract hackers to hold U.S. businesses hostage with ransomware. This follows the Biden administration's public accusation that Beijing is conducting unsanctioned cyber operations worldwi...
[]
[]
[]
scitechnews
None
None
None
None
U.S. President Joe Biden said he expected to receive a report Tuesday detailing how China's Ministry of State Security has employed contract hackers to hold U.S. businesses hostage with ransomware. This follows the Biden administration's public accusation that Beijing is conducting unsanctioned cyber operations worldwi...
92
Contact-Aware Robot Design
Adequate biomimicry in robotics necessitates a delicate balance between design and control, an integral part of making our machines more like us. Advanced dexterity in humans is wrapped up in a long evolutionary tale of how our fists of fury evolved to accomplish complex tasks. With machines, designing a new robotic ma...
A system developed by Massachusetts Institute of Technology (MIT) researchers uses software to optimize the shape and control of a robotic manipulator for a specific task. After manipulating the design and simulating the robot manipulator performing a task, the system assigns an optimization score to assess its design ...
[]
[]
[]
scitechnews
None
None
None
None
A system developed by Massachusetts Institute of Technology (MIT) researchers uses software to optimize the shape and control of a robotic manipulator for a specific task. After manipulating the design and simulating the robot manipulator performing a task, the system assigns an optimization score to assess its design ...
93
Algorithm May Help Scientists Demystify Complex Networks
UNIVERSITY PARK, Pa. - From biochemical reactions that produce cancers, to the latest memes virally spreading across social media, simple actions can generate complex behaviors. For researchers trying to understand these emergent behaviors, however, the complexity can tax current computational methods. Now, a team of r...
A new algorithm capable of analyzing models of biological systems can lead to greater understanding of their underlying decision-making mechanisms, with implications for studying how complex behaviors are rooted in relatively simple actions. Pennsylvania State University (Penn State) 's Jordan Rozum said the modeling f...
[]
[]
[]
scitechnews
None
None
None
None
A new algorithm capable of analyzing models of biological systems can lead to greater understanding of their underlying decision-making mechanisms, with implications for studying how complex behaviors are rooted in relatively simple actions. Pennsylvania State University (Penn State) 's Jordan Rozum said the modeling f...
94
Platform Allows Autonomous Vehicles to Safely Drive at Small Distances
Vehicle automation has become an important topic in recent years. It is aimed towards mitigating driver-induced traffic accidents, improving the road capacity of the existing infrastructure as well as reducing fuel consumption. Two major classes of automated vehicles can be distinguished. The first are cooperative vehi...
A Ph.D. student at the Eindhoven University of Technology in the Netherlands, Robbin van Hoek, has integrated the benefits of cooperative and autonomous vehicles into a single platform. Cooperative vehicles exchange motion data via vehicle-to-vehicle or vehicle-to-infrastructure communication, but generally can perform...
[]
[]
[]
scitechnews
None
None
None
None
A Ph.D. student at the Eindhoven University of Technology in the Netherlands, Robbin van Hoek, has integrated the benefits of cooperative and autonomous vehicles into a single platform. Cooperative vehicles exchange motion data via vehicle-to-vehicle or vehicle-to-infrastructure communication, but generally can perform...
95
Rats Took Over This Pacific Island. Now Drones Are Leading the Fightback
When the people who would become the first Polynesian islanders ventured out into the remote Pacific some 3,000 years ago, they took three main animals with them; pigs, chickens, and dogs. Expanding their territory over the next few thousand years, from New Zealand north to Hawaii and east to Easter Islands, the Polyne...
The conservation group Island Conservation plans to use drones to try to eliminate rats on Tetiaroa atoll and two other islands in French Polynesia, beginning in August. Hexacopter (six-rotor) drones from New Zealand's Envico Technologies will be used to drop 30 tons of rat poison on the islands over a two-week period....
[]
[]
[]
scitechnews
None
None
None
None
The conservation group Island Conservation plans to use drones to try to eliminate rats on Tetiaroa atoll and two other islands in French Polynesia, beginning in August. Hexacopter (six-rotor) drones from New Zealand's Envico Technologies will be used to drop 30 tons of rat poison on the islands over a two-week period....
96
Tool to Explore Billions of Social Media Messages Could Predict Political, Financial Turmoil
Researchers at the University of Vermont (UVM), Charles River Analytics, and MassMutual Data Science (the data science unit of the Massachusetts Mutual Life Insurance Company) have developed an online tool that uncovers the stories within the billions of Twitter posts made since 2008. The Storywrangler, powered by UVM'...
[]
[]
[]
scitechnews
None
None
None
None
Researchers at the University of Vermont (UVM), Charles River Analytics, and MassMutual Data Science (the data science unit of the Massachusetts Mutual Life Insurance Company) have developed an online tool that uncovers the stories within the billions of Twitter posts made since 2008. The Storywrangler, powered by UVM'...
97
GPUs Can Now Analyze a Billion Complex Vectors in Record Time
The complexity of a digital photo cannot be understated. Each pixel comprises many data points, and there can be millions of pixels in just a single photo. These many data points in relation to each other are referred to as "high-dimensional" data and can require immense computing power to analyze, say if you were sear...
Researchers at Facebook AI Research have developed an approach to leverage graphical processing units (GPUs) for the analysis of high-dimensional media. The researchers developed an algorithm that enables GPUs to host and analyze a library of vectors, and employed a technique that compresses vector databases so the GPU...
[]
[]
[]
scitechnews
None
None
None
None
Researchers at Facebook AI Research have developed an approach to leverage graphical processing units (GPUs) for the analysis of high-dimensional media. The researchers developed an algorithm that enables GPUs to host and analyze a library of vectors, and employed a technique that compresses vector databases so the GPU...
99
Air-Powered Computer Memory Helps Soft Robot Control Movements
Engineers at UC Riverside have unveiled an air-powered computer memory that can be used to control soft robots. The innovation overcomes one of the biggest obstacles to advancing soft robotics: the fundamental mismatch between pneumatics and electronics. The work is published in the open-access journal, PLOS One. Pneum...
A new air-powered computer memory can be utilized to control soft robots, thanks to engineers at the University of California, Riverside (UC Riverside). The researchers designed an 8-bit pneumatic random-access memory (RAM) chip that substituted microfluidic valves for electronic transistors. The valves stay sealed aga...
[]
[]
[]
scitechnews
None
None
None
None
A new air-powered computer memory can be utilized to control soft robots, thanks to engineers at the University of California, Riverside (UC Riverside). The researchers designed an 8-bit pneumatic random-access memory (RAM) chip that substituted microfluidic valves for electronic transistors. The valves stay sealed aga...
101
As Spain's Beaches Fill Up, Seaside Resort Sends in Drones
Officials in the town of Sitges in northeastern Spain are using drones for real-time crowd monitoring along 18 km of beach as COVID-19 cases rise. Ricardo Monje of Annunzia, the company that developed the project, said, "We can take photos, pass them through some software and with the software we can count how many peo...
[]
[]
[]
scitechnews
None
None
None
None
Officials in the town of Sitges in northeastern Spain are using drones for real-time crowd monitoring along 18 km of beach as COVID-19 cases rise. Ricardo Monje of Annunzia, the company that developed the project, said, "We can take photos, pass them through some software and with the software we can count how many peo...
103
How Germany Hopes to Get the Edge in Driverless Technology
FRANKFURT - In Hamburg, a fleet of electric Volkswagen vans owned by a ride-hailing service roams the streets picking up and dropping off passengers. The vehicles steer themselves, but technicians working from a remote control center keep an eye on their progress with the help of video monitors. If anything goes wrong,...
A new law awaiting the signature of Germany's president would make driverless cars legal and allow companies to begin making money from autonomous driving services. However, the law requires humans to provide oversight for autonomous vehicles, and mandates these vehicles operate in approved, defined spaces. The law cov...
[]
[]
[]
scitechnews
None
None
None
None
A new law awaiting the signature of Germany's president would make driverless cars legal and allow companies to begin making money from autonomous driving services. However, the law requires humans to provide oversight for autonomous vehicles, and mandates these vehicles operate in approved, defined spaces. The law cov...
104
AI System Developed to Diagnose Heart Problems
Researchers at the Technion - Israel Institute of Technology have developed an artificial intelligence (AI) system that can diagnose cardiac issues based on hundreds of electrocardiograms (ECG). The AI system uses an augmented neural network trained on more than 1.5 million ECG tests on hundreds of patients worldwide. ...
[]
[]
[]
scitechnews
None
None
None
None
Researchers at the Technion - Israel Institute of Technology have developed an artificial intelligence (AI) system that can diagnose cardiac issues based on hundreds of electrocardiograms (ECG). The AI system uses an augmented neural network trained on more than 1.5 million ECG tests on hundreds of patients worldwide. ...
105
Google to Help Insurers Measure Slip-and-Fall Risks in Buildings
Cloud computing services platform Google Cloud and building instrumentation company BlueZoo have partnered to help small-business insurers more accurately quantify slip-and-fall and other accident risks in buildings. BlueZoo will deploy sensors in buildings that will listen for Wi-Fi probes emitted by mobile phones, an...
[]
[]
[]
scitechnews
None
None
None
None
Cloud computing services platform Google Cloud and building instrumentation company BlueZoo have partnered to help small-business insurers more accurately quantify slip-and-fall and other accident risks in buildings. BlueZoo will deploy sensors in buildings that will listen for Wi-Fi probes emitted by mobile phones, an...
106
First 3D-Printed Steel Bridge Opens in Amsterdam
By Matthew Sparkes A 3D-printed bridge has been installed in Amsterdam Adriaan De Groot The first ever 3D-printed steel bridge has opened in Amsterdam, the Netherlands. It was created by robotic arms using welding torches to deposit the structure of the bridge layer by layer, and is made of 4500 kilograms of stainless ...
The world's first three-dimensionally (3D) -printed stainless steel bridge has opened to pedestrians and cyclists in Amsterdam. Deposited in layers by robot arms with welding torches over six months, the 12-meter (39-foot) -long MX3D Bridge spans the Oudezijds Achterburgwal canal. Sensors attached to the structure will...
[]
[]
[]
scitechnews
None
None
None
None
The world's first three-dimensionally (3D) -printed stainless steel bridge has opened to pedestrians and cyclists in Amsterdam. Deposited in layers by robot arms with welding torches over six months, the 12-meter (39-foot) -long MX3D Bridge spans the Oudezijds Achterburgwal canal. Sensors attached to the structure will...
107
iOS Zero-Day Let SolarWinds Hackers Compromise Fully Updated iPhones
The Russian state hackers who orchestrated the SolarWinds supply chain attack last year exploited an iOS zero-day as part of a separate malicious email campaign aimed at stealing Web authentication credentials from Western European governments, according to Google and Microsoft. Attacks targeting CVE-2021-1879, as the ...
Google and Microsoft researchers found that the Russian state hackers behind last year's SolarWinds supply chain hack also exploited a then-unknown iOS zero-day vulnerability in a separate malicious email campaign. The goal was to steal Web authentication credentials from Western European governments via messages to go...
[]
[]
[]
scitechnews
None
None
None
None
Google and Microsoft researchers found that the Russian state hackers behind last year's SolarWinds supply chain hack also exploited a then-unknown iOS zero-day vulnerability in a separate malicious email campaign. The goal was to steal Web authentication credentials from Western European governments via messages to go...
108
Japan Shatters Internet Speed Record
We're in for an information revolution. Engineers in Japan just shattered the world record for the fastest internet speed, achieving a data transmission rate of 319 Terabits per second (Tb/s), according to a paper presented at the International Conference on Optical Fiber Communications in June. The new record was made...
Japanese engineers have broken the world Internet speed record with a 319 TB per second data transmission rate across more than 3,001 kilometers (1,864.7 miles) of existing fiber-optic infrastructure. The achievement nearly doubles the previous record of 178 Tb/s. The researchers used four cores, or glass tubes housed ...
[]
[]
[]
scitechnews
None
None
None
None
Japanese engineers have broken the world Internet speed record with a 319 TB per second data transmission rate across more than 3,001 kilometers (1,864.7 miles) of existing fiber-optic infrastructure. The achievement nearly doubles the previous record of 178 Tb/s. The researchers used four cores, or glass tubes housed ...
109
NIST Evaluates Face Recognition Software's Accuracy for Flight Boarding
The most accurate face recognition algorithms have demonstrated the capability to confirm airline passenger identities while making very few errors, according to recent tests of the software conducted at the National Institute of Standards and Technology (NIST). The findings, released today as Face Recognition Vendor T...
Tests of face recognition (FR) software at the U.S. National Institute of Standards and Technology (NIST) indicate the most accurate algorithms are able to confirm airline passenger identities at boarding while committing few errors. The NIST researchers assessed the algorithms' performance in matching images of travel...
[]
[]
[]
scitechnews
None
None
None
None
Tests of face recognition (FR) software at the U.S. National Institute of Standards and Technology (NIST) indicate the most accurate algorithms are able to confirm airline passenger identities at boarding while committing few errors. The NIST researchers assessed the algorithms' performance in matching images of travel...
110
Seattle Leads Nation in 'Brain Gain,' Adds Tech Jobs Faster Than Any Other Big U.S. Market Over 5 Years
The Seattle region added more than 48,000 tech jobs from 2016 to 2020, an increase of more than 35% - growing at a faster rate than any other large U.S. tech market, according to a new analysis by the CBRE real estate firm. The report confirms the meteoric growth of the region's tech industry in the latter half of the ...
A report by real estate firm CBRE reveals that more than 48,000 technology jobs were added in the Seattle region from 2016 to 2020. Only the Canadian tech markets in Toronto and Vancouver posted faster growth rates in North America, the study found. Seattle ranked second, behind the San Francisco Bay Area and ahead of ...
[]
[]
[]
scitechnews
None
None
None
None
A report by real estate firm CBRE reveals that more than 48,000 technology jobs were added in the Seattle region from 2016 to 2020. Only the Canadian tech markets in Toronto and Vancouver posted faster growth rates in North America, the study found. Seattle ranked second, behind the San Francisco Bay Area and ahead of ...
113
University of Illinois at Urbana-Champaign Graduate Receives ACM Doctoral Dissertation Award
Chuchu Fan is the recipient of the 2020 ACM Doctoral Dissertation Award for her dissertation, " Formal Methods for Safe Autonomy: Data-Driven Verification, Synthesis, and Applications ." The dissertation makes foundational contributions to verification of embedded and cyber-physical systems, and demonstrates applicabil...
ACM has named University of Illinois at Urbana-Champaign graduate Chuchu Fan the recipient of the 2020 ACM Doctoral Dissertation Award for contributing to the verification of embedded and cyber-physical systems. Fan's work showcases industrial-scale application of developed verification technologies; furthers the theor...
[]
[]
[]
scitechnews
None
None
None
None
ACM has named University of Illinois at Urbana-Champaign graduate Chuchu Fan the recipient of the 2020 ACM Doctoral Dissertation Award for contributing to the verification of embedded and cyber-physical systems. Fan's work showcases industrial-scale application of developed verification technologies; furthers the theor...
115
After Backlash, Predictive Policing Adapts to a Changed World
Pushback against law enforcement's use of predictive software has forced reconsideration, with officials in Santa Cruz, CA, recently warning the technology contributes to racial profiling. Predictive-policing companies are beginning to deprioritize "forecasting" crime and concentrate more on tracking police, in order t...
[]
[]
[]
scitechnews
None
None
None
None
Pushback against law enforcement's use of predictive software has forced reconsideration, with officials in Santa Cruz, CA, recently warning the technology contributes to racial profiling. Predictive-policing companies are beginning to deprioritize "forecasting" crime and concentrate more on tracking police, in order t...
117
ECB Starts Work on Digital Version of the Euro
LONDON - The European Central Bank announced Wednesday that it's starting work toward creating a digital euro currency as more consumers ditch cash. The project is expected to take two years and the idea is to design a digital version of the common currency, used in the 19 members of the euro zone. However, the actual ...
The European Central Bank (ECB) has launched an initiative to produce a digital euro currency. The ECB expects the design and investigation stage to take two years, while the currency's actual implementation could add two more years to the project. ECB's Fabio Panetta said, "Private solutions for digital and online pay...
[]
[]
[]
scitechnews
None
None
None
None
The European Central Bank (ECB) has launched an initiative to produce a digital euro currency. The ECB expects the design and investigation stage to take two years, while the currency's actual implementation could add two more years to the project. ECB's Fabio Panetta said, "Private solutions for digital and online pay...
118
Chinese Phone Games Now Require Facial Scans to Play at Night
Tencent, the world's largest Chinese video game publisher, has taken an extreme step to comply with its nation's rules about limiting minors' access to video games. As of this week, the publisher has added a facial recognition system, dubbed "Midnight Patrol," to over 60 of its China-specific smartphone games , and it ...
Chinese video game publisher Tencent has added a facial recognition system to more than 60 of its China-specific smartphone games, in order to comply with government rules to limit access to video games by minors. Users will receive a prompt to scan their face once a gameplay session exceeds an unspecified amount of ti...
[]
[]
[]
scitechnews
None
None
None
None
Chinese video game publisher Tencent has added a facial recognition system to more than 60 of its China-specific smartphone games, in order to comply with government rules to limit access to video games by minors. Users will receive a prompt to scan their face once a gameplay session exceeds an unspecified amount of ti...
120
Meet the Open Source Software Powering NASA's Ingenuity Mars Helicopter
The open source F Prime software that drives the U.S. National Aeronautics and Space Administration (NASA) 's Ingenuity Mars Helicopter is also finding use at universities as a flight software option for university and student projects. JPL's Aadil Rizvi said F Prime is an out-of-the-box solution for several flight sof...
[]
[]
[]
scitechnews
None
None
None
None
The open source F Prime software that drives the U.S. National Aeronautics and Space Administration (NASA) 's Ingenuity Mars Helicopter is also finding use at universities as a flight software option for university and student projects. JPL's Aadil Rizvi said F Prime is an out-of-the-box solution for several flight sof...
122
Stumble-Proof Robot Adapts to Challenging Terrain in Real Time
Robots have a hard time improvising, and encountering an unusual surface or obstacle usually means an abrupt stop or hard fall. But researchers have created a new model for robotic locomotion that adapts in real time to any terrain it encounters, changing its gait on the fly to keep trucking when it hits sand, rocks, s...
A new robotic locomotion model capable of real-time terrain adaptation has been developed by a multi-institutional research team. Engineers at Facebook AI, the University of California, Berkeley (UC Berkeley), and Carnegie Mellon University based Rapid Motor Adaptation (RMA) on the ability of humans and other animals t...
[]
[]
[]
scitechnews
None
None
None
None
A new robotic locomotion model capable of real-time terrain adaptation has been developed by a multi-institutional research team. Engineers at Facebook AI, the University of California, Berkeley (UC Berkeley), and Carnegie Mellon University based Rapid Motor Adaptation (RMA) on the ability of humans and other animals t...
125
3D Printable Phase-Changing Composites Can Regulate Temperatures Inside Buildings
Changing climate patterns have left millions of people vulnerable to weather extremes. As temperature fluctuations become more commonplace around the world, conventional power-guzzling cooling and heating systems need a more innovative, energy-efficient alternative, and in turn, lessen the burden on already struggling ...
Texas A&M University (TAMU) scientists have engineered novel three-dimensional (3D) printable phase-change material (PCM) composites for regulating interior building temperatures cost-effectively. The method eliminates the plastic capsules that surround each PCM particle in conventional manufacturing by blending light-...
[]
[]
[]
scitechnews
None
None
None
None
Texas A&M University (TAMU) scientists have engineered novel three-dimensional (3D) printable phase-change material (PCM) composites for regulating interior building temperatures cost-effectively. The method eliminates the plastic capsules that surround each PCM particle in conventional manufacturing by blending light-...