Advertisement
News
Subscribe to Scientific Computing News

The Lead

Computing Paths to Future Asteroid Exploration

July 2, 2014 | by NASA | Comments

As left over building blocks of the solar system's formation, asteroids are of significant interest to scientists. Resources, especially water, embedded within asteroids could be of use to astronauts traveling through deep space. Likewise, asteroids could continue to be destinations for robotic and human missions as NASA pioneers deeper into the solar system, to Mars and beyond.

TOPICS:
Eugenia Cheng, visiting senior lecturer in mathematics and a concert pianist, specializes in category theory, which she characterizes as 'the mathematics of mathematics.' Courtesy of Robert Kozloff

Power of Mathematics Opens New Possibilities in Music

August 27, 2014 3:34 pm | by Steve Koppes, University of Chicago | Comments

Anthony Cheung’s formal mathematical training essentially ended with high school calculus. But as a musician and composer, he has explored mathematical phenomena in new ways, especially through their influence on harmony and timbre. “Through technology and thinking about acoustics, we can change sounds on the computer in innumerable ways,” says Cheung, whose musical composition earned him a 2012 Rome Prize from the American Academy in Rome.

TOPICS:
So far, JOANA is the only software analysis tool worldwide that does not only find all security gaps but also minimizes the number of false alarms without affecting the functioning of programs.

For Secure Software: X-rays instead of Passport Control

August 27, 2014 3:13 pm | by Karlsruhe Institute of Technology | Comments

Trust is good, control is better. This also applies to the security of computer programs. Instead of trusting “identification documents” in the form of certificates, the JOANA software analysis tool examines the source text (code) of a program. In this way, it detects leaks, via which secret information may get out or strangers may enter the system from outside. At the same time, JOANA reduces the number of false alarms to a minimum.

TOPICS:
An example of a whole slide scan

Leica Microsystems Offers Slide Scanning and Image Hosting for Education

August 27, 2014 2:40 pm | by Leica Microsystems | Comments

Leica Microsystems is offering a custom slide scanning and image hosting service for teachers, which makes it possible to share images within the classroom and to expand learning outside the classroom. Glass slides sent to a scanning center are processed to create high-resolution digital image files, which then can be accessed online from a hosted server via any standard Internet browser for study by students anytime, anywhere.

TOPICS:
Advertisement
Crocus Pollen and Stigmate -- Courtesy of Nikon Small World

Close-up: Crocus Pollen and Stigmate

August 27, 2014 2:28 pm | Comments

This 400X photo of crocus pollen and stigmate received an Image of Distinction designation in the 2013 Nikon Small World Photomicrophotography Competition, which recognizes excellence in photography with the optical microscope. It was taken by Frederic Labaune of Education Nationale in Auxonne, France, using episcopy and stacking.

TOPICS:
Pressure retarded osmosis (PRO) is a method of producing renewable energy from two streams of a different salinity. Courtesy of Jose-Luis Olivares/MIT

Renewable Energy: The Power of Salt

August 26, 2014 4:27 pm | by Jennifer Chu, MIT | Comments

Where the river meets the sea, there is the potential to harness a significant amount of renewable energy, according to a team of mechanical engineers at MIT. The researchers evaluated an emerging method of power generation called pressure retarded osmosis, in which two streams of different salinity are mixed to produce energy. In principle, a PRO system would take in river water and seawater on either side of a semi-permeable membrane.

TOPICS:
Mosaic of satellite images of Antarctica taken by RADARSAT-2. Courtesy of RADARSAT-2 Data and Products © MacDonald, Dettwiler and Associates Ltd. (2008) – All Rights Reserved.  RADARSAT is an official mark of the Canadian Space Agency.

Most Complete Antarctic Map for Climate Research Publicly Available

August 26, 2014 4:18 pm | by University of Waterloo | Comments

The University of Waterloo has unveiled a new satellite image of Antarctica, and the imagery will help scientists all over the world gain new insight into the effects of climate change. The mosaic is free and fully accessible to the academic world and the public. Using Synthetic Aperture Radar with multiple polarization modes aboard the RADARSAT-2 satellite, the CSA collected more than 3,150 images of the continent.

TOPICS:
Ph.D. students Giovanni Guccione (L) and Harry Slatyer examine their gold-coated silver gallium nanowire in the Quantum Optics labs. Courtesy of Quantum Optics Group, ANU

Laser Makes Atomic-force Microscopes 20 Times More Sensitive

August 26, 2014 4:12 pm | by Australian National University | Comments

Laser physicists have found a way to make atomic-force microscope probes 20 times more sensitive and capable of detecting forces as small as the weight of an individual virus. The technique, developed by researchers in the Quantum Optics Group of Australian National University’s Research School of Physics and Engineering, hinges on using laser beams to cool a nanowire probe to minus 265 degrees Celsius.

TOPICS:
Users in analytical laboratories have more freedom of choice when selecting a chromatography data system.

Agilent and Shimadzu Enable Control of Each Other’s GC Instruments in Respective Chromatographic Data Systems

August 26, 2014 3:32 pm | by Agilent | Comments

Agilent Technologies and Shimadzu announced the release of each other’s GC instrument control for their respective chromatography data systems. The move provides customers in analytical laboratories with more freedom of choice when selecting a chromatography data system.

TOPICS:
Advertisement
Voyager 2 Captures Images of Neptune -- Courtesy of NASA

25 Years Ago, Voyager 2 Captures Images of Neptune

August 26, 2014 3:16 pm | by NASA | Comments

NASA's Voyager 2 spacecraft gave humanity its first glimpse of Neptune and its moon Triton in the summer of 1989. This picture of Neptune was produced from the last whole planet images taken through the green and orange filters on the Voyager 2 narrow angle camera. The images were taken on August  20, 1989, at a range of 4.4 million miles from the planet, 4 days and 20 hours before closest approach on August 25.

TOPICS:
Akselos' software running in a Web browser for 2.01x. This app shows the stresses in the landing gear for a solar-powered airplane. Courtesy of Akselos

Simulation Software Drastically Increases Speed of 3-D Engineering Simulations

August 25, 2014 12:40 pm | by Rob Matheson, MIT | Comments

MIT spinout Akselos has developed novel software, based on years of research at the Institute, which uses precalculated supercomputer data for structural components — like simulated “Legos” — to solve FEA models in seconds. Hundreds of engineers in the mining, power-generation, and oil and gas industries are now using Akselos software.

TOPICS:
Sandia National Laboratories managers Alex Roesler, left, and Luke Purvis, center, and systems analyst Jarret Lafleur shown inside a Bank of Italy vault in a historic Livermore, California, building, studied 23 high-value heists that occurred in the last

National Security: Lessons Learned Drawn from Perfect Heists

August 25, 2014 12:00 pm | by Sandia National Laboratories | Comments

The Antwerp Diamond Center theft and other sophisticated, high-value heists show that motivated criminals can find ways to overcome every obstacle between them and their targets. Can the Energy and Defense departments, responsible for analyzing, designing and implementing complex systems to protect vital national security assets, learn from security failures in the banking, art and jewelry worlds? Sandia Labs set out to answer that question

TOPICS:
The study combined two established ways of detecting user emotions: keystroke dynamics and text-pattern analysis.

Does your Computer Know How You’re Feeling?

August 25, 2014 11:16 am | by Taylor & Francis | Comments

Researchers in Bangladesh have designed a computer program that can accurately recognize users’ emotional states as much as 87 percent of the time, depending on the emotion. Writing in the journal Behaviour & Information Technology, A.F.M. Nazmul Haque Nahin and his colleagues describe how their study combined — for the first time — two established ways of detecting user emotions: keystroke dynamics and text-pattern analysis.

TOPICS:
Researchers from Argonne, in collaboration with Caterpillar Inc. and Convergent Science, carried out large internal combustion engine simulations involving fine spatial and temporal resolutions; high fidelity; and robust two-phase flow, spray, turbulence,

Argonne wins HPC Innovation Excellence Award

August 25, 2014 10:47 am | by Argonne National Laboratory | Comments

Argonne National Laboratory was one of seven new winners of the HPC Innovation Excellence Award. Announced by International Data Corporation at the ISC '14 supercomputer industry conference in Leipzig, Germany, the award recognizes noteworthy achievements by users of high-performance computing (HPC) technologies.

TOPICS:
Mizapin -- Courtesy of Nikon Small World

Mizapin Antidepressant Drug Crystals

August 25, 2014 10:41 am | Comments

This 160X photo of Mizapin antidepressant drug crystals received an Image of Distinction designation in the 2013 Nikon Small World Photomicrophotography Competition, which recognizes excellence in photography with the optical microscope. It was taken by Robert Markus of Stockholm University using polarized light and differential interference contrast.

TOPICS:
Ramasany Gowthami participated in the creation of an Android app by means of which users get together to crack a modern cryptographic code.

Smartphones Set Out to Decipher Cryptographic System

August 25, 2014 4:33 am | by Sébastien Corthésy, EPFL | Comments

An Android app has been created that allows users to get together to crack a modern cryptographic code. All encryption types, among which we can find the widely used RSA, can theoretically be broken. If so, how to ensure that our data remains protected? The answer lies in the time and effort required to break the code.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading