The next generation of cyberattacks will be more sophisticated, more difficult to detect and more capable of wreaking untold damage on the nation’s computer systems. So, the DoD has given a $3 million grant to a team of computer scientists to develop software that can hunt down a new kind of vulnerability nearly impossible to find with today’s technology. The team is tasked with creating an analyzer that can thwart algorithmic attacks.
Simply declaring a region as a nature protection area is not enough, regular monitoring of its...
A key handwritten scientific document by Alan Turing in which he works on the foundations of...
Notorious gangsters Al Capone and Carlo Gambino were famously done in by tax evasion charges....
As part of the 2015 Cambridge Science Festival, David Spiegelhalter, Winton Professor for the Understanding of of Risk at Cambridge University, has given an overview of the history of sex research using data going back to 1580, conducted by pioneering sexologists through to today’s ‘sexperts.’
A young doctor leans over a patient who has been in a serious car accident and invariably must be experiencing pain. The doctor's trauma team examines the patient's pelvis and rolls her onto her side to check her spine. They scan the patient's abdomen with a rapid ultrasound machine, finding fluid. They insert a tube in her nose. Throughout the procedure, the patient's face remains rigid, showing no signs of pain.
Researchers are designing artificial limbs to be more sensational, with the emphasis on sensation. They have developed a language of touch that can be "felt" by computers and humans alike. The engineers and students are constructing a language quantified with mechanical touch sensors that interact with objects of various shapes, sizes and textures.
A world-first collaboration uses previously top-secret technology to zoom through the human body down to the level of a single cell and could be a game-changer for medicine. UNSW Australia's Professor Tate is first to use the system in humans. She has forged a pioneering partnership with the US-based Cleveland Clinic, Brown and Stanford Universities, as well as Zeiss and Google to help crunch terabytes of data gathered from human study.
It can be disheartening to learn that something precious, such as a one-of-a-kind family photo, has disappeared from a scratched or broken CD or DVD. It also can become serious, dangerous and potentially costly if it happens to a disc containing criminal forensic evidence, corporate records or scientific data. But there may be a way in the future to bring the material back.
Researchers have created an algorithm that allowed a man to grasp a bottle with a prosthetic hand powered only by his thoughts. The technique, demonstrated with a man whose right hand had been amputated, uses non-invasive brain monitoring, capturing brain activity to determine what parts of the brain are involved in grasping an object. A computer program, or brain-machine interface (BMI), harnessed the subject’s intentions...
Researchers have developed a new computational model that effectively simulates the mechanical behavior of biofilms. Their model may lead to new strategies for studying a range of issues from blood clots to waste treatment systems. The new model may be adapted to study clot formation in blood vessels, which can pose the risk of detaching and migrating to the lungs, a fatal event.
Qlucore Omics Explorer 3.1 for Mac is data analysis software designed to maximize the outcome of research by making it easy to analyze experiment data from a biological point-of-view. Examples of this are the inbuilt Gene Ontology (GO) Browser, a Gene Set Enrichment Analysis (GSEA) function, and freedom to explore data using any variable identifier: variable collapse.
When disaster strikes, it is critical that experts, decision makers and emergency personnel have access to real-time information in order to assess the situation and respond appropriately. It is equally critical that individuals and organizations have the capacity to analyze the wealth of data generated in the midst of the disaster and its immediate aftermath in order to produce accurate, customized warnings.
Electromagnetic radiation – it might sound like something that you’d be better off avoiding, but electromagnetic waves of various kinds underpin our senses and how we interact with the world – from the light emissions through which your eyes perceive these words, to the microwaves that carry the Wi-Fi signal to your laptop or phone on which you’re reading it.
Big data: It’s a term we read and hear about often, but is hard to grasp. Computer scientists tackled some big data about an important protein and discovered its connection in human history as well as clues about its role in complex neurological diseases. Through a novel method of analyzing these big data, they discovered a region encompassing the gephyrin gene on chromosome 14 that underwent rapid evolution after splitting in two...
Mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an infamous old cipher called the knapsack code to create an online security system better prepared for future demands.
Integer overflows are one of the most common bugs in computer programs — not only causing programs to crash but, even worse, potentially offering points of attack for malicious hackers. A new algorithm for identifying integer-overflow bugs was tested on five common open-source programs, in which previous analyses had found three bugs. The new algorithm found all three known bugs — and 11 new ones.
The Norwegian Academy of Sciences and Letters has decided to award the Abel Prize for 2015 to the American mathematicians John F. Nash Jr. and Louis Nirenberg “for striking and seminal contributions to the theory of nonlinear partial differential equations and its applications to geometric analysis.” They will receive the Abel Prize from His Majesty King Harald on May 19, 2015. The Abel Prize carries a cash award of about 1 million USD.
A 60-year-old math problem first put forward by Nobel laureate Enrico Fermi has been solved. In 1955, a team of scientists led by Fermi used a computer for the first time to try to solve a numerical experiment. The outcome wasn’t what they were expecting, and the complexity of the problem underpinned the then-new field of non-linear physics and paved the way for six decades of new thinking. Chaos theory is just one of the theories...
The small Lego machine inside the White House whirred, and in a moment it was turning the pages of a story book. One page flipped, then another, ever faster as President Barack Obama marveled at its efficiency. The contraption's eventual aim would be to allow paralyzed or arthritic patients to read books despite their disabilities. "How did you figure this out?" Obama, impressed, asked its inventors.
Los Alamos National Laboratory mechanical and thermal engineering researchers’ efforts to solve the complex problem of how ocean currents affect the infrastructure of floating oil rigs and their computational fluid dynamics (CFD) numerical simulations received recognition from ANSYS, a company that provides computer-based engineering simulation capabilities.
During a panel at the South by Southwest Festival, NASA representatives discussed how citizen scientists have made a difference in asteroid hunting and announced the release of a desktop software application developed by NASA. The application is based on an Asteroid Data Hunter-derived algorithm that analyzes images for potential asteroids. It’s a tool that can be used by amateur astronomers and citizen scientists.
Albert Einstein is known in popular culture for his famous E = mc2 formula. Scientists know him for revolutionizing physics with his general theory of relativity. But is it possible to know the man behind the big ideas? Yes, thanks to the massive body of written work and correspondence he left behind, which the Einstein Papers Project is dedicated to collecting, editing, translating and publishing.
Scientists have produced a new map of the Moon’s most unusual volcano showing that its explosive eruption spread debris over an area much greater than previously thought. A team of astronomers and geologists studied an area of the lunar surface in the Compton-Belkovich Volcanic Complex. By mapping the radioactive element thorium, which spewed out during the eruption, they discovered debris was able to cover an area the size of Scotland.
Breakthrough science requires pioneers. People who combine brilliance with courage, even in the face of daunting opposition. The women who paved the way for modern scientific exploration exemplify this spirit; grappling not only with fundamental questions of the universe, but with discrimination and societal constraints that often stripped them of scientific credit.
A means of reprogramming a flawed immune response into an efficient anti-tumoral one was brought to light by the results of a translational trial relating to breast cancer. Thanks to the innovative combination of mathematical modeling and experimentation, only 20 tests were necessary, whereas traditional experimentation would have required 596 tests to obtain the same results.
Researchers from Brown and Johns Hopkins universities have come up with a new way to evaluate how well computers can divine information from images. The team describes its new system as a “visual Turing test,” after the legendary computer scientist Alan Turing’s test of the extent to which computers display human-like intelligence.
Simulink is a block diagram environment for multidomain simulation and model-based design. It supports simulation, automatic code generation, and continuous test and verification of embedded systems. The MATLAB add-on provides a graphical editor, customizable block libraries and solvers for modeling and simulating dynamic systems.
To humor mathematicians, picture a pile of sand grains — say, a billion — in one square of a vast sheet of graph paper. If four or more grains occupy a single square, that square topples by sending one grain to each of its four neighboring squares. Keep zooming out so the squares become very small, and something strange happens — the sand still “remembers” that it used to live on a square lattice, and a distinctive pattern emerges.
- Page 1