Buried under thousands of miles of pavement in California are 27,000 traffic sensors that are supposed to help troubleshoot both daily commutes and long-term maintenance needs on some of the nation's most heavily used and congested roadways. About 9,000 of them do not work, despite their critical role in an "intelligent transportation" system designed to do things like detect the congestion that quickly builds after an accident.
Amid a rash of tombstone thefts from cemeteries in...
Iris scans, fingerprint scans, facial and voice...
The widespread use of advanced surveillance...
A new market study forecasts that the global market for driver monitoring systems will reach 64.8 million units by the end of 2020 with the majority of shipments being accounted for in vehicles sold in the Asia-Pacific region. A major 2013 is that these systems are migrating from the luxury brands like Volvo and Mercedes-Benz to more mass market models.
Mystaire has announced the release of Aura ductless chemical fume hoods, featuring EverSafe II microprocessor safety controller monitors and adjustable fume hood face velocity to user preset values.
As cars become more like PCs on wheels, what's to stop a hacker from taking over yours? In recent demonstrations, hackers have shown they can slam a car's brakes at freeway speeds, jerk the steering wheel and even shut down the engine — all from their laptop computers. The hackers are...
Vulnerabilities in software and firmware are the easiest ways to attack a system, and two revised publications from NIST approach the problem by providing new guidance for software patching and warding off malware. The new computer security guides to help computer system managers protect their systems.
A new report by biometric researchers at NIST uses data from thousands of frequent travelers enrolled in an iris recognition program to determine that no consistent change occurs in the distinguishing texture of their irises for at least a decade. These findings inform identity program administrators on how often iris images need to be recaptured to maintain accuracy.
Carbon monoxide poisoning is a significant problem for construction workers because it can build up quickly in enclosed spaces from use of gasoline-powered tools. New research calls for the use of a wearable computing system installed in a helmet to protect construction workers from this type of poisoning.
In an effort to thwart forgeries, researchers in Switzerland have proposed a new miniaturized authentication system. By combining moiré patterns and microlithography techniques, authorities can be easily recognize counterfeits with the naked eye and counterfeiters will find it impossible to reproduce items through currently existing printer or scanner technology.
GOJO Industries, a maker of hand hygiene and skin health and inventors of Purell Hand Sanitizer, conducted an independent research study at the John Peter Smith Hospital in Fort Worth, Texas to determine the impact on hand hygiene compliance rates when the hospital hand hygiene program included an electronic compliance activity monitoring system. The research showed a 92% hand hygiene improvement.
There is increasing pressure on the chemical and related industries to ensure that their products comply with increasing numbers of safety regulations. Researchers at the Univ. of Kansas have developed a computational technique that could allow the industry to predict whether a given compound will be toxic even at a low dose and thus allow alternatives to be found when necessary.
A Personal Identity Verification (PIV) card is a government-issued smart card used by federal employees and contractors to access government facilities and computer networks. To assist agencies seeking stronger security and greater operational flexibility, NIST has made several modifications to the previous version of Biometric Data Specification for PIV cards.
Research is growing with high-tech gadgets that promise new safety nets for seniors determined to live on their own for as long as possible. Motion sensors on the wall and a monitor under the mattress one day might automatically alert loved ones to early signs of trouble well before an elderly loved one gets sick or suffers a fall.
Relief may be on the way for airline passengers who can't bear to be separated even briefly from their personal electronic devices. The government is moving toward allowing gate-to-gate use of music players, tablets, laptops, smartphones and other gadgets. Howeveer, restrictions on cellphone calls and Internet use and transmission are not expected to be changed.
This week, Sandia National Laboratories is hosting the seventh annual Western National Robot Rodeo and Capability Exercise, a challenging five-day event that draws civilian and military bomb squad teams from across the country to see who can most effectively defuse dangerous situations with the help of robots. The competition provides an opportunity to practice using robots and new technology in a low-risk, but competitive environment.
Americans are accustomed to calling 9-1-1 to get help in an emergency. A research team lead by Ram Dantu of the University of North Texas sees the growth of cell phone and smartphone usage as an opportunity to improve 9-1-1 response. His team has designed several innovative smart phone apps that virtually place 9-1-1 operators at the scene of an emergency, allowing faster response.
Engineers in California have developed new image processing techniques for rapid exploration and characterization of structural fires by small Segway-like robotic vehicles. Thermal data recorded by the robot’s small infrared camera is maps it onto a 3-D scene created by a pair of stereo cameras, producing a virtual reality picture that can be used by first responders as the robot navigates a building.
Some U.S. government officials and experts have strong concerns about Japan's plan to operate a nuclear fuel reprocessing plant in Aomori to retract plutonium while most of the nation's reactors remain shut down, a member of the government's Japan Atomic Energy Commission said Monday. Japan possesses a large amount of plutonium but prospects for consuming it remain unclear as most of Japan's nuclear reactors are idled.
The Naval Research Laboratory aided both the 2009 and 2013 Presidential Inaugurations with a technology called CT-Analyst. The software modeling tool is designed to provide first responders with a tool that can provides accurate, instantaneous, 3D predictions of chemical, biological, and radiological agent transport in urban settings.
A specially-adapted “tactile helmet”, developed by researchers at the University of Sheffield, could provide fire-fighters operating in challenging conditions with vital clues about their surroundings. The helmet is fitted with a number of ultrasound sensors that are used to detect the distances between the helmet and nearby walls or other obstacles. These signals are transmitted to vibration pads that are attached to the inside of the helmet, touching the wearer's forehead.
Engineers have recently developed a portable mapping system—carried in a backpack—that can be used to automatically create annotated physical maps of locations where GPS is not available, such as in underground areas and on ships. The system improves upon algorithms once developed for robots—which are not practical for all environments—and has a built-in allowance for normal human movement, like walking.
Malware shut down 32,000 computers and servers at three major South Korean TV networks and three banks last Wednesday, disrupting communications and banking businesses, officials said. Investigators have yet to pinpoint the culprit, but the focus remains fixed on North Korea, where South Korean security experts say Pyongyang has been training a team of computer-savvy "cyber warriors" as cyberspace becomes a fertile battleground in the standoff between the two Koreas.
Using a low-cost apparatus designed to quickly and accurately measure the properties of handheld laser devices, NIST researchers tested 122 laser pointers and found that nearly 90% of green pointers and about 44% of red pointers tested were out of compliance with federal safety regulations. Often, these pointers emitted more visible power than allowed by law
Even cyberwar has rules, and one group of experts is putting out a manual to prove it. Their handbook, the Tallinn Manual, due to be published later this week, applies the practice of international law to the world of electronic warfare in an effort to show how hospitals, civilians and neutral nations can be protected in an information-age fight.
A Canadian research center said Wednesday that it had identified 25 different countries that host servers linked to FinFisher, a Trojan horse program which can dodge anti-virus protections to steal data, log keystrokes, eavesdrop on Skype calls, and turn microphones and webcams into live surveillance devices. This finding doesn't necessarily mean those countries' governments are using FinFisher, but it is an indication of the spyware's reach.
Damage to building structural elements, elevators, stairs, and fire protection systems caused by the shaking from a major earthquake can play a critical role in the spread of fire and hamper the ability of occupants to evacuate, and impede fire departments in their emergency response operations. These are among the conclusions of a groundbreaking study of post-earthquake building fire performance conducted in 2012 at the Worcester Polytechnic Institute (WPI).
In 2010, the ideas behind a squid's sticky tendrils and Spiderman's super-strong webbing were combined to create a prototype for the first remote device able to stop vehicles in their tracks. Funded by the U.S. Department of Homeland Security, the effort resulted in an immobilization device that shoots spiked arms with attached netting at a passing vehicle. The device tangles in a car’s axles, bringing the vehicle to a screeching halt.
- Page 1