Officials at a Chicago-based startup, Sagamore-Adams Laboratories LLC, say innovations discovered in Purdue University's School of Nuclear Engineering are being commercialized to address challenges in improving radiation detection and making sealants and adhesives safer. They have developed technology that could lead to radiation sensors that cost less and provide better information than traditional sensors.
European laboratories testing food for dioxins now have lower-cost, smaller-footprint alternatives for confirming levels of toxic contaminants, thanks to a new European Union regulation. Thermo Fisher Scientific worked closely with national reference labs in the EU to support the development of the new regulation, which permits use of gas chromatograph-triple stage quadrupole mass spectrometers (GC-MS/MS) for confirmation.
Bridges become an infrastructure problem as they get older, as de-icing salt and carbon dioxide gradually destroy the reinforced concrete. A new robot called C2D2 (Climbing Corrosion Detecting Device) is now in use in Switzerland and can check the condition of these structures, even in places that people cannot reach.
Researchers in Switzerland have created an Android app which lets users get together to crack a modern cryptographic code. Building on earlier work that used a network of 300 PlayStation consoles, the scientists decided to leverage the power of smartphones. By running the algorithm a very large number of times the code may be broken eventually.
Port scanners are programs that search the Internet for systems that exhibit potential vulnerabilities. According to report published online, Hacienda is one such port scanning program. The report says that this program is being put into service by the "Five Eyes," a federation of Western secret services. Scientists have developed free software that can help prevent this kind of identification and thus the subsequent capture of systems.
Russian hackers have stolen 1.2 billion user names and passwords in a series of Internet heists affecting 420,000 websites, according to a report published Tuesday. The thievery was described in a New York Times story based on the findings of Hold Security, a Milwaukee firm that has a history of uncovering online security breaches. For confidentiality reasons, the identities of the affected websites weren't identified by the Times.
Police in New York City are concerned that the increasing popularity of drones in such a tightly packed metropolis could carry major risks, even becoming a potential tool for terrorists to conduct surveillance or carry out attacks. Even though it's illegal to fly the devices just about anywhere in New York City without permission, recent incidents and breathtaking videos of Manhattan suggest that the restrictions are being widely flouted.
Systems that automatically read automobile license plates have the potential to save police investigative time and increase safety, but law enforcement officials must address issues related to staffing, compatibility and privacy before the technology can reach its full potential, according to a new RAND Corp. report.
In a basement laboratory at Fort Sam Houston military base in Texas, a research team has spent the last two years simulating improvised explosive device blasts on postmortem pig eyes using a high-powered shock tube. Their most striking discovery is that these blasts can damage the optic nerve, and these injuries can occur even at low pressures, causing visual defects that until now have been associated traumatic brain injuries.
In early March, a mysterious ship the size of a large passenger ferry left Romania and plotted a course toward Scandinavia. About a month later, at the fenced-in headquarters of Norway's military intelligence service, the country's spychief disclosed its identity. It was a $250 million spy ship, tentatively named Marjata, that will be equipped with sensors and other technology to snoop on Russia's activities in the Arctic beginning in 2016.
The need for robust password security has never been more critical than now, as people use smartphones or tablets to pay bills and store personal information. A new Rutgers study shows that free-form gestures can be used to unlock phones and grant access to apps. These gestures are less likely to be observed and reproduced than than traditional methods such as typed passwords.
Highlighting the impact of malicious software, Target suffered the largest retail hack in U.S. history during the Christmas shopping season of 2013. To help combat this worsening trend, Virginia Tech computer scientists have used causal relations to determine whether or not network activities have justifiable and legitimate causes to occur. The work effectively isolates infected computer hosts and detects in advance stealthy malware.
Researchers at Oregon State Univ. have discovered that some compounds called polyoxoniobates can degrade and decontaminate nerve agents such as the deadly sarin gas, and have other characteristics that may make them ideal for protective suits, masks or other clothing. The use of polyoxoniobates for this purpose had never before been demonstrated, and the discovery could have important implications for both military and civilian protection.
As news reports of lithium-ion battery (LIB) fires in Boeing Dreamliner planes and Tesla electric cars remind us, these batteries, which are in everyday portable devices, like tablets and smartphones, have their downsides. Now, scientists have designed a safer kind of lithium battery component that is far less likely to catch fire and still promises effective performance.
Research in Australia may help in the fight against terrorism with the creation of a sensor that can detect tiny quantities of explosives with the use of light and special glass fibers. The researchers have created a new optical fiber sensor which can detect explosives in concentrations as low as 6.3 ppm (parts per million). It requires an analysis time of only a few minutes.
Farmers optimize crop production on their own lands by rotating crops, or testing soils to choose the right amount of fertilizers to apply. But is it possible to optimize production across a much bigger area, such as the eastern U.S.? That’s the question a team of U.S. Dept. of Agriculture scientists has begun to tackle by developing a sophisticated new modeling tool.
Counterfeit or adulterated olive oil has been a persistent presence on the market, in part because the oil is difficult to track. An invisible label, developed by researchers in Switzerland, could perform this task. The tag consists of tiny magnetic DNA particles encapsulated in a silica casing and mixed with the oil. Just a few grams of the new substance are enough to tag the entire olive oil production of Italy.
According to a new study, coupling commercially available spectral x-ray detectors with a specialized algorithm can improve the detection of uranium and plutonium in small, layered objects such as baggage. This approach enhances the detection powers of x-ray imaging and may provide a new tool to impede nuclear trafficking.
A major factor making driving difficult is hazards that are sudden and hard to predict. The wrong choice in this situation, known as the “dilemma zone,” may lead to crashes. Roadside and in-vehicle display warning systems may help drivers handle these hazards by predicting their occurrence and providing advanced warning to the driver, according to a new study.
Inspired by human biology, a revolutionary new method of encrypting confidential information has been patented by scientists. This discovery could transform daily life which is reliant on secure electronic communications for everything from mobiles to sensor networks and the internet.
FOMO—or the fear of missing out—is a common complaint at the South By Southwest Interactive festival in Austin, Texas each year. It's here, after all, that "Girls" creator Lena Dunham spoke on Monday at the same time that NSA whistleblower Edward Snowden gave a teleconferenced talk. All the while, IBM showed off the capabilities of cognitive computing in a language anyone could understand: food.
Intelligence officials are planning a sweeping system of electronic monitoring that would tap into government, financial and other databases to scan the behavior of many of the 5 million federal employees with secret clearances. The system is intended to identify rogue agents, corrupt officials and leakers, in part to prevent cases similar to former National Security Agency analyst Edward Snowden.
For 15 years trucks have been hauling decades worth of plutonium-contaminated waste to what is supposed to be a safe and final resting place a half mile underground in the salt beds of the Permian Basin in New Mexico. But back-to-back accidents and an above-ground radiation release shuttered the government's only deep underground nuclear waste dump and raised questions about the $5-billion-a-year program for cleaning up legacy waste.
Standing in a full-body scanner at an airport isn’t fun, and the process adds time and stress to a journey. It also raises privacy concerns. But researchers now report making several key advances in terahertz wave sensor technology to create a more precise and direct method for using these waves to detect explosives from greater distances.
Imagine a user who intends to send $2 to a friend through PayPal. Embedded malware in the user’s laptop, however, converts the $2 transaction into a $2,000 transfer to the account of the malware author instead. Researchers at Georgia Institute of Technology have created a prototype software, Gyrus, that takes steps to prevent malware from sending spam emails and instant messages, and blocking unauthorized commands such as money transfers.
An international partnerships is aiming to develop robust fingerprint sensors with resolution beyond today’s 500 dpi international standards, the minimum required by the U.S. Federal Bureau of Investigation. The new platform uses vertical piezoelectric nanowire matrices designed using multiphysics modeling software.
- Page 1