Decision Lens is a cloud-based prioritization and resource optimization solution based on an Analytic Hierarchy Process (AHP) that empowers organizations to make better decisions within R&D and innovation. AHP allows organizations to blend together various qualitative and quantitative decision criteria into a holistic value model that more broadly reflects the way decision makers truly think.
A big step in understanding the human genome has...
According to a new study, in the unlikely event of...
Sensors made with copper could be cheap, light, flexible and highly conductive. Making such concepts affordable enough for general use remains a challenge but a new way of working with copper nanowires and a PVA “nano glue” could be a game-changer. Engineers in Australia have found a way of making flexible copper conductors cost-effective enough for commercial applications.
Eight U.S. Dept. of Energy national laboratories are combining forces to use high performance computing to build the most complete climate and Earth system model yet devised. The project, called Accelerated Climate Modeling for Energy, or ACME, is designed to accelerate the development and application of fully coupled, state-of-the-science Earth system models for scientific and energy applications.
Researchers in Switzerland have created an Android app which lets users get together to crack a modern cryptographic code. Building on earlier work that used a network of 300 PlayStation consoles, the scientists decided to leverage the power of smartphones. By running the algorithm a very large number of times the code may be broken eventually.
It’s well known that compared with 2-D cell culture models, 3-D cell culture models have different patterns of development, respond differently to therapeutic targets and have different patterns of gene expression. Lawrence Berkeley National Laboratory’s BioSig3D is the only computational platform that provides Web-based delivery of image-based bioinformatics technology from 3-D cell culture models that are imaged in full 3-D using either confocal or deconvolution microscopy.
Computer security researchers have developed a modification to the core Android operating system that allows developers and users to plug in new security enhancements. The new Android Security Modules (ASM) framework aims to eliminate the bottleneck that prevents developers and users from taking advantage of new security tools.
With a method known as finite element analysis (FEA), engineers can generate 3-D digital models of large structures to simulate how they’ll fare under stress, vibrations, heat and other real-world conditions. Used for mapping out large-scale structures, these simulations require intensive computation done by powerful computers over many hours, costing engineering firms much time and money.
Hewlett-Packard and National Renewable Energy Laboratory’s HP Apollo supercomputing platform approaches HPC from an entirely new perspective as the system is cooled directly with warm water. This is done through a “dry-disconnect” cooling concept that has been implemented with the simple but efficient use of heat pipes. Unlike cooling fans, which are designed for maximum load, the heat pipes can be optimized by administrators.
While it's becoming commonplace for patients to see the results of laboratory work electronically, a new Univ. of Michigan study suggests that many people may not be able to understand what those numbers mean. The research found that people with low comprehension of numerical concepts—or numeracy—and low literacy skills were less than half as likely to understand whether a result was inside or outside the reference ranges.
New supercomputing calculations provide the first evidence that particles predicted by the theory of quark-gluon interactions but never before observed are being produced in heavy-ion collisions at the Relativistic Heavy Ion Collider, a facility that is dedicated to studying nuclear physics. These heavy strange baryons, containing at least one strange quark, still cannot be observed directly.
It makes sense that the credit for science papers with multiple authors should go to the authors who perform the bulk of the research, yet that’s not always the case. Now a new algorithm developed at Northeastern’s Center for Complex Network Research helps sheds light on how to properly allocate credit.
A Univ. of Chicago-led team of researchers has developed a technique to record the quantum mechanical behavior of an individual electron contained within a nanoscale defect in diamond. Their technique uses ultrafast pulses of laser light, both to control the defect’s entire quantum state and observe how that single electron state changes over time.
Port scanners are programs that search the Internet for systems that exhibit potential vulnerabilities. According to report published online, Hacienda is one such port scanning program. The report says that this program is being put into service by the "Five Eyes," a federation of Western secret services. Scientists have developed free software that can help prevent this kind of identification and thus the subsequent capture of systems.
In the age of big data, visualization tools are vital. With a single glance at a graphic display, a human being can recognize patterns that a computer might fail to find even after hours of analysis. But what if there are aberrations in the patterns? Or what if there’s just a suggestion of a visual pattern that’s not distinct enough to justify any strong inferences? Or what if the pattern is clear, but not what was to be expected?
Software developed by Univ. of California, Berkeley computer scientists seeks to tame the vast amount of visual data in the world by generating a single photo that can represent massive clusters of images. This tool can give users the photographic gist of a kid on Santa’s lap, housecats, or brides and grooms at their weddings. It works by generating an image that literally averages the key features of the other photos.
Chip designers are facing both engineering and fundamental limits that have become barriers to the continued improvement of computer performance. Have we reached the limits to computation? In a review article in Nature, Igor Markov of the Univ. of Michigan reviews limiting factors in the development of computing systems to help determine what is achievable, identifying "loose" limits and viable opportunities for advancements.
Inspired by the discovery of “race track memory” by IBM researchers, scientists at the Univ. of California, Davis, with the support of the Semiconductor Research Corp., are investigating complex oxides that could be used to manipulate magnetic domain walls within the wires of semiconductor memory devices at nanoscale dimensions. This research may lead to devices that displace existing magnetic hard disk drive and solid state RAM solutions.
Rutgers Univ. researchers have shown that GPS technology is not needed to show where a driver traveled. A starting point and the driver's speed are enough when using a technique dubbed “elastic pathing”, which predicts pathways by seeing how speed patterns match street layouts. This could cause concerns for privacy, however, since many insurance companies offer discounts in return for customers allowing their driving habits to be monitored.
A computer algorithm being developed by Brown Univ. researchers lets users instantly change the weather, time of day, season or other features in outdoor photos with simple text commands. Machine learning and a clever database make it possible. A paper describing the work will be presented at SIGGRAPH 2014.
Performing systematic analyses of both known and imagined chemical compounds to find their key properties, Northwestern Univ. engineers have created a database that takes some of the guesswork out of designing new materials. Called the Open Quantum Materials Database (OQMD), it launched in November and is the largest database in the world of its kind, containing analyses of 285,780 compounds and growing.
A fundamental chemical pathway that all plants use to create an essential amino acid needed by all animals to make proteins has now been traced to two groups of ancient bacteria. The pathway is also known for making hundreds of chemicals, including a compound that makes wood strong and the pigments that make red wine red.
Borrowing from the ancient Japanese art of origami, children's toys and even a touch of the "Transformers" movies, scientists and engineers at Harvard University and the Massachusetts Institute of Technology have created self-assembling, paper robots. These complex machines transform themselves from little more than a sheet of paper and plastic into walking automatons.
For decades, scientists have been trying to use quantum systems for logical calculations, but implementing a system that manages superposition states is challenging. A team of researchers in Austria and Japan has now proposed a new architecture based on microscopic defects in diamond. They are convinced that the basic elements of their newly proposed architecture are better suited to be miniaturized, mass-produced and integrated on a chip.
Russian hackers have stolen 1.2 billion user names and passwords in a series of Internet heists affecting 420,000 websites, according to a report published Tuesday. The thievery was described in a New York Times story based on the findings of Hold Security, a Milwaukee firm that has a history of uncovering online security breaches. For confidentiality reasons, the identities of the affected websites weren't identified by the Times.
By carefully controlling the position of an atomic-scale diamond defect within a volume smaller than what some viruses would fill, researchers have cleared a path toward better quantum computers and nanoscale sensors. These diamond defects are attractive candidates for qubits, the quantum equivalent of a computing bit, and accurate positioning is key to using them to store and transmit information.
Imagine a world in which your wristwatch or other wearable device communicates directly with your online profiles, storing information about your daily activities where you can best access it—all without requiring batteries. Or, battery-free sensors embedded around your home could track minute-by-minute temperature changes and send that information to your thermostat to help conserve energy.
- Page 1