A new white paper from Decision Lens teaches how world-class innovation teams create standard frameworks to evaluate and prioritize the strategic investments that deliver the highest returns on investment, streamlining and accelerating the R&D portfolio planning process.
Sandia National Laboratories’ Goma 6.0 is software for...
Modeling and simulation is standard practice in nearly every scientific field. Idaho National...
Mapping of the human genome has advanced our understanding of life, health and potential cures for diseases. Many technologies could benefit from genome-level investigations. Now, a disruptive virtual scientific simulation tool that delivers a genome-level investigation for electrolytes is available. Idaho National Laboratory’s Kevin Gering has developed the Advanced Electrolyte Model (AEM), a molecular-based, scientifically proven simulation tool.
Researchers from North Carolina State Univ. have developed a novel and versatile modeling strategy to simulate polyelectrolyte systems. The model has applications for creating new materials as well as for studying polyelectrolytes, including DNA and RNA. Polyelectrolytes are chains of molecules that are positively or negatively charged when placed in water.
Computer security researchers have developed a modification to the core Android operating system that allows developers and users to plug in new security enhancements. The new Android Security Modules (ASM) framework aims to eliminate the bottleneck that prevents developers and users from taking advantage of new security tools.
With a method known as finite element analysis (FEA), engineers can generate 3-D digital models of large structures to simulate how they’ll fare under stress, vibrations, heat and other real-world conditions. Used for mapping out large-scale structures, these simulations require intensive computation done by powerful computers over many hours, costing engineering firms much time and money.
Oak Ridge National Laboratory’s DUCCS is ultra-efficient software that utilizes highly parallel chaotic map computations to quickly (in a few minutes) and efficiently detect component faults in computing units, memory elements and interconnects of hybrid CPU-GPU computing systems.
Port scanners are programs that search the Internet for systems that exhibit potential vulnerabilities. According to report published online, Hacienda is one such port scanning program. The report says that this program is being put into service by the "Five Eyes," a federation of Western secret services. Scientists have developed free software that can help prevent this kind of identification and thus the subsequent capture of systems.
Software developed by Univ. of California, Berkeley computer scientists seeks to tame the vast amount of visual data in the world by generating a single photo that can represent massive clusters of images. This tool can give users the photographic gist of a kid on Santa’s lap, housecats, or brides and grooms at their weddings. It works by generating an image that literally averages the key features of the other photos.
Rutgers Univ. researchers have shown that GPS technology is not needed to show where a driver traveled. A starting point and the driver's speed are enough when using a technique dubbed “elastic pathing”, which predicts pathways by seeing how speed patterns match street layouts. This could cause concerns for privacy, however, since many insurance companies offer discounts in return for customers allowing their driving habits to be monitored.
Russian hackers have stolen 1.2 billion user names and passwords in a series of Internet heists affecting 420,000 websites, according to a report published Tuesday. The thievery was described in a New York Times story based on the findings of Hold Security, a Milwaukee firm that has a history of uncovering online security breaches. For confidentiality reasons, the identities of the affected websites weren't identified by the Times.
Editors of photos routinely resize objects, or move them up, down or sideways, but Carnegie Mellon Univ. researchers are adding an extra dimension to photo editing by enabling editors to turn or flip objects any way they want, even exposing surfaces not visible in the original photograph.
An integrated, web-based platform for measuring research output and impact, monitoring trends and benchmarking, InCites is Thomson Reuters’ latest effort to allow users to easily assess and look beyond the global influence of a specific journal to conduct transparent analysis and make better decisions. The expanded assessment solution has been implemented on the 2014 edition of Journal Citation Reports.
By now, most scientists agree that the temperature of the planet is rising and that the increase is due to human activities. But the jury still out regarding the variability of that increase. Researchers using “big data” computational tools have recently taken a systematic approach to answering this question and their results point to both higher global temperatures and increasing variability among those temperature extremes.
An affordable digital reading system invented by researchers in Australia now allows people who are blind to read more than just words. The device works by using pattern recognition technology and other methods on any document to identify images, graphs, maths or text. From here it is then converted to audio format with navigation markup.
“Big data” has yet to make a mark on conservation efforts to preserve the planet’s biodiversity. But that may soon change with a new model developed by Univ. of California, Berkeley, biologist Brent Mishler and his colleagues in Australia. This effort leverages the growing mass of data to take into account not only the number of species throughout an area, but also the variation among species and their geographic rarity, or endemism.
A Brown Univ. group has developed a wireless virtual reality system to study a phenomenon that scientists don’t yet understand: How pedestrians interact with each other and how those individual behaviors, in turn, generate patterns of crowd movement. The system, which uses motion capture technology can immerse up to four people in a carefully controlled, realistic virtual crowd.
Fully automated "deep learning" by computers greatly improves the odds of discovering particles such as the Higgs boson, according to a recent study. In fact, this approach beats even veteran physicists' abilities, which now consists of developing mathematical formulas by hand to apply to data. New machine learning methods are rendering that approach unnecessary.
An Android update, wearable gadgets, and so-called smart home devices are just some of the innovations Google is likely to show off at its two-day developer conference, which begins today in San Francisco. In recent years, the conference has focused on smartphones and tablets, but this year Google's Android operating system is expected to stretch into cars, homes, and smartwatches.
Executive functions in your brain are important for making decisions in everyday life when you have to deal with sudden changes in your environment. A recent study by scientists in Singapore showed that adults who played the physics-based puzzle video game Cut the Rope regularly, for as little as an hour a day, had improved executive functions. This marks the first time video games have been shown to deliver such broad improvements.
The Supreme Court on Thursday tossed out an Australian company's patent for business software in a closely watched case that clarifies standards for awarding patents. The justices ruled unanimously that the government should not have issued a patent to Alice Corp. in the 1990s because the company simply took an abstract idea that has been around for years and programmed it to run through a computer.
The National Science Foundation has announced a five-year, $4 million award to tackle the challenge of synchronizing time in cyber-physical systems, which are systems that integrate sensing, computation, control and networking into physical objects and infrastructure. The grant brings together expertise from five universities to improve the way computers maintain knowledge of time and synchronize it with other networked devices.
Without a specific search term in mind, it can be surprisingly hard to find information on the Internet , or to know how to start searching. To help, computer scientists have created the first fully automated computer program that teaches everything there is to know about any visual concept. Called Learning Everything about Anything (LEVAN), the program searches millions of books and images to learn all possible variations of a concept.
Upon introducing engineering simulation into an organization, it’s important to formulate an implementation plan. Simply telling the engineering team to “have at it” doesn’t generally lead to positive results. Every plan will be different, but all can benefit from some basic considerations.
Computer scientists at Microsoft Research and the University of California, San Diego have developed a system, called ParentGuardian, that combines a mobile application and sensor to detect stress in parents. The system, initially tested on parents of children with ADHD, delivers research-based strategies to help decrease stress during emotionally charged interactions with children.
After another year of flat spending in 2013, global investment in R&D is forecast to grow by 3.8% to $1.6 trillion in 2014, according the annual R&D Magazine Global Funding Forecast. In the U.S., federal spending is forecast to increase modestly (1.5%), another promising sign, but it’s fair to say the pressure is still on to do more with less, particularly in Big Pharma where recent R&D cuts have been the most dramatic.
Pharmaceutical companies are constantly seeking ways to improve efficiency in order to increase productivity, all while speeding up innovation and protecting intellectual property (IP). The use of mobile applications (apps) in the laboratory has been investigated as a means to achieve these goals. By allowing scientists to move freely around the laboratory, mobile apps add value to suboptimal processes requiring non-value-added steps.
- Page 1