Showing 20 articles starting at article 361
< Previous 20 articles Next 20 articles >
Categories: Computer Science: Encryption, Engineering: Robotics Research
Published New winged robot can land like a bird


Researchers have developed a method that allows a flapping-wing robot to land autonomously on a horizontal perch using a claw-like mechanism. The innovation could significantly expand the scope of robot-assisted tasks.
Published Designing better battery electrolytes


Scientists give the lay of the land in the quest for electrolytes that could enable revolutionary battery chemistries.
Published Researchers develop wireless, ultrathin 'Skin VR' to provide a vivid, 'personalized' touch experience in the virtual world


Enhancing the virtual experience with the touch sensation has become a hot topic, but today's haptic devices remain typically bulky and tangled with wires. Researchers have now developed an advanced wireless haptic interface system, called WeTac, worn on the hand, which has soft, ultrathin soft features, and collects personalized tactile sensation data to provide a vivid touch experience in the metaverse.
Published New robot does 'the worm' when temperature changes


A new gelatinous robot that crawls, powered by nothing more than temperature change and clever design, brings 'a kind of intelligence' to the field of soft robotics.
Published Molecular shape-shifting


Structures made out of building blocks can shift their shape and autonomously self-organize to a new configuration. The physicists revealed this mechanism which may be used to actively manipulate molecular organization. A seed of the novel desired configuration is sufficient to trigger reorganization. This principle can be applied on to biological building blocks which are constantly recycled to form new structures in living systems.
Published Model shows how intelligent-like behavior can emerge from non-living agents


A new model describes how biological or technical systems form complex structures equipped with signal-processing capabilities that allow the systems to respond to stimulus and perform functional tasks without external guidance.
Published Bolstering the safety of self-driving cars with a deep learning-based object detection system


Self-driving cars need to implement efficient, effective, and accurate detection systems to provide a safe and reliable experience to its users. To this end, an international research team has now developed an end-to-end neural network that, in conjunction with the Internet-of-Things technology, detects object with high accuracy (> 96%) in both 2D and 3D. The new method outperforms the current state-of-the-art methods and the way to new 2D and 3D detection systems for autonomous vehicles.
Published Researchers propose methods for automatic detection of doxing


A new automated approach to detect doxing -- a form of cyberbullying in which certain private or personally identifiable information is publicly shared without an individual's consent or knowledge -- may help social media platforms better protect their users, according to researchers.
Published Soft robot detects damage, heals itself


Engineers have created a soft robot capable of detecting when and where it was damaged -- and then healing itself on the spot.
Published Researchers use ultrasound waves to move objects hands-free


Researchers have discovered a new method to move objects using ultrasound waves, opening the door for using contactless manipulation in industries such as robotics and manufacturing.
Published Checking blood pressure in a heartbeat, using artificial intelligence and a camera



Engineers have designed a system to remotely measure blood pressure by filming a person's forehead and extracting cardiac signals using artificial intelligence algorithms.
Published Pulses driven by artificial intelligence tame quantum systems



Machine learning drives self-discovery of pulses that stabilize quantum systems in the face of environmental noise.
Published Microlaser chip adds new dimensions to quantum communication


With only two levels of superposition, the qubits used in today's quantum communication technologies have limited storage space and low tolerance for interference. Engineering's hyperdimensional microlaser generates 'qudits,' photons with four simultaneous levels of information. The increase in dimension makes for robust quantum communication technology better suited for real-world applications.
Published New AI model can help prevent damaging and costly data breaches


Privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for potential data leaks.
Published New method to systematically find optimal quantum operation sequences for quantum computers developed


Computer scientists have succeeded in developing a method for systematically finding the optimal quantum operation sequence for a quantum computer. They have developed a systematic method that applies optimal control theory (GRAPE algorithm) to identify the theoretically optimal sequence from among all conceivable quantum operation sequences. This method is expected to become a useful tool for medium-scale quantum computers and is expected to contribute to improving the performance of quantum computers and reducing environmental impact in the near future.
Published From bits to p-bits: One step closer to probabilistic computing


Scientists have developed a mathematical description of what happens within tiny magnets as they fluctuate between states when an electric current and magnetic field are applied. Their findings could act as the foundation for engineering more advanced computers that can quantify uncertainty while interpreting complex data.
Published Thinking like a cyber-attacker to protect user data


Researchers have shown that a component of modern computer processors that enables different areas of the chip to communicate with each other is susceptible to a side-channel attack. An attacker can monitor how traffic from two different cores on a processor interferes with each other to extract secret information, like a cryptographic key.
Published A key role for quantum entanglement


A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists has now demonstrated experimentally, for the first time, an approach to quantum key distribution that is based on high-quality quantum entanglement -- offering much broader security guarantees than previous schemes.
Published Quantum cryptography: Hacking is futile


An international team has successfully implemented an advanced form of quantum cryptography for the first time. Moreover, encryption is independent of the quantum device used and therefore even more secure against hacking attempts.
Published 'Pulling back the curtain' to reveal a molecular key to The Wizard of Oz


Many people and companies worry about sensitive data getting hacked, so encrypting files with digital keys has become more commonplace. Now, researchers have developed a durable molecular encryption key from sequence-defined polymers that are built and deconstructed in a sequential way. They hid their molecular key in the ink of a letter, which was mailed and then used to decrypt a file with text from a classic story.