Showing 20 articles starting at article 501
< Previous 20 articles Next 20 articles >
Categories: Computer Science: Encryption, Geoscience: Oceanography
Published Due to their feed, chicken and farmed salmon have remarkably similar environmental footprints


We love our chicken. We love our salmon. Thanks to how we farm these two popular proteins, their environmental footprints are surprisingly similar.
Published Asphalt volcano communities


Santa Barbara Channel's natural oil seeps are a beach-goer's bane, flecking the shores with blobs of tar. But the leaking petroleum also creates fascinating geologic and biologic features. About 10 miles off the coast of Santa Barbara, several jet-black mounds interrupt the featureless sea floor. These asphalt volcanoes, virtually unique in the world, provide a rare habitat in a region known for its underwater biodiversity.
Published Chromo-encryption method encodes secrets with color


In a new approach to security that unites technology and art, E researchers have combined silver nanostructures with polarized light to yield a range of brilliant colors, which can be used to encode messages.
Published Deep-sea black carbon comes from hydrothermal vents


Hydrothermal vents have been identified as a previously undiscovered source of dissolved black carbon in the oceans, furthering the understanding of the role of oceans as a carbon sink.
Published Record low sea ice cover in the Antarctic



There is currently less sea ice in the Antarctic than at any time in the forty years since the beginning of satellite observation: in early February 2023, only 2.20 million square kilometers of the Southern Ocean were covered with sea ice.
Published New land creation on waterfronts increasing, study finds



Humans are artificially expanding cities' coastlines by extending industrial ports and creating luxury residential waterfronts. Developers have added over 2,350 square kilometers of land (900 square miles, or about 40 Manhattans) to coastlines in major cities since 2000, according to a new study. The study reports the first global assessment of coastal land reclamation, which is the process of building new land or filling in coastal water bodies, including wetlands, to expand a coastline. The researchers used satellite imagery to analyze land changes in 135 cities with populations of at least 1 million, 106 of which have done some coastline expansion.
Published The cod population off the coast of Sweden is not extinct



Through DNA analyses, researchers have identified that there are still juvenile coastal cod off the west coast of Sweden. However, it is still difficult to find any mature adult cod in the area.
Published Past records help to predict different effects of future climate change on land and sea



Ongoing climate change driven by greenhouse gas emissions is often discussed in terms of global average warming. For example, the landmark Paris Agreement seeks to limit global warming to 1.5 degrees C, relative to pre-industrial levels. However, the extent of future warming will not be the same throughout the planet. One of the clearest regional differences in climate change is the faster warming over land than sea. This 'terrestrial amplification' of future warming has real-world implications for understanding and dealing with climate change.
Published Marine reserves unlikely to restore marine ecosystems


Protected marine areas are one of the essential tools for the conservation of natural resources affected by human impact -- mainly fishing --, but, are they enough to recover the functioning of these systems? A study now highlights the limitations of marine reserves in restoring food webs to their pristine state prior to the impact of intensive fishing.
Published Devastating cost of future coastal flooding for many developing nations predicted in new study


New global modelling predicts the devastating socioeconomic impacts of future extreme coastal flooding for developing nations caused by climate change, with Asia, West Africa and Egypt facing severe costs in the coming decades.
Published Plastic debris in the Arctic comes from all around the world


In the course of five years, citizens who went on sailing cruises to the Arctic surveyed and collected plastic debris that had washed up on the shores of Svalbard. This has now been analyzed. According to the findings, one third of the plastic debris which still bore imprints or labels allowing an analysis of their origin came from Europe, and much of that number from Germany.
Published Changing climate conditions likely facilitated early human migration to the Americas at key intervals, research suggests



Researchers have pinpointed two intervals when ice and ocean conditions would have been favorable to support early human migration from Asia to North America late in the last ice age, a new paper shows.
Published More frequent atmospheric rivers hinder seasonal recovery of Arctic sea ice


The Arctic is rapidly losing sea ice, even during winter months when temperatures are below freezing and ice should be recovering from the summer melt. A new study found powerful storms called atmospheric rivers are increasingly reaching the Arctic in winter, slowing sea ice recovery and accounting for a third of all winter sea ice decline, according to a team led by Penn State scientists.
Published Quantum physicists make major nanoscopic advance



In a new breakthrough, researchers have solved a problem that has caused quantum researchers headaches for years. The researchers can now control two quantum light sources rather than one. Trivial as it may seem to those uninitiated in quantum, this colossal breakthrough allows researchers to create a phenomenon known as quantum mechanical entanglement. This in turn, opens new doors for companies and others to exploit the technology commercially.
Published Researchers propose methods for automatic detection of doxing


A new automated approach to detect doxing -- a form of cyberbullying in which certain private or personally identifiable information is publicly shared without an individual's consent or knowledge -- may help social media platforms better protect their users, according to researchers.
Published Microlaser chip adds new dimensions to quantum communication


With only two levels of superposition, the qubits used in today's quantum communication technologies have limited storage space and low tolerance for interference. Engineering's hyperdimensional microlaser generates 'qudits,' photons with four simultaneous levels of information. The increase in dimension makes for robust quantum communication technology better suited for real-world applications.
Published New AI model can help prevent damaging and costly data breaches


Privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for potential data leaks.
Published New method to systematically find optimal quantum operation sequences for quantum computers developed


Computer scientists have succeeded in developing a method for systematically finding the optimal quantum operation sequence for a quantum computer. They have developed a systematic method that applies optimal control theory (GRAPE algorithm) to identify the theoretically optimal sequence from among all conceivable quantum operation sequences. This method is expected to become a useful tool for medium-scale quantum computers and is expected to contribute to improving the performance of quantum computers and reducing environmental impact in the near future.
Published From bits to p-bits: One step closer to probabilistic computing


Scientists have developed a mathematical description of what happens within tiny magnets as they fluctuate between states when an electric current and magnetic field are applied. Their findings could act as the foundation for engineering more advanced computers that can quantify uncertainty while interpreting complex data.
Published Thinking like a cyber-attacker to protect user data


Researchers have shown that a component of modern computer processors that enables different areas of the chip to communicate with each other is susceptible to a side-channel attack. An attacker can monitor how traffic from two different cores on a processor interferes with each other to extract secret information, like a cryptographic key.