Showing 20 articles starting at article 121
< Previous 20 articles Next 20 articles >
Categories: Computer Science: Encryption, Mathematics: Statistics
Published Researchers use supercomputers for largest-ever turbulence simulations of its kind


Despite being among the most researched topics on supercomputers, a fundamental understanding of the effects of turbulent motion on fluid flows still eludes scientists. A new approach aims to change that.
Published New computer vision system designed to analyse cells in microscopy videos


Researchers have developed a system based on computer vision techniques that allows automatic analysis of biomedical videos captured by microscopy in order to characterize and describe the behavior of the cells that appear in the images.
Published Where mathematics and a social perspective meet data


Community structure, including relationships between and within groups, is foundational to our understanding of the world around us.
Published Capturing hidden data for asymptomatic COVID-19 cases provides a better pandemic picture


Asymptomatic COVID-19 cases are the bane of computer modelers' existences -- they throw off the modeling data to an unknown degree. A new approach explores using historic epidemic data from eight different countries to estimate the transmission rate and fraction of under-reported cases.
Published The power of chaos: A robust and low-cost cryptosystem for the post-quantum era


Scientists develop a chaos-based stream cipher that can withstand attacks from large-scale quantum computers.
Published New computational tool predicts cell fates and genetic perturbations


Researchers have built a machine learning framework that can define the mathematical equations describing a cell's trajectory from one state to another, such as its development from a stem cell into one of several different types of mature cell. The framework, called dynamo, can also be used to figure out the underlying mechanisms -- the specific cocktail of gene activity -- driving changes in the cell.
Published How big does your quantum computer need to be?


Researchers decided to explore two very different quantum problems: breaking the encryption of Bitcoin and simulating the molecule responsible for biological nitrogen fixation. They describe a tool they created to determine how big a quantum computer needs to be to solve problems like these and how long it will take.
Published Enhanced statistical models will aid conservation of killer whales and other species


Retrieving an accurate picture of what a tagged animal does as it journeys through its environment requires statistical analysis, especially when it comes to animal movement, and the methods statisticians use are always evolving to make full use of the large and complex data sets that are available. A recent study by researchers at the Institute for the Oceans and Fisheries (IOF) and the UBC department of statistics has taken us a step closer to understanding the behaviours of northern resident killer whales by improving statistical tools useful for identifying animal behaviours that can't be observed directly.
Published IT security: Computer attacks with laser light


Computer systems that are physically isolated from the outside world (air-gapped) can still be attacked. This is demonstrated by IT security experts. They show that data can be transmitted to light-emitting diodes of regular office devices using a directed laser. With this, attackers can secretly communicate with air-gapped computer systems over distances of several meters. In addition to conventional information and communication technology security, critical IT systems need to be protected optically as well.
Published Real-world study shows the potential of gait authentication to enhance smartphone security


A study showed that -- within an appropriate framework -- gait recognition could be a viable technique for protecting individuals and their data from potential crime.
Published How statistics can aid in the fight against misinformation


Mathematicians created a statistical model that can be used to detect misinformation in social posts.
Published Grouping of immune cell receptors could help decode patients' personal history of infection


Novel software for grouping immunological T-cell receptors may enable the identification of shared patterns that could be used to determine if a person has previously been infected or vaccinated against a given pathogen.
Published New chip hides wireless messages in plain sight


Researchers have developed a method for incorporating security in the physical nature of the wireless transmission signal for 5G and future networks.
Published A nanoantenna for long-distance, ultra-secure communication


Researchers have used a nanoantenna to focus light onto a single semiconductor nanobox. This approach will enhance the utility of quantum repeater technology currently under development for advanced communication and data storage. Such technology is essential to overcoming the limitations of classical computer information for securely sharing information over long distances.
Published Big data privacy for machine learning just got 100 times cheaper


Computer scientists have discovered an inexpensive way for tech companies to implement a rigorous form of personal data privacy when using or sharing large databases for machine learning.
Published Securing data transfers with relativity


To counter hacking, researchers have developed a new system based on the concept of 'zero-knowledge proofs', the security of which is based on the physical principle of relativity: information cannot travel faster than the speed of light. Thus, one of the fundamental principles of modern physics allows for secure data transfer.
Published New strategy for detecting non-conformist particles called anyons


By observing how strange particles called anyons dissipate heat, researchers have shown that they can probe the properties of these particles in systems that could be relevant for topological quantum computing.
Published Physicists describe photons’ characteristics to protect future quantum computing


Physicists have described in theoretical terms how to develop codes that cannot be broken by quantum computers -- computing devices of the future. These codes rely on distributing single photons that share a quantum character solely among the parties that wish to communicate.
Published Using quantum Parrondo’s random walks for encryption


SUTD has set out to apply concepts from quantum Parrondo's paradox in search of a working protocol for semiclassical encryption.
Published Calculating the path of cancer


Scientists are using a new mathematical tool to predict how combinations of genetic mutations cause different types of tumors.