Mathematics: Statistics
Published

Researchers use supercomputers for largest-ever turbulence simulations of its kind      (via sciencedaily.com) 

Despite being among the most researched topics on supercomputers, a fundamental understanding of the effects of turbulent motion on fluid flows still eludes scientists. A new approach aims to change that.

Mathematics: Statistics
Published

New computer vision system designed to analyse cells in microscopy videos      (via sciencedaily.com) 

Researchers have developed a system based on computer vision techniques that allows automatic analysis of biomedical videos captured by microscopy in order to characterize and describe the behavior of the cells that appear in the images.

Mathematics: Statistics
Published

Where mathematics and a social perspective meet data      (via sciencedaily.com) 

Community structure, including relationships between and within groups, is foundational to our understanding of the world around us.

Mathematics: Statistics
Published

Capturing hidden data for asymptomatic COVID-19 cases provides a better pandemic picture      (via sciencedaily.com) 

Asymptomatic COVID-19 cases are the bane of computer modelers' existences -- they throw off the modeling data to an unknown degree. A new approach explores using historic epidemic data from eight different countries to estimate the transmission rate and fraction of under-reported cases.

Computer Science: Encryption Mathematics: Puzzles
Published

The power of chaos: A robust and low-cost cryptosystem for the post-quantum era      (via sciencedaily.com) 

Scientists develop a chaos-based stream cipher that can withstand attacks from large-scale quantum computers.

Mathematics: Statistics
Published

New computational tool predicts cell fates and genetic perturbations      (via sciencedaily.com) 

Researchers have built a machine learning framework that can define the mathematical equations describing a cell's trajectory from one state to another, such as its development from a stem cell into one of several different types of mature cell. The framework, called dynamo, can also be used to figure out the underlying mechanisms -- the specific cocktail of gene activity -- driving changes in the cell.

Computer Science: Encryption
Published

How big does your quantum computer need to be?      (via sciencedaily.com) 

Researchers decided to explore two very different quantum problems: breaking the encryption of Bitcoin and simulating the molecule responsible for biological nitrogen fixation. They describe a tool they created to determine how big a quantum computer needs to be to solve problems like these and how long it will take.

Mathematics: Statistics
Published

Enhanced statistical models will aid conservation of killer whales and other species      (via sciencedaily.com) 

Retrieving an accurate picture of what a tagged animal does as it journeys through its environment requires statistical analysis, especially when it comes to animal movement, and the methods statisticians use are always evolving to make full use of the large and complex data sets that are available. A recent study by researchers at the Institute for the Oceans and Fisheries (IOF) and the UBC department of statistics has taken us a step closer to understanding the behaviours of northern resident killer whales by improving statistical tools useful for identifying animal behaviours that can't be observed directly.

Computer Science: Encryption
Published

IT security: Computer attacks with laser light      (via sciencedaily.com) 

Computer systems that are physically isolated from the outside world (air-gapped) can still be attacked. This is demonstrated by IT security experts. They show that data can be transmitted to light-emitting diodes of regular office devices using a directed laser. With this, attackers can secretly communicate with air-gapped computer systems over distances of several meters. In addition to conventional information and communication technology security, critical IT systems need to be protected optically as well.

Computer Science: Encryption Engineering: Biometric
Published

Real-world study shows the potential of gait authentication to enhance smartphone security      (via sciencedaily.com) 

A study showed that -- within an appropriate framework -- gait recognition could be a viable technique for protecting individuals and their data from potential crime.

Mathematics: Statistics
Published

How statistics can aid in the fight against misinformation      (via sciencedaily.com) 

Mathematicians created a statistical model that can be used to detect misinformation in social posts.

Mathematics: Statistics
Published

Grouping of immune cell receptors could help decode patients' personal history of infection      (via sciencedaily.com) 

Novel software for grouping immunological T-cell receptors may enable the identification of shared patterns that could be used to determine if a person has previously been infected or vaccinated against a given pathogen.

Computer Science: Encryption
Published

New chip hides wireless messages in plain sight      (via sciencedaily.com) 

Researchers have developed a method for incorporating security in the physical nature of the wireless transmission signal for 5G and future networks.

Computer Science: Encryption
Published

A nanoantenna for long-distance, ultra-secure communication      (via sciencedaily.com) 

Researchers have used a nanoantenna to focus light onto a single semiconductor nanobox. This approach will enhance the utility of quantum repeater technology currently under development for advanced communication and data storage. Such technology is essential to overcoming the limitations of classical computer information for securely sharing information over long distances.

Computer Science: Encryption
Published

Big data privacy for machine learning just got 100 times cheaper      (via sciencedaily.com) 

Computer scientists have discovered an inexpensive way for tech companies to implement a rigorous form of personal data privacy when using or sharing large databases for machine learning.

Computer Science: Encryption Engineering: Biometric
Published

Securing data transfers with relativity      (via sciencedaily.com) 

To counter hacking, researchers have developed a new system based on the concept of 'zero-knowledge proofs', the security of which is based on the physical principle of relativity: information cannot travel faster than the speed of light. Thus, one of the fundamental principles of modern physics allows for secure data transfer.

Mathematics: Statistics
Published

New strategy for detecting non-conformist particles called anyons      (via sciencedaily.com) 

By observing how strange particles called anyons dissipate heat, researchers have shown that they can probe the properties of these particles in systems that could be relevant for topological quantum computing.

Computer Science: Encryption
Published

Physicists describe photons’ characteristics to protect future quantum computing      (via sciencedaily.com) 

Physicists have described in theoretical terms how to develop codes that cannot be broken by quantum computers -- computing devices of the future. These codes rely on distributing single photons that share a quantum character solely among the parties that wish to communicate.

Computer Science: Encryption Mathematics: Puzzles
Published

Using quantum Parrondo’s random walks for encryption      (via sciencedaily.com) 

SUTD has set out to apply concepts from quantum Parrondo's paradox in search of a working protocol for semiclassical encryption.

Mathematics: Statistics
Published

Calculating the path of cancer      (via sciencedaily.com) 

Scientists are using a new mathematical tool to predict how combinations of genetic mutations cause different types of tumors.