Illustration of a KTN crystal operating under different phases.Credit: Penn State A major technological advance in the field of high-speed beam-scanning devices has increased the speed of 2D and 3D printing by up to 1000 times, according to researchers in...
This graphic depicts the operation of a new portable crime-scene forensics technology designed to take precise, high-resolution 3-D images of shoeprints and tire-tread marks. The technology works by encoding data in LED light that is projected onto the snow...
Credit: Michigan State University Using the largest computer in Japan - one of the most powerful in the world - research led by an MSU scientist has achieved breakthroughs in understanding how proteins are affected by realistic biological environments. The...
When you check your Twitter feed, do you assume there is a real person behind each Tweet that is posted or shared? After all, there is a name and a photo, so it must be a real person behind...
Technology will benefit display companies in manufacturing low cost and light weight 2D/3D convertible displays for mobile applications Convertible video displays that offer both 2D and 3D imaging without the need of any eyewear offer greater convenience to users who...
Image Credit: Carnegie Mellon University Electrical and Computer Engineering A revolutionary and emerging class of energy-harvesting computer systems require neither a battery nor a power outlet to operate, instead operating by harvesting energy from their environment. While radio waves, solar...
Researchers from MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL) have devised a way to train neural networks so that they provide not only predictions and classifications but rationales for their decisions.Illustration: Christine Daniloff/MIT New training technique would reveal the...
Researchers from Binghamton University -- State University of New York and the University of California, Riverside have found a weakness in the Haswell central processing unit (CPU) components that makes common computer operating systems vulnerable to malicious attacks. Computer hackers...
Image Credit: Flickr/cyberhades Malicious websites promoting scams, distributing malware and collecting phished credentials pervade the web. As quickly as we block or blacklist them, criminals set up new domain names to support their activities. Now a research team including Princeton...
The findings demonstrate silent, eyes-free text entry on a mobile device without a keyboard (participants touched on Glass's touchpad to enter Morse code during quizzes). Many mobile or wearable devices cannot accommodate a full keyboard, so it is a...
The sapphire crystal on display at the University of Adelaide. Credit: University of Adelaide The world's most precise clock has been fine-tuned to boost radar and GPS capabilities. The Cryogenic Sapphire Oscillator, or Sapphire Clock, has been enhanced by researchers from...