After years of making progress on an organic aqueous flow battery, Harvard University researchers ran into a problem: the organic anthraquinone molecules that powered their ground-breaking battery were slowly decomposing over time, reducing the long-term usefulness of the battery.
* This article was originally published here
This Blog Is Powered By Life Technology™. Visit Life Technology™ At www.lifetechnology.com Subscribe To This Blog Via Feedburner / Atom 1.0 / RSS 2.0.
Wednesday, 5 June 2019
Security and privacy rarely considered before buying IoT devices
In today's often-precarious security and privacy landscape, you'd think consumers would be taking security and privacy risks into serious consideration when purchasing new IoT devices. And you'd be wrong.
* This article was originally published here
* This article was originally published here
Mojo Vision shows off display technology for augmented reality
What meets the eye is important—but in the case of entering the realm of augmented reality, how it meets the eye is an issue. A California company is on that case. They have technology to let AR users keep in the flow eyes-up. Hands-free.
* This article was originally published here
* This article was originally published here
Consumers want food labelling details spoon-fed
In 2016, Congress passed a federal mandate requiring manufacturers to label bioengineered foods. Since then, industry leaders have been searching for quick and easily accessible methods for sharing information about how and why a product was bioengineered, and the impact that might have on the consumer or the environment.
* This article was originally published here
* This article was originally published here
New approach optimizes use of future wave electricity generators during disaster
When hurricanes strike, loss of electricity ranks as one of the top concerns for relief workers. Blackouts lasting a week or more can hamper recovery efforts, shutter hospitals, threaten public health and disrupt transportation. The monthslong effort to restore power to Puerto Rico following the 2017 hurricane season has led to renewed interest in finding innovative ways to get affected power grids back online.
* This article was originally published here
* This article was originally published here
Hoard of the rings: Unusual rings are a novel type of Bronze Age cereal-based product
Strange ring-shaped objects in a Bronze Age hillfort site represent a unique form of cereal-based product, according to a study published June 5, 2019 in the open-access journal PLOS ONE by Andreas G. Heiss of the Austrian Archaeological Institute (ÖAW-ÖAI) and colleagues.
* This article was originally published here
* This article was originally published here
Shared control allows a robot to use two hands working together to complete tasks
A team of researchers from the University of Wisconsin and the Naval Research Laboratory has designed and built a robotic system that allows for bimanual robot manipulation through shared control. In their paper published in the journal Science Robotics, the group explains the ideas behind their work and how well they worked in practice.
* This article was originally published here
* This article was originally published here
Defense against wireless attacks using a deep neural network and game theory
A growing number of devices are now connected to the internet and are capable of collecting, sending and receiving data. This interconnection between devices, referred to as the Internet of Things (IoT), poses serious security threats, as cyberattackers can now target computers and smartphones, but also a vast array of other devices, such as tablets, smart watches, smart home systems, transportation systems and so on.
* This article was originally published here
* This article was originally published here
Finding fake fingerprints
It was once the stuff of science fiction security, open your eye wide and look into the camera to gain entry to the spaceship flight deck or press a finger tip or palm of your against the pad to access the secret database that lets you take control of the baddies' weapons. Today, of course, iris recognition, fingerprint readers, and other biometric systems are becoming increasingly commonplace. Most modern smart phones have a fingerprint reader that lets you unlock your phone without having to remember a password or number.
* This article was originally published here
* This article was originally published here
Apple's new Photos app for iOS 13 may just be the tool you've been waiting for
We take more and more photos every year on our new and improved smartphones, but finding them is probably the greatest pain point consumers face.
* This article was originally published here
* This article was originally published here
Study compares different strategies for treating insomnia
New research indicates that for treating insomnia, stimulus control therapy (which reassociates the bed with sleepiness instead of arousal) and sleep restriction therapy are effective, and it is best to use them individually rather than together.
* This article was originally published here
* This article was originally published here
Researchers try to recreate human-like thinking in machines
Researchers at Oxford University have recently tried to recreate human thinking patterns in machines, using a language guided imagination (LGI) network. Their method, outlined in a paper pre-published on arXiv, could inform the development of artificial intelligence that is capable of human-like thinking, which entails a goal-directed flow of mental ideas guided by language.
* This article was originally published here
* This article was originally published here
Energy storage project in Utah described as world's largest of its kind
Mitsubishi Hitachi Power Systems (MHPS) announced an ambitious energy storage project to develop what it claims will be the world's largest energy storage project of its kind, in Utah. Renewable hydrogen is at the core.
* This article was originally published here
* This article was originally published here
Study finds tie between attributing hostile intent and aggression in children and youth
Children who tend to attribute hostile motives to other people are more likely to display aggression, however, the strength of this relationship varies. A new meta-analysis sought to determine the relation between attributing hostile intent and aggressive behavior. It found that the relation between the two is the strongest in tasks that are emotionally engaging, such as when someone is provoked or loses a game. It also found that attributing hostile intent to others guides the way individuals process information across a broad range of contexts, suggesting that learning to attribute hostile intent in one situation may contribute to aggression in other situations.
* This article was originally published here
* This article was originally published here
A deep neural network that can maximize or minimize coloring to blend into or stand out against a background
A team of researchers at the University of Bristol has developed a deep learning neural network that can identify the best way to minimize or maximize coloring to allow for blending into a background or standing out. In their paper published in Journal of the Royal Society Interface, the team describes their network and possible uses for it.
* This article was originally published here
* This article was originally published here
Subscribe to:
Posts (Atom)