Bluesky Facebook Reddit Email

NSF backs first community platform for smarter wireless

Rice University researchers are developing an open-source platform to turbo-charge the research process of inventing novel machine-learning based techniques for intelligent wireless network management and optimization. The 3DML platform will provide agile and flexible tools to manage and protect complex wireless networks.

GoPro HERO13 Black

GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.

Hey, Alexa, who else is listening right now?

Researchers at the University of Cincinnati are exploring potential security weaknesses in voice-activated speakers like Alexa and Google Home. They found that hackers can exploit devices using a passive attack called 'voice command fingerprinting', which involves eavesdropping on data transferred between the smart speaker and the clou...

Rigol DP832 Triple-Output Bench Power Supply

Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.

Research center planned to help companies protect 'Internet of Things'

The University of Kansas is launching a center to improve IoT security, partnering with private firms to develop secure products and practices. The center aims to provide frameworks for companies to address IoT cybersecurity threats, with potential follow-on research on proprietary projects.

Better teleoperations with a less complicated system

A team of international researchers has developed a new control algorithm that reduces the complexity of bilateral teleoperation systems while maintaining their performance. The proposed composited stated convergence scheme achieves this by reducing communication channels, resulting in better transient performance.

Columbia professor develops a detector that stops lateral phishing attacks

A Columbia professor has developed a machine-learning based detector that automatically detects and stops lateral phishing attacks within organizations. The detector uses features like anomaly detection in communication patterns to flag suspicious emails with high precision and low false positive rates.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

Strong showing for UTA in unmanned aerial vehicle competition

The University of Texas at Arlington's team, led by Associate Professor Yan Wan, excelled in the 2019 Swarm and Search AI Challenge. They developed algorithms for multiple UAVs to map wildfires efficiently. The technology can provide real-time information and forecasts to firefighters.

Two UTA researchers elected fellows of National Academy of Inventors

UTA faculty Teik C. Lim and L.K. Mestha have been elected as National Academy of Inventors fellows for their prolific spirit of innovation in creating or facilitating outstanding inventions. Their work has made a tangible impact on quality of life, economic development, and society.

Argonne's Min Si receives early career award from IEEE Computer Society

Min Si, an assistant computer scientist at Argonne National Laboratory, has received the Institute of Electrical and Electronics Engineers (IEEE) Award for Excellence in High Performance Computing. Her research focuses on dynamic communication models and runtime systems for heterogeneous environments.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

What's next for smart homes: An 'Internet of Ears?'

Researchers at Case Western Reserve University are developing a new system that uses changes in vibrations, sound, and electrical fields to improve energy consumption and monitor occupants' movements. The system has the potential to provide energy savings, track structural integrity, and enhance building safety.

Clapping Music app reveals that changing rhythm isn't so easy

Scientists at Queen Mary University of London created an app that challenges users to play Clapping Music, a complex piece written by Steve Reich. The app collected data from over 100,000 players and found that changing rhythms is harder than playing individual rhythms, with average accuracy varying greatly between difficulty levels

Engineers propose coordinated control to assist drivers

Researchers developed a coordinated control architecture for motion management in ADAS systems, demonstrating improved safety and comfort. The study showed that 'coordinated control' strategy successfully damped out deviation errors, giving much greater precision in following intended trajectories.

Aranet4 Home CO2 Monitor

Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.

New microscope sets a record for visualizing surface wetting properties

Aalto University researchers developed Scanning Droplet Adhesion Microscopy (SDAM) to understand and characterize the wetting properties of superhydrophobic materials. The microscope is 1,000 times more precise than current techniques, enabling the creation of wetting maps that reveal microscopic defects on surfaces.

Chip-based sensors with incredible sensitivity

Penn State electrical engineers create microchip-based sensors for multiple applications, including motion, temperature, pressure and biochemical sensing, using innovative on-chip glass microspherical shell whispering gallery mode resonators.

CalDigit TS4 Thunderbolt 4 Dock

CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.

UTA's David Nygren receives Marie Sklodowska-Curie award

David Nygren, Presidential Distinguished Professor of Physics at UTA, has been honored with the 2018 Marie Sklodowska Curie Award for his groundbreaking contributions to particle detection and nuclear sciences. He invented the Time Projection Chamber, a key technology used in particle physics research.

Brainiacs win big

The UCSB Brain Initiative, a cross-disciplinary program tackling the mind and brain, has received a significant boost from the Hearst Foundation. The award will support the initiative's efforts to transform our understanding of the human brain and provide new tools for neuroengineering.

Nikon Monarch 5 8x42 Binoculars

Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.

Google's AI tool for video searching can be easily deceived

Researchers at the University of Washington have shown that Google's Cloud Video Intelligence API can be tricked into mislabeling videos by inserting images. The system, designed to automatically recognize objects and search for content within videos, can be deceived even when the inserted image is barely visible.

Fluke 87V Industrial Digital Multimeter

Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.

FAU receives $4.4 million grant to increase Hispanics in computer-related careers

Florida Atlantic University has received a $4.4 million grant from the US Department of Education to increase degrees awarded to Hispanic and low-income students in computer science, computer engineering, and electrical engineering. The project aims to improve student success rates and provide employment opportunities in various settings.

GQ GMC-500Plus Geiger Counter

GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.

Sony Alpha a7 IV (Body Only)

Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.

Jeff Shamma elected IFAC fellow

Jeff Shamma, a King Abdullah University of Science & Technology professor, has been elected as an IFAC Fellow for his significant contributions to linear parameter varying systems and multiagent systems. He joins a prestigious list of global academics and experts in the field of control and systems engineering.

Can computers do magic?

Computer scientists at Queen Mary University of London have developed systems to analyze human perceptual quirks and predict audience responses, enabling magicians to create new tricks. These computational models can be used in various areas of magic, including stage illusions, optical illusions, and close-up magic.

Cryptographic system lets users control access to their data

Researchers at MIT and Harvard University have developed a new cryptographic system called Sieve that allows users to store and manage their personal data securely. With Sieve, users can control which apps have access to their data and revoke access with ease.

Apple MacBook Pro 14-inch (M4 Pro)

Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.

System lets Web users share aspects of their browsing history

Researchers developed Eyebrowse, a system allowing users to share self-selected aspects of their online activity with friends and the public. Users can add whitelisted sites, track friend visits, and view community browsing history, providing insights for academics and companies targeting consumers.

Using electrical signals to train the heart's muscle cells

Researchers have shown that electrical stimulation of human heart muscle cells can aid their development and function. The team used electrical signals designed to mimic those in a developing heart to regulate and synchronize the beating properties of nascent cardiomyocytes, which support the beating function of the heart.

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.

Using FM to improve wireless networks

Researchers at Northwestern University have developed Wi-FM, a technique that uses ambient FM radio signals to mitigate interference between competing wireless networks. By analyzing usage patterns and adapting to changes, Wi-FM enables devices to harmonize their signals and reduce slow speeds, resulting in improved network performance.

Electrical engineer's work may signal better wireless connections

Dr. Aria Nosratinia is investigating ways to break wireless messages into microstreams, reducing interference, and developing methods to detect malicious hardware modifications known as hardware Trojans. His research could lead to better wireless communication and increased network capacity.

Apple Watch Series 11 (GPS, 46mm)

Apple Watch Series 11 (GPS, 46mm) tracks health metrics and safety alerts during long observing sessions, fieldwork, and remote expeditions.

Research shows Cuba's Internet issues

Researchers at Northwestern University found Cuba's Internet connection to be among the poorest in the Americas, with information traveling back from the US taking up to 270 milliseconds. The team is exploring a possible configuration problem or routing policy as the cause of this delay.

Shoring up Tor

Researchers at MIT and QCRI demonstrate a vulnerability in Tor's design, allowing an adversary to infer a hidden server's location or the source of information reaching a user. However, they also propose defenses, which are being evaluated for inclusion in future versions of the Tor software, to prevent such attacks.

Apple AirPods Pro (2nd Generation, USB-C)

Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.

New method of quantum entanglement packs vastly more data in a photon

Researchers at UCLA have developed a new way to harness light particles, enabling photons to be entangled in multiple dimensions. This allows for the transmission of denser packets of information through fiber optic networks, with potential applications in finance, healthcare, and military communications.

Helping robots put it all together

A new MIT algorithm significantly reduces robot teams' planning time by deferring difficult grasp decisions until easier ones are made. The algorithm produces a workable plan that may not be perfectly efficient but saves time in planning, often offsetting added execution time.

DJI Air 3 (RC-N2)

DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.

UW researchers hack a teleoperated surgical robot to reveal security flaws

Researchers at UW's BioRobotics Lab hacked a next-generation teleoperated robotic system to test its vulnerability to cyberattacks. The team found that the robot could be easily disrupted or derailed by common forms of cyberattacks, highlighting the need for additional security measures before deployment.

Infrared imaging technique operates at high temperatures

Researchers at Northwestern University developed a new detector that can capture high-resolution mid-wavelength infrared images at room temperature, paving the way for applications in surveillance and disease detection. The technology has potential for vascular imaging and disease detection, particularly with images of the human body.

Recommendation theory

The MIT researchers' model assumes that large groups of ratings can be clustered together and described probabilistically. They found that just five clusters were enough to account for most of the variation in a population, suggesting that collaborative filtering yields nearly optimal predictions.

Creality K1 Max 3D Printer

Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.

Raising cryptography's standards

Researchers at MIT and Maynooth University developed a mathematical framework to calculate the minimum-security guarantees for any given encryption scheme. This allows information managers to make more informed decisions about how to protect data. The framework also applies to data privacy, enabling the modification or structuring of a...