-
Under-road heating system to keep Europe’s highways ice-free
Snow and ice can dramatically change the conditions of a road, where slippery surfaces make it harder to keep control of a vehicle, particularly when braking or turning. Under-road heating that melts ice and snow within 15 minutes and real-time information about icy road conditions could help prevent wintertime accidents.
-
-
New approach to defeating superbugs
Researchers have developed a new way to identify second-line antibiotics that may be effective in killing germs already resistant to a first-line antibiotic – potentially helping overcome antibiotic resistance. This new research – based on tackling antibiotic resistance via existing drugs (with a twist) — provides an approach clinicians could consult when deciding which antibiotic treatment courses will be most effective for patients.
-
-
Want to squelch fake news? Let the readers take charge
Would you like to rid the internet of false political news stories and misinformation? Then consider using — yes — crowdsourcing. That’s right. A new study co-authored by an MIT professor shows that crowdsourced judgments about the quality of news sources may effectively marginalize false news stories and other kinds of online misinformation.
-
-
Thwarting cyberattacks by giving attackers “false hope”
With almost every online purchase, a person’s personal information — name, date of birth and credit card number — is stored electronically often in the “cloud,” which is a network of internet servers. Now, as more people buy from online businesses, researchers hope to employ a new strategy in the ongoing struggle to protect digital information in the cloud from targeted cyberattacks. The strategy establishes a new artificial intelligence system to combat digital intrusions.
-
-
New computing architectures to deliver verifiable data assurances
Whether a piece of information is private, proprietary, or sensitive to national security, systems owners and users have little guarantees about where their information resides or of its movements between systems. As is the case with consumers, the national defense and security communities similarly have only few options when it comes to ensuring that sensitive information is appropriately isolated, particularly when it’s loaded to an internet-connected system. A new program seeks to create new software and hardware architectures that provide physically provable assurances around data security and privacy.
-
-
To protect us from the risks of advanced artificial intelligence, we need to act now
Artificial intelligence can play chess, drive a car and diagnose medical issues. Examples include Google DeepMind’s AlphaGo, Tesla’s self-driving vehicles, and IBM’s Watson. This type of artificial intelligence is referred to as Artificial Narrow Intelligence (ANI) – non-human systems that can perform a specific task. With the next generation of AI the stakes will almost certainly be much higher. Artificial General Intelligence (AGI) will have advanced computational powers and human level intelligence. AGI systems will be able to learn, solve problems, adapt and self-improve. They will even do tasks beyond those they were designed for. The introduction of AGI could quickly bring about Artificial Super Intelligence (ASI). When ASI-based systems arrive, there is a great and natural concern that we won’t be able to control them.
-
-
Robots to operate in nuclear no-go zones
Sturdy, intelligent robots which react to their surroundings are being developed to work in situations which are too dangerous for humans, such as cleaning up Europe’s decades-old radioactive waste or helping during a nuclear emergency.
-
-
Breeding challenges of land mine-finding rats
Thousands of people – many of them children – are hurt or killed by land mines each year, so finding these devices before they explode is critical. There is a surprising champion of detection: the African giant pouched rat. Native to sub-Saharan Africa, the pouched rats are large – they can grow up to 3 feet long, including the tail – but are still too small to set off the land mines. They have an exceptional sense of smell – they are also used to detect tuberculosis – but scientists know very little about their biology or social structure, and they’re difficult to breed in captivity.
-
-
Portable ultrasound scanner identifies underage victims, border-crossers
Human trafficking is a worldwide problem, and a serious crime. Researchers have developed a portable, non-invasive, ultrasound scanning device to identify underage victims trying to cross borders illegally. It was specifically designed as a means of uncovering, fighting and preventing human trafficking, but the German government is now exploring the use of the scanner to identify the age of asylum seekers.
-
-
New decision-making tool for oil spill clean-up
Engineers have created an interactive decision tree aimed at finding the best solution for specific oil spill scenarios. Numerous chemical dispersant technologies are available to address different types of oil spills and countless variables and external conditions can play into the effectiveness of any given dispersant. The decision-making tool helps bridge this gap to determine how a dispersant technology will perform under different spill scenarios.
-
-
Benefits of next-generation wargames
Technological advances for game engines and cloud architectures are fueling the development of next-generation wargames that can increase insights for policymakers. Researchers say that the new technologies are making wargame tools more accessible and providing strategists with more insights.
-
-
Connected vehicles’ windshield wipers could help prevent flooding
We’ve been promised all kinds of benefits from a future of connected vehicles, but flood control? One of your car’s oldest features has been put to a new, high-tech use by University of Michigan researchers. Utilizing a test fleet in the city of Ann Arbor, engineers tracked when wipers were being used and matched it with video from onboard cameras to document rainfall. They found that tracking windshield wiper activity can provide faster, more accurate rainfall data than radar and rain gauge systems we currently have in place.
-
-
Administration unveils its Missile Defense Review
Thirty-five years after Ronald Reagan vowed to make nuclear weapons “impotent and obsolete,” the administration has today unveiled its Missile Defense Review – the latest iteration of U.S. efforts to build an effective ballistic missile defense. The Pentagon says that its search for more effective missile defense technologies is the result of its focus on near-peer adversaries such as China and Russia, but the administration’s Missile Defense Review appears more suitable for defending the United States against more limited attacks, such as those likely to come from North Korea or, perhaps, Iran.
-
-
Drone jamming system to protect European airports, public spaces
Airports could be equipped with technology capable of detecting and bringing down drones that stray into their air space, according to Dan Hermansen, chief technology officer of Danish anti-drone firm MyDefence. The company has developed a drone alarm and protection system that is being installed at a number of prominent sites around Europe, including an airport. It has the potential to prevent the kind of costly disruption that hit London’s Gatwick and Heathrow airports recently.
-
-
Americans’ attitude to AI
The impact of artificial intelligence technology on society is likely to be large. While the technology industry and governments currently predominate policy conversations on AI, the authors of a new report expect the public to become more influential over time. Understanding the public’s views on artificial intelligence will, therefore, be vital to future AI governance.
-
More headlines
The long view
Risk Assessment with Machine Learning
Researchers utilize geological survey data and machine learning algorithms for accurately predicting liquefaction risk in earthquake-prone areas.
Bookshelf: Smartphones Shape War in Hyperconnected World
The smartphone is helping to shape the conduct and representation of contemporary war. A new book argues that as an operative device, the smartphone is now “being used as a central weapon of war.”
New Approach Detects Adversarial Attacks in Multimodal AI Systems
New vulnerabilities have emerged with the rapid advancement and adoption of multimodal foundational AI models, significantly expanding the potential for cybersecurity attacks. Topological signatures key to revealing attacks, identifying origins of threats.