• Timber bridges viable option for low-traffic local roads

    Glulam timber bridges are viable and cost-effective options for replacing bridges on low-traffic county and township roads. Glulam, short for glued laminated, means the structural members are made of layers of wood strips bonded with glue. A timber bridge would provide alternatives to conventional precast double-tee bridges, giving counties and townships more options when designing a new bridge or replacing an old one.

  • Climate action window could close as early as 2023

    As the Trump administration repeals the U.S. Clean Power Plan, a new study underscores the urgency of reducing greenhouse gas emissions—from both environmental and economic perspectives. For the U.S. most energy-hungry sectors—automotive and electricity—the study identifies timetables for action, after which the researchers say it will be too late to stave off a climate tipping point. And the longer the nation waits, the more expensive it will be to move to cleaner technologies in those sectors—a finding that runs contrary to conventional economic thought because prices of solar, wind and battery technologies are rapidly falling, the study’s authors say.

  • Flights worldwide face increased risk of severe turbulence owing to climate change

    Flights all around the world could be encountering lots more turbulence in the future, according to the first ever global projections of in-flight bumpiness. A new study has calculated that climate change will significantly increase the amount of severe turbulence worldwide by 2050–2080. Severe turbulence involves forces stronger than gravity, and is strong enough to throw people and luggage around an aircraft cabin.

  • Software “containers” increase computer security

    ONR has awarded the University of Wisconsin–Madison $6.1 million to research what are known as containers. While not a household word for average computer users, containers are increasingly popular in the tech world. Containers help software run reliably when moved from one computing environment to another, such as from an individual’s laptop to the cloud. These complex programs pull together everything an application needs to work so those elements stay together when the application migrates.

  • Administration’s decision to rescind 2015 water rule based on flawed analysis: Experts

    New evidence suggests that the Trump administration’s proposal to rescind the 2015 Waters of the United States (WOTUS) rule that would limit the scope of the Clean Water Act inappropriately overlooks wetlands-related values. The differences between the two analyses led to an almost 90 percent drop in quantified benefits from the 2015 to the 2017 analysis.

  • “Cardiac password” project uses the wave of the heart motion for authentication

    One of the unique features for the upcoming iPhone X is facial recognition security, where users can simply unlock their phones by holding it up to their face and allowing the phone’s security measures to identify the correct user. However, it seems just as soon as new means of authentication are developed and put into use, hackers find a way around them, from hacking passwords to faking fingerprints to fool biometric security systems. But there may be one authentication method that cannot be hacked: Cardiac password.

  • Proposed budget cuts will weaken state, local ability to handle biological, chemical attacks

    Looming budget cuts within DHS are doing little to qualm concern that state and local infrastructure is unprepared to handle a biological or chemical attack. “We are much better prepared than we were” post-9/11,” said one expert “But we are not where we need to be, and the progress is, in some cases, somewhat fragile.”

  • Brain-controlled drones are here

    Single unmanned autonomous vehicles (UAVs) directed by joysticks, radio controllers, and mobile phones are already accomplishing a variety of useful tasks, such as aerial photography and security patrols. But using multiple drones requires multiple human operators, and this presents a coordination problem. Now a single operator using emerging human-brain interfaces can control a swarm of drones, making possible new classes of applications.

  • Stanford Cyber Initiative addresses cybersecurity, governance, and the future of work

    Daily headlines emphasize the down side of technology: cyberattacks, election hacking and the threat of fake news. In response, government organizations are scrambling to understand how policy should shape technology’s role in governance, security and jobs. The Stanford Cyber Initiative is bringing together scholars from all over campus to confront the challenges technology presents.

  • Averting disaster on railroad crossings

    The damsel in distress, tied up and left on the railroad tracks, is one of the oldest and most clichéd cinema tropes. This clichéd crime has connections to real, contemporary accidents that happen far more than they should. There are 200,000 crossings in the United States, and efforts to minimize the number of these crossings by creating overpasses, or elevating roadways are cost-prohibitive. Researchers found a better solution to reduce the number of accidents at railroad crossings: The Ghost Train Generator.

  • Big Power should cooperate to slow proliferation of hypersonic missiles

    Experts propose that despite their differences, Russia, China, and the United States should act jointly to head off a little-recognized security threat — the proliferation of hypersonic missiles beyond the three nations. the spread of this new class of weapons would increase the chance of strategic (missile-based) wars and would jeopardize nations small and large—including the three nations that now have the technology

  • Filter removes fracking-related contaminants from water

    A new filter produced has proven able to remove more than 90 percent of hydrocarbons, bacteria and particulates from contaminated water produced by hydraulic fracturing (fracking) operations at shale oil and gas wells. The process turns a ceramic membrane with microscale pores into a superhydrophilic filter that “essentially eliminates” the common problem of fouling.

  • The dangers of weaponized narratives, and how to respond to them

    Criticism of Facebook began last week after a news report said the social network enabled advertisers to seek out self-described anti-Semites and, revealed this week, published Russian-bought divisive political ads. The company responded by saying that it would restrict how advertisers targeted their audiences and actively work with the U.S. government on its Russian-interference investigations. Google also came under fire at the same time after news that it allowed the sale of ads tied to racist and bigoted keywords. Google responded by claiming it would work harder to halt offensive ads. Weaponized narrative is the new global battle space, one expert said: “America and other Western democracies — and indeed the very Enlightenment — are under attack.”

  • Countering misinformation and correcting “fake news”

    It is no use simply telling people they have their facts wrong. To be more effective at correcting misinformation in news accounts and intentionally misleading “fake news,” you need to provide a detailed counter-message with new information—and get your audience to help develop a new narrative. A new study, the first conducted with this collection of debunking data, finds that a detailed counter-message is better at persuading people to change their minds than merely labeling misinformation as wrong. But even after a detailed debunking, misinformation still can be hard to eliminate, the study finds.

  • DHS funds national consortium to develop better methods for fighting criminal activity

    The University of Arkansas at Little Rock has been named a priority partner in a new DHS-funded national consortium. SHS S&T S&T) will award the consortium a $3.85 million grant for its first operating year in a 10-year grant period to create the Center of Excellence for Criminal Investigations and Network Analysis (CINA). The center’s research will focus on criminal network analysis, dynamic patterns of criminal activity, forensics, and criminal investigative processes.