• A Water Strategy for the Parched West: Have Cities Pay Farmers to Install More Efficient Irrigation Systems

    Unsustainable water practices, drought and climate change are causing this crisis across the U.S. Southwest. To achieve a meaningful reduction in water use, states need to focus on the region’s biggest water user: agriculture.

  • Your Brain Is Better Than You at Busting Deepfakes

    Deepfake videos, images, audio, or text appear to be authentic, but in fact are computer generated clones designed to mislead you and sway public opinion. They are the new foot soldiers in the spread of disinformation and are rife – they appear in political, cybersecurity, counterfeiting, and border control realms. While observers can’t consciously recognize the difference between real and fake faces, their brains can.

  • Deep Learning Technology for Faster and More Accurate Terahertz Security Inspection

    With the strengthening of global anti-terrorist measures, it is increasingly important to conduct security checks in public places to detect concealed objects carried by the human body. A new detection method can be used for accurate and real-time detection of hidden objects in terahertz images. 

  • 'Killer Robots': Will They Be Banned?

    A UN panel in Geneva remains split on whether to ban autonomous weapons, which don’t need a human to pull the trigger. Increasingly, these sorts of weapons are the stuff of a manufacturer’s promotional materials rather than science fiction movies. The war in Ukraine is complicating the conversation.

  • The World’s Largest Experimental Earthquake Infrastructure Facility

    The National Science Foundation (NSF) promotes research investments and technology that help recognize and mitigate the impacts of natural disasters across the U.S.“The ability to test infrastructure under a full range of motion is critical for unleashing new and pioneering research that can lead to effective, economical and innovative infrastructure designs and retrofitting strategies for existing infrastructure,” said NSF director Sethuraman Panchanathan.

  • Solution to Encrypted Messages Being Hacked Before Sending or After Receipt

    Message applications must do more to keep user data safe from undetected malware or over-the-shoulder eavesdropping that bypasses encryption before a message has been sent. Researchers have created a new end-to-end encryption mechanism that protects users’ communications at a far higher level than currently experienced on popular applications.

  • NIST chooses Kyber, Dilithium and SPHINCS+ as Standards for Post-Quantum Cryptography

    NIST has selected CRYSTALS-KYBER, CRYSTALS-Dilithium and SPHINCS+, three security algorithms, as one the new standards for post-quantum cryptography. The underlying technology must ensure that the encryption of sensitive communication will continue to be secure in the coming decades.

  • How Not to Solve the Climate Change Problem

    When politicians talk about reaching “net zero” emissions, they’re often counting on trees or technology that can pull carbon dioxide out of the air. What they don’t mention is just how much these proposals or geoengineering would cost to allow the world to continue burning fossil fuels. I’ve been working on climate change for over four decades. Let’s take a minute to come to grips with some of the rhetoric around climate change and clear the air, so to speak.

  • Strengthening U.S. Government’s Enhanced Potential Pandemic Pathogen Framework, Dual Use Research

    Group of scientists, public health experts, policy researchers propose strengthening of U.S. government’s policies regarding enhanced potential pandemic pathogen framework and dual use research of concern.

  • Review: IT in Health Care Has Produced Modest Changes — So Far

    Large study of existing research shows incremental improvement in patient outcomes and productivity, without big employment changes.

  • New Imaging Method Reveals Concealed Objects

    Imaging scenes that lie outside an observer’s direct line of sight could greatly enhance search and rescue missions, such as finding a lost child in an abandoned factory, as well as military and police surveillance operations, such as exposing a hidden terrorist or enemy stronghold. Using submillimeter radiation naturally emitted by objects and people, researchers see around corners.

  • Quantum-Inspired Approach Allows Lidar to Be used for Facial Recognition

    Quantum-inspired technique can be used to perform lidar imaging with a much higher depth resolution than is possible with conventional approaches. Lidar, which uses laser pulses to acquire 3D information about a scene or object, is usually best suited for imaging large objects such as topographical features or built structures due to its limited depth resolution. By capturing more details, new approach could make lidar useful for facial recognition.

  • Warning System for Dangerous Heavy Rain and Flash Floods

    In recent years, there have been repeated flash floods in Germany, some with devastating effects, which have been triggered by localized heavy rainfall. New project aims to provide prototypical warnings at different spatial scales, from the whole of Germany to individual federal states and down to the municipal level.

  • New Computing Security Architecture Protects Sensitive Private Data

    Protecting sensitive information on the internet has become an essential feature for computing architectures. Applications that process such data must trust the system software they rely on, such as operating systems and hypervisors, but such system software is complex and often has vulnerabilities that can risk data confidentiality and integrity.

  • Safer Web Surfing with a New Method for Detecting Malicious Code Patterns

    With the ever-increasing importance of the Internet in our lives, there are growing attempts to exploit software vulnerabilities in our PCs for personal benefit. One way to do so is by infecting the victim’s PC with a malicious code injected through a website. A fast and reliable detection approach can analyze distribution patterns of malicious codes in websites.