Synopsis: Domenii: Ict: Ict generale: Computing: Computer science:


ScienceDaily_2014 00383.txt

For this purpose, only the image processing algorithms would have to be adjusted accordingly y


ScienceDaily_2014 00384.txt

#Mining big data yields Alzheimers discovery Scientists at The University of Manchester have used a new way of working to identify a new gene linked to neurodegenerative diseases such as Alzheimer's.


ScienceDaily_2014 00419.txt

the research team has developed algorithms that convert the input from sensors taped to a patient's hand into varying patterns and intensities of electrical signals.


ScienceDaily_2014 00434.txt

All this gesturing wizardry is made possible by a new type of algorithm developed by Jie Song a Master's student in the working group headed by by Otmar Hilliges Professor of Computer science.

Intelligent programming uses computer memorythe program uses the smartphone's built-in camera to register its environment.

and memory power explains Hilliges adding that their new algorithm uses a far smaller portion of computer memory


ScienceDaily_2014 00562.txt

This is in no small part due to the fact that the vast majority of telecommunications operators use the same encryption algorithm--the so-called AES,

It expands the AES algorithm with several layers which are never the same. Dynamic encryption"When my phone calls you up, it selects a system on

Technically speaking, it adds more components to the known algorithm. The next time I call you,


ScienceDaily_2014 01482.txt

because a high density of transistors has many direct and indirect benefits for computation and signal processing.


ScienceDaily_2014 01835.txt

and Vladimir Volman, an engineer at Lockheed martin. Tour is the T. T. and W. F. Chao Chair in Chemistry as well as a professor of materials science and nanoengineering and of computer science.


ScienceDaily_2014 06021.txt

"Tour is Rice's T. T. and W. F. Chao Chair in Chemistry and professor of mechanical engineering and nanoengineering and of computer science.

For example, manufacturers have announced plans for RRAM prototype chips that will be capable of storing about one terabyte of data on a device the size of a postage stamp--more than 50 times the data density of current flash memory technology.


ScienceDaily_2014 16510.txt

After weeks of programming I eventually got to the point where the robot could paint shapes and lines in a particular color.


scitechdaily.com 2015 00330.txt.txt

which has limited options for B-cell-based vaccine programming. Using Cellsqueeze circumvents this problem, and by being able to separately configure delivery and activation,


scitechdaily.com 2015 00341.txt.txt

#New Algorithm Lets Robots Autonomously Plan for Tasks Researchers from MIT have developed a new algorithm that lets autonomous robots divvy up assembly tasks on the fly,

This week, at the Institute for Electrical and Electronics Engineersinternational Conference on Robotics and Automation, a group of MIT researchers were nominated for two best-paper awards for a new algorithm that can significantly reduce robot teamsplanning time.

The plan the algorithm produces may not be perfectly efficient, but in many cases, the savings in planning time will more than offset the added execution time.

Courtesy of the researchersthe researchers also tested the viability of their algorithm by using it to guide a crew of three robots in the assembly of a chair. ee really excited about the idea of using robots in more extensive ways in manufacturing,

says Daniela Rus, the Andrew and Erna Viterbi Professor in MIT Department of Electrical engineering and Computer science,

whose group developed the new algorithm. or this, we need robots that can figure things out for themselves more than current robots do.

We see this algorithm as a step in that direction. us is joined on the paper by three researchers in her lab first author Mehmet Dogar

and Andrew Spielberg and Stuart Baker, both graduate students in electrical engineering and computer science. Grasping consequencesthe problem the researchers address is one in

Principled procrastinationthe algorithm begins by devising a plan that completely ignores the grasping problem. This is the equivalent of a plan in

Then the algorithm considers the transition from one stage of the operation to the next from the perspective of a single robot

If the algorithm were permitted to run to completion its last few grasp decisions might require the modification of every robot behavior at every step of the assembly process,

In some, they found that their algorithm could, in minutes, produce a workable plan that involved just a few drops,

But their algorithm could still produce a workable plan. ith an elegant heuristic approach to a complex planning problem,


scitechdaily.com 2015 00382.txt.txt

The work combines his expertise in manipulating droplet fluid dynamics with a fundamental element of computer science an operating clock. n this work,

Imagine if when you run a set of computations that not only information is processed but physical matter is manipulated algorithmically as well.

The ability to precisely control droplets using fluidic computation could have a number of applications in high-throughput biology and chemistry,

allowing observation of computation as it occurs in real time. The presence or absence of a droplet represents the 1s and 0s of binary code

and the clock ensures that all the droplets move in perfect synchrony, and thus the system can run virtually forever without any errors. ollowing these rules,

feedback and cascadability hallmarks of scalable computation. A simple-state machine including 1-bit memory storage (known as lip-flop is demonstrated also using the above basic building blocks.

is that it opens up a new way of thinking of computation in the physical world.

Although the physics of computation has been applied previously to understand the limits of computation, the physical aspects of bits of information has never been exploited as a new way to manipulate matter at the mesoscale (10 microns to 1 millimeter).

computation takes a special place. We are trying to bring the same kind of exponential scale up because of computation we saw in the digital world into the physical world


scitechdaily.com 2015 00408.txt.txt

#Researchers Increase Energy-Burning Brown Fat cells A team of researchers has discovered a way to increase energy-burning human brown fat cells


scitechdaily.com 2015 00412.txt.txt

piston-driven engine that generates electricity causing a light to flash, and a rotary engine that drives a miniature car.


scitechdaily.com 2015 00432.txt.txt

an MIT graduate student in electrical engineering and computer science and first author on the new paper. e need to regulate the input to extract the maximum power,


scitechdaily.com 2015 00477.txt.txt

The researchers created an algorithm that analyzes the percentage of photons absorbed by each filter,


smartcitiescouncil.com 2015 000015.txt

Sesame street and other children programming is delivered on mobile devices to young children. A third-party study found children in the program showed significant gains in comprehension, language and word knowledge.


Smart_Planet_1 00997.txt

or cameras and algorithms or satellite GPS, this is guided by a cable that emits a electromagnetic signal.


Smart_Planet_13 00287.txt

innovative businesses are being built around application programming interfaces (APIS) --which provide pre-built cloud resources for the underlying forms and functions for new businesses and concepts.


spectrum.ieee.org 2015 00470.txt.txt

and fortunately, Dexcom supplied an API (application programming interface) library as part of its software installation. It took about 3 hours to code A c#program that polled the receiver

Using the same C# program as before, I ran commands and captured the USB traffic as it flowed between my computer and the receiver.

I shared my C# program with him and continued to refine the Android app over the summer,

and in early 2014, we made the C# uploader, Android app, Pebble watch, and Nightscout code open source. Subsequently,


spectrum.ieee.org 2015 00472.txt.txt

algorithms will check reports from neighboring sensors to determine whether the vibration was localay, from a truck going byr felt elsewhere.


spectrum.ieee.org 2015 00475.txt.txt

At the Mobile World Congress in Barcelona earlier this year, Fraunhofer IIS (Institute for Integrated circuits) demonstrated a system based on a combination of powerful standard algorithms that can encode

along with data traffic, incorporating algorithms that can recover from packet loss, which turns today Voice over internet Protocol (Voip) calls into choppy, unintelligible hash.

The technology includes algorithms that encode music and other nonspeech audio, sounds that are mangled typically by codes optimized to squeeze many voice calls into narrow slices of the spectrum.

Most 4g smartphones include dedicated circuits running algorithms to code and decode 7, 000-Hz HD Voice,

Its speech compression algorithms are more complex and powerfulthan those used for the decade-old HD Voice system,

The codec also includes other algorithms developed to compress music. The separate algorithms are vital

because speech and music are compressed in different ways. Voice compression typically relies on algorithms called code-excited linear prediction (CELP),

which is built on the physics underlying the human vocal system. CELP can reduce the data rate of voice signals by about a factor of 10. hat coding did a good job on speech

Music-compression algorithms, such as the MP3 and AAC codecs used for streaming audio, are optimized for human auditory perception.

For example, the algorithms don bother to accurately reproduce the soft components of sounds likely to be masked by louder sounds at other frequencies and times.

containing algorithms for both voice and music, and it switches between them as needed. The new voice algorithms are substantially more complex than those of the decade-old 7, 000-Hz codec.

Rather than being developed around characteristics of specific languages, as earlier codecs were, these are nearly language independent.

The music part is the latest low-latency version of the AAC algorithm, developed for real-time streamed communications.


spectrum.ieee.org 2015 00495.txt.txt

#Damage Recovery Algorithm Could Make All Robots Unstoppable For the last three years, wee been watching as the hexapods created by Antoine Cully

Using an exceptionally clever algorithm, the robots have demonstrated that they can shrug off absurd amounts of damage,

This illustrates how it possible to endow just about any robot with resiliency via this algorithm,

Recovering from damage is just one application for this algorithm: it can also be used to adapt to different terrain,


spectrum.ieee.org 2015 00498.txt.txt

Then the algorithm figures out how to administer that dose from one minute to the next to keep the glucose levels within safe bounds.

A slew of improvements in sensors, actuators, algorithms, and insulin are coming together to create the artificial pancreas.

hooked through a cellphone with an algorithm and to a Roche pump, linked to it by a Bluetooth signal,

when its algorithm merely predicts that the patient blood sugar will drop. It on the market in Australia and is set to sell in Europe later this year.

Pumps clog, algorithms misfire, sensors get walled off by scar tissue. Some of the recent technical advances are proprietary and still under wraps,

Besides the sensor and the pump are the algorithms, the secret sauce that allows the artificial pancreas to analyze,

A third kind of algorithm tries to model human physiology, for instance by considering how quickly food passes through your system

and how long the insulin takes to work. he beauty of this approach is that it like chess programming:

Tuning these algorithms requires big data, gathered from both the individual patient and the larger community of patients.

He says his algorithms learn by doing and so adapt to the patient. he algorithm analyzes during the day

and between days for short-term learning and also longer term, Hovorka says. f somebody goes skiing,

Every 10 to 12 minutes we run the algorithm for predictive control. We have a number of models running in parallel,


spectrum.ieee.org 2015 00536.txt.txt

this allows a number of smart switching algorithms to be used, says Harper. he energy savings come


spectrum.ieee.org 2015 00586.txt.txt

and picked up different neurons. ur decoding algorithms took that into account, Andersen says. If a given electrode was no longer contributing useful information to the decoding of a goal location

for example, the algorithm would ignore its signal and substitute other inputs. Andersen thinks such adaptive algorithms may enable a wide range of BCIS to record reliably over time.

Most of the prior studies in which paralyzed people used implanted BCIS were conducted by John Donoghue, director of Brown University Institute for Brain science and a pioneer in the use of implants in the motor cortex.


techcrunch 00014.txt

tart programming now, get hired in months alongside ALPS and other career education programs. Trend:


techcrunch 00046.txt

Instead, Digit relies on an algorithm that determines how much it should move from one account to another,


techcrunch 00102.txt

#Girls Who Code Expands To Get More Young Women In Computer science Majors The computer science gender gap struggle in Silicon valley is real.

The 7-week program pairs girls interested in computer science education with field trips to top tech companies such as Twitter and Square.

CA. She says she didn think she was capable of programming before participating in the program. would say h I don know what I doing.

She told Techcrunch that there are actually more girls than boys in her computer science class now, thanks to her involvement with Girls Who Code.


techcrunch 00142.txt

This is Amazon third scripted show after its entry into original programming last year, and the show itself has been nominated for Best Comedy,


techcrunch 00154.txt

In its blog post the company reiterated that the accuracy of Google translate depends on members of its Translate Community who supplement the tool s algorithms by correcting translations


techcrunch 00361.txt

The virtual machine allowed you to make the best use of your resources on a single machine

By applying this virtual machine concept across the entire data center, you create a single pool of resources that you can manipulate any way that you like

Finally, you can use it with private cloud infrastructure services including virtual machines, bare metal and Openstack.


techcrunch 00391.txt

has defined host/virtual machine/container interactions for networking. Critical portions of OVS are included now directly in the Linux kernel,


techcrunch.com 2015 00001207.txt

with a smart dinosaur toy that supports full speech recognition and can chat with kids, tell them jokes


techcrunch.com 2015 0000201.txt

After graduating from university with a degree in computer science Izak created an ipad app that was inspired by his younger brother Oriel who has autism.


techcrunch.com 2015 0000367.txt

This allows for conference calls with whiteboarding for drawing out concepts without requiring everyone to use a teleconferencing app that looks like it was made by a mediocre Java engineer with a long checklist of features to include and no real grasp on UX.


techcrunch.com 2015 0000369.txt

so that no power is needed for the keyboard. n a paper detailing the research project called Personalized Keystroke Dynamics for Self-Powered Humanachine Interfacing published in the ACSNANO journal the scientists argue that algorithms which can identify who is typing by analyzing keystroke timing are limited more than their hardware-based


techcrunch.com 2015 000052.txt

and the learning algorithms will find the patterns, or at least be able to predict likelihoods with decent accuracy.

In testing of its algorithms it says it has measured measured id-step accuracyin the 90%range of predicting volume a day ahead,

a little bit there are, based on how this algorithm has performed in the past. If you have a sense of what that distribution looks like you can make your decision based on the relative costs,

and used that combination to be able to say who are the patients who are likely to fall. e do use a whole bunch of machine learning algorithms that help take out any unknowns in the equation,


techcrunch.com 2015 0000524.txt

and use the source code to create encrypted apps. Whatsapp recently incorporated Open Whisper System code into the Android version of its app. e want as many people as possible to have embedded the capability within their apps


techcrunch.com 2015 0000527.txt

and previously worked at Microsoft Research as well as other computer science researchers like Yann Lecun who are looking for better ways to teach computers how to recognize objects and speech.


techcrunch.com 2015 0000724.txt

Filkhedma A concierge for household services Baby Boons modern baby ecommerce Wallstreetchamber Which claims to have an algorithm for automated share investing.


techcrunch.com 2015 0000816.txt

timer settings and a learning algorithm that the company claims can save you up to 40 percent on your home heating and cooling bills over time,


techcrunch.com 2015 05931.txt.txt

Oyeniyi has a Masters in Computer science and Elodimuor one in Economics. The system is live


techcrunch.com 2015 06131.txt.txt

Javascript is its programming language. Over the years, however, wee seen more and more efforts that allow developers to work around some of the limitations of Javascript by building compilers that transpile code in other languages to Javascript.

Some of these projects focus on adding new features to the language (like Microsoft Typescript) or speeding up Javascript (like Mozilla asm. js project.

Now, many of these projects are starting to come together in the form of Webassmbly. The new format is meant to allow programmers to compile their code for the browser (currently the focus is on C/C++,

with other languages to follow), where it is executed then inside the Javascript engine. Instead of having to parse the full code,

though, which can often take quite a while (especially on mobile), Webassembly can be decoded significantly faster The idea is that Webassembly will provide developers with a single compilation target for the web that will,

Javascript files are simple text files that are downloaded from the server and then parsed and compiled by the Javascript engine in the browser.

The Webassembly team decided to go with a binary format because that code can be compressed even more than the standard Javascript text files

and because it much faster for the engine to decode the binary format (up to 23x faster in the current prototype) than parsing asm. js code, for example.

In this early stage, the team also plans to launch a so-called polyfill library that will translate Webassembly code into Javascript

Over time then, the teams will build more tools (compilers, debuggers, etc. and add support for more languages (Rust,

Go and C# ,for example). As Javascript inventor (and short-term Mozilla CEO) Brendan Eich points out today,

once the main browsers support the new format natively, Javascript and Webassembly will be able to diverge again.

The team notes that the idea here is not to replace Javascript, by the way, but to allow many more languages to be compiled for the Web.

Indeed, chances are that both Javascript and Webassembly will be used side-by-side and some parts of the application may use Webassembly modules (animation, visualization, compression, etc.),

while the user interface will still be written mostly in Javascript, for example. It not often that we see all the major browser vendors work together on a project like this,

so this is definitely something worth watching in the months and years ahead s


techcrunch.com 2015 06252.txt.txt

#Bringing Eye Exams To The Palm Of A Doctor Hand, Smart Vision Raises $6. 1 Million Commercializing a new tool to bring the basic eye exam into the palm of a doctor hand


tech_review 00021.txt

Then the same algorithms can find similar audiences on other websites and present the ads to them.

With enough data and a good algorithm the analytics companies say they can determine just which ads made a difference.

A favorable product review in Consumer Reports or a celebrity endorsement at the Oscars falls outside the algorithm.

In theory the algorithms should be able to allocate budget to advertising networks that police their inventory to avoid phony ads.


tech_review 00036.txt

During the 1990s and 2000s computer scientists repeatedly attempted to design algorithms circuits and neural networks that could perform this trick.

and read from during the course of a computation. In Turing s famous description of a computer the memory is the tickertape that passes back and forth through the computer and which stores symbols of various kinds for later processing.

Our experiments demonstrate that our Neural Turing Machine is capable of learning simple algorithms from example data

and of using these algorithms to generalize well outside its training regime say Graves and co. That is an important step forward that has the potential to make computing machines much more brainlike than ever before.


tech_review 00049.txt

and combine them in ways no one has managed yet to do. think people are starting to realize this is the future of building consumer devices he says. ut it involves big challenges at the intersection of optics, electronics, algorithms,


tech_review 00065.txt

and reprogrammed the prosthesis with algorithms that would allow it to execute the necessary rotations.


tech_review 00102.txt

Some engineers for instance have used the idea of grid cells as inspiration for new algorithms to control robots or autonomous submarines.


tech_review 00154.txt

Not Programming Eugene Izhikevich thinks you shouldn t have to write code in order to teach robots new tricks.

Instead of programming you show it consistent examples of desired behavior. Izhikevich s startup Brain Corporation based in San diego has developed an operating system for robots called Brainos to make that possible.

while faster than programming it produces less predictable behavior. You wouldn t want to use the technique to ensure that an autonomous car could detect jaywalkers for example he says.


tech_review 00165.txt

In a mental flash he had pictured a strand of DNA threading its way through a microscopic pore.

His flash of insight was that a molecule passing through one of these pores especially a long molecule like DNA would continuously change the blob's electrical properties.


tech_review 00195.txt

but the patient-identifying system has broader applications says Anil Jain a distinguished professor at Michigan State university s Computer science and Engineering Department and coauthor of the paper.


tech_review 00196.txt

Larger systems of such qubits could be configured to run just about any kind of algorithm depending on the problem at hand much like a conventional computer.

It can only run a specific algorithm used for a specific kind of problem that requires selecting the best option in a situation with many competing requirements for example determining the most efficient delivery route around a city.


tech_review 00227.txt

The trick is based on the fact that the roundelectrical potential in many computers fluctuates according to the computation that is being performed by its processorncluding the computations that take place

It is possible to avoid such attacks by adding random data to computations. The developers of one popular free cryptographic software package, Gnupg, incorporated such a patch into the latest version of their software a


tech_review 00269.txt

In recent years, major breakthroughs in image analysis and speech recognition have come from using large, simulated neural networks to work on data (see eep Learning.

One downside is that IBM chip requires an entirely new approach to programming. Although the company announced a suite of tools geared toward writing code for its forthcoming chip last year (see BM Scientists Show Blueprints for Brainlike Computing,


tech_review 00283.txt

Valencell algorithms can also estimate things like the number of calories youe burned. The data is sent then on to your smartphone.

Kevin Bowyer, chair of the University of Notre dame computer science and engineering department, who has studied iris


tech_review 00303.txt

and coffee makersy the end of the year (see enser, Faster Memory Challenges Both DRAM and Flash.

says Wei Lu, a professor of electrical engineering and computer science at the University of Michigan, and cofounder of Crossbar.


tech_review 00304.txt

The technology uses algorithms to alter an image based on a person glasses prescription together with a light filter set in front of the display.

The algorithm alters the light from each individual pixel so that, when fed through a tiny hole in the plastic filter, rays of light reach the retina in a way that re-creates a sharp image.

Brian A. Barsky, a University of California, Berkeley, computer science professor and affiliate professor of optometry and vision science who coauthored a paper on it, says it like undoing

and a detail of a Vincent Van gogh self-portrait and applied algorithms that warped the image by taking into account the specific eye condition it was told to account for.


tech_review 00309.txt

The second device, called Traxion, was developed within the last year at the University of Tokyo by a team led by computer science researcher Jun Rekimoto.


tech_review 00321.txt

It offers a programming interface for integrating custom and third-party code metadata tagging to keep document archives organized and high-fidelity file previews to make specific documents easy to identify without having to open them.


tech_review 00335.txt

Exploits Cyber attacks rely on exploitation of ulnerabilitiesbugs in the source code of commonly used software to infect target computers.


tech_review 00373.txt

A computer algorithm then creates a stack of thin layers that a radiologist can read, much like the pages of a book.


tech_review 00428.txt

on Tuesday Google released draft source code of a tool, called End-to-end, that would secure a message from the moment it leaves one browser to the moment it arrives at anothereaning even e-mail providers couldn read them as they travel between two people,


tech_review 00501.txt

and uses machine-learning algorithms to identify useful patterns. Oslo looks like a corporate manager answer to Google Now,


tech_review 00540.txt

But doing this today requires at least some degree of programming knowledge. Now Bug Labs, a New york city company, is trying to make it as easy to create an Internet of things application as it is to put a file into Dropbox.


timesofindia.indiatimes.com_home_science 2015 00359.txt.txt

an assistant professor of computer science and co-director of the Dartnets (Dartmouth Networking and Ubiquitous Systems) Lab."It works on off-the-shelf smart devices.


timesofindia.indiatimes.com_home_science 2015 00548.txt.txt

and come up with algorithms for evaluating which of these viruses could present a threat to humans

and come up with algorithms for evaluating which of these viruses could present a threat to humans


timesofindia.indiatimes.com_home_science 2015 00688.txt.txt

A joint project between the computer science and electrical and computer engineering departments and the College of Veterinary medicine has developed the technology designed to improve communication between dogs and humans."

an assistant professor of computer science whose dog Diesel is one of their primary lab partners. The smart harness is equipped a computer backpack that fits comfortably on a dog's back.

A joint project between the computer science and electrical and computer engineering departments and the College of Veterinary medicine has developed the technology designed to improve communication between dogs and humans."

an assistant professor of computer science whose dog Diesel is one of their primary lab partners. The smart harness is equipped a computer backpack that fits comfortably on a dog's back.


timesofindia.indiatimes.com_home_science 2015 00693.txt.txt

such as pattern recognition algorithms, principal component analysis, discriminant function analysis, cluster analysis, and artificial neural networks s


timesofindia.indiatimes.com_home_science 2015 00721.txt.txt

#New air filter to clear cigarette smoke quickly SEOUL: A new air-cleaning filter can get rid of all the harmful smoke substances in a room-where ten people are simultaneously smoking-in less than an hour,


www.3ders.org 2015 000025.txt

and assessing potential low-quality areas with the algorithm progressively captures the surface of the scanned object,

the researchers compared it to two other state-of-the-art NBV-based algorithms, one focused on visibility and the other one on boundaries.

They also compared their algorithm to curvature and density-based approaches, and went even further to compare 3d models that had been scanned manually,

Finally, the researchers experimented with using their algorithm on a one-armed industry robot instead of the PR2,


< Back - Next >


Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011