These new capabilities reduce risk by: Overcoming acquisition limitations in seismic surveys by mathematically regularising sources
Atlas copco says that risks of working close to unstable and hazardous benches close to the wall are well known
The bee bacteria beat every pathogen they faced a promising result given the global threat posed by superbugs.
and at least some stingless bees from the microbial threats they face while gathering nectar. Although the exact mechanisms remain a mystery the researchers say the secret to such strong results is likely the variety of active substances involved.
When used alive these 13 lactic acid bacteria produce the right kind of antimicrobial compounds as needed depending on the threat.
and microbial threats that varies with season and honeybee health. This study bodes well for developing countries given the availability of fresh honey
"The Defense Advanced Research Projects Agency (DARPA), the branch of the U s. Department of defense responsible for developing new technologies for the military, provided funding for the $53. 5 million project.
militaries are allowed not to use laser weapons directly against people a condition that Klunder said the U s. Navy with abide by, according to Optics. org.
the laser can deter the threat with an effect known as optical"dazzling.""This nonlethal option which amounts to a very bright glare is meant to serve as a warning,
But, if a threat keeps coming, sailors aboard the Ponce can increase the strength of the laser's highly concentrated beam,
making it capable of destroying the threat altogether. In recent tests, Laws successfully hit targets aboard a small boat that was speeding toward the Navy ship.
making them safer for military personnel to operate. And since all they require is a steady supply of electricity,
Of course, the U s. military is also pursuing this new breed of weapons for economic reasons.
Plans are for Sierra to be the exclusive domain of The National Nuclear Security Administration,
which will use its new super-toy for ensuring"the safety, security and effectiveness of the nation nuclear deterrent without testing,"
The new money will go to vaccination programmes, better disease surveillance and research on new vaccines.
and so risk undoing the progress already made. The existence of residual pockets of infection is the main reason why the drive to completely erase the disease has failed so far,
whether the FDA has the necessary expertise to evaluate the environmental risks posed by transgenic animals,
"says Paul Nelson at the Nuclear Security Science and Policy Institute of Texas A&m University in College Station.
The risks involved with a bone-marrow transplant far outweigh those that come with years of antiretroviral drug therapy
The government agencies Environment Canada and Health Canada will use the data to make risk assessments for the materials
reported in July 2008 that very little information existed about the risks associated with nanomaterials."
Any federal reliance on cloud computing, for example, will have to be evaluated in the light of security requirements.
"And risks always exist when it comes to a new finding in science, and the investment on the research and development has been made based on the estimation of such risks.
Moreover, Lee adds, "we are willing to take risks, and need to innovate to survive o
#Ceramics surprise with durable dryness Coatings that repel water are found in myriad applications#they keep car windscreens clear in storms, for example,
The mechanism of the hijacking is unclear, but reproducing it could lead to new stem-cell-based therapeutic strategies.
she felt particularly vulnerable to the threat of ES-cell funding being stopped. So she switched to ips cells in 2010,
a vaccinologist at THE WHO. But it carries no risk of causing polio. By giving children an inactivated vaccine that protects against all three subtypes of polio,
the threat alone achieved some of its intended effect#to instil enough uncertainty to keep some researchers from entering the field e
while shifting focus to prevention in patients at risk of a heart attack.""We can t just assume that modifying the risk factor is modifying risk,
says Harlan Krumholz, a cardiologist at Yale university in New haven, Connecticut.""We ve been burned so many times in the past decade by that assumption.
Clinical trials have shown repeatedly that statins reduce the risk of heart attack and stroke, but lowering LDL with other medications does not work as well.
including fighting inflammation, another risk factor for heart disease. Krumholz s scepticism is rooted in experience. In 2008 and 2010, the Action to Control Cardiovascular Risk in Diabetes (ACCORD) clinical trial challenged dogma
when it reported that lowering blood pressure or blood sugar to prespecified targets did not reduce the risk of heart attack or stroke.
In the case of blood sugar, the risks were worsened. The trial demonstrated the folly of assuming that risk factors must have a causal role in disease,
says Robert Vogel, a cardiologist at the University of Colorado, Denver.""Short people have a higher risk of heart disease,
he says.""But wearing high heels does not lower your risk. Jay Cohn, a cardiologist at the University of Minnesota Medical school in Minneapolis, also worries that the focus on LDL levels offers up the wrong patients for statin therapy.
Most of those who have a heart attack do not have high LDL, he notes. Cohn advocates treating patients with statins based on the state of health of their arteries,
as revealed by noninvasive tests such as ultrasound.""If your arteries and heart are healthy, I don t care
"We can t just assume that modifying the risk factor is modifying risk. Not all cardiologists want to abolish LDL targets.
A comparison with traditional surveillance data showed that Google Flu Trends, which estimates prevalence from flu-related Internet searches,
but not substitute for, traditional epidemiological surveillance networks.""It is hard to think today that one can provide disease surveillance without existing systems,
says Alain-Jacques Valleron, an epidemiologist at the Pierre and Marie Curie University in Paris,
With its creation of the Sentinelles network in 1984, France was the first country to computerize its surveillance.
Its estimates have matched almost exactly the CDC s own surveillance data over time ###and it delivers them several days faster than the CDC can.
and has been extended to include surveillance for a second disease, dengue. Sources: Google Flu Trends (www. google. org/flutrends;
During a visit to Argonne National Laboratory, he will call for $2-billion energy security trust fund dedicated to research to boost automobile efficiency,
Obama had mentioned briefly the idea of an energy security trust in his State of the Union address in January,
which restricts trade in species not at immediate risk of extinction but in need of protection.
and can therefore be offered to those suffering from paraplegia without exposing them to any particular medical risks
#Tau Associated MAPT Gene Increases Risk for Alzheimer's disease A international team of scientists, led by researchers at the University of California,
San diego School of medicine, has identified the microtubule associated-protein protein tau (MAPT) gene as increasing the risk for developing Alzheimer disease (AD).
have suggested that MAPT is associated with increased risk for AD, other studies have found no association.
they found that carriers of the deleterious MAPT allele (an alternative form of the gene) are increased at risk for developing AD
Thanks to our collaborators from the Consortium, the International Parkinson Disease Genetics Consortium, the Genetic and Environmental Risk in Alzheimer Disease, the Cohorts for Heart and Aging research in Genomic Epidemiology, decode Genetics and the Demgene cohort,
Until this year no one had shown convincingly that the MAPT (tau) gene altered the risk of AD and this,
The recent association of genetic variation in the MAPT gene with AD risk and the emerging availability of tau imaging are now leading to a recognition that perhaps tau changes are key in the pathophysiologic pathway of AD
"In addition to tighter lab security and tougher laws, the trio called for yeast strains to be engineered to produce drugs with limited street value,
Scientists are also investigating the risk of earthquake -and landslide-triggered tsunamis in Alpine lakes.
Credit card security breaches are becoming more and more common, and customers'personal information is being exposed. Could biometric payment methods replace credit cards altogether?
Researchers from Tsinghua University and Tzekwan technology, a financial security protection firm, have announced the first ATM that works with facial recognition capabilities, reports the South China Morning Post.
Brain-Zapping Implant Could Aid Injured Soldiers The authors of the paper say next step is to use the mesh system to deliver living stem cells that may help repair damaged sections of the brain or perhaps a multifunction electronic device
prompting clerics to urge those at risk of heatstroke not to fast. Doctor Qaiser Sajjad of the Pakistan Medical Association in Karachi said that a lack of understanding of heatstroke among the public how to spot symptoms
and added that here a very heavy security feature to our business. Manufacturing these structures is part of an elaborate process that involves breaking down the nanopore structures into niform-sized particlesthat are fabricated ompletely
but people health is put at risk. Imagine someone being treated for diabetes. You want to make sure they have the right medication. n an interconnected world where smartphones
that the tags are tarting to get adoptedand that a lot of the company ustomers are oriented very security.
and 27"other contacts"are under medical surveillance. None of those quarantined or under surveillance in Hong kong and China have showed any signs of illness so far.
With reporting by Dennis Normile in Tokyo o
#New test could reveal every virus that's ever infected you Can remember every viral infection youe ever had?
We could also use other sensors to assess methane outgassing levels and explosion risk. Initially the firm plans to use information collected by European space agency satellites
After all space technology is largely dual use of value to both military and civilian communities. The basics of rocket technology and missile technology are largely symbiotic.
Such dependence inherently carries risk. Given Russia's democratic government though (democratic only if you squinted hard
when looking at it) it seemed a reasonable risk. Enter the egotistic ambitious and maybe ruthless Putin.
Then there is the risk that the net will run into operational satellites. The engineers also worry that the debris they are fighting could fight back.
There is a growing trend for organisations to put forward a concept for a debris removal device without considering fully the potential risks involved in deploying
and dimensions as Cygnus to avoid putting the real thing at risk. About 10 minutes into the mission the Cygnus dummy successfully separated from the rocket
#Hewlett Foundation funds new MIT initiative on cybersecurity policy MIT has received $15 million in funding from the William
and Flora Hewlett Foundation to establish an initiative aimed at laying the foundations for a smart sustainable cybersecurity policy to deal with the growing cyber threats faced by governments businesses and individuals.
The MIT Cybersecurity Policy Initiative (CPI) is one of three new academic initiatives to receive a total of $45 million in support through the Hewlett Foundation s Cyber Initiative.
With the new awards the Hewlett Foundation has allocated now $65 million over the next five years to strengthening cybersecurity the largest-ever private commitment to this nascent field.
and security have profound implications for the future. To make those choices well it is imperative that they be made with a sense of
and the Hewlett Foundation s remarkable generosity provide an opportunity for MIT to make a meaningful and lasting impact on cybersecurity policy MIT President L. Rafael Reif says.
And UC Berkeley s Center for Internet security and Policy will be organized around assessing the possible range of future paths cybersecurity might take.
Engineering is vital to understanding the architectural dynamics of the digital systems in which risk occurs.
And we ll bring that expertise to the understanding of connected digital systems and cybersecurity.
Developing a more formal understanding of the security behavior of large-scale systems is a crucial foundation for sound public policy.
This is the state of cybersecurity policy today: growing urgency but no metrics and little science he says.
CSAIL is home to much of the technology that is at the core of cybersecurity such as the RSA cryptography algorithm that protects most online financial transactions and the development of web standards via the MIT-based World wide web Consortium.
How policymakers should address security risks to personal health information; How financial institutions can reduce risk by sharing threat intelligence;
Developing cybersecurity policy frameworks for autonomous vehicles like drones and self-driving cars; andhow to achieve regional and even global agreements on both privacy and security norms in online environments.
To address these issues CPI will not only bring to bear different disciplines from across MIT from computer science to management to political science
but also engage with stakeholders outside the Institute including government industry and civil society organizations. We want to understand their challenges
if you were in the military and youe trying to screen for some disease, but you don have a lab with you.
The work was supported by the National institutes of health the Army Research Office through MIT s Institute for Soldier Nanotechnologies and the Department of energy y
#Underwater robot for port security Last week at the International Conference on Intelligent Robots and Systems MIT researchers unveiled an oval-shaped submersible robot a little smaller than a football with a flattened
It s very expensive for port security to use traditional robots for every small boat coming into the port says Sampriti Bhattacharyya a graduate student in mechanical engineering who designed the robot together with her advisor Ford Professor of Engineering
Nathan Betcher a special-tactics officer in the U s. Air force has followed Bhattacharyya and Asada s work closely.
The research was funded by the National institutes of health the Defense Threat Reduction Agency the U s army Research Laboratory the U s army Research Office the Office of Naval Research and the Ellison Medical Foundation n
either on uniforms or on vehicles, could allow the camouflage patterns to constantly change in response to the surroundings. he U s. military spends millions developing different kinds of camouflage patterns,
If a company decides to use a surveillance drone for crop management, for instance, it can easily add software that stitches together different images to determine which areas of a field are overwatered
At the time, drones were used primarily for military surveillance, powered by a lack boxthat could essentially fly the drones and control the camera.
then with Michini and a team of Boeing engineers to make a military-grade lack boxsystem,
and take the risk. Mint launched in 2009 with an initial concept design for Medeye.
limiting the risk of lead contamination of the environment. When the panels are retired eventually, the lead can simply be recycled into new solar panels. he process to encapsulate them will be the same as for polymer cells today,
The work was funded by the National Science Foundation the Wyss Institute for Biologically Inspired Research at Harvard and the Air force Office of Scientific research h
This research was supported by funding from the Air force Office of Scientific research r
#Extracting audio from visual information Algorithm recovers speech from the vibrations of a potato-chip bag filmed through soundproof glass.
You know that the killer has admitted his guilt because there surveillance footage of his potato chip bag vibrating.
Since 2004 Ted Stanley and his late wife Vada Stanley have been instrumental to the progress made thus far in identifying the genetic risk factors for schizophrenia and bipolar disorder and the initiation of therapeutic efforts based on those discoveries.
Yet in the past few years scientists have begun to find genes that shape the risk of schizophrenia bipolar disorder and other illnesses thanks in large part to Stanley s support.
but the National security agency isn t the only organization that collects information about people s online behavior.
At the IEEE s Conference on Privacy Security and Trust in July Oshani Seneviratne an MIT graduate student in electrical engineering and computer science and Lalana Kagal a principal research scientist at CSAIL will present a paper
Because the BAT is advanced an aerostat platform Glass says customers can use it to lift additional payloads such as weather monitoring and surveillance equipment.
In 2012 Altaeros after just two years of refining proved the BAT s efficiency at 300 feet above ground at a former Air force base in Maine where the company still assembles
which is already familiar from airport security checkpoints has a number of other promising applications from explosives detection to collision avoidance in cars.
Some of these differences have been linked with cancer vulnerability; for example, a genetic defect in a type of DNA repair called nucleotide excision repair often leads to a condition called xeroderma pigmentosum, in
allowing researchers to identify people who are at higher risk and potentially enabling prevention or earlier diagnosis of diseases linked to DNA repair.
and food can pose safety risks and cost governments and private companies hundreds of billions of dollars annually.
The research was funded by the U s. Air force, the Office of the Assistant Secretary of defense for Research and Engineering, the Singapore-MIT Alliance, the National Science Foundation, the U s army Research Office,
The work was supported in part by the Army Research Office, through MIT Institute for Soldier Nanotechnologies,
The research was funded by the Office of Naval Research the Army Research Office the National Science Foundation the Hertz Foundation the Department of defense the National institutes of health and the Presidential Early Career Award for Scientists and Engineers s
and commercializing software called Ksplice that automatically applies patches (security updates or bug fixes) to an operating system on the fly without requiring a reboot.
and risk of error Arnold says. The aim is to allow administrators the benefit of the update
Although today s computer technology risks becoming obsolete within a few years Ksplice (now 5 years old) is still a novel product says Daher who was Ksplice s chief operations officer.
The source of Kspliceksplice s roots trace back to 2006 when Arnold was charged with implementing a security update for MIT s Student Information Processing Board that arrived on a weekday.
and they don have the tools we have to deal with risk, Suri says. hey also don have government programs like unemployment insurance or health insurance,
and use those contacts as part of their risk-sharing networks. But that proximity means that the same environmental
Roughly the size of a small shoebox, the aluminum-cased APA which began as a prototype for MIT Soldier Design Competition in 2005 has a handle with direction control switches (up or down) and a trigger.
capstan-based mechanism ensures that the battery-powered device can lift two soldiers sometimes carrying 80 to 100 pounds of equipment swiftly along an attached rope, without jamming.
First designed for soldiers who plunged into caves and wells in Iraq and Afghanistan the APA is now being used by all four military branches on the battlefield and in training to climb mountains, buildings, and ships.
It even being used in helicopter extraction and rescue missions. Finding steady success with its military customers, Atlas is now expanding its Charlestown, Mass.
and Daniel Walker 5, SM 9 for the annual MIT Soldier Design Competition, which challenges student teams to invent technologies based on military requests.
Additional help came from MIT Institute for Soldier Nanotechnologies. Ball specifically credits former technology transfer specialist Lisa Shaler-Clark as instrumental in taking the APA rom the lab bench to the field.
A global agreement on carbon emissions would be most effective at reducing the risks of climate change
The research was funded by the National Science Foundation and the Army Research Office through MIT Institute for Soldier Nanotechnologies t
but also with code that actually performs vital security checks. At the ACM Symposium on Operating systems Principles in November, MIT researchers will present a new system
And sometimes, that can mean dispensing with a security check that guarantees the program proper execution.
Such a system could be used to monitor patients who are at high risk for blood clots says Sangeeta Bhatia senior author of the paper and the John and Dorothy Wilson Professor of Health Sciences and Technology and Electrical engineering and Computer science.
Some patients are at more risk for clotting but existing blood tests are not consistently able to detect the formation of new clots says Bhatia who is also a senior associate member of the Broad Institute and a member of MIT s Koch Institute for Integrative Cancer Research
Another application is monitoring patients who are at high risk for a clot for example people who have to spend a lot of time in bed recovering from surgery.
If a patient is at risk for thrombosis you could send them home with a 10-pack of these sticks
Armies of mobile cubes could temporarily repair bridges or buildings during emergencies, or raise and reconfigure scaffolding for building projects.
In ongoing work, the MIT researchers are building an army of 100 cubes, each of which can move in any direction,
making it hard to predict the risk of a vaso-occlusive crisis, Dao says. He and his colleagues designed their microfluidic device to mimic the conditions inside a blood vessel as oxygen leaves the Blood cells flow through a narrow channel that wraps around a compartment containing oxygen.
Analyzing risk Using this device to measure blood samples from 25 sickle cell disease patients, the researchers were able to determine how deoxygenation affects red blood cellssickling rates;
the Center for Materials science and engineering, the Center for Sensorimotor Neural engineering, the Mcgovern Institute for Brain Research, the U s army Research Office through the Institute for Soldier Nanotechnologies,
since more than 4 million homes and buildings in cities across the United states for military, commercial,
The work was supported by the National Science Foundation and the Air force Office of Scientific research
#Defusing bombs by color This March, Cambodia held its first national-level science festival at the Royal University of Phnom penh,
and also served as a lieutenant in the U s army Corps of Engineers in Vietnam in 1970-1971.
#Alumnus throwable tactical camera gets commercial release Unseen areas are troublesome for police and first responders:
Bounce Imaging will deploy 100 Explorers to police departments nationwide, with aims of branching out to first responders and other clients in the near future.
For this first manufacturing run, the startup aims to gather feedback from police, who operate in what Aguilar calls a eputation-heavy market. ou want to make sure you deliver well for your first customer,
Bounce Imaging started fielding numerous requests from police departments which became its target market. Months of rigorous testing with departments across New england led Bounce Imaging from a clunky prototype of the Explorer Medusa of cables
But they also learned key lessons about what police needed. Among the most important lessons, Aguilar says,
is that police are under so much pressure in potentially dangerous situations that they need something very easy to use. e had loaded the system up with all sorts of options and buttons and nifty things but really,
minimizing the risks of leaving toxic secondary products to persist in, say, a body of water. nce they switch to this macro situation where theye big clumps,
This enhanced resolution at the diffraction limit of light is critical for data storage digital imaging and security applications.
but it does not contain toxic metals such as cadmium that are known to pose potential risks
The new tool could be used as a high-throughput screening platform to identify patients at risk of developing the urologic condition.
risk for consumers as well. In this study researchers exposed cultured laboratory mouse cells resembling the arterial wall cells to NPS of silicon dioxide
The aims of our study were to gain additional insight into the cardiovascular risk associated with silicon dioxide nanoparticle exposure
A recent update from the American Heart Association also suggested that fine particles in air pollution leads to elevated risk for cardiovascular diseases.
However more research was needed to examine the role of ultrafine particles (which are much smaller than fine particles) on atherosclerosis development and cardiovascular risk.
and there is a risk that some of this heritage will be lost within the next 100 years if effective solutions are not found.
or holography Yang said. 3d security elements that are difficult to replicate and which offer different levels of authentication could also be generated for anti-counterfeiting and anti-forgery technologies.
#Research team developing injectable treatment for soldiers wounded in battle Internal bleeding is a leading cause of death on the battlefield,
and the Massachusetts institute of technology could buy wounded soldiers the time they need to survive by preventing blood loss from serious internal injuries.
Gaharwar envisions the biomaterial being preloaded into syringes that soldiers can carry with them into combat situations.
If a soldier experiences a penetrating, incompressible injury one where it is difficult if not impossible to apply the pressure needed to stop the bleeding he
which pose the risk of flowing to other parts of the body and forming unintended and potentially harmful clot formations,
The way traditional science works is to map out all the possible risks demonstrate you've accounted for them
or airport scanners used to sense explosives or chemical threats. Zang says scanners with the new technology"could be used by the military police,
first responders and private industry focused on public safety.""Unlike the today's detectors, which analyze the spectra of ionized molecules of explosives and chemicals,
Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011