Such a system could be used to monitor patients who are at high risk for blood clots says Sangeeta Bhatia senior author of the paper and the John and Dorothy Wilson Professor of Health Sciences and Technology and Electrical engineering and Computer science.
Some patients are at more risk for clotting but existing blood tests are not consistently able to detect the formation of new clots says Bhatia who is also a senior associate member of the Broad Institute and a member of MIT s Koch Institute for Integrative Cancer Research
Another application is monitoring patients who are at high risk for a clot for example people who have to spend a lot of time in bed recovering from surgery.
If a patient is at risk for thrombosis you could send them home with a 10-pack of these sticks
In other words, when the two sides of a cracked material are pulled apart, instead of cracking further, it can heal. he stress from the disclinations is leading to this unexpected behavior,
Armies of mobile cubes could temporarily repair bridges or buildings during emergencies, or raise and reconfigure scaffolding for building projects.
making it hard to predict the risk of a vaso-occlusive crisis, Dao says. He and his colleagues designed their microfluidic device to mimic the conditions inside a blood vessel as oxygen leaves the Blood cells flow through a narrow channel that wraps around a compartment containing oxygen.
Analyzing risk Using this device to measure blood samples from 25 sickle cell disease patients, the researchers were able to determine how deoxygenation affects red blood cellssickling rates;
minimizing the risks of leaving toxic secondary products to persist in, say, a body of water. nce they switch to this macro situation where theye big clumps,
This enhanced resolution at the diffraction limit of light is critical for data storage digital imaging and security applications.
but it does not contain toxic metals such as cadmium that are known to pose potential risks
The new tool could be used as a high-throughput screening platform to identify patients at risk of developing the urologic condition.
risk for consumers as well. In this study researchers exposed cultured laboratory mouse cells resembling the arterial wall cells to NPS of silicon dioxide
The aims of our study were to gain additional insight into the cardiovascular risk associated with silicon dioxide nanoparticle exposure
A recent update from the American Heart Association also suggested that fine particles in air pollution leads to elevated risk for cardiovascular diseases.
However more research was needed to examine the role of ultrafine particles (which are much smaller than fine particles) on atherosclerosis development and cardiovascular risk.
and there is a risk that some of this heritage will be lost within the next 100 years if effective solutions are not found.
or holography Yang said. 3d security elements that are difficult to replicate and which offer different levels of authentication could also be generated for anti-counterfeiting and anti-forgery technologies.
which pose the risk of flowing to other parts of the body and forming unintended and potentially harmful clot formations,
and have a longer shelf life than do human platelets a benefit in times of widespread emergency
The way traditional science works is to map out all the possible risks demonstrate you've accounted for them
or airport scanners used to sense explosives or chemical threats. Zang says scanners with the new technology"could be used by the military police,
This excess oxygen leached at faster and faster rates over time actually contributes to the risk of failure and acts as fuel for a potential fire.
But that temperature threshold dropped for a highly charged battery suggesting that operating at full energy capacity accelerates structural degradation and vulnerability.
even though pristine and uncharged NCA samples remained stable up to 400 degrees Celsius charging introduced the usual decomposition and vulnerabilities.
while minimizing the risk of complications, "Masson said. Another benefit, and a considerable one:""While traditional equipment requires an investment of around $100, 000,
and dedication in their fields and are meant to encourage beneficiaries to freely explore their interests without fear of risk-taking.
This will allow us to take more risks in our research since there are no'milestones'we have to meet he says referring to a frequent requirement of many funders.
because other patterning techniques have the risk of damaging the crystal structure and orientation and thus influence the properties of the material.
The results indicate little risk to humans ingesting the particles through drinking water say scientists at Duke's Center for the Environmental Implications of Nanotechnology (CEINT.
and national security since an electron beam is a critical component in generating X-rays. While carbon nanotube cathodes have been studied extensively in academia Fermilab is the first facility to test the technology within a full-scale setting.
The researchers said their invention could serve as a full-thickness patch to repair defects due to Tetralogy of fallot atrial and ventricular septal defects and other defects without the risk of inducing abnormal cardiac rhythms.
#Graphene sensor tracks down cancer biomarkers An ultrasensitive biosensor made from the wonder material graphene has been used to detect molecules that indicate an increased risk of developing cancer.
and in elevated levels has been linked to an increased risk of developing several cancers. However 8-OHDG is typically present at very low concentrations in urine so is very difficult to detect using conventional detection assays known as enzyme-linked immunobsorbant assays (ELISAS.
Generic epitaxial graphene biosensors of ultrasensitive detection of cancer risk biomarker Z Tehrani et al 2014 2d Mater. 1 025004. iopscience. iop. org/2053
Gold conducts and thus creates a short-circuit that sabotages the appealing semiconducting properties of the graphene ribbon.
night vision and security. The light we see illuminating everyday objects is actually only a very narrow band of wavelengths and frequencies.
and security industries since they are cost-effective compared to optical detection procedures. Such biosensors allow for scalability
carefully constructed cluster that the immune system perceives as a threat, prompting it to release large amounts of antibodies that can attack
"Besides the evident application in replacing the typical'rainbow holograms'of credit cards and other security items,
and telecommunications medical devices and security he says. If these could be made flexible they could be integrated in clothes rolled up
They noted that it could potentially be used to sniff out a hard-to-detect explosive popular among terrorists.
or PETN, an explosive compound considered a favorite of terrorists. Small amounts of it pack a powerful punch,
robust and reusable will allow for simple monitoring of high-risk individuals in any environment, particularly in the developing world.
thus providing a direct assessment of the risk for the patient to develop a cancer.
but if those nanoparticles cannot be digested effectively they can accumulate in the liver creating a risk of secondary poisoning especially among patients who are already at risk of liver failure.
Since 2006 to protect against the threat of those explosives people traveling by air in America have been limited to one#quart-sized bag for liquids each#in a container no larger than 3. 4 ounces.
The research is supported by the Department of Homeland security and it's easy to see how an airport security checkpoint in the future could employ a#liquid-scanning device like the Magray.
The device has been in development since#at least 2007 but#it still may be a few years before Magrays can scan Thanksgiving travelers'homemade gravy
The Open source Beehives project is a collaborative response to the threat faced by bee populations in industrialised nations around the world.
When did the shuttle program become relevant to anyone but the US Department of Espionage?
It's possible enhancing the biochemical events that lead to growth in the brain would cause issues elsewhere in the body like potentially raising the risk of cancer.
and be prepared to monitor radioactivity in an emergency although they probably (hopefully) wouldn't get much of a chance to use it.
and putting the animal at a higher risk of being detected. We know that sharks hunt using their extremely sensitive sense of smell as well â
When health-care providers in the developing world can afford only drugs that don't have a built-in security network,
and nullify the risks associated with smoking. Stole this from yahoo answers By the truth...
The Washington monument and New orleans are not knock on wood under threat in the same way as the Bamiyan Buddhas
Lee told Popular Science that an international panel helps us set up criteria for evaluation sites looking at risk facing the sites significance of the sites and technical benefits of the sites.
In the demonstration the Navy boats first escorted a high value unit simulating a ring of robotic bodyguards around a vessel in a narrow part of the sea.
They can perform more patrols since unmanned swarms of up to 20 boats can be controlled by one sailor at a time.
round-the-clock patrols only require one new sailor at the controls every few hours instead of 50 sailors out in the water every time.
More patrols with small ships surrounding big ones will make larger vessels safer as well. Multiple times during the media call Klunder and Brizzolara mentioned Al qaeda s suicide bombing attack on the destroyer USS Cole in October 2000.
As the Cole refueled at a Yemeni port a small foreign craft approached the side of the destroyer
For lenders interested in making sure loan repayments happen on schedule moving collateral can present an investment risk.
Recently Popular Science reported on how in an effort to mitigate this risk repo men are scanning billions of license plates putting drivers'privacy at risk
In turn lenders are installing fake devices to outwit hacking attempts. From the story: These devices are distinct from previous attempts in car hacking not in function but in initiation.
In addition to seeking out threats like that the LRV as requested will go farther than current Humvees protect against some blasts work in all weather and with degraded visibility and defeat outdated tanks.
If the hit put the player at risk of a concussion the information is sent to a handheld device that alerts the trainer on the sidelines.#
The potential robustness of these robots could mean they can take risks traditional robots might not dare#you could roll them off the edges of cliffs
#The Rise Of The Crypto Phone Between revelations of NSA spying and a sense that marketers and hackers are picking our digital pockets we re all getting a little edgy about cellular security.
Con Your callers also need to have installed the apps for the encryption to work.####Free WINDOWS OS X Linux Orbot for Androidpros The preconfigured browser routes you through a worldwide network of proxy servers anonymizing IP numbers.
##$40 hidecell. compros Storing your phone in a metal-lined bag will eliminate surveillance possibilities by blocking cell-tower signals along with your Wi-fi GPS and Bluetooth connections.
the Advanced High performance Reconnaissance and Surveillance Aircraft (AHRLAC) looks like an alternate history version of a World war i fighter.
The result of a collaboration between South africa's Aerosud aviation firm and the Paramount Group, the AHRLAC is designed as a cheap alternative to the big name in military surveillance right now:
These range from surveillance to light attack, which could make it a useful tool for border patrol, some forms of counterinsurgency warfare,
The pusher propeller design--in which the propellers are mounted behind their respective engines--helps the plane fly slowly, an important task for surveillance aircraft.
It's made to carry everything from surveillance cameras and radar to rockets, flares, and some missiles.
#Japan's Military Will Patrol Earth's Orbitals Japan's military plans to take defense to the heavens in 2019.
and Automation Index ROBO-STOX licenses their proprietary index to ETF Securities to provide European investors with highly diversified access to a new age of growth in robotics and automation.
ETF Securities is the first to license the ROBO-STOX Global Robotics and Automation UCITS Index for use in an exchange traded fund (ETF) that is listed on the London Stock exchange.
Android developer hacker hustler and resident diabetes expert if our bears ever become sentient you#ll know whom to blame.
Covering manufacturing agriculture health transport civil security and households the initiative#calledâ SPARCÂ#is the EU#s industrial policy effort to strengthen Europe#s position in the global
But what happens if theres an emergency and no medical expert to assist? NASA came up with the answer recently
and World cup Football Packbots will be deployed in Brazil during the 2014â World cup Soccerâ season to bring a high-tech approach to security.
The robots will be stationed throughout Brazilâ#12 host cities during the soccer matches to boost security
Factory-in-a-Day aims to develop a system that can be purposed easily re for new product lines  by reducing the system integration time to a single day the project hopes to minimize investment risk for SMES.
#Honda automatic driverless valet parking system Honda has developed a low-cost automatic valet parking system that uses parking lot surveillance cameras to help park cars automatically.
Vision from the rear camera is supplemented with that from surveillance cameras to create a system that can see more around the car. he information that used to move the cars such as white lines is sent to the cars as maps.
Rather than people who are ill going to the doctor our idea is for healthy people to think about how to stay healthy prepare for any emergencies
military and security (64%)manufacturing (57%)space exploration (45%)search and rescue (36%)and healthcare (18%.
and security context may be useful to assess what UK citizens are comfortable with ranging from troop support in areas such as minesweeping to remote surveillance to fully armed drones.
Other applications include home automation surveillance medical instruments prosthetic devices and smart clothing. The artificial compound eye features a panoramic hemispherical field of view with a resolution identical to that of the fruitfly in less than 1 mm thickness.
evaluate future risks, and identify genes related to illness. y investigating SNPS, we can determine that this drug will work for this person,
The propellers are driven by brushless Hacker A05-13s motors that are attached to the wings by 3d printed mountings.
Hacker A05-13s Motor controllers: ZTW Spider 12a ESCS with Simonk firmware Propellers: 5×3 GWS EP-5030 Flap servos:
and willing to take risks through our investments. We try to demonstrate that renewable energy is part of the solution.
we couldn't risk them being bumped by something else, "she said. The Dallas studio provided links to the resumes and portfolios of several actors,
While US Scales Back Support to Rebels The upper chamber of the Russian parliament has given unanimously a formal consent to President Putin to use the nation military in Syria to fight terrorism at a request from the Syrian President Bashar
but some have turned also over their equipment to Al qaeda affiliated Al Nusra Front. The administration announced the creation of the program last year,
It could be used for small package delivery or vertical takeoff and landing, long endurance surveillance for agriculture, mapping and other applications."
Suppressing immunity in this way opens up the risk of new infections and certain cancers. Ott's ambitious technique therefore has an ambitious goal--to one day provide amputees with fully functional limbs that can be transplanted
"We need a limb that doesn't pose any risk to humans, "she says. Ott agrees and is hopeful he will be working in science long enough to see his work come to fruition."
Nepal's national emergency operation centre said on twitter, less than three weeks after a similar disaster killed more than 8, 000 people.
I saw in the news the day before yesterday that the risk was lower, it wouldn't happen again...
Nepal's National Emergency Operation center tweeted:""Pray to Almighty: Keep all Nepalese Safe in this difficult period of time."
The mirror uses a series of ultispectralcameras to assess an individual diet, alcohol consumption, physical activity, smoking habit and metabolic risk.
that ARVS dramatically reduce the risk of transmission. Several Prep studies similarly have shown that ARVS protect uninfected people regardless of the route of transmission.
But this creative strategy also carries risks. he rationale is sound, and the data are exciting,
#Singapore Telecom to buy US cybersecurity firm for $810 mn Singapore Telecom (Singtel) said Wednesday it will buy almost all of US cybersecurity firm Trustwave for $810 million,
Southeast asia's biggest telecom firm by revenue said it will acquire a 98 percent equity interest in Trustwave under an agreement it signed with the Chicago-headquartered company.
Trustwave, a leading specialist in managed security services, is valued at $850 million, Singtel said in a statement.
Trustwave chairman and chief executive Robert J. Mccullen will hold the other two percent.""We aspire top be a global player in cybersecurity,
"Singtel said it"will leverage Trustwave's threat intelligence, technology and talent to meet the growing demand for always-on managed security services in North america and the Asia-Pacific region".
"Trustwavehich helps firms fight cybercrime, protect their data and reduce security riskas three million business subscribers served by 1, 200 employees in 26 countries.
Singtel said that after the acquisition, Trustwave will continue to operate as an independent business unit
and strengthen is position in the United states and Europe. The purchase will also enable Trustwave to use Singtel's vast presence in the Asia Pacific to"broaden its overall security portfolio
and address the fast-growing emerging security market opportunity"in the region, the statement added. Cash-rich Singtel has been expanding well beyond its small domestic market
and holds substantial stakes in mobile telecom firms in key Asian markets including India, Indonesia, the Philippines and Thailand.
It also has owned a wholly subsidiary in Australia called Optus O
#Silicon valley mulls invasion of'unicorns 'When social media software firm Sprinklr unveiled its latest funding last month,
ignoring traditional standards of risk.""We are in a risk bubble, "he said.""Companies are taking on huge burn rates to justify spending the capital they are raising in these enormous financings,
putting their long-term viability in jeopardy.""In a running Twitter conversation on the subject, Danielle Morrill of the research firm Mattermark said"I've narrowed it down to 61 potential dead unicorns.
Airbnb is seen as a threat to the hotel sector similar to Uber's menace to the taxi industry.
which could help curb the risk of unwanted infections in agricultural or garden plants, the team says.
#Assuring solar modules will last for decades The Energy department's National Renewable energy Laboratory (NREL) is co-leading an international push to assure the reliability of solar panelsn assurance demanded by customers, manufacturers, lenders, and utilities.
along with everyone else in the solar industry, know with maximum assurance how long the PV systems will last and
"While these scenarios pose serious threats, our cells have evolved elegant mechanisms to cope, Vindigni says. DNA replicates by unzipping its two interwoven strands
"A continuous accumulation of micro-cracking (that leads to a softening of the material) can be used as a metric for material degradation assessment."
With a rising global population leading to increased pressure on food resources, it is becoming ever more essential that crop breeding programmes work to enhance the security of global food sources.
#Lasers burn holes in quantum security systems A new way to hack quantum-cryptography systems has been unveiled by physicists in Canada.
QKD uses the laws of quantum mechanics to guarantee complete security when two people exchange a cryptographic key.
Unconditional security? In practice, however, the security of QKD is impaired by physical limitations of the sources,
receivers and other hardware used to implement it. According to Vadim Makarov of the University of Waterloo and colleagues, many scientists assume that
then QKD can"provide unconditional security"."But the team has shown that even in perfectly understood systems,
The group also used the same laser to weaken the security of"quantum coin tossing,
The Canadian group says that the new results should force scientists to"think again"about how to assess the security of quantum-cryptographic devices,
and other optical attacks will become"an obligatory part of security assurance for future quantum communications".
He believes that countermeasures are possible, suggesting that an additional detector could be installed to register the light from any damaging laser beams.
The economy is already under threat of deflation and struggling to revive bricks-and-mortar investment. It is targeted officially to grow by 7 per cent this year,
including in companies partly owned by the China Securities Finance Corp (CSFC), the state margin lender tasked with buying stocks and propping up prices.
, according to data from National securities Depository Limited (NSDL. The sales helped push the Nifty down 6. 6 per cent in August, its worst monthly performance since November 2011.
However, these devices, often created with nondegradable elastic polymers, bear an inherent risk of intestinal obstruction as a result of accidental fracture or migration.
which is a medical emergency potentially requiring surgical intervention, says Koch Institute research affiliate Giovanni Traverso,
as there is a greater risk for fracture if a device is too large or too complex.
or have a mechanism that would enable it to pass through the stomach unaltered before disintegrating in the intestines. o lower any possible risk of obstruction,
Invisibility skin cloaks on the microscopic scale might prove valuable for hiding the detailed layout of microelectronic components or for security encryption purposes.
Invisibility skin cloaks on the microscopic scale might prove valuable for hiding the detailed layout of microelectronic components or for security encryption purposes.
and give clinicians more time to treat someone at risk. Septic shock, which is the third level of sepsis,
or she was at risk for septic shock, an alert was sent to a doctor who could then take action
TREWSCORE correctly spotted 85 percent of the patients who were at risk for septic shock,
For instance, a patient who is treated successfully will appear as low-risk in the electronic health records
Saria and her team address this problem by modifying pattern recognition algorithms so the computer can avoid mistaking high-risk patients for low-risk ones.
and other sourceso there is nothing to betray the surveillance. The system calculates the positions of hidden target by comparing two signals:
and a surveillance channel, which picks up Doppler-shifted waves reflecting from the moving subject.
and surveillance signals, interprets the very small frequency shifts, and reveals the hidden subject location and motion.
safety patrols and law enforcement. he most important data come from a handful of car functions:
That cheap enough to make economic sense in medical emergencies, like those encountered in a neonatal intensive care unit.
or act early to reduce the risk of stampedes and other dangers. utomated computer analysis of such large-scale and dense crowds has never been done before,
Automated crowd counting could also prove increasingly potent with the growing use of aerial drone surveillance,
survey farm land, inspect cell towers, patrol property, or do search & rescue, Now wel see just how many businesses will pay a monthly subscription for Airware to power their drones for industrial inspections, agriculture management, anti-poaching, and more.
#France Is One step Closer To Adopting Extensive Surveillance Law Following Charlie Hebdo attacks, The french Government has been tirelessly working to draft
like if someone is watching videos related to terrorism, and then record everything you do online.
but to get tangible results for the Government and French intelligence agencies. In order to campaign for this law
the Government has been saying that intelligence agencies were already spying on everyone, and this new law is a more honest for everyone.
intelligence laws are all about finding the perfect balance between security and privacy. But today law doesn really take privacy into account.
and even The french association of terrorism victims are all against it. But 438 out of 566 members of the lower house from all parties voted for the law.
#Biometric Security: From Selfies To Walking Gaits Oren Levy is CEO of Zooz. The payments industry, facing the risk of increasingly sophisticated cyberattacks
and various types of credit card fraud, has begun incorporating various types of biometric technology to enhance security
and prevent breaches. As recently reported, Mastercard is launching a facial recognition payment service based on elfiestaken on a smartphone.
which has boosted security on its mobile app by using fingerprint sensors that are installed on some Samsung Electronics devices.
While the payments industry is currently working full steam on various forms of biometric technology aimed at thwarting ever-increasing security breaches in payments technologies,
because it affords a higher level of security against cyber attacks than other protection methods. The newfound availability of biometric technology for mobile and cloud-based platforms raises the security bar further.
Nevertheless, while there are many who hail biometrics as a game changer, others believe that in its current form it does not provide the necessary level of security to prevent identity theft.
The fact is that hackers have succeeded in using photographs to lift fingerprints and access personal accounts.
The notorious hacking group called the Chaos Computer Club even replicated the fingerprint of the German Defense Minister.
A lot is happening these days in the field of identification technology to increase security. Qualcomm Technologies recently announced the development of the first comprehensive mobile biometric solution based on ultrasonic technology.
While traditional fingerprint authentication relies on capacitive touch-based sensors, the new Snapdragon solution features ultrasonic-based technology,
which would prevent hackers from replicating fingerprints or other biometric methods. This type of technology would have the ability to detect
and tokenization layers that will ensure high-level security. The ultimate solution technology may involve using a mixture of several forms of biometric authentication,
Increased security is not the only consideration when discussing the advantages of biometrics. Imagine a world in which there is no need to remember a slew of passwords and PINS for various sites.
and banks millions of dollars and provide high-level protection against cyber attacks. However, when it comes to the extensive use of biometrics in the payments industry,
Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011