Sunday, September 25, 2011

Blog: Proton-Based Transistor Could Let Machines Communicate With Living Things

Proton-Based Transistor Could Let Machines Communicate With Living Things
UW News (09/20/11) Hannah Hickey

Researchers at the University of Washington have developed a transistor that uses protons, instead of electrons, to send information, which could enable electronic devices to communicate directly with living things. "We found a biomaterial that is very good at conducting protons, and allows the potential to interface with living systems," says Washington professor Marco Rolandi. A machine that was compatible with a living system could monitor body processes such as flexing muscles and transmitting brain signals. The prototype device is a field-effect transistor, a drain and source terminal for the current. "In our device, large bio-inspired molecules can move protons, and a proton current can be switched on and off, in a way that's completely analogous to an electronic current in any other field-effect transistor," Rolandi says. The device uses a modified form of the compound chitosan, originally extracted from squid pen, because it works very well at moving protons by absorbing water and forming many hydrogen bonds that the protons are able to easily move between. "So we now have a protonic parallel to electronic circuitry that we actually start to understand rather well," Rolandi says.

Friday, September 23, 2011

Blog: New Mathematical Model to Enable Web Searches for Meaning

New Mathematical Model to Enable Web Searches for Meaning
University of Hertfordshire (09/23/11) Paige Upchurch

University of Hertfordshire computer scientist Daoud Clarke has developed a mathematical model based on a theory of meaning that could revolutionize artificial intelligence technologies and enable Web searches to interpret the meaning of queries. The model is based on the idea that the meaning of words and phrases is determined by the context in which they occur. "This is an old idea, with its origin in the philosophy of Wittgenstein, and was later taken up by linguists, but this is the first time that someone has used it to construct a comprehensive theory of meaning," Clarke says. The model provides a way to represent words and phrases as sequences of numbers, known as vectors. "Our theory tells you what the vector for a phrase should look like in terms of the vectors for the individual words that make up the phrase," Clarke says. "Representing meanings of words using vectors allows fuzzy relationships between words to be expressed as the distance or angle between the vectors." He says the model could be applied to new types of artificial intelligence, such as determining the exact nature of a particular Web query.

Wednesday, September 21, 2011

Blog: Robotics Team Finds Artificial Fingerprints Improve Tactile Abilities

Robotics Team Finds Artificial Fingerprints Improve Tactile Abilities
PhysOrg.com (09/21/11) Bob Yirka

National University of Singapore researchers have demonstrated how adding artificial fingerprints to robot fingers can increase tactile sensation, enabling the robot to discern the differences in the curvature of objects. The researchers, led by Saba Salehi, John-John Cabibihan, and Shuzhi Sam Ge, built a touch sensor consisting of a base plate, embedded sensors, and a raised ridged surface. The researchers tested the sensor in a variety ways to determine if they were able to use it to sense things in different ways, specifically as it was applied to flat, edged, and curved objects. The researchers found that the raised sensor provided more feedback information than the one with the flat surface, so much so that they were able to tell the difference in the three types of objects with 95.7 percent accuracy.

Blog: Novel High-Performance Hybrid System for Semantic Factoring of Graph Databases

Novel High-Performance Hybrid System for Semantic Factoring of Graph Databases
Pacific Northwest National Laboratory (09/21/11) Kathryn Lang; Christine Novak

Researchers at the Pacific Northwest National Laboratory, Sandia National Laboratories, and Cray have developed an application that can analyze gigabyte-sized data sets. The application uses semantic factoring to organize data, revealing hidden connections and threads. The researchers used the application to analyze the massive datasets for the Billion Triple Challenge, an international competition aimed at demonstrating capability and innovation for dealing with very large semantic graph databases. The researchers utilized the Cray XMT architecture, which allowed all 624 gigabytes of input data to be held in RAM. The researchers are now developing a prototype that can be adapted to a variety of application domains and datasets, including working with the bio2rdf.org and future billion-triple-challenge datasets in prototype testing and evaluation.

Monday, September 19, 2011

Blog: Mining Data for Better Medicine

Mining Data for Better Medicine
Technology Review (09/19/11) Neil Savage

Researchers are utilizing digital medical records to conduct wide-ranging studies on the effects of certain drugs and how they relate to different populations. Data-mining studies also are being used to uncover evidence of economic problems, such as overbilling and unnecessary procedures. In addition, some large hospital systems are employing full-time database research teams to study electronic records. Stanford University researcher Russ Altman is developing tools to analyze the U.S. Food and Drug Administration's Adverse Event Reporting System, a database containing several million reports of drugs that have harmed patients. The Stanford researchers have developed an algorithm that searched for patients taking widely prescribed drugs who subsequently suffered side effects similar to those seen in diabetics. "There's just an incredibly wide range of possibilities for research from using all this aggregated data," says Margaret Anderson, executive director of FasterCures, a think tank in Washington, D.C. "We're asking, 'Why aren't we paying a little bit more attention to that?'"

Friday, September 16, 2011

Blog: Data May Not Compute

Data May Not Compute
Harvard Gazette (09/16/11) Alvin Powell

The fast pace of technology's advance has left some data behind as data stored on tapes, floppy disks, and other media that is now unreadable by modern computers is essentially lost. In addition, file formats change as new programs are developed, making older programs obsolete. To help save this lost data, Harvard University's Institute for Quantitative Social Science (IQSS) is leading the Dataverse Network Project, which provides archival storage for scientific research projects. IQSS provides professional archiving standards designed to ensure future access to data. Once a researcher's data is entered into the system, it is converted from its original file format into a basic one that ensures the information will remain readable for decades. When that format becomes obsolete, the system will automatically convert the data to a new format that also is designed to last for decades, says IQSS director Gary King. The institute currently hosts more than 350 individual researchers' Dataverses, which includes about 40,000 studies and 665,000 files, according to IQSS' Merce Crosas. The software's open source design allows other researchers to add features that can be shared with the community of users.

Thursday, September 15, 2011

Blog: Intel Code Lights Road to Many-Core Future

Intel Code Lights Road to Many-Core Future
EE Times (09/15/11) Rick Merritt

Intel's release of open source code for a data-parallel version of Javascript seeks to help mainstream programmers who use scripting languages tap the power of multicore processors. Intel's Justin Rattner says in an interview that there will be multiple programming models, and Parallel JS encompasses one such model. The language enhances performance for data-intensive, browser-based apps such as photo and video editing and three-dimensional gaming running on Intel chips. Rattner describes Parallel JS as "a pretty important step that gets us beyond the prevailing view that once you are beyond a few cores, multicore chips are only for technical apps." A later iteration of Parallel JS also will exploit the graphics cores currently incorporated into Intel's latest processors. In addition, Intel is working on ways to enhance modern data-parallel tools that operate general-purpose programs on graphics processors, and those tools could be issued next year, Rattner says. He notes that beyond that, data-parallel methods require a more basic change to boost power efficiency by becoming more asynchronous.

Blog: Social Media for Dementia Patients

Social Media for Dementia Patients
SINTEF (09/15/11)

SINTEF researchers are developing a version of the popular Facebook social media site that offers a simpler user interface designed for elderly people and those with dementia. "Why should elderly people be excluded from the social media, which are the communication platform of the future?" says SINTEF researcher Tone Oderud. The researchers want to develop a Web-based communications application that is simple and secure for elderly and senile users, their relatives, and caregivers. They say that social media can become an important tool for improving the quality of life of elderly people, while easing the burden on therapists and caregivers. In testing, the application has shown that simple contact between relatives and the support services improved all users' security. "The tests have shown us that there is great potential for all in the fields of caregiving and digital communication," Oderud says.

Monday, September 12, 2011

Blog: In Plane View; using cluster analysis to discover what's normal

In Plane View
MIT News (09/12/11) Jennifer Chu

Massachusetts Institute of Technology professor John Hansman and colleagues have developed an airline health detection tool that identifies flight glitches without knowing ahead of time what to look for. The method uses cluster analysis, a type of data mining that filters data into subsets to find common patterns. Flight data outside the clusters is labeled as abnormal, enabling analysts to further inspect those reports to determine the nature of the anomaly. The researchers developed a data set from 365 flights that took place over one month. "The beauty of this is, you don't have to know ahead of time what 'normal' is, because the method finds what's normal by looking at the cluster," Hansman says. The researchers mapped each flight at takeoff and landing and found several flights that fell outside the normal range, mostly due to crew mistakes rather than mechanical flaws, according to Hansman. "To make sure that systems are safe in the future, and the airspace is safe, we have to uncover precursors of aviation safety accidents [and] these [cluster-based] analyses allow us to do that," says the U.S.'s National Aeronautics and Space Administration's Ashok Srivastava.

Friday, September 9, 2011

Blog: Google to Unveil 'Dart' Programming Language

Google to Unveil 'Dart' Programming Language
eWeek (09/09/11) Darryl K. Taft

Google plans to introduce a new programming language called Dart at the upcoming Goto conference. Dart is described as a structured Web programming language, and Google engineers Lars Bak and Gilad Bracha are scheduled to present it at Goto, which takes place Oct. 10-12 in Aarhus, Denmark. Bracha is the creator of the Newspeak programming language, co-author of the Java Language Specification, and a researcher in the area of object-oriented programming languages. Bak has designed and implemented object-oriented virtual machines, and has worked on Beta, Self, Strongtalk, Sun's HotSpot, OOVM Smalltalk, and Google's V8 engine for the Chrome browser. In 2009, Google introduced the experimental language Go in an attempt to combine the development speed of working in a dynamic language, such as Python, with the performance and safety of a compiled language such as C or C++.

Wednesday, September 7, 2011

Blog: New Forensics Tool Can Expose All Your Online Activity

New Forensics Tool Can Expose All Your Online Activity
New Scientist (09/07/11) Jamie Condliffe

Software developed by researchers from Stanford University can be used to bypass the encryption on a personal computer's hard drive to find what Web sites a user has visited and whether any data has been stored in the cloud. The team launched the Windows-based open source software, Offline Windows Analysis and Data Extraction (OWADE), at the Black Hat 2011 security conference. Most sensitive data on a hard drive, including browsing history, site logins, and passwords, uses an algorithm to generate an encryption key based on the standard Windows login. Elie Bursztein and colleagues discovered how to decrypt the files a year ago. OWADE combines their knowledge of how this system works with existing data-extraction techniques into a single forensics package. "We've built a tool that can reconstruct where the user has been online, and what identity they used," Bursztein says. Law enforcement would be able to use the tool to track sex offenders, but people who want to remain anonymous could potentially exploit the software and develop new ways of avoiding being caught.

Tuesday, September 6, 2011

Blog: NSA Extends Label-Based Security to Big Data Stores (key/value data stores - NoSQL]

NSA Extends Label-Based Security to Big Data Stores
IDG News Service (09/06/11) Joab Jackson

The U.S. National Security Agency (NSA) recently submitted Accumulo, new label-based data store software, to the Apache Software Foundation, hoping that more parties will continue to develop the technology for use in future secure systems. "We have made much progress in developing this project over the past [three] years and believe both the project and the interested communities would benefit from this work being openly available and having open development," say the NSA developers. Accumulo, which is based on Google's BigTable design, is a key/value data store, in which providing the system with the key will return the data associated with that key. Accumulo also can be run on multiple servers, making it a good candidate for big data systems. The system's defining feature is the ability to tag each data cell with a label, and a section called column visibility that can store the labels. "The access labels in Accumulo do not in themselves provide a complete security solution, but are a mechanism for labeling each piece of data with the authorizations that are necessary to see it," the NSA says. The new label-based storage system could be the basis of other secure data store-based systems, which could be used by healthcare, government agencies, and other parties with strict security and privacy requirements.

Saturday, September 3, 2011

Blog: Computers Can See You--If You Have a Mug Shot; aulity of facial recognition systems

Computers Can See You--If You Have a Mug Shot
Wall Street Journal (09/03/11) Carl Bialik

Carnegie Mellon University (CMU) researchers recently presented data suggesting that facial recognition tools could identify individuals based on posed mug shots. The researchers demonstrated that, in principle, 33 percent of people photographed could be matched with a database of photos taken from Facebook. As part of the study, the researchers used images of 93 volunteers and compared them to Facebook photos of people on the CMU network. The results mean no one using facial-recognition software can claim "I can recognize any person in the U.S. at this very moment," says CMU's Ralph Gross. The problem is taking one image and comparing it to a wide set of images to find a single correct match. Comparing photos of just one person is easier and has achieved much more success. In a recent U.S. National Institute of Standards and Technology test, facial recognition software misidentified individuals in photographs just one percent of the time. Compared to Facebook images, closed-circuit (CC) TV images will probably be even more difficult to use with facial recognition systems, according to computer-vision experts. "Identifying faces in CCTV-quality images requires human experts," says University of Cambridge professor John Daugman.

Blog Archive