Menu

Blog

Archive for the ‘information science’ category: Page 234

Jun 20, 2019

Researchers develop ‘vaccine’ against attacks on machine learning

Posted by in categories: biotech/medical, information science, robotics/AI

Researchers from CSIRO’s Data61, the data and digital specialist arm of Australia’s national science agency, have developed a world-first set of techniques to effectively ‘vaccinate’ algorithms against adversarial attacks, a significant advancement in machine learning research.

Jun 14, 2019

DNA could store all of the world’s data in one room

Posted by in categories: biotech/medical, computing, information science

New algorithm delivers the highest-ever density for large-scale data storage.

Read more

Jun 14, 2019

A Data Storage Revolution? DNA Can Store Near Limitless Data in Almost Zero Space

Posted by in categories: computing, information science, space

In the age of big data, we are quickly producing far more digital information than we can possibly store.

Last year, $20 billion was spent on new data centers in the US alone, doubling the capital expenditure on data center infrastructure from 2016.

And even with skyrocketing investment in data storage, corporations and the public sector are falling behind.

Continue reading “A Data Storage Revolution? DNA Can Store Near Limitless Data in Almost Zero Space” »

Jun 13, 2019

Terrifying AI Matches DNA to Facial Recognition Databases

Posted by in categories: biotech/medical, information science, robotics/AI

Cops would love to have a system that uses DNA from a crime scene to generate a picture of a suspect’s face, but that tech is still restricted to science fiction.

That technology may never exist, but a team of Belgian and American engineers just developed something similar. Using what they know about how DNA shapes the human face, the researchers built an algorithm that scans through a database of images and selects the faces that could be linked to the DNA found at a crime scene, according to research published Wednesday in the journal Nature Communications — a powerful crime-fighting tool, but also a terrifying new way to subvert privacy.

Read more

Jun 10, 2019

Immortality is mathematically impossible, new research finds

Posted by in categories: biotech/medical, information science, life extension, mathematics

A mathematical equation has proven that controlling one of the two major changes in a cell—decay or cancerous growth—enhances the other, causing inevitable death.

NEXT NEWS ❯

Read more

Jun 7, 2019

The New Era of Exponential Encryption

Posted by in categories: encryption, information science

In their book “Era of Exponential Encryption — Beyond Cryptographic Routing” the authors provide a vision that can demonstrate an increasing multiplication of options for encryption and decryption processes: Similar to a grain of rice that doubles exponentially in every field of a chessboard, more and more newer concepts and programming in the area of cryptography increase these manifolds: both, encryption and decryption, require more session-related and multiple keys, so that numerous options even exist for configuring hybrid encryption: with different keys and algorithms, symmetric and asymmetrical methods, or even modern multiple encryption, with that ciphertext is converted again and again to ciphertext. It will be analyzed how a handful of newer applications like e.g. Spot-On and GoldBug E-Mail Client & Crypto Chat Messenger and other open source software programming implement these encryption mechanisms. Renewing a key several times — within the dedicated session with “cryptographic calling” — has forwarded the term of “perfect forward secrecy” to “instant perfect forward secrecy” (IPFS). But even more: if in advance a bunch of keys is sent, a decoding of a message has to consider not only one present session key, but over dozens of keys are sent — prior before the message arrives. The new paradigm of IPFS has already turned into the newer concept of these Fiasco Keys are keys, which provide over a dozen possible ephemeral keys within one session and define Fiasco Forwarding, the approach which complements and follows IPFS. And further: by adding routing- and graph-theory to the encryption process, which is a constant part of the so called Echo Protocol, an encrypted packet might take different graphs and routes within the network. This shifts the current status to a new age: The Era of Exponential Encryption, so the vision and description of the authors. If routing does not require destination information but is replaced by cryptographic in.

Read more

Jun 6, 2019

How Peter Shor’s Algorithm is Destined to Put an End to Modern Encryption

Posted by in categories: computing, encryption, information science, internet, quantum physics

RSA Encryption is an essential safeguard for our online communications. It was also destined to fail even before the Internet made RSA necessary, thanks the work of Peter Shor, whose algorithm in 1994 proved quantum computers could actually be used to solve problems classical computers could not.

Read more

Jun 3, 2019

This Clothing Line Was Designed By AI

Posted by in categories: information science, robotics/AI

‘Glitch’ is a new company that sells dresses generated by machine learning algorithms.

Read more

Jun 3, 2019

Beyond CSI: How big data is reshaping the world of forensics

Posted by in category: information science

In recent years, forensics scientists, statisticians, and engineers have been working to put crime scene forensics on a stronger footing, with some classic techniques falling out of favor.

[Photos: OpenClipart-Vectors/Pixabay; Hunter Harritt/Unsplash; blickpixel/Pixabay].

Read more

Jun 3, 2019

These $10 Sensor-Packed Gloves Could Give Robots a Sense of Touch

Posted by in categories: biotech/medical, information science, robotics/AI

Machines are mastering vision and language, but one sense they’re lagging behind on is touch. Now researchers have created a sensor-laden glove for just $10 and recorded the most comprehensive tactile dataset to date, which can be used to train machine learning algorithms to feel the world around them.

Dexterity would be an incredibly useful skill for robots to master, opening up new applications everywhere from hospitals to our homes. And they’ve been coming along in leaps and strides in their ability to manipulate objects, OpenAI’s cube juggling robotic hand being a particularly impressive example.

So far, though, they’ve had one hand tied behind their backs. Most approaches have relied on using either visual data or demonstrations to show machines how they should grasp objects. But if you look at how humans learn to manipulate objects, you realize that’s just one part of the puzzle.

Read more