Toggle light / dark theme

Get the latest international news and world events from around the world.

Log in for authorized contributors

A light-programmable, dynamic ultrasound wavefront

The notion of a phased array was initially articulated by Nobel Prize recipient K. F. Braun. Phased arrays have subsequently evolved into a formidable mechanism for wave manipulation. This assertion holds particularly true in the realm of ultrasound, wherein arrays composed of ultrasound-generating transducers are employed in various applications, including therapeutic ultrasound, tissue engineering, and particle manipulation.

Importantly, these applications—contrary to those aimed at imaging—demand high-intensity ultrasound, which complicates the electrical driving requirements, as each channel necessitates its own independently operational pulse circuitry and amplifier. Consequently, the majority of phased array transducers (PATs) are constrained to several hundred elements, thereby restricting the capability to shape intricate ultrasound beams.

To date, there exists no scalable methodology for the powering and control of phased array transducers.

New Open-Source Tool Makes Complex Data Easily Understandable

Datavzrd makes complex datasets interactive and easy to use. It works across scientific fields without programming knowledge. Tabular data is central to scientific research, whether in medicine, the social sciences, or archaeology. Yet transforming raw tables into something clear and usable is of

The Universe’s Engine Is Changing: DESI Hints Dark Energy Isn’t What We Thought

DESI observations suggest black holes may generate dark energy by consuming stellar matter. The idea resolves puzzles about neutrino mass and cosmic expansion. These are remarkable times for probing some of the most profound mysteries in physics, made possible by advanced experiments and increasi

Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers

Cybersecurity researchers have discovered two new malicious packages on the npm registry that make use of smart contracts for the Ethereum blockchain to carry out malicious actions on compromised systems, signaling the trend of threat actors constantly on the lookout for new ways to distribute malware and fly under the radar.

“The two npm packages abused smart contracts to conceal malicious commands that installed downloader malware on compromised systems,” ReversingLabs researcher Lucija Valentić said in a report shared with The Hacker News.

/* */