When tested in simulated drone paths, the model was able to predict the operator location with 78% accuracy. The next step in the project would be to repeat this experiment with data captured from real drones.
Components made of glass- and carbon- fiber reinforced composites, soaring in high-performance applications, can be 3D printed. A team of researchers from NYU Tandon School of Engineering found that the printer head toolpaths are easy to reproduce -- and therefore steal -- with machine learning (ML) tools applied to the microstructures of the part obtained by a CT scan.
An international study has used data from a major home Internet Protocol (IP) security camera provider to evaluate potential privacy risks for users.
Researchers at TU Darmstadt halt individual photons and can release them at the push of a button. The tool could be used for bug-proof communications, for example, or for something that was previously impossible. A recent paper on their work was published in ;Optics Express'.
A Purdue team created a technology called OPTIMUSCLOUD -- which is designed to help achieve cost and performance efficiency for cloud-hosted databases.
A new study provides new details of a technique that could have allowed a relatively small number of computers to carry out DDoS (distributed denial of service) attacks on a massive scale, overwhelming targets with false requests for information until they were thrown offline.
Ring, Nest, SimpliSafe and eight other manufacturers of internet-connected doorbell and security cameras have been alerted to "systemic design flaws" discovered by Florida Tech computer science student Blake Janes that allow a shared account that appears to have been removed to actually remain in place with continued access to the video feed.
Using biologically inspired robotic swarms consisting of large groups of robots that have been programmed to operate cooperatively, much like individuals in an ant or bee colony, scientists from the University of Colorado demonstrate that the locally observed distribution of robots can be correlated to the location of environmental features, such as exits in office-like environments. The study's findings were published in IEEE/CAA Journal of Automatica Sinica.
Engineers have demonstrated a method for ensuring that an increasingly popular method of genetic identification called "DNA fingerprinting" remains secure against inadvertent mistakes or malicious attacks in the field. The technique relies on introducing genetic "barcodes" to DNA samples as they are collected and securely sending information crucial to identifying these barcodes to technicians in the laboratory.
We believe we are less likely than others are to fall for phishing scams, thereby underestimating our own exposure to risk, a new cybersecurity study has found.