An international research team has designed a deep learning system able to detect natural disasters using images posted on social media. The researchers applied computer vision tools that, once trained using 1.7 million photographs, proved capable of analyzing, filtering and detecting real disasters. The paper is published in the journal IEEE Transactions on Pattern Analysis and Machine Intelligence.An international research team has designed a deep learning system able to detect natural disasters using images posted on social media. The researchers applied computer vision tools that, once trained using 1.7 million photographs, proved capable of analyzing, filtering and detecting real disasters. The paper is published in the journal IEEE Transactions on Pattern Analysis and Machine Intelligence.[#item_full_content]

A savvy hacker can obtain secret information, such as a password, by observing a computer program’s behavior, like how much time that program spends accessing the computer’s memory.A savvy hacker can obtain secret information, such as a password, by observing a computer program’s behavior, like how much time that program spends accessing the computer’s memory.[#item_full_content]

Researchers at NYU Tandon School of Engineering’s C2SMART Center have developed an algorithm to plan the most efficient routes for modular vehicle (MV) fleets—specially-designed vehicles that attach and detach from one another as they move people around cities—removing a significant obstacle to making this type of transportation system a reality.Researchers at NYU Tandon School of Engineering’s C2SMART Center have developed an algorithm to plan the most efficient routes for modular vehicle (MV) fleets—specially-designed vehicles that attach and detach from one another as they move people around cities—removing a significant obstacle to making this type of transportation system a reality.[#item_full_content]

Visualization and artificial intelligence (AI) are well-applied approaches to data analysis. In complex data analysis scenarios, like epidemic traceability and city planning, humans need to understand large-scale data and make decisions, which requires complementing the strengths of both visualization and AI. However, integrating these into data analysis processes has yet to be accomplished.Visualization and artificial intelligence (AI) are well-applied approaches to data analysis. In complex data analysis scenarios, like epidemic traceability and city planning, humans need to understand large-scale data and make decisions, which requires complementing the strengths of both visualization and AI. However, integrating these into data analysis processes has yet to be accomplished.[#item_full_content]

Computer scientists at the University of Waterloo have discovered a method of attack that can successfully bypass voice authentication security systems with up to a 99% success rate after only six tries.Computer scientists at the University of Waterloo have discovered a method of attack that can successfully bypass voice authentication security systems with up to a 99% success rate after only six tries.[#item_full_content]

Cambridge scientists have set out principles for how computational science—which powers discoveries from unveiling the mysteries of the universe to developing treatments to fight cancer to improving our understanding of the human genome, but can have a substantial carbon footprint—can be made more environmentally sustainable.Cambridge scientists have set out principles for how computational science—which powers discoveries from unveiling the mysteries of the universe to developing treatments to fight cancer to improving our understanding of the human genome, but can have a substantial carbon footprint—can be made more environmentally sustainable.[#item_full_content]

All it takes is a simple text command: in no time at all, artificial intelligence can generate an image that looks like a real photo and is indistinguishable from it to human eyes. Fascinating though it is, it essentially casts doubt on the authenticity of every image.All it takes is a simple text command: in no time at all, artificial intelligence can generate an image that looks like a real photo and is indistinguishable from it to human eyes. Fascinating though it is, it essentially casts doubt on the authenticity of every image.[#item_full_content]

Researchers have developed a new design for computer memory that could both greatly improve performance and reduce the energy demands of internet and communications technologies, which are predicted to consume nearly a third of global electricity within the next ten years.Researchers have developed a new design for computer memory that could both greatly improve performance and reduce the energy demands of internet and communications technologies, which are predicted to consume nearly a third of global electricity within the next ten years.[#item_full_content]

Hirebucket

FREE
VIEW