Menu

Blog

Page 12

Aug 16, 2022

Open-source software gives a leg up to robot research

Posted by in category: robotics/AI

Carnegie Mellon researchers have developed an open-source software that enables more agile movement in legged robots.

Robots can help humans with tasks like aiding disaster recovery efforts or monitoring the environment. In the case of quadrupeds, robots that walk on four legs, their mobility requires many software components to work together seamlessly. Most researchers must spend much of their time developing lower-level infrastructure instead of focusing on high-level behaviors.

Continue reading “Open-source software gives a leg up to robot research” »

Aug 16, 2022

Uncovering nature’s patterns at the atomic scale in living color

Posted by in categories: information science, mapping, robotics/AI

Color coding makes aerial maps much more easily understood. Through color, we can tell at a glance where there is a road, forest, desert, city, river or lake.

Working with several universities, the U.S. Department of Energy’s (DOE) Argonne National Laboratory has devised a method for creating color-coded graphs of large volumes of data from X-ray analysis. This new tool uses computational data sorting to find clusters related to physical properties, such as an atomic distortion in a . It should greatly accelerate future research on structural changes on the atomic scale induced by varying temperature.

The research team published their findings in the Proceedings of the National Academy of Sciences in an article titled “Harnessing interpretable and unsupervised to address big data from modern X-ray diffraction.”

Aug 16, 2022

ÆPIC and SQUIP Vulnerabilities Found in Intel and AMD Processors

Posted by in category: futurism

Researchers have uncovered details of the ÆPIC and SQUIP vulnerabilities in Intel and AMD processors that allow attackers to obtain secret info.

Aug 16, 2022

New Evil PLC Attack Weaponizes PLCs to Breach OT and Enterprise Networks

Posted by in categories: cybercrime/malcode, robotics/AI

Cybersecurity researchers have elaborated a novel attack technique that weaponizes programmable logic controllers (PLCs) to gain an initial foothold in engineering workstations and subsequently invade the operational technology (OT) networks.

Dubbed “Evil PLC” attack by industrial security firm Claroty, the issue impacts engineering workstation software from Rockwell Automation, Schneider Electric, GE, B&R, Xinje, OVARRO, and Emerson.

Programmable logic controllers are a crucial component of industrial devices that control manufacturing processes in critical infrastructure sectors. PLCs, besides orchestrating the automation tasks, are also configured to start and stop processes and generate alarms.

Aug 16, 2022

SOVA Android Banking Trojan Returns With New Capabilities and Targets

Posted by in categories: finance, robotics/AI

Researchers discover a new variant of the SOVA Android banking trojan with upgraded capabilities.

Aug 16, 2022

Newly Uncovered PyPI Package Drops Fileless Cryptominer to Linux Systems

Posted by in category: cybercrime/malcode

Researchers discover a new Python package distributed via the PyPI repository that drops fileless crypto-mining malware onto Linux systems.

Aug 16, 2022

A low-power stretchable neuromorphic nerve with proprioceptive feedback

Posted by in category: energy

A stretchable neuromorphic ‘nerve’ restores coordinated and smooth motions in the legs of mice with neurological motor disorders, enabling the animals to kick a ball, walk or run.

Aug 16, 2022

Humanoid robot passes for human in joint task experiment

Posted by in category: robotics/AI

This same feature could also play a role in our ability to tell what is human, and what is not. Several experiments have shown that when humanoid robots exhibit human-like variability in response times or motion patterns, we perceive them as more human-like.

In a study published in Science Robotics1, researchers have observed this same effect when the human and the robot are performing a shared activity. “To evaluate the impact of behavioural variability in the attribution of humanness to a robot, in our experiment the robot was either teleoperated by another human or controlled by a computer”, says Agnieszka Wykowska, senior researcher at the Italian Institute of Technology (IIT) in Genoa, and the coordinator of the study.

The research has also shown that the effect applies even when the variability of the robot’s behaviour does not closely resemble the human one, if it falls in the same range. “Depending on the context and on the function that the robot needs to perform, roboticists can endow their machines with a different degree of humanness by modulating the variability of their behaviors,” Wykowska adds.

Aug 16, 2022

Black Hole Mysteries Solved

Posted by in category: cosmology

Recent theoretical and observational results have revealed new secrets about these shadowy objects, with deep implications for more than just black holes themselves.

By Clara Moskowitz

By:

Aug 16, 2022

How the Brain Gathers Threat Cues and Turns Them Into Fear

Posted by in category: neuroscience

Summary: CGRP neurons found in subregions of the thalamus and brainstem relay multisensory threat information to the amygdala. These neural circuits are essential for the formation of aversive memories, a new study reports.

Source: Salk Institute.

Salk scientists have uncovered a molecular pathway that distills threatening sights, sounds and smells into a single message: Be afraid.

Page 12 of 7,626First910111213141516Last