Menu

Blog

Page 7525

May 28, 2020

Reducing transmission of SARS-CoV-2

Posted by in category: biotech/medical

Masks and testing are necessary to combat asymptomatic spread in aerosols and droplets.

Respiratory infections occur through the transmission of virus-containing droplets (5 to 10 μm) and aerosols (≤5 μm) exhaled from infected individuals during breathing, speaking, coughing, and sneezing. Traditional respiratory disease control measures are designed to reduce transmission by droplets produced in the sneezes and coughs of infected individuals. However, a large proportion of the spread of coronavirus disease 2019 (COVID-19) appears to be occurring through airborne transmission of aerosols produced by asymptomatic individuals during breathing and speaking (13). Aerosols can accumulate, remain infectious in indoor air for hours, and be easily inhaled deep into the lungs. For society to resume, measures designed to reduce aerosol transmission must be implemented, including universal masking and regular, widespread testing to identify and isolate infected asymptomatic individuals.

Humans produce respiratory droplets ranging from 0.1 to 1000 μm. A competition between droplet size, inertia, gravity, and evaporation determines how far emitted droplets and aerosols will travel in air (4, 5). Respiratory droplets will undergo gravitational settling faster than they evaporate, contaminating surfaces and leading to contact transmission. Smaller aerosols (≤5 μm) will evaporate faster than they can settle, are buoyant, and thus can be affected by air currents, which can transport them over longer distances. Thus, there are two major respiratory virus transmission pathways: contact (direct or indirect between people and with contaminated surfaces) and airborne inhalation.

May 28, 2020

A new eVTOL player enters the race with 60-mile range electric air taxi

Posted by in category: drones

There’s currently a race to create the first air taxi service using electric vertical take-off and landing aircraft (eVTOL) and a new serious player has entered the race: Archer.

Following the rise of consumer drones and improved battery capacity, electric vertical take-off and landing aircraft (eVTOL) with the capacity for passengers has become possible.

Continue reading “A new eVTOL player enters the race with 60-mile range electric air taxi” »

May 28, 2020

This New Electric Aircraft Uses ’60s-Era Tech to Take Off Like a Helicopter and Fly Like a Plane

Posted by in category: transportation

Tilt-wing applications were first used in the 1960s, but MOBi-One’s new design is on the leading edge of the eVTOL revolution.

May 28, 2020

Kelvin Dafiaghor Photo

Posted by in category: robotics/AI

Day 4: The kids learnt how to build a robotic arm using breadboard, servo motor, batteries and sensor in the Artificial Intelligence Hub boot camp tagged Introduction to Robotics 1.0 #TakeOver.


Kelvin Dafiaghor added a new photo.

May 28, 2020

Google AI researchers want to teach robots tasks through self-supervised reverse engineering

Posted by in category: robotics/AI

Google and Stanford University researchers propose a technique that has AI predict the steps required to reach a goal state.

May 28, 2020

Next-gen laser facilities look to usher in new era of relativistic plasmas research

Posted by in categories: cosmology, physics

The subject of the 2018 Nobel Prize in physics, chirped pulse amplification is a technique that increases the strength of laser pulses in many of today’s highest-powered research lasers. As next-generation laser facilities look to push beam power up to 10 petawatts, physicists expect a new era for studying plasmas, whose behavior is affected by features typically seen in black holes and the winds from pulsars.

May 28, 2020

Deeptrace: Modern capabilities for fake video creation are an emerging threat to digital communication, both on private channels and online

Posted by in category: futurism

Modern capabilities for fake video creation are an emerging threat to digital communication, both on private channels and online.

Since 2018, we have been at the forefront of threat research and detection solutions against deepfakes, working with news organizations, brands, and digital platforms.

Learn more.

May 28, 2020

Microsoft warns about attacks with the PonyFinal ransomware

Posted by in category: cybercrime/malcode

Microsoft’s security team has issued an advisory today warning organizations around the globe to deploy protections against a new strain of ransomware that has been in the wild over the past two months.

“PonyFinal is a Java-based ransomware that is deployed in human-operated ransomware attacks,” Microsoft said in a series of tweets published today.

Human-operated ransomware is a subsection of the ransomware category. In human-operated ransomware attacks, hackers breach corporate networks and deploy the ransomware themselves.

May 28, 2020

Turning Your Wall Into A Touch Screen

Posted by in category: futurism

This ring-like device turns any surface you want into a touch screen 👆 🤯.

May 28, 2020

A new scheme for satellite-based quantum-secure time transfer

Posted by in categories: encryption, quantum physics, satellites, security

Researchers at the University of Science and Technology of China have recently introduced a new satellite-based quantum-secure time transfer (QSTT) protocol that could enable more secure communications between different satellites or other technology in space. Their protocol, presented in a paper published in Nature Physics, is based on two-way quantum key distribution in free space, a technique to encrypt communications between different devices.

“Our main idea was to realize quantum-secure time transfer in order to resolve the in practical time–frequency transfer,” Feihu Xu, one of the researchers who carried out the study, told Phys.org.

Quantum key distribution (QKD) is a technique to achieve secure communication that utilize based on the laws of quantum mechanics. Quantum protocols can generate secret security keys based on , enabling more secure data transfer between different devices by spotting attackers who are trying to intercept communications.