Showing 20 articles starting at article 501

< Previous 20 articles        Next 20 articles >

Categories: Computer Science: Encryption, Space: Astrophysics

Return to the site home page

Space: Astrophysics Space: Structures and Features
Published

A star's unexpected survival      (via sciencedaily.com) 

Hundreds of millions of light-years away in a distant galaxy, a star orbiting a supermassive black hole is being violently ripped apart under the black hole's immense gravitational pull. As the star is shredded, its remnants are transformed into a stream of debris that rains back down onto the black hole to form a very hot, very bright disk of material swirling around the black hole, called an accretion disc. This phenomenon -- where a star is destroyed by a supermassive black hole and fuels a luminous accretion flare -- is known as a tidal disruption event (TDE), and it is predicted that TDEs occur roughly once every 10,000 to 100,000 years in a given galaxy.

Energy: Alternative Fuels Engineering: Nanotechnology Space: Astrophysics Space: Structures and Features Space: The Solar System
Published

The world in grains of interstellar dust      (via sciencedaily.com) 

Understanding how dust grains form in interstellar gas could offer significant insights to astronomers and help materials scientists develop useful nanoparticles.

Space: Astrophysics Space: Cosmology Space: Exploration Space: Structures and Features
Published

Researchers measure size-luminosity relation of galaxies less than a billion years after Big Bang      (via sciencedaily.com) 

A team has studied the relation between galaxy size and luminosity of some of the earliest galaxies in the universe taken by the James Webb Space Telescope, less than a billion years after the Big Bang.

Space: Astrophysics Space: Exploration Space: Structures and Features
Published

Hubble finds hungry black hole twisting captured star into donut shape      (via sciencedaily.com) 

Black holes are gatherers, not hunters. They lie in wait until a hapless star wanders by. When the star gets close enough, the black hole's gravitational grasp violently rips it apart and sloppily devours its gasses while belching out intense radiation. Astronomers have recorded a star's final moments in detail as it gets gobbled up by a black hole.

Space: Astrophysics Space: Structures and Features Space: The Solar System
Published

How do rocky planets really form?      (via sciencedaily.com) 

A new theory could explain the origin and properties of systems of rocky super-Earths and their relationship with the terrestrial planets of the solar system.

Space: Astrophysics Space: Exploration Space: Structures and Features
Published

How did the Butterfly Nebula get its wings? It's complicated      (via sciencedaily.com) 

Something is amiss in the Butterfly Nebula. When astronomers compared two exposures of this planetary nebula that had been taken by the Hubble Space Telescope in 2009 and 2020, they saw dramatic changes in the material within its 'wings.' Powerful winds are apparently driving complex alterations of material within the Butterfly Nebula, behavior not seen in planetary nebulae to date. The researchers want to understand how such activity is possible from what should be a 'sputtering, largely moribund star with no remaining fuel.'

Computer Science: Encryption
Published

Researchers propose methods for automatic detection of doxing      (via sciencedaily.com) 

A new automated approach to detect doxing -- a form of cyberbullying in which certain private or personally identifiable information is publicly shared without an individual's consent or knowledge -- may help social media platforms better protect their users, according to researchers.

Computer Science: Encryption Computer Science: Quantum Computers Mathematics: Puzzles
Published

Microlaser chip adds new dimensions to quantum communication      (via sciencedaily.com) 

With only two levels of superposition, the qubits used in today's quantum communication technologies have limited storage space and low tolerance for interference. Engineering's hyperdimensional microlaser generates 'qudits,' photons with four simultaneous levels of information. The increase in dimension makes for robust quantum communication technology better suited for real-world applications.

Computer Science: Encryption
Published

New AI model can help prevent damaging and costly data breaches      (via sciencedaily.com) 

Privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for potential data leaks.

Computer Science: Encryption
Published

New method to systematically find optimal quantum operation sequences for quantum computers developed      (via sciencedaily.com) 

Computer scientists have succeeded in developing a method for systematically finding the optimal quantum operation sequence for a quantum computer. They have developed a systematic method that applies optimal control theory (GRAPE algorithm) to identify the theoretically optimal sequence from among all conceivable quantum operation sequences. This method is expected to become a useful tool for medium-scale quantum computers and is expected to contribute to improving the performance of quantum computers and reducing environmental impact in the near future.

Computer Science: Encryption
Published

From bits to p-bits: One step closer to probabilistic computing      (via sciencedaily.com) 

Scientists have developed a mathematical description of what happens within tiny magnets as they fluctuate between states when an electric current and magnetic field are applied. Their findings could act as the foundation for engineering more advanced computers that can quantify uncertainty while interpreting complex data.

Computer Science: Encryption
Published

Thinking like a cyber-attacker to protect user data      (via sciencedaily.com) 

Researchers have shown that a component of modern computer processors that enables different areas of the chip to communicate with each other is susceptible to a side-channel attack. An attacker can monitor how traffic from two different cores on a processor interferes with each other to extract secret information, like a cryptographic key.

Computer Science: Encryption Mathematics: Puzzles
Published

A key role for quantum entanglement      (via sciencedaily.com) 

A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists has now demonstrated experimentally, for the first time, an approach to quantum key distribution that is based on high-quality quantum entanglement -- offering much broader security guarantees than previous schemes.

Computer Science: Encryption
Published

Quantum cryptography: Hacking is futile      (via sciencedaily.com) 

An international team has successfully implemented an advanced form of quantum cryptography for the first time. Moreover, encryption is independent of the quantum device used and therefore even more secure against hacking attempts.

Computer Science: Encryption Mathematics: Puzzles
Published

'Pulling back the curtain' to reveal a molecular key to The Wizard of Oz      (via sciencedaily.com) 

Many people and companies worry about sensitive data getting hacked, so encrypting files with digital keys has become more commonplace. Now, researchers have developed a durable molecular encryption key from sequence-defined polymers that are built and deconstructed in a sequential way. They hid their molecular key in the ink of a letter, which was mailed and then used to decrypt a file with text from a classic story.

Computer Science: Encryption Engineering: Biometric
Published

Radio waves for the detection of hardware tampering      (via sciencedaily.com) 

Up to now, protecting hardware against manipulation has been a laborious business: expensive, and only possible on a small scale. And yet, two simple antennas might do the trick.

Computer Science: Encryption
Published

Secure communication with light particles      (via sciencedaily.com) 

While quantum computers offer many novel possibilities, they also pose a threat to internet security since these supercomputers make common encryption methods vulnerable. Based on the so-called quantum key distribution, researchers have developed a new, tap-proof communication network.

Computer Science: Encryption
Published

Emulating impossible 'unipolar' laser pulses paves the way for processing quantum information      (via sciencedaily.com) 

A laser pulse that sidesteps the inherent symmetry of light waves could manipulate quantum information, potentially bringing us closer to room temperature quantum computing.

Computer Science: Encryption
Published

Self-propelled, endlessly programmable artificial cilia      (via sciencedaily.com) 

Researchers have developed a single-material, single-stimuli microstructure that can outmaneuver even living cilia. These programmable, micron-scale structures could be used for a range of applications, including soft robotics, biocompatible medical devices, and even dynamic information encryption.

Computer Science: Encryption Mathematics: Puzzles
Published

Scientific advance leads to a new tool in the fight against hackers      (via sciencedaily.com) 

A new form of security identification could soon see the light of day and help us protect our data from hackers and cybercriminals. Quantum mathematicians have solved a mathematical riddle that allows for a person's geographical location to be used as a personal ID that is secure against even the most advanced cyber attacks.