Search query: exploration

Categories: All Categories


13142 records searched, 4166 records found, 20 matches displayed

< Previous 20 articles        Next 20 articles >


Search Hints:

  • Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
  • Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
  • Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
  • Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)


Most frequent words for articles published in the last 45 days:
developed (95), climate (85), team (83), species (75), cells (74), used (72), human (64), help (61), change (60), water (60), years (60), data (57), energy (55), such (53), carbon (51), discovered (50), time (48), like (47), materials (46), even (44)


Return to the site home page

Physics: Acoustics and Ultrasound
Published

Concert hall acoustics for non-invasive ultrasound brain treatments - Concert Hall Acoustics for Non-Invasive Ultrasound Brain Treatments      (via sciencedaily.com) 

Engineers have developed a device that is a first step to enabling noninvasive, ultrasound-based the...

Physics: Acoustics and Ultrasound
Published

Ultrasound scan can diagnose prostate cancer - Ultrasound Scan: A Promising Diagnostic Tool for Prostate Cancer      (via sciencedaily.com) 

An ultrasound scan can be used to detect cases of prostate cancer, according to new research. ABSTRA...

Computer Science: Encryption Engineering: Biometric
Published

Radio waves for the detection of hardware tampering - Radio Waves for the Detection of Hardware Tampering      (via sciencedaily.com) 

Up to now, protecting hardware against manipulation has been a laborious business: expensive, and on...

Computer Science: Encryption Engineering: Biometric
Published

Securing data transfers with relativity - Securing Data Transfers with Relativity: A Comprehensive Guide      (via sciencedaily.com) 

To counter hacking, researchers have developed a new system based on the concept of 'zero-knowledge...

Computer Science: Encryption
Published

Researchers propose methods for automatic detection of doxing - Researchers Propose Methods for Automatic Detection of Doxing      (via sciencedaily.com) 

A new automated approach to detect doxing -- a form of cyberbullying in which certain private or per...

Computer Science: Encryption
Published

Thinking like a cyber-attacker to protect user data - Thinking Like a Cyber-Attacker to Protect User Data      (via sciencedaily.com) 

Researchers have shown that a component of modern computer processors that enables different areas o...

Computer Science: Encryption
Published

Quantum cryptography: Hacking is futile - Quantum Cryptography: Hacking is Futile      (via sciencedaily.com) 

An international team has successfully implemented an advanced form of quantum cryptography for the...

Computer Science: Encryption
Published

Secure communication with light particles - Secure Communication with Light Particles: A Breakthrough in Quantum Cryptography      (via sciencedaily.com) 

While quantum computers offer many novel possibilities, they also pose a threat to internet security...

Computer Science: Encryption
Published

Self-propelled, endlessly programmable artificial cilia - Self-Propelled, Endlessly Programmable Artificial Cilia: A Breakthrough in Robotics      (via sciencedaily.com) 

Researchers have developed a single-material, single-stimuli microstructure that can outmaneuver eve...