Technique protects privacy when making online recommendations

These algorithms work by using personal information like our past purchases and browsing history to generate tailored recommendations. The sensitive nature of such data makes preserving privacy extremely important, but existing methods for solving this problem rely on heavy cryptographic tools requiring enormous amounts of computation and bandwidth. MIT researchers may have a better solution. … Read more

Efficient production technique for a novel ‘inexperienced’ fertilizer

Journal Reference: Ivana Brekalo, Valentina Martinez, Bahar Karadeniz, Patrik Orešković, Donata Drapanauskaite, Hein Vriesema, Robert Stenekes, Martin Etter, Igor Dejanović, Jonas Baltrusaitis, Krunoslav Užarević. Scale-Up of Agrochemical Urea-Gypsum Cocrystal Synthesis Using Thermally Controlled Mechanochemistry. ACS Sustainable Chemistry & Engineering, 2022; DOI: 10.1021/acssuschemeng.2c00914 For several years, scientists from DESY and IRB, have been collaborating to explore … Read more

New technique offers faster security for non-volatile memory tech

“NVMs are an emerging technology that allows rapid access to the data, and retains data even when a system crashes or loses power,” says Amro Awad, senior author of a paper on the work and an assistant professor of electrical and computer engineering at North Carolina State University. “However, the features that give NVMs these … Read more

CRISPR and HIV: New technique in human blood unveils potential paths toward cure

Journal Reference: Joseph Hiatt, Judd F. Hultquist, Michael J. McGregor, Mehdi Bouhaddou, Ryan T. Leenay, Lacy M. Simons, Janet M. Young, Paige Haas, Theodore L. Roth, Victoria Tobin, Jason A. Wojcechowskyj, Jonathan M. Woo, Ujjwal Rathore, Devin A. Cavero, Eric Shifrut, Thong T. Nguyen, Kelsey M. Haas, Harmit S. Malik, Jennifer A. Doudna, Andrew P. … Read more

Pioneering technique could unlock targeted treatments for cancer

Journal Reference: Joshua P. Smalley, India M. Baker, Wiktoria A. Pytel, Li-Ying Lin, Karen J. Bowman, John W. R. Schwabe, Shaun M. Cowley, James T. Hodgkinson. Optimization of Class I Histone Deacetylase PROTACs Reveals that HDAC1/2 Degradation is Critical to Induce Apoptosis and Cell Arrest in Cancer Cells. Journal of Medicinal Chemistry, 2022; DOI: 10.1021/acs.jmedchem.1c02179 … Read more

Pivotal technique harnesses cutting-edge AI capabilities to model and map the natural environment

Journal Reference: Charlie Kirkwood, Theo Economou, Nicolas Pugeault, Henry Odbert. Bayesian Deep Learning for Spatial Interpolation in the Presence of Auxiliary Information. Mathematical Geosciences, 2022; DOI: 10.1007/s11004-021-09988-0 A team of experts, including Charlie Kirkwood from the University of Exeter, has created a sophisticated new approach to modelling the Earth’s natural features in greater detail and … Read more

‘Fingerprint’ machine learning technique identifies different bacteria in seconds

Journal Reference: Eojin Rho, Minjoon Kim, Seunghee H. Cho, Bongjae Choi, Hyungjoon Park, Hanhwi Jang, Yeon Sik Jung, Sungho Jo. Separation-free bacterial identification in arbitrary media via deep neural network-based SERS analysis. Biosensors and Bioelectronics, 2022; 202: 113991 DOI: 10.1016/j.bios.2022.113991 Their results were made available online on Jan. 18 in Biosensors and Bioelectronics, ahead of … Read more

Lowe-On, l’alliance du luxe et de la technique

Lowe On lalliance du luxe et de la technique

Jonathan Anderson (au centre), directeur artistique de Loewe, et Thilo Alex Brunner, responsable du design chez On. COLLAGE CAMILLE DURAND. PHOTOS COURTESY OF LOEWE. ON La première fois, c’est aux pieds d’un voyageur en transit qu’il se rappelle les avoir aperçues. Jonathan Anderson, prolifique et exigeant créateur de mode, est depuis 2013 à la tête … Read more

New technique unlocks ancient history of Earth from grains of sand

Journal Reference: M. Barham, C.L. Kirkland, A.D. Handoko. Understanding ancient tectonic settings through detrital zircon analysis. Earth and Planetary Science Letters, 2022; 583: 117425 DOI: 10.1016/j.epsl.2022.117425 Lead researcher Dr Milo Barham, from the Timescales of Mineral Systems Group within Curtin’s School of Earth and Planetary Sciences, said the team devised a metric, which determines the … Read more

A security technique to fool would-be cyber attackers

This malicious program notices delays when it tries to access a computer’s memory, because the hardware is shared among all programs using the machine. It can then interpret those delays to obtain another program’s secrets, like a password or cryptographic key. One way to prevent these types of attacks is to allow only one program … Read more

Travors