Menu

Blog

Archive for the ‘computing’ category: Page 150

Nov 23, 2023

Midcircuit Operations in Atomic Arrays

Posted by in categories: computing, particle physics, quantum physics

Three research groups have exploited the nuclear spins of ytterbium-171 to manipulate qubits before they are read out—an approach that could lead to efficient error-correction schemes for trapped-atom computing platforms.

Quantum computing on neutral-atom platforms has reached remarkable milestones in the past two decades. However, researchers have yet to overcome a key barrier to the realization of a neutral-atom-based quantum computer: the efficient correction of errors. In principle that barrier can be lowered with so-called midcircuit operations. These operations involve probing the quantum state of “ancilla” qubits without disturbing nearby “data” qubits used for computation. The ancilla qubit measurements can indicate whether the data qubits have undergone faulty operations, allowing for the data qubits to be corrected midcircuit—that is, during the execution of the computation rather than after its completion. Now three independent research groups have achieved midcircuit operation, or made progress toward this goal, with a novel choice of atom: ytterbium-171 (171 Yb) [13].

A neutral-atom qubit platform consists of a two-dimensional (2D) array of atoms trapped by optical tweezers—tightly focused laser beams whose wavelengths are tuned far away from the atomic transitions. The size of the traps, limited by diffraction, is typically about 1 µm. Thanks to the large electric-dipole force from the focused laser and to a high vacuum, the atoms can stay trapped for as long as tens of seconds.

Nov 22, 2023

Windows Hello auth bypassed on Microsoft, Dell, Lenovo laptops

Posted by in categories: computing, engineering, security

Security researchers bypassed Windows Hello fingerprint authentication on Dell Inspiron, Lenovo ThinkPad, and Microsoft Surface Pro X laptops in attacks exploiting security flaws found in the embedded fingerprint sensors.

Blackwing Intelligence security researchers discovered vulnerabilities during research sponsored by Microsoft’s Offensive Research and Security Engineering (MORSE) to assess the security of the top three embedded fingerprint sensors used for Windows Hello fingerprint authentication.

Continue reading “Windows Hello auth bypassed on Microsoft, Dell, Lenovo laptops” »

Nov 21, 2023

Site-specific encoding of photoactivity and photoreactivity into antibody fragments

Posted by in categories: biotech/medical, computing

New light activated cancer treatment.


Several antibodies and antibody fragments have been previously developed for the treatment of various diseases, including cancer3,4. These antibodies bind to cell surface receptors expressed at higher levels on cancer cells, addressing a major challenge of selective cell targeting in cancer therapy. Although full-length antibodies have shown promise for treatment of several cancers, limited success has been demonstrated in eliminating solid tumors. Due to their large size, full-length antibodies are unable to diffuse deep into solid tumors5. In addition, it has been shown that high-affinity antibodies bind to the periphery of the tumor tissues, forming a barrier and preventing their further penetration6. Some studies in patients with cancer estimate that only 0.01% of the injected antibodies accumulate per gram of solid tumor tissue7. Small antibody fragments with low molecular weight can diffuse much deeper into tissues, presenting an excellent alternative to full-length antibodies. However, small antibody fragments have a low residence time in the body and often have a higher rate of dissociation (koff) from the target compared with full-length antibodies, limiting their clinical utility8. To address these challenges, antibody fragments are often multimerized9,10 and/or conjugated to larger proteins11, which increases the size of antibody fragments, again reducing their ability to penetrate into the tumor.

One solution to overcome the limitation of low residence time would be to replace the noncovalent interactions between the antibody fragment and its antigen with a covalent bond. In a notable effort, an affibody containing a photocrosslinker in its antigen binding region was shown to covalently link to its antigen and demonstrated higher accumulation on tumor tissues12. Another pioneering study involved developing affibodies containing a latent bioreactive amino acid in their antigen binding region that forms a covalent bond with the target antigen by proximity-dependent reaction without any external impetus13. However, the former had substantially lower binding affinity compared with its wild-type (wt) counterpart and thus, requires using a high concentration for efficient initial binding, while the latter could react with target antigen expressed on healthy cells causing side effects.

Continue reading “Site-specific encoding of photoactivity and photoreactivity into antibody fragments” »

Nov 21, 2023

Woman Controls a Fighter Jet Sim Using Only Her Mind

Posted by in categories: computing, military, neuroscience

Year 2015 face_with_colon_three


A brain-computer interface lets a quadriplegic woman pilot an F-35 flight simulator with the power of her mind alone.

Nov 21, 2023

Q&A: Professor discusses new approaches for the implementation of the quantum internet

Posted by in categories: computing, encryption, internet, quantum physics

Researchers around the world are working on a network which could connect quantum computers with one another over long distances. Andreas Reiserer, Professor of Quantum Networks at the Technical University of Munich (TUM), explains the challenges which have to be mastered and how atoms captured in crystals can help.

The idea is the same: We use today’s to connect computers with one another, while the lets quantum computers communicate with one another. But in technical terms the quantum internet is much more complex. That’s why only smaller networks have been realized as yet.

There are two main applications: First of all, networking quantum computers makes it possible to increase their computing power; second, a quantum network will make absolutely interception-proof encryption of communication possible. But there are other applications as well, for example networking telescopes to achieve a previously impossible resolution in order to look into the depths of the universe, or the possibility of synchronizing around the world extremely precisely, making it possible to investigate completely new physical questions.

Nov 21, 2023

A scientist explains an approaching milestone marking the arrival of quantum computers

Posted by in categories: computing, encryption, information science, quantum physics

Quantum advantage is the milestone the field of quantum computing is fervently working toward, where a quantum computer can solve problems that are beyond the reach of the most powerful non-quantum, or classical, computers.

Quantum refers to the scale of atoms and molecules where the laws of physics as we experience them break down and a different, counterintuitive set of laws apply. Quantum computers take advantage of these strange behaviors to solve problems.

Continue reading “A scientist explains an approaching milestone marking the arrival of quantum computers” »

Nov 21, 2023

Researchers use quantum computing to predict gene relationships

Posted by in categories: biotech/medical, computing, genetics, quantum physics

In a new multidisciplinary study, researchers at Texas A&M University showed how quantum computing—a new kind of computing that can process additional types of data—can assist with genetic research and used it to discover new links between genes that scientists were previously unable to detect.

Their project used the new computing technology to map gene regulatory networks (GRNs), which provide information about how can cause each other to activate or deactivate.

As the team published in npj Quantum Information, will help scientists more accurately predict relationships between genes, which could have huge implications for both animal and human medicine.

Nov 21, 2023

A nanosatellite and a hot air balloon for emergency broadband anywhere

Posted by in categories: computing, internet, satellites, security

It is estimated that 95% of the planet’s population has access to broadband internet, via cable or a mobile network. However, there are still some places and situations in which staying connected can be very difficult. Quick responses are necessary in emergency situations, such as after an earthquake or during a conflict. So too are reliable telecommunications networks that are not susceptible to outages and damage to infrastructure, networks can be used to share data that is vital for people’s well-being.

A recent article, published in the journal Aerospace, proposes the use of nanosatellites to provide comprehensive and stable coverage in areas that are hard to reach using long-range communications. It is based on the bachelor’s and master’s degree final projects of Universitat Oberta de Catalunya (UOC) graduate David N. Barraca Ibort.

The paper is co-authored by Raúl Parada, a researcher at the Telecommunications Technological Center of Catalonia (CTTC/CERCA) and a course instructor with the UOC’s Faculty of Computer Science, Multimedia and Telecommunications; Carlos Monzo, a researcher and member of the same faculty; and Víctor Monzón, a researcher at the Interdisciplinary Center for Security Reliability and Trust at the University of Luxembourg.

Nov 20, 2023

LLMs differ from human cognition because they are not embodied

Posted by in categories: computing, materials

Large language models (LLMs) are impressive technological creations but they cannot replace all scientific theories of cognition. A science of cognition must focus on humans as embodied, social animals who are embedded in material, cultural and technological contexts.

There is the technological question of whether computers can be intelligent, and also the scientific question of how it is that humans and other animals are intelligent. Answering either question requires an agreement about what the word ‘intelligence’ means. Here, I will both follow common usage and avoid making it a matter of definition that only adult humans could possibly be intelligent by assuming that to be intelligent is to have the ability to solve complex and cognitively demanding problems. If we understand intelligence this way, the question of whether computers can be intelligent has already been answered. With apologies to Dreyfus and Lanier, it has been clear for years that the answer is an emphatic ‘yes’. The recent advances made by ChatGPT and other large language models (LLMs) are the cherry on top of decades of technological innovation.

Nov 20, 2023

Researchers Refute a Widespread Belief About Online Algorithms

Posted by in categories: computing, information science

“It’s really simple to define this problem,” said Marcin Bieńkowski, an algorithms researcher at the University of Wrocław in Poland. But it “turns out to be bizarrely difficult.” Since researchers began attacking the k-server problem in the late 1980s, they have wondered exactly how well online algorithms can handle the task.

Over the decades, researchers began to believe there’s a certain level of algorithmic performance you can always achieve for the k-server problem. So no matter what version of the problem you’re dealing with, there’ll be an algorithm that reaches this goal. But in a paper first published online last November, three computer scientists showed that this isn’t always achievable. In some cases, every algorithm falls short.