TECHNOLOGY

Advertisement
Jan 01 2025TECHNOLOGY

Artificial Neural Networks: Guarding Smart Cities for Citizens' Rights

Smart cities, with their data-driven approaches, are revolutionizing urban living. But as these cities grow smarter, concerns about data privacy, security, and citizen participation grow too. So, how do we balance innovation with protecting people’s rights? That’s where regulations come in. One key

reading time less than a minute
Jan 01 2025TECHNOLOGY

Two-Level Neural Network Boosts Freeway Traffic Forecasting

Traffic forecasting on freeways has long relied on deep learning models, especially graph neural networks that blend graph theory with deep learning. These models are great at learning complex time and space patterns. However, traditional graph convolutional networks (GCNs) sometimes struggle with l

reading time less than a minute
Dec 31 2024TECHNOLOGY

Sports Activity Recognition with Minimal Sensor Data: A New Approach

Imagine having the ability to identify sports activities just by using basic motion data. This is exactly what a new method called Human Activity Recognition (HAR) does. By using sensors and special learning algorithms, HAR can tell the difference between various sports activities with impressive ac

reading time less than a minute
Dec 31 2024TECHNOLOGY

OnePlus Watch 3 Pro & OPPO's Rebranded Versions: What to Expect

Get ready for an exciting update in the world of smartwatches! OnePlus is cooking up a Pro version of its flagship Wear OS smartwatch, the OnePlus Watch 3, later this year. We found evidence of the OnePlus Watch 3 Pro in the OHealth app, which is the official companion app for OPPO and OnePlus smart

reading time less than a minute
Dec 31 2024TECHNOLOGY

How Fractional-Order Controllers Improve Nonlinear Process Control

Spherical tanks are popular in industries due to their large storage capacity. But managing their liquid levels can be tricky. Traditional PI and PID controllers just don't cut it because these processes are nonlinear. Enter Fractional-Order controllers (FOPI and FOPID), designed using the Approxima

reading time less than a minute
Dec 31 2024TECHNOLOGY

Hackers Linked to China Breach US Treasury Computers

Imagine this: US Treasury computers were hacked recently. It wasn't just any hacker, though. Officials say it was a Chinese state-sponsored group. Here's how it went down. A third-party software provider called BeyondTrust discovered something fishy on December 2. It seemed hackers had stolen a key

reading time less than a minute
Dec 31 2024TECHNOLOGY

Better Machining: Real-Time State Tracking for Multi-Part Systems

Ever wondered how to make machine tools work better? Researchers are using a special self-healing model to do just that. They're focusing on how the parts of a machine tool move together. By using something called the Lagrange method, they can create a model that shows how these parts interact. This

reading time less than a minute
Dec 31 2024TECHNOLOGY

Drones and Trucks: A Fresh Approach to Rural Deliveries

Ever wondered how rural logistics can be made more efficient? Well, a recent study found a pretty neat solution. It turns out that combining trucks and drones can do wonders! Let's dig into it. Rural delivery, it's tough. Long distances, bad roads, and not many people around. Traditional methods ta

reading time less than a minute
Dec 31 2024TECHNOLOGY

Smart Disinfection System: How Tech is Making Public Spaces Safer

Everyone is talking about the novel coronavirus, or COVID-19, which has impacted millions worldwide. We've had to adopt social distancing and isolation. But what about public spaces like toilets? How do we keep them safe? A team designed a clever disinfection system using an STM32 microprocessor. Th

reading time less than a minute
Dec 31 2024TECHNOLOGY

Cyber Thieves Nab US Treasury Files via Hacked Support Service

Earlier this month, hackers linked to China managed to sneak into the US Treasury Department's computers. They didn't do it directly, though. Instead, they targeted a third-party cybersecurity company called BeyondTrust. By getting into BeyondTrust's system, the hackers could access some of the Trea

reading time less than a minute