Jump to navigation
What does an Olympic athlete do after the competition? He runs another round to warm down, goes to the sauna or has a massage. Sports scientists have analysed the effect these activities have on the body.
In order to prevent fraud with digital currency such as bitcoin, sophisticated security mechanisms are deployed. However, they currently consume enormous volumes of electricity.
Alzheimer’s is one of the worst fears of old age. New evidence suggests that we are not entirely at its mercy.
Every time we use online banking or log into a web application, we are transmitting sensitive data such as passwords and account information via the Internet. Currently, they are not one hundred per cent secure.
Integrating Trojans in computer chips is a time consuming and at the same time highly sophisticated attack method. They are almost impossible to detect - an advantage that intelligence agencies would love to exploit.
Even though a quantum computer does, as yet, remain pure theory, IT experts are able to determine how easily it could break common encryptions. They deploy a trick familiar used in logics.
Cars, fridges, household appliances – in the future, many everyday items will be online. That opens up numerous new targets for attacks. This is how the researchers from Bochum want to protect us.
Remote control of radiators or wireless door locks – the possibilities offered by interconnected devices are fascinating, but they have to be protected against hacker attacks.
Patient files might contain hints for detecting diseases at an early stage. But how can the collated data be evaluated without invading the patients’ privacy? With the help of mathematics.
In Colombia, large areas are teeming with mines. Finding them with traditional technologies is as good as impossible.
On many websites users are prompted to prove that they are human by entering symbols that are difficult to read. In case of partially sighted people, audio captchas are used, but there’s room for improvement.
Autonomous micro labs the size of cells that monitor chemical systems from the inside – pure fiction, as yet. But several crucial steps have been taken.
Anxiety and depression are two of the most frequently occurring mental disorders worldwide. Light-activated nerve cells may indicate how they are formed.
Visions of future technologies and lifestyles have influenced many research projects. More often than not, the researchers weren’t aware that they were skirting science fiction.
Humans are experts in facial perception. But not from birth. At which point do children become as skilled at it as adults?
Eike Kiltz studies the hardest problems in mathematics – research doesn’t get any more theoretical and abstract than that. A glimpse into his work routine.
IT security experts dream of unbreakable cryptographic algorithms. Vision or fantasy?
Maren Lorenz researches historical utopias of human breeding. She often sees links to the present.
The idea to improve humans and to optimise procreation emerged long before genetic engineering. As far back as the 18th century, concepts did exist that appear unthinkable from the modern perspective.
Non-contact mounting and manipulation of objects with the aid of light – it sounds like a vision from a science-fiction film. But it is daily routine at the Applied Laser Technologies lab.