Jump to navigation
When concrete and steel stick together, they may be able to withstand extreme heat far longer than each of them can on its own. This is relevant when planning for fire protection in building construction.
How does the brain learn spatial information? Neural computation researchers are using artificial intelligence to explore this question.
Cryptocurrencies are not subject to centralised governance. The community holds the power – but fails to do all that needs to be done. As a result, the collateral of the currency might be at risk.
5G has plenty more to offer than 4G. Radix Security makes sure that it doesn’t leave any security gaps open.
Why do we tend to like people who share our interests – and why do we like people even more if they share our most unusual tastes?
Consciousness continues to puzzle researchers. A team from Bochum and San Francisco presents a new theory on its function
The introduction of the commenting feature has added a whole new dimension to the internet. The promise was: everyone can participate. But things took a different turn.
Conditioning that once worked with Pavlov’s dog does also work with an artificially induced change in nerve cell activity.
The reason why male bees collect scents in pockets on their hind legs remained a mystery for a long time. As an attractant? As a wedding gift? To show off to other males? Researchers have now figured it out.
Carbon nanotubes not only shine brighter in the presence of dopamine, but also for longer. The time period of shining serves as a new parameter to detect biological messenger substances.
Chemotherapy treatments produce strong side effects. A new agent that accumulates in the tumour tissue and is activated there by ultrasound waves does not have this problem.
Feeling like we have a degree of control makes us tolerate pain better. In the case of fibromyalgia, however, this simply doesn’t work. A study provides clues as to why.
Genes influence different structures and the function of the brain. These in turn explain differences in behaviour. Analysing all three aspects at once is a challenge – but has now been achieved.
Using a new technique, researchers were able to observe live what happens in the first picosecond when a proton detaches from a dye after exposure to light.
International researchers propose an operational methodology for mapping and assessing ecosystem services process to inform the policy in Eritrea and beyond.
Funded by the European Research Council with 2.5 million euros, Gregor Leander is developing new encryption methods. He wanders off the beaten track and doesn’t simply rely on the principle of trial and error.
We are growing more and more dependent on digital navigation. Frank Dickmann is researching ways of improving our individual spatial orientation skills in spite of this trend.
Even though mathematically verifiable secure encryption algorithms do exist, in practice attackers manage to hijack data on a regular basis. This is because encryption doesn’t happen merely in theory.
Researchers recommend better integration of argumentation skills in teacher training.
Attackers have the ability not only to manipulate software, but also to tamper with the hardware. A team from Bochum is devising methods to detect such tampering.