Emerging Tech

Emerging Tech

  • Port of San Diego (Wikimedia Commons)

    Algorithm mimics evolution to aid disaster recovery

    Researchers have created an algorithm that quickly weighs the available information about transportation infrastructure, the damage sustained and repair resources and presents the best recovery strategies.

  • Enhancing GPS with ‘signals of opportunity’

    Enhancing GPS with ‘signals of opportunity’

    Wi-Fi, cellular LTE and digital television signals can -- with a lot of technical magic -- be retasked to track locations.

  • Predicting power outages from soil moisture data

    Predicting power outages from soil moisture data

    With data on soil moisture collected from a NASA satellite, researchers were able predict power outages with 91 percent accuracy five days before Hurricane Matthew raked the East Coast in early October.

  • Sensor-equipped cockroaches to the rescue

    Sensor-equipped cockroaches to the rescue

    Biobots can be dispatched into damaged buildings or other hazardous environments to collect data.

  • Self-learning software that builds itself

    Self-learning software that builds itself

    Researchers have developed a machine-learning system that can assemble code components into a program to meet goals set by the human developers.

  • ‘Living Bridge’ pioneers smart infrastructure

    ‘Living Bridge’ pioneers smart infrastructure

    Lights and sensors monitoring the structure and environmental conditions around New Hampshire’s Memorial Bridge are powered by underwater turbines.

  • Pushing the potential of piezoelectric devices

    Pushing the potential of piezoelectric devices

    States are exploring the use of piezoelectric sensors for generating electricity, detecting stress on bridges and monitoring pavement conditions.

  • Sending passwords securely…through your body

    Sending passwords securely…through your body

    Researchers at the University of Washington have come up with a way to secure passwords by sending them through the human body, beyond the reach of wireless sniffers.

  • Computer security

    Hacking your data without touching your network

    Cybersecurity researchers show how data can be captured by near-field analysis of electromagnetic leakage.

    Comments: 1

inside gcn

  • Millions of formerly secret CIA documents available online (Photo by ShutterStock)

    Millions of formerly secret CIA documents available online


More from 1105 Public Sector Media Group