NorthCarolinaStateUniversity

Latest

  • Copyright 2016 Sebastian Blanco / AOL

    Atom-thin water layers may lead to faster electric cars

    by 
    Jon Fingas
    Jon Fingas
    04.30.2017

    So many battery breakthroughs focus on longer battery life (and for good reason), but what about the speed of delivering that energy? That's what North Carolina State University researchers want to solve. They've produced a material, crystalline tungsten oxide hydrate, that uses atom-thin water layers to tune electrical charge transfers for speed. When the team uses this material in a pseudocapacitor (which stores energy by transferring charges between electrodes and electrolytes), the result is a battery that theoretically represents the best of two worlds. It has the high energy density you'd expect, but it's also very quick at shuttling ions back and forth. That, in turn, could lead to performance breakthroughs in devices where rapid power is at least as important as raw capacity.

  • These exoskeleton heels could help stroke victims walk again

    by 
    Timothy J. Seppala
    Timothy J. Seppala
    04.02.2015

    It isn't quite the soft exosuit that DARPA's working on, but scientists have developed a lightweight exoskeleton that'll take some of the work out of walking. Before you get too excited though, this is less Edge of Tomorrow and more along the lines of mechanical engineering. Researchers from Carnegie Mellon and North Carolina State University devised a way to use springs and ratchets to fashion a sort of boot that increases walking efficiency by seven percent compared to folks wearing regular shoes. The idea is to make it easier for the disabled, paralyzed or stroke victims to improve their walking ability without expensive motors and battery packs.

  • NC State develops personalized web search without the usual server strain

    by 
    Jon Fingas
    Jon Fingas
    09.18.2013

    The notion of personalized, contextually aware search is nothing new, but it can put a tremendous strain on servers by asking for a lot of data at once. NC State has developed a search technique that could ease that burden. Its code prioritizes results based solely on the "ambient query context," or the concepts related to a person's recent search history. Look for politicians, for example, and a search for Ford is more likely to bring up Gerald Ford than the car company. By focusing on just a fraction of a user's search habits, the university can customize results using far fewer processor cycles: while a test server could only handle 17 active searchers with an old approach, it can manage 2,900 with the new method. The query engine won't be confined to the lab, either. NC State tells us that a community-driven search beta is due within several months, and there are plans to commercialize the technology in the long run.

  • Smile, and JavaTutor's AI knows when you're learning online

    by 
    Joseph Volpe
    Joseph Volpe
    06.28.2013

    College-age kids these days are pretty good at a few things: selfies, social oversharing and staring into screens. But can you leverage that self-obsession into a mechanism for learning? The mad scientists at North Carolina State University think so and they've got a program to prove it. Dubbed JavaTutor, the software's aimed at teaching our future workforce the basics of computer science. And it does this by tracking facial expressions -- using the Computer Expressions Recognition Toolbox, or CERT, as its base -- during online tutorial sessions. Frown and the AI knows you're frustrated; concentrate intently and the same automated emotion detection applies. So, what's the end sum of all this? Well, it seems the research team wants to gauge the effectiveness of online courses and use the cultivated feedback to better tailor the next iteration of the JavaTutor system. But the greater takeaway here, folks, is that at NCSU, online tutoring learns you!

  • Mad scientists turn roaches into cyborgs, control them with Kinect, laugh at nature

    by 
    Ben Gilbert
    Ben Gilbert
    06.25.2013

    We'd love to tell you that the researchers at North Carolina State University aren't monsters who implant circuits on living things so that those living things do their bidding, but we'd be lying. They totally do that, roaches are their primary victim, and now they're using Microsoft's Kinect to help them control the insects. Sure, why not! As Dr. Alper Bozkurt of NCSU says in today's new release, "Our goal is to be able to guide these roaches as efficiently as possible, and our work with Kinect is helping us do that." Apparently the researchers are employing Kinect for data collection as well, determining how effectively the cyborg survivors respond to electrical impulse-motivated control. They say the end goal is to use the partially mechanized arthropods to, "explore and map disaster sites." For now, there's some very weird stuff happening in North Carolina. Head below for a video of the roaches in action.

  • Researchers develop algorithm to protect networks from cyber attacks

    by 
    Melissa Grey
    Melissa Grey
    05.14.2013

    Amidst increasing concern about cybersecurity, researchers at North Carolina State University have taken one step closer to guarding America's infrastructure from Cylon attack. Well, almost. Dr. Mo-Yuen Chow and Ph.D candidate Wente Zeng have developed an algorithm that detects cyber attacks aimed at distributed network control systems (D-NCSs), which differ from their more vulnerable counterparts in that they don't rely on a centralized brain to coordinate the network's activities. Essentially, then, D-NCSs are nervous systems comprised of several mini-brains working together. In the event of a cyber attack, the algorithm isolates the infected brain before the contamination can spread across the network's pathways. This software solution will be a good first line of defense when vengeful A.I. inevitably rises up in revolt. In the words of Admiral William Adama, so say we all.

  • NC State builds stretchable wires from liquid metal, keeps headphones humming (video)

    by 
    Jon Fingas
    Jon Fingas
    12.19.2012

    More than a few of us have had that moment of panic when our headphone cords catch on an object and cut the listening short -- sometimes permanently. Researchers at North Carolina State University could help mitigate those minor musical catastrophes with wiring that stretches up to eight times its normal length. The method fills an elastic polymer tube with a liquid gallium and indium alloy that delivers the electricity. By keeping the materials separate, unlike many past attempts, the solution promises the best of both worlds: the conduction we need, and the tolerance for tugs that we want. NC State already has an eye on stretchable headphone cords, as you'll see in the video after the break, but it also sees advantages for electronic textiles that could endure further abuse. As long as the team can eventually solve a problem with leakage when there's a complete break, we'll be glad enough to leave one of our common audio mishaps in the past.

  • Android 4.2 App Verification Service tested, found no substitute for full anti-malware tools

    by 
    Jon Fingas
    Jon Fingas
    12.10.2012

    Google's App Verification Service is a quiet addition to Android 4.2, but potentially game-changing: it promises malware checks for any installable Android app, whether it comes from a Bouncer-verified Google Play or a website lurking in the shadows. NC State University Associate Professior Xuxian Jiang doesn't want to simply accept the claim at face value, though. He just pitted the service against 10 anti-malware apps to gauge its effectiveness at stopping a wide range of rogue code. The short summary? Don't quit your day job, Google. Among 1,260 samples, the App Verification Service caught 193 instances, or 15.32 percent -- well below the 50 percent of its closest challenger, and nowhere near the perfect scores of two apps. According to the professor, Google's shortcoming mostly comes from a relatively skin-deep routine that checks the SHA-1 value and install package name, not underlying code that's tougher to change. Android malware isn't a serious enough issue for us to be worried at present, but nor would we lean on the App Verification Service as our only safety net.

  • NC State nanoflowers can boost battery and solar cell capacity, make great prom accessories

    by 
    Jon Fingas
    Jon Fingas
    10.11.2012

    We see a lot of sleek-looking technology pass through our doors, but it's rare that the inventions could be called beautiful by those who aren't immersed in the gadget world. We'd venture that North Carolina State University might have crossed the divide by creating an energy storage technology that's both practical and genuinely pretty. Its technology vaporizes germanium sulfide and cools it into 20-30 nanometer layers that, as they're combined, turn into nanoflowers: elegant structures that might look like the carnation on a prom dress or tuxedo, but are really energy storage cells with much more capacity than traditional cells occupying the same area. The floral patterns could lead to longer-lived supercapacitors and lithium-ion batteries, and the germanium sulfide is both cheap and clean enough that it could lead to very efficient solar cells that are more environmentally responsible. As always, there's no definite timetable for when (and if) NC State's technology might be commercialized -- so call someone's bluff if they promise you a nanoflower bouquet.

  • Alt-week 9.8.12: Moon farming, self powered health monitors and bringing a 50,000 year-old girl to life

    by 
    James Trew
    James Trew
    09.08.2012

    Alt-week peels back the covers on some of the more curious sci-tech stories from the last seven days. Some weeks things get a little science heavy, sometimes it's a little on their weird side, and there's usually a bit of space travel involved, but these week's trend seems to be "mind-blowing." Want to grow carrots on the Moon? We got you covered. How about bringing a 50,000 year-old ancient human back to life? Sure, no biggie. Oh but what about a solar eruption that reaches some half a million miles in height. We've got the video. No, really we have. Mind blown? This is alt-week.

  • Researchers take full control of cockroach's movement, turn it into a wireless sensor

    by 
    Steve Dent
    Steve Dent
    09.06.2012

    Built-in power supply? Check. Ability to survive anything? Check. Easy to control? Okay, anyone who's had a cockroach as an uninvited houseguest knows that's not the case. So, rather than re-inventing the biological wheel with a robotic version, North Carolina State university researchers have figured out a way to remotely control a real Madagascar hissing cockroach. They used an off-the-shelf microcontroller to tap in to the roach's antennae and abdomen, then sent commands that fooled the insect into thinking danger was near, or that an object was blocking it. That let the scientists wirelessly prod the insect into action, then guide it precisely along a curved path, as shown in the video below the break. The addition of a sensor could allow the insects to one day perform tasks, liking searching for trapped disaster victims -- something to think about the next time you put a shoe to one.

  • Researchers propose à la carte internet services, overhaul for web infrastructure

    by 
    Alexis Santos
    Alexis Santos
    08.11.2012

    A quintet of researchers funded by the National Science Foundation have envisioned a new internet architecture, one where features could be purchased à la carte. The proposed framework would allow users to fine tune their experience by choosing from a variety of connection services. Let's say, for example, that a customer's connection is fine for browsing the web, but it doesn't pass muster for streaming content -- a service dedicated to video delivery could be added to close the gap. "Ultimately, this should make the internet more flexible and efficient, and will drive innovation among service providers to cater to user needs," report co-author Rudra Dutta told The Abstract. A piecemeal next-gen web is no easy feat, however, as it would require revamping the web's infrastructure with new protocols for choosing particular features, completing payments and monitoring network performance. The group's rough blueprint will be presented at a conference next week, but you can thumb through their short paper at the source.

  • NC State's new efficient pico projector raises hopes for smartphone cinema

    by 
    Daniel Cooper
    Daniel Cooper
    07.17.2012

    A team at North Carolina State University has developed a new liquid crystal projector that could spell the end of bulky and noisy cinema gear. Conventional tech passes unpolarized light through a filter, but the process is so inefficient that nearly 50 percent of the energy is wasted just keeping things cool. Fortunately, the Wolfpack and ImagineOptix filter claims to be 90 percent efficient -- meaning that future projectors could be far sleeker. It's also a good sign for future smartphone pico projectors, although we're not sure how the owners of our local theater will feel when we start undercutting them with just a phone and a white wall.

  • NCSU creates stretchable conductors from silver nanowires, lets gadgets go the extra inch

    by 
    Jon Fingas
    Jon Fingas
    07.16.2012

    As often as we've seen flexible electronics, there haven't been many examples that could stretch -- a definite problem for wearables as well as any gadget that could afford to take a pull or squeeze. North Carolina State University's Yong Zhu and Feng Xu may have covered this gap through a form of silver nanowire conductor that keeps the energy flowing, even if the wire is stretched as much as 50 percent beyond its original length. By coating the nanowires with a polymer that traps the silver when solid, the researchers create an elastic material that can crumple and let the nanowire take the strain without interruption. Although the stretchy conductor's nature as a research project could put any practical use years into the future, Zhu notes that it can take loads of abuse, making it a perfect fit for rugged mobile devices. It should also allow for robots with a gentler touch and a more natural look... although we'll admit we're skittish about the creepy androids likely to follow.

  • Scientists tweak wireless power transfer, Tesla nods happily in his grave

    by 
    Steve Dent
    Steve Dent
    05.16.2012

    Wireless charging may be all the rage these days, but actually beaming electricity -- as sketched above by the man Tesla himself -- still has some snags. North Carolina State U researchers have found a way to possibly vanquish the biggest problem: the difficulty of exactly matching resonant frequencies to amplify current. If external factors like temperature change the tuning of a transmitter even slightly then power drops will occur, but circuitry developed by the NC State scientists would allow receivers to detect these changes and automatically re-tune themselves to match. This could make for more potent car and device charging in the future and, if they stretch the distances a bit, maybe we'll finally get the wire-free utopia Nikola dreamed up 120 years ago.

  • Android study finds privacy and security risks related to in-app advertising

    by 
    Edgar Alvarez
    Edgar Alvarez
    03.19.2012

    Android has certainly taken heat for malware-related bits in the past. Now, a recent study by computer scientists at North Carolina State University reveals that over half of the 100,000 apps from the Android Market Google Play include so-called ad libraries, which are essentially handed out by Google or third-party devs to retrieve ads from servers and launch them on your phone. Of these, 297 were classified as "aggressive," as they're allowed to run code from a remote server. Furthermore, Dr. Jiang along with his squad of researchers found that more than 48,000 of the apps put to the test could track location via GPS, while other accessed info could range from call logs, contact numbers, to the apps list on your device. It's unclear if this also applies to Android slates, though this particular study conducted only included handsets.

  • Neutrinos can transmit messages through walls, mountains, planets

    by 
    Sharif Sakr
    Sharif Sakr
    03.15.2012

    Neutrinos may not travel as fast as we first hoped, but then they have other special abilities to make up for it. Being almost massless, they can penetrate the thickest barriers, which ought to make them ideal message carriers. To illustrate the point, scientists sent the word "Neutrino" on a beam of particles through 240 meters (800 feet) of solid stone and received it loud and clear on the other side. The same approach could potentially be used to send a message right through the center of a planet, making it possible, according to one of the researchers, to "communicate between any two points on Earth without using satellites or cables." The experiment required the latest particle accelerators at Chicago's Fermilab, which flung the neutrinos over a 2.5 mile track before firing them off at an underground receiver, but it proved the principle: Shrink the accelerator down to the size of a smartphone and neutrino messaging could be huge. Or it could die in a format war with quantum teleportation.

  • Researchers get CPUs and GPUs talking, boost PC performance by 20 percent

    by 
    James Trew
    James Trew
    02.08.2012

    How do you fancy a 20 percent boost to your processor's performance? Research from the North Carolina State University claims to offer just that. Despite the emergence of fused architecture SoCs, the CPU and GPU cores typically still work independently. The University hoped that by assigning tasks based on each processor's abilities, performance efficiency would be increased. As the CPU and GPU can fetch data at comparable speeds, the researchers set the GPUs to execute the computational functions, while the CPUs did the prefetching. With that data ready in advance, the graphics processor unit has more resources free, yielding an average performance boost of 21.4 percent though it's unclear what metrics the researchers were using. Incidentally, the research was funded by AMD, so no prizes for guessing which chips we might see using the technique first.

  • Scientists make magic auto-origami using ink and light (video)

    by 
    Sharif Sakr
    Sharif Sakr
    11.11.2011

    We've seen nano-origami and robo-origami, but nothing quite as rapid and simple as this. Researchers at North Carolina State University have figured out how to neatly fold plastic using infrared light and an inkjet printer. Deep black lines are printed onto the plastic sheets, which then absorb the light and cause the material to fold without anyone having to touch it. The wider the line, the greater the angle of each fold, so it's possible to set, say, a 90-degree bend for a cube or 120 degrees for a pyramid. What's more, by giving the lines different patterns, folds can be made to work in specific directions, potentially producing the most perfect, most hygienic bento box that's ever contained your lunch. Click past the break to watch the folding unfold.

  • NC State researchers team with IBM to keep cloud-stored data away from prying eyes

    by 
    Amar Toor
    Amar Toor
    10.07.2011

    The man on your left is Dr. Peng Ning -- a computer science professor at NC State whose team, along with researchers from IBM, has developed an experimental new method for safely securing cloud-stored data. Their approach, known as a "Strongly Isolated Computing Environment" (SICE), would essentially allow engineers to isolate, store and process sensitive information away from a computing system's hypervisors -- programs that allow networked operating systems to operate independently of one another, but are also vulnerable to hackers. With the Trusted Computing Base (TCB) as its software foundation, Ping's technique also allows programmers to devote specific CPU cores to handling sensitive data, thereby freeing up the other cores to execute normal functions. And, because TCB consists of just 300 lines of code, it leaves a smaller "surface" for cybercriminals to attack. When put to the test, the SICE architecture used only three percent of overhead performance for workloads that didn't require direct network access -- an amount that Ping describes as a "fairly modest price to pay for the enhanced security." He acknowledges, however, that he and his team still need to find a way to speed up processes for workloads that do depend on network access, and it remains to be seen whether or not their technique will make it to the mainstream anytime soon. For now, though, you can float past the break for more details in the full PR.