nc state

Latest

  • Unknown caller. A man holds a phone in his hand and thinks to end the call. Incoming from an unknown number at night. Incognito or anonymous

    Research shows answering one robocall doesn't lead to more

    by 
    Christine Fisher
    Christine Fisher
    08.18.2020

    Researchers used 66,606 fake phone lines to better understand robocalls.

  • Magneto-Track smart footballs give officials their location and direction

    by 
    Sean Buckley
    Sean Buckley
    09.05.2014

    Sure, football arenas like Levi's Stadium are being outfitted with everything modern technology has to offer, but what about the game itself? Don't worry, researchers are working on improving that too: engineers at Carnegie Mellon and NC State have developed a football tracking system that could one day replace the old "stick-and-chain" measurement system for calling a first down. It's called the Magneto-Track system, and it uses low-frequency magnetic fields to follow a tracker embedded in the game ball. The result? A real-time measurement of the ball's position and orientation on the field.

  • Android 'smishing' vulnerability discovered by NCSU researchers; Google has a fix incoming

    by 
    Darren Murph
    Darren Murph
    11.02.2012

    The art of smishing (SMS-Phishing) has been practiced for some time, but a discovery by the wizards at NC State University has uncovered a new vulnerability that could bring the aforesaid act back into the spotlight. Xuxian Jiang's research team recently identified the hole and confirmed that it impacts Gingerbread, Ice Cream Sandwich and Jelly Bean. Put simply, if an Android user downloads an infected app, the attacking program can "make it appear that the user has received an SMS, or text, message from someone on the phone's contact list or from trusted banks." This fake message can solicit personal information, such as passwords for user accounts. The team isn't going to disclose proof until Google patches it up, but the school has said that Google will be addressing it "in a future Android release." For now, however, Jiang recommends additional caution when downloading and installing apps from unknown sources, while also suggesting that folks pay close attention to received SMS text messages.

  • NC State nanoflowers can boost battery and solar cell capacity, make great prom accessories

    by 
    Jon Fingas
    Jon Fingas
    10.11.2012

    We see a lot of sleek-looking technology pass through our doors, but it's rare that the inventions could be called beautiful by those who aren't immersed in the gadget world. We'd venture that North Carolina State University might have crossed the divide by creating an energy storage technology that's both practical and genuinely pretty. Its technology vaporizes germanium sulfide and cools it into 20-30 nanometer layers that, as they're combined, turn into nanoflowers: elegant structures that might look like the carnation on a prom dress or tuxedo, but are really energy storage cells with much more capacity than traditional cells occupying the same area. The floral patterns could lead to longer-lived supercapacitors and lithium-ion batteries, and the germanium sulfide is both cheap and clean enough that it could lead to very efficient solar cells that are more environmentally responsible. As always, there's no definite timetable for when (and if) NC State's technology might be commercialized -- so call someone's bluff if they promise you a nanoflower bouquet.

  • Alt-week 9.8.12: Moon farming, self powered health monitors and bringing a 50,000 year-old girl to life

    by 
    James Trew
    James Trew
    09.08.2012

    Alt-week peels back the covers on some of the more curious sci-tech stories from the last seven days. Some weeks things get a little science heavy, sometimes it's a little on their weird side, and there's usually a bit of space travel involved, but these week's trend seems to be "mind-blowing." Want to grow carrots on the Moon? We got you covered. How about bringing a 50,000 year-old ancient human back to life? Sure, no biggie. Oh but what about a solar eruption that reaches some half a million miles in height. We've got the video. No, really we have. Mind blown? This is alt-week.

  • Researchers propose à la carte internet services, overhaul for web infrastructure

    by 
    Alexis Santos
    Alexis Santos
    08.11.2012

    A quintet of researchers funded by the National Science Foundation have envisioned a new internet architecture, one where features could be purchased à la carte. The proposed framework would allow users to fine tune their experience by choosing from a variety of connection services. Let's say, for example, that a customer's connection is fine for browsing the web, but it doesn't pass muster for streaming content -- a service dedicated to video delivery could be added to close the gap. "Ultimately, this should make the internet more flexible and efficient, and will drive innovation among service providers to cater to user needs," report co-author Rudra Dutta told The Abstract. A piecemeal next-gen web is no easy feat, however, as it would require revamping the web's infrastructure with new protocols for choosing particular features, completing payments and monitoring network performance. The group's rough blueprint will be presented at a conference next week, but you can thumb through their short paper at the source.

  • NC State's new efficient pico projector raises hopes for smartphone cinema

    by 
    Daniel Cooper
    Daniel Cooper
    07.17.2012

    A team at North Carolina State University has developed a new liquid crystal projector that could spell the end of bulky and noisy cinema gear. Conventional tech passes unpolarized light through a filter, but the process is so inefficient that nearly 50 percent of the energy is wasted just keeping things cool. Fortunately, the Wolfpack and ImagineOptix filter claims to be 90 percent efficient -- meaning that future projectors could be far sleeker. It's also a good sign for future smartphone pico projectors, although we're not sure how the owners of our local theater will feel when we start undercutting them with just a phone and a white wall.

  • Researchers partially automate CPU core design, aim to fast track new PC processor production

    by 
    Michael Gorman
    Michael Gorman
    06.27.2012

    Tired of the year wait (or more) in between new silicon architecture offerings from Chipzilla and AMD? Well, if some Wolfpack researchers have anything to say about it, we'll measure that wait in months thanks to a new CPU core design tool that automates part of the process. Creating a new CPU core is, on a high level, a two step procedure. First, the architectural specification is created, which sets the core's dimensions and arranges its components. That requires some heavy intellectual lifting, and involves teams of engineers to complete. Previously, similar manpower was needed for the second step, where the architecture spec is translated into an implementation design that can be fabricated in a factory. No longer. The aforementioned NC State boffins have come up with a tool that allows engineers to input their architecture specification, and it generates an implementation design that's used to draw up manufacturing blueprints. The result? Considerable time and manpower savings in creating newly designed CPU cores, which means that all those leaked roadmaps we're so fond of could be in serious need of revision sometime soon.

  • Mobile security researchers present Android Malware Genome Project at IEEE

    by 
    James Trew
    James Trew
    05.22.2012

    Android's openness, combined with its popularity, has lead a few of the developer faithful astray -- with malware being a legitimate concern for the mobile operating system. To help combat the issue, Xuxian Jiang, an NC State researcher, has created the Android Malware Genome Project, which was presented at the IEEE Symposium on Security this week. The aim is to collect and analyse all the known malicious software, and share the findings so that more effective and preventative measures to be taken by the community. Jiang claims that the main drawback has been understanding the malware, and getting access to examples, something the project aims to solve. More than 1,200 malware samples have been collected so far, and if you're curious, the dataset is available for download via the source.

  • Scientists tweak wireless power transfer, Tesla nods happily in his grave

    by 
    Steve Dent
    Steve Dent
    05.16.2012

    Wireless charging may be all the rage these days, but actually beaming electricity -- as sketched above by the man Tesla himself -- still has some snags. North Carolina State U researchers have found a way to possibly vanquish the biggest problem: the difficulty of exactly matching resonant frequencies to amplify current. If external factors like temperature change the tuning of a transmitter even slightly then power drops will occur, but circuitry developed by the NC State scientists would allow receivers to detect these changes and automatically re-tune themselves to match. This could make for more potent car and device charging in the future and, if they stretch the distances a bit, maybe we'll finally get the wire-free utopia Nikola dreamed up 120 years ago.

  • NC State researcher finds more efficient way to cool devices, looks to cut costs too

    by 
    Billy Steele
    Billy Steele
    04.09.2012

    Does your electronic device have you a bit hot under the collar these days? A researcher at NC State has developed a faster and less expensive method for cooling gadgets -- especially those that tend to crank the heat up. Dr. Jag Kasichainula, an Associate Professor of Materials Science and Engineering, authored a paper on the research that implements a "heat spreader' composed of a copper-graphene composite and an indium-graphene interface film to cool devices. Because the two materials exhibit a high thermal conductivity, they allow the device to cool more efficiently while distributing said heat -- 25 percent quicker than the pure copper in many pieces of tech. And if that wasn't enough, the research also details the process for creating the composite using electrochemical deposition. "Copper is expensive, so replacing some of the copper with graphene actually lowers the overall cost.," Kasichainula notes. If you're itching to read a full rundown of the findings, the full text can be accessed via the source link below.

  • Scientists make magic auto-origami using ink and light (video)

    by 
    Sharif Sakr
    Sharif Sakr
    11.11.2011

    We've seen nano-origami and robo-origami, but nothing quite as rapid and simple as this. Researchers at North Carolina State University have figured out how to neatly fold plastic using infrared light and an inkjet printer. Deep black lines are printed onto the plastic sheets, which then absorb the light and cause the material to fold without anyone having to touch it. The wider the line, the greater the angle of each fold, so it's possible to set, say, a 90-degree bend for a cube or 120 degrees for a pyramid. What's more, by giving the lines different patterns, folds can be made to work in specific directions, potentially producing the most perfect, most hygienic bento box that's ever contained your lunch. Click past the break to watch the folding unfold.

  • NC State researchers team with IBM to keep cloud-stored data away from prying eyes

    by 
    Amar Toor
    Amar Toor
    10.07.2011

    The man on your left is Dr. Peng Ning -- a computer science professor at NC State whose team, along with researchers from IBM, has developed an experimental new method for safely securing cloud-stored data. Their approach, known as a "Strongly Isolated Computing Environment" (SICE), would essentially allow engineers to isolate, store and process sensitive information away from a computing system's hypervisors -- programs that allow networked operating systems to operate independently of one another, but are also vulnerable to hackers. With the Trusted Computing Base (TCB) as its software foundation, Ping's technique also allows programmers to devote specific CPU cores to handling sensitive data, thereby freeing up the other cores to execute normal functions. And, because TCB consists of just 300 lines of code, it leaves a smaller "surface" for cybercriminals to attack. When put to the test, the SICE architecture used only three percent of overhead performance for workloads that didn't require direct network access -- an amount that Ping describes as a "fairly modest price to pay for the enhanced security." He acknowledges, however, that he and his team still need to find a way to speed up processes for workloads that do depend on network access, and it remains to be seen whether or not their technique will make it to the mainstream anytime soon. For now, though, you can float past the break for more details in the full PR.

  • Researchers develop method to measure effects of WiFi attacks

    by 
    Lydia Leavitt
    Lydia Leavitt
    09.13.2011

    America is built on the principles of life, liberty and WiFi, the latter of which has increasingly become a target for hackers hoping to mess up our chi. To predict what would happen as result of an assault, researchers at North Carolina State University created two models -- one based on a continuous jam of service, and one on an intermittent disruption that would cut off service during specific times. They then measured "order gain," which compares the probability of an attacker having network access to the probability of a legitimate user having access. Basically, the more control a hacker has, the more regular users that will lose service and be shut out -- making it harder to regain control. Researchers hope the new method will help identify the most vulnerable networks, opening the doors to create effective countermeasures to keep our WiFi safe -- something that Starbucks customers will surely be thankful for.

  • New program makes it easier to turn your computer into a conversational chatterbox

    by 
    Amar Toor
    Amar Toor
    09.05.2011

    We've already seen how awkward computers can be when they try to speak like humans, but researchers from North Carolina State and Georgia Tech have now developed a program that could make it easier to show them how it's done. Their approach, outlined in a recently published paper, would allow developers to create natural language generation (NLG) systems twice as fast as currently possible. NLG technology is used in a wide array of applications (including video games and customer service centers), but producing these systems has traditionally required developers to enter massive amounts of data, vocabulary and templates -- rules that computers use to develop coherent sentences. Lead author Karthik Narayan and his team, however, have created a program capable of learning how to use these templates on its own, thereby requiring developers to input only basic information about any given topic of conversation. As it learns how to speak, the software can also make automatic suggestions about which information should be added to its database, based on the conversation at hand. Narayan and his colleagues will present their study at this year's Artificial Intelligence and Interactive Digital Entertainment conference in October, but you can dig through it for yourself, at the link below.

  • NC State discovery finds optimal connections 10,000 times more quickly, ResNet admins do a double take

    by 
    Darren Murph
    Darren Murph
    06.29.2011

    Ever wondered how just one message in an average Chatroulette session finds its way to whatever destination fate may deem suitable? Sure you have. As it stands, every single pulse from your Ethernet socket starts its initial journey by hunting for an optimal connection path; in some cases, that involves routing through massive ring networks crossing over untold miles of fiber optic cabling. Using traditional techniques, nailing down an optimal solution for a ring can take eons (or days, whichever you prefer), but there's a new methodology coming out of NC State's den that could enable the same type of scenario to reach its natural conclusion 10,000 times faster. Dr. George Rouskas, a computer science professor and proud Wolfpacker, has just published a new paper describing the scheme, with the focal point being a "mathematical model that identifies the exact optimal routes and wavelengths for ring network designers." More technobabble surrounding the discovery can be found in the source link below, but unfortunately, there's no telling how long it'll take your impending click to be addressed using conventional means. Here's to the future, eh?

  • NC State builds self-healing structural stress sensor, moves on to other alliterative projects

    by 
    Jesse Hicks
    Jesse Hicks
    06.16.2011

    "Sensor, heal thyself," goes an old saying, and North Carolina State University researchers have given it a new spin. Structural stress monitors can break during, say, an earthquake or explosion: just when you most need information about a building's integrity. So the NCSU crew added a reservoir of ultraviolet-curable resin; if their sensor cracks, the resin flows into the gap, where a UV light hardens it. An infrared light, which does the actual monitoring, then has a complete circuit through which to pass, and voila: stress data flows once more, aiding decision-makers. Obviously we never tire of UV-reactive gadgetry, especially for making safer buildings, and we're doubly glad to see self-healing that doesn't involve the phrase "he's just not that into you." To see the self-repair in action, check the picture after the break, and hit the source link for more info.

  • NC State's coiled nanowire discovery could lead to stretchable electronic devices

    by 
    Darren Murph
    Darren Murph
    01.12.2011

    Cotton may very well be the fabric of our lives, but it'd sure feel a lot better draped across our skin if we could incorporate stretchable electronic devices into it. That's the goal of NC State's own Dr. Yong Zhu, who has worked with a team of gurus to create "the first coils of silicon nanowire on a substrate that can be stretched to more than double their original length." Essentially, this type of breakthrough brings us one (major) step closer to "incorporating stretchable electronic devices into clothing, implantable health-monitoring devices, and a host of other applications." Compared to prior studies on buckling, this particular approach one-ups those focusing on freestanding nanowires, with the new coils' mechanical properties enabling them to be "stretched an additional 104 percent beyond their original length." That's a lot of technobabble, for sure, but what you need to realize is just how amazing your life will be as soon as The Zhu Crew figures out how to improve the reliability of the electrical performance when the coils are stretched to the limit. Flexible PMPs woven into your ski jacket? Bendable LCDs sewn right into your car's headrests? The future... it's here.

  • NC State and CMU develop velocity-sensing shoe radar, aim to improve indoor GPS routing

    by 
    Darren Murph
    Darren Murph
    12.01.2010

    The world at large owes a good bit to Maxwell Smart, you know. Granted, it's hard to directly link the faux shoe phone to the GPS-equipped kicks that are around today, but the lineage is certainly apparent. The only issue with GPS in your feet is how they react when you waltz indoors, which is to say, not at all. In the past, most routing apparatuses have used inertial measurement units (IMUs) to track motion, movement and distance once GPS reception is lost indoors, but those have proven poor at spotting the difference between a slow gait and an outright halt. Enter NC State and Carnegie Mellon University, who have worked in tandem in order to develop a prototype shoe radar that's specifically designed to sense velocity. Within the shoe, a radar is attached to a diminutive navigational computer that "tracks the distance between your heel and the ground; if that distance doesn't change within a given period of time, the navigation computer knows that your foot is stationary." Hard to say when Nike will start testing these out in the cleats worn by football players, but after last week's abomination of a spot (and subsequent botching of a review by one Ron Cherry) during the NC State - Maryland matchup, we're hoping it's sooner rather than later.

  • NC State gurus find 'Goldilocks' of DNA self-assembly, look to improve drug-delivery vehicles

    by 
    Darren Murph
    Darren Murph
    10.28.2010

    We're guessing that most Wolfpackers in the greater Raleigh area are in full-on tailgate mode right now, but aside from laying a beating on the Seminoles this evening, NC State faithful are also trumpeting a new DNA discovery that could one day make it easy to get vital drugs to hard-to-reach places within you. Researchers from the university have purportedly discovered the 'Goldilocks' of DNA self-assembly, which holds promise for technologies ranging from drug delivery to molecular sensors. The concept, known as DNA-assisted self-assembly, has been vastly improved by using "computer simulations of DNA strands to identify the optimal length of a DNA strand for self-assembly." You see, perfection occurs when strands aren't long enough to intertwine with each other, yet not short enough to simply fold over on each other. We know, it's a lot to wrap your brain around with half a hot dog shoved in your mouth, but hit the video after the break for a... shall we say, more visual explanation.