Ultra-fast random numbers: New generator boosts security and speed
In computer security, random numbers are crucial values that must be unpredictable—such as secret keys or initialization vectors (IVs)—forming the foundation of security systems. To achieve this, deterministic random bit generators (DRBGs) are used, which produce numbers that appear random. However, existing DRBGs had limitations in both security (unpredictability against hacking) and output speed.
phys.org : computer-sciences
Allie, an AI chess bot, learns to play like humans from 91 million Lichess games
Yiming Zhang didn't grow up playing chess. Like many other people, the Carnegie Mellon University Ph.D. student discovered the Netflix series "The Queen's Gambit" during the pandemic and began playing online. However, he quickly realized how unnatural it felt playing against chess bots.
phys.org : computer-sciences
Two-phase model incorporates interactions with air to facilitate realistic simulation of fluids
Storm surges or collapsing dams—authentic simulations of water flows are not only important for special effects in disaster movies, but could also help to protect coastal regions. For more realistic simulations of fluid motions, researchers at the Technical University of Munich (TUM) have developed a new method that also takes into account the interaction with air. The approach is so efficient that calculations of complex wave motions can even be carried out with standard computers.
phys.org : computer-sciences
BEAST-GB model combines machine learning and behavioral science to predict people's decisions
A key objective of behavioral science research is to better understand how people make decisions in situations where outcomes are unknown or uncertain, which entail a certain degree of risk.
phys.org : computer-sciences
Time-lapse video made easy: The camera's in your pocket
When you think of "time-lapse video," what usually springs to mind is a camera fixed on a tripod taking image after image at predetermined intervals. But what if you could do the same thing by taking out your phone and snapping a picture every time you walk past a certain tree on your way to work? No tripod necessary.
phys.org : computer-sciences
Exposing how automation apps can spy—and how to detect it
A team of University of Wisconsin-Madison engineers and computer scientists has identified vulnerabilities in popular automation apps that can make it easy for an abuser to stalk individuals, track their cellphone activity, or even control their devices with little risk of detection.
phys.org : computer-sciences
Robots gain new function: Algorithm automatically recognizes sensors and their mathematical modeling
Modern robotic systems—in drones or autonomous vehicles, for example—use a variety of sensors, ranging from cameras and accelerometers to GPS modules. To date, their correct integration has required expert knowledge and time-consuming calibration.
phys.org : computer-sciences
More cameras, more problems? Why deep learning still struggles with 3D human sensing
Accurately estimating human pose was among the first tasks addressed by deep learning. Early models like OpenPose focused on localizing human joints as 2D keypoints in image coordinates. Later, Google came up with Mediapipe, followed by YOLOpose, which gained major attention and is widely adopted due to its efficiency and accuracy.
phys.org : computer-sciences
기계연 미래 전략기술 이끌어갈 K-Machine 리더 찾는다
기계연, 미래 전략기술 이끌어 갈 K-Machine 리더 찾는다 - 한국기계연구원 2025년도 제2회 신입직원 공개채용 실시 - - 8.11.(월)~9.1.(월) 11:00까지, 탄소중립·AI로봇 등 9개 분야 모집 - □ 한국기계연구원(원장 류석현, 이하 기계연)이 국가 미래 전략기술 분야의 혁신을 이끌 핵심 인재 확보에 나선다.
한국기계연구원 > KIMM NEWS
Proving presence: GPS spoofing and deepfakes countered by Proof-of-Location system
The work of University of Tartu intersectoral doctoral researcher Eduardo Brito could reshape how we verify truth in the digital world. His research on a decentralized Proof-of-Location system, recently published in Scientific Reports, offers a new way to cryptographically prove where and when something happened, without compromising privacy or relying on centralized authorities.
phys.org : computer-sciences
Eye-tracking tech achieves 90% accuracy in detecting readers' intent
Researchers from the Faculty of Data and Decision Sciences at the Technion have developed a technology capable of identifying various aspects of a reader's interaction with a text that is based solely on their eye movements.
phys.org : computer-sciences
LLMs can match human brain perceptions in everyday scenes
When we look at the world, our brain doesn't just recognize objects such as "a dog" or "a car," it also understands the broader meaning, like what's happening, where it's happening, and how everything fits together. But for years, scientists didn't have a good way to measure that rich, complex understanding.
phys.org : computer-sciences
Anthropic says they've found a new way to stop AI from turning evil
AI is a relatively new tool, and despite its rapid deployment in nearly every aspect of our lives, researchers are still trying to figure out how its "personality traits" arise and how to control them. Large learning models (LLMs) use chatbots or "assistants" to interface with users, and some of these assistants have exhibited troubling behaviors recently, like praising evil dictators, using blackmail or displaying sycophantic behaviors with users. Considering how much these LLMs have already been integrated into our society, it is no surprise that researchers are trying to find ways to weed out undesirable behaviors.
phys.org : computer-sciences
'Meschers' tool visualizes and edits 'physically impossible' objects
M.C. Escher's artwork is a gateway into a world of depth-defying optical illusions, featuring "impossible objects" that break the laws of physics with convoluted geometries. What you perceive his illustrations to be depends on your point of view—for example, a person seemingly walking upstairs may be heading down the steps if you tilt your head sideways.
phys.org : computer-sciences
C++ coroutines prone to code-reuse attack despite control flow integrity
A code-reuse attack named coroutine frame-oriented programming (CFOP) is capable of exploiting C++ coroutines across three major compilers, namely Clang/LLVM, GCC and MSVC. CFOP even succeeds in environments that are protected by control flow integrity (CFI), exposing relevant gaps in 15 of these defense schemes.
phys.org : computer-sciences
AI models simulate human subjects to aid social science research, but limits remain
LLMs that emulate human speech are being used to cost-effectively test assumptions and run pilot studies, producing promising early results. But researchers note that human data remains essential.
phys.org : computer-sciences
New tool offers direct lighting control for photographs using 3D scene modeling
Lighting plays a crucial role when it comes to visual storytelling. Whether it's film or photography, creators spend countless hours, and often significant budgets, crafting the perfect illumination for their shot. But once a photograph or video is captured, the illumination is essentially fixed. Adjusting it afterward, a task called "relighting," typically demands time-consuming manual work by skilled artists.
phys.org : computer-sciences
기계연, 북미 청정기술 동맹… 캐나다 천연자연부와 글로벌 공동연구 본격화
기계연, 북미 청정기술 동맹… 캐나다 천연자연부와 글로벌 공동연구 본격화 - 캐나다 천연자원부(NRCan)와 자원회수·에너지전환 분야 양해각서(MOU) 체결 - 캐나다 NRC 항공제조기술센터, MILA 등 전략기관 방문… 북미 기술협력 네트워크 강화 - CKC 2025 참석 통해 한-캐 과학기술협력 교두보 마련 □ 국
한국기계연구원 > KIMM NEWS
AI can evolve to feel guilt—but only in certain social environments
Guilt is a highly advantageous quality for society as a whole. It might not prevent initial wrongdoings, but guilt allows humans to judge their own prior judgments as harmful and prevents them from happening again. The internal distress caused by feelings of guilt often—but not always—results in the person taking on some kind of penance to relieve themselves from internal turmoil. This might be something as simple as admitting their wrongdoing to others and taking on a slight stigma of someone who is morally corrupt. This upfront cost might be initially painful, but can relieve further guilt and lead to better cooperation for the group in the future.
phys.org : computer-sciences
New algorithm enables efficient machine learning with symmetric data structures
If you rotate an image of a molecular structure, a human can tell the rotated image is still the same molecule, but a machine-learning model might think it is a new data point. In computer science parlance, the molecule is "symmetric," meaning the fundamental structure of that molecule remains the same if it undergoes certain transformations, like rotation.
phys.org : computer-sciences