Archive

Posts Tagged ‘algorithm’

Why “We The People” Should Use Random Sample Voting

January 3rd, 2013 01:40 admin View Comments

Stats

Frequent contributor Bennett Haselton writes this week with his explanation of how an improved algorithm on the White House’s petition-creation site could do away with Death Star petitions and even improve on the existing serious ones. Read on below for his modest proposal on that front.

Source: Why “We The People” Should Use Random Sample Voting

BLAKE2 Claims Faster Hashing Than SHA-3, SHA-2 and MD5

December 25th, 2012 12:18 admin View Comments

Encryption

hypnosec writes BLAKE2 has been recently announced as a new alternative to the existing cryptographic hash algorithms MD5 and SHA-2/3. With applicability in cloud storage, software distribution, host-based intrusion detection, digital forensics and revision control tools, BLAKE2 performs a lot faster than the MD5 algorithm on Intel 32- and 64-bit systems. The developers of BLAKE2 insist that even though the algorithm is faster, there are no loose ends when it comes to security. BLAKE2 is an optimized version of the then SHA-3 finalist BLAKE.”

Source: BLAKE2 Claims Faster Hashing Than SHA-3, SHA-2 and MD5

A Better Thought-Controlled Computer Cursor

November 19th, 2012 11:56 admin View Comments

Biotech

An anonymous reader writes Stanford researchers have developed a new algorithm (Abstract only) that significantly improves the control and performance of neural prosthetics — brain-controlled computer interfaces for individuals suffering from spinal cord injury and neurodegenerative disease to aid interaction with computers, drive electronic wheelchairs, and control robotic arms and legs. With this algorithm, monkeys implanted with multielectrode arrays in motor regions of their brain controlled a computer cursor more quickly and accurately than ever before, including navigation around obstacles. Further, the system maintained this high performance across 4 years, demonstrating long-term reliability. These improvements in performance and robustness are crucial for clinically-useful neural prosthetics, and pave the way for success in clinical trails.”

Source: A Better Thought-Controlled Computer Cursor

A Better Thought-Controlled Computer Cursor

November 19th, 2012 11:56 admin View Comments

Biotech

An anonymous reader writes Stanford researchers have developed a new algorithm (Abstract only) that significantly improves the control and performance of neural prosthetics — brain-controlled computer interfaces for individuals suffering from spinal cord injury and neurodegenerative disease to aid interaction with computers, drive electronic wheelchairs, and control robotic arms and legs. With this algorithm, monkeys implanted with multielectrode arrays in motor regions of their brain controlled a computer cursor more quickly and accurately than ever before, including navigation around obstacles. Further, the system maintained this high performance across 4 years, demonstrating long-term reliability. These improvements in performance and robustness are crucial for clinically-useful neural prosthetics, and pave the way for success in clinical trails.”

Source: A Better Thought-Controlled Computer Cursor

New Quantum Computing Record Set By Recycled Photons

October 23rd, 2012 10:56 admin View Comments

Science

CelestialScience writes “A recycling technique has enabled a quantum computer to carry out a quantum calculation known as Shor’s algorithm on a larger number than ever before. The benchmark algorithm exploits quantum mechanics to simplify the factorization of numbers into their prime components — a hard task for classical computers when the numbers get large. Until now, the largest number factorized using Shor’s algorithm was 15. Now Anthony Laing at the University of Bristol, UK and colleagues report in Nature Photonics that they used a recycled photon to factorize 21 — still far too small and trivial to spook cryptographers, who rely on the difficulty of factorizing large numbers for their widely-used techniques. But a record nonetheless.”

Source: New Quantum Computing Record Set By Recycled Photons

Mysterious Algorithm Was 4% of Trading Activity Last Week

October 10th, 2012 10:17 admin View Comments

Businesses

concealment sends this excerpt from CNBC: “A single mysterious computer program that placed orders — and then subsequently canceled them — made up 4 percent of all quote traffic in the U.S. stock market last week, according to the top tracker of high-frequency trading activity. The motive of the algorithm is still unclear. The program placed orders in 25-millisecond bursts involving about 500 stocks, according to Nanex, a market data firm. The algorithm never executed a single trade, and it abruptly ended at about 10:30 a.m. ET Friday.”

Source: Mysterious Algorithm Was 4% of Trading Activity Last Week

Stanford Researchers Discover the ‘Anternet’

August 27th, 2012 08:14 admin View Comments

Science

stoilis writes “A collaboration between Deborah Gordon, a Stanford ant biologist, and Balaji Prabhakar, a computer scientist, has revealed that the behavior of harvester ants, as they forage for food, mirrors the protocols that control traffic on the Internet. From the article: ‘Prabhakar wrote an ant algorithm to predict foraging behavior depending on the amount of food – i.e., bandwidth – available. Gordon’s experiments manipulate the rate of forager return. Working with Stanford student Katie Dektar, they found that the TCP-influenced algorithm almost exactly matched the ant behavior found in Gordon’s experiments. “Ants have discovered an algorithm that we know well, and they’ve been doing it for millions of years,” Prabhakar said.’ The abstract is published in the Aug. 23 issue of PLoS Computational Biology.”

Source: Stanford Researchers Discover the ‘Anternet’

Solid State Quantum Computer Finds 15=3×5 — 48% of the Time

August 26th, 2012 08:41 admin View Comments

Math

mikejuk writes “The Shor quantum factoring algorithm has been run for the first time on a solid state device and it successfully factored a composite number. A team from UCSB has managed to build and operate a quantum circuit composed of four superconducting phase qubits. The design creates entangled bits faster than before and the team verified that entanglement was happening using quantum tomography. The final part of the experiment implemented the Shor factoring algorithm using 15 as the value to be factored. In 150,000 runs of the calculation, the chip gave the correct result 48% of the time. As Shor’s algorithm is only supposed to give the correct answer 50% of the time, this is a good result but not of practical use.”

Source: Solid State Quantum Computer Finds 15=3×5 — 48% of the Time

Obama Finally Beats Bieber Fever According To Klout

August 16th, 2012 08:07 admin View Comments

The Internet

Thanks to a change in the way their algorithm works, Klout says that President Obama is finally more influential the Justin Bieber. The company now examines more “real world” factors such as the information in your LinkedIn profile and data from Wikipedia entries. From the article: “The overhaul, which began in January, was part of the company’s effort to address critics who pointed to Bieber as a prime example of why quantifying online influence was, at best, irrelevant. The teenage pop singer, with his army of 26 million Twitter followers who retweet his every word, had a Klout score that dwarfed that of the U.S. president.”

Source: Obama Finally Beats Bieber Fever According To Klout

Researchers Develop Algorithm To Trace Malware, Epidemics, More

August 11th, 2012 08:21 admin View Comments

Communications

hypnosec writes “Want to trace the source of virus that has infected your computer? Researchers at a Federal Institute of Technology in Lausanne (EPFL), Switzerland have the answer. The scientists have devised software capable of tracing computer viruses back to their source. Beyond computer viruses, the software can also trace terror suspects, rumor-mongering and even infectious diseases back to their source. Pedro Pinto, one of the researchers, explained that the algorithm works by going through information in a reverse direction back to the original source. He said, ‘Using our method, we can find the source of all kinds of things circulating in a network just by “listening” to a limited number of members of that network.’ The team tested their software on a known data maze to check if their research actually pinpoints the individuals behind the 9/11 attacks and they were able to pin-point three suspects, out of which one was the master mind behind the attacks.”

Source: Researchers Develop Algorithm To Trace Malware, Epidemics, More

YOYOYOOYOYOYO