Wednesday 8 May 2019

Fracture risk tool useful in women with breast cancer initiating aromatase inhibitor therapy

The FRAX tool takes into account certain factors to determine the risk of bone fracture in the general population. In a Journal of Bone and Mineral Research study, the tool was effective at determining fracture risk for women with breast cancer who were treated with aromatase inhibitors, which cause accelerated bone loss, when combined with bone mineral density measurements.

* This article was originally published here

Google bucks soaring smartphone prices with new Pixel

Google bucked the soaring smartphone price trend Tuesday, unveiling a high-performance Pixel handset aimed at the middle of the market as part of a wide-ranging pitch to developers of its new hardware, software and privacy efforts.

* This article was originally published here

Ridesharing companies worsened congestion in San Francisco: study

One of the early promises of the ride-hailing era ushered in by Uber and Lyft was that the new entrants would complement public transit, reduce car ownership, and help alleviate urban congestion.

* This article was originally published here

Soaking up pharmaceuticals and personal care products from water

Medications excreted in the urine or dumped into the toilet can end up in the water supply, just like lotions or cosmetics that wash off the body and go down the sink or shower drain. Unfortunately, conventional wastewater treatment cannot completely remove pharmaceuticals and personal care products (PPCPs). Now, researchers reporting in ACS Applied Materials & Interfaces have developed an adsorbent membrane that they say could be used to purify water contaminated with PPCPs.

* This article was originally published here

Design flaws create security vulnerabilities for 'smart home' internet-of-things devices

Researchers at North Carolina State University have identified design flaws in "smart home" Internet-of-Things (IoT) devices that allow third parties to prevent devices from sharing information. The flaws can be used to prevent security systems from signaling that there has been a break-in or uploading video of intruders.

* This article was originally published here

AMD's tech to power new supercomputer for Department of Energy

Advanced Micro Devices announced Tuesday that its technology will help power a new supercomputer at Tennessee-based Oak Ridge National Laboratory in 2021.

* This article was originally published here

New chip stops attacks before they start

A new computer processor architecture developed at the University of Michigan could usher in a future where computers proactively defend against threats, rendering the current electronic security model of bugs and patches obsolete.

* This article was originally published here

Graphite coating makes perovskite solar cells waterproof

A cheaper, cleaner and more sustainable way of making hydrogen fuel from water using sunlight is step closer thanks to new research from the University of Bath's Centre for Sustainable Chemical Technologies.

* This article was originally published here

Urban trees 'live fast, die young' compared to those in rural forests

Urban trees grow more quickly but die faster than rural trees, resulting in a net loss of street-tree carbon storage over time, according to a study published May 8 in the open-access journal PLOS ONE by Ian Smith of Boston University, US and colleagues. The findings suggest that planting initiatives alone may not be sufficient to maintain or enhance canopy cover and biomass due to the unique demographics of urban ecosystems.

* This article was originally published here

A multi-scale body-part mask guided attention network for person re-identification

Person re-identification entails the automated identification of the same person in multiple images from different cameras and with different backgrounds, angles or positions. Despite recent advances in the field of artificial intelligence (AI), person re-identification remains a highly challenging task, particularly due to the many variations in a person's pose, as well as other differences associated with lighting, occlusion, misalignment and background clutter.

* This article was originally published here

Supply-chain hack attacks are worrying investigators

What do you know about supply-chain attacks? In January, an article in CSO said it's when a weak link in your enterprise security might lie with partners and suppliers. It's when someone infiltrates your system through an outside partner or provider with access to your systems and data.

* This article was originally published here

Using AI to predict breast cancer and personalize care

Despite major advances in genetics and modern imaging, the diagnosis catches most breast cancer patients by surprise. For some, it comes too late. Later diagnosis means aggressive treatments, uncertain outcomes, and more medical expenses. As a result, identifying patients has been a central pillar of breast cancer research and effective early detection.

* This article was originally published here

Stark racial, financial divides found in opioid addiction treatment

Escaping the grip of opioid addiction doesn't come easily for anyone. But a new study reveals sharp racial and financial divides in which Americans receive effective treatments for opioid addiction.

* This article was originally published here

Researchers make transformational AI seem 'unremarkable'

Physicians making life-and-death decisions about organ transplants, cancer treatments or heart surgeries typically don't give much thought to how artificial intelligence might help them. And that's how researchers at Carnegie Mellon University say clinical AI tools should be designed—so doctors don't need to think about them.

* This article was originally published here

An approach for securing audio classification against adversarial attacks

Adversarial audio attacks are small perturbations that are not perceivable by humans and are intentionally added to audio signals to impair the performance of machine learning (ML) models. These attacks raise serious concerns about the security of ML models, as they can cause them to make mistakes and ultimately generate wrong predictions.

* This article was originally published here

Experimental cosmologist group launches its first iterations of space-traveling 'wafercraft'

These are the adventures of the "StarChip Wafersize."

* This article was originally published here

Google's AI Assistant aims to transcend the smart speaker

When Google launched its now distinctive digital assistant in 2016, it was already in danger of being an also-ran.

* This article was originally published here

Three lions rescued in Albania sent to the Netherlands

Three lions, rescued in October from a private zoo in Albania where they were kept in "hellish" conditions were transported Tuesday to the Netherlands, an animal welfare organisation said.

* This article was originally published here