Friday, April 29, 2011

Good Eggs: Nanomagnets Offer Food for Thought About Computer Memories

For a study described in a new paper, NIST researchers used electron-beam lithography to make thousands of nickel-iron magnets, each about 200 nanometers (billionths of a meter) in diameter. Each magnet is ordinarily shaped like an ellipse, a slightly flattened circle. Researchers also made some magnets in three different egglike shapes with an increasingly pointy end. It's all part of NIST research on nanoscale magnetic materials, devices and measurement methods to support development of future magnetic data storage systems.

It turns out that even small distortions in magnet shape can lead to significant changes in magnetic properties. Researchers discovered this by probing the magnets with a laser and analyzing what happens to the"spins" of the electrons, a quantum property that's responsible for magnetic orientation. Changes in the spin orientation can propagate through the magnet like waves at different frequencies. The more egg-like the magnet, the more complex the wave patterns and their related frequencies. (Something similar happens when you toss a pebble in an asymmetrically shaped pond.) The shifts are most pronounced at the ends of the magnets.

To confirm localized magnetic effects and"color" the eggs, scientists made simulations of various magnets using NIST's object-oriented micromagnetic framework (OOMMF). Lighter colors indicate stronger frequency signals.

The egg effects explain erratic behavior observed in large arrays of nanomagnets, which may be imperfectly shaped by the lithography process. Such distortions can affect switching in magnetic devices. The egg study results may be useful in developing random-access memories (RAM) based on interactions between electron spins and magnetized surfaces. Spin-RAM is one approach to making future memories that could provide high-speed access to data while reducing processor power needs by storing data permanently in ever-smaller devices. Shaping magnets like eggs breaks up a symmetric frequency pattern found in ellipse structures and thus offers an opportunity to customize and control the switching process.

"For example, intentional patterning of egg-like distortions into spinRAM memory elements may facilitate more reliable switching," says NIST physicist Tom Silva, an author of the new paper.

"Also, this study has provided the Easter Bunny with an entirely new market for product development."


Source

Friday, April 22, 2011

'Time Machine' Made to Visually Explore Space and Time in Videos: Time-Lapse GigaPans Provide New Way to Access Big Data

Viewers, for instance, can use the system to focus in on the details of a booth within a panorama of a carnival midway, but also reverse time to see how the booth was constructed. Or they can watch a group of plants sprout, grow and flower, shifting perspective to watch some plants move wildly as they grow while others get eaten by caterpillars. Or, they can view a computer simulation of the early universe, watching as gravity works across 600 million light-years to condense matter into filaments and finally into stars that can be seen by zooming in for a close up.

"With GigaPan Time Machine, you can simultaneously explore space and time at extremely high resolutions," said Illah Nourbakhsh, associate professor of robotics and head of the CREATE Lab."Science has always been about narrowing your point of view -- selecting a particular experiment or observation that you think might provide insight. But this system enables what we call exhaustive science, capturing huge amounts of data that can then be explored in amazing ways."

The system is an extension of the GigaPan technology developed by the CREATE Lab and NASA, which can capture a mosaic of hundreds or thousands of digital pictures and stitch those frames into a panorama that be interactively explored via computer. To extend GigaPan into the time dimension, image mosaics are repeatedly captured at set intervals, and then stitched across both space and time to create a video in which each frame can be hundreds of millions, or even billions of pixels.

An enabling technology for time-lapse GigaPans is a feature of the HTML5 language that has been incorporated into such browsers as Google's Chrome and Apple's Safari. HTML5, the latest revision of the HyperText Markup Language (HTML) standard that is at the core of the Internet, makes browsers capable of presenting video content without use of plug-ins such as Adobe Flash or Quicktime.

Using HTML5, CREATE Lab computer scientists Randy Sargent, Chris Bartley and Paul Dille developed algorithms and software architecture that make it possible to shift seamlessly from one video portion to another as viewers zoom in and out of Time Machine imagery. To keep bandwidth manageable, the GigaPan site streams only those video fragments that pertain to the segment and/or time frame being viewed.

"We were crashing the browsers early on," Sargent recalled."We're really pushing the browser technology to the limits."

Guidelines on how individuals can capture time-lapse images using GigaPan cameras are included on the site created for hosting the new imagery's large data files,http://timemachine.gigapan.org. Sargent explained the CREATE Lab is eager to work with people who want to capture Time Machine imagery with GigaPan, or use the visualization technology for other applications.

Once a Time Machine GigaPan has been created, viewers can annotate and save their explorations of it in the form of video"Time Warps."

Though the time-lapse mode is an extension of the original GigaPan concept, scientists already are applying the visualization techniques to other types of Big Data. Carnegie Mellon's Bruce and Astrid McWilliams Center for Cosmology, for instance, has used it to visualize a simulation of the early universe performed at the Pittsburgh Supercomputing Center by Tiziana Di Matteo, associate professor of physics.

"Simulations are a huge bunch of numbers, ugly numbers," Di Matteo said."Visualizing even a portion of a simulation requires a huge amount of computing itself." Visualization of these large data sets is crucial to the science, however."Discoveries often come from just looking at it," she explained.

Rupert Croft, associate professor of physics, said cosmological simulations are so massive that only a segment can be visualized at a time using usual techniques. Yet whatever is happening within that segment is being affected by forces elsewhere in the simulation that cannot be readily accessed. By converting the entire simulation into a time-lapse GigaPan, however, Croft and his Ph.D. student, Yu Feng, were able to create an image that provided both the big picture of what was happening in the early universe and the ability to look in detail at any region of interest.

Using a conventional GigaPan camera, Janet Steven, an assistant professor of biology at Sweet Briar College in Virginia, has created time-lapse imagery of rapid-growing brassicas, known as Wisconsin Fast Plants."This is such an incredible tool for plant biology," she said."It gives you the advantage of observing individual plants, groups of plants and parts of plants, all at once."

Steven, who has received GigaPan training through the Fine Outreach for Science program, said time-lapse photography has long been used in biology, but the GigaPan technology makes it possible to observe a number of plants in detail without having separate cameras for each plant. Even as one plant is studied in detail, it's possible to also see what neighboring plants are doing and how that might affect the subject plant, she added.

Steven said creating time-lapse GigaPans of entire landscapes could be a powerful tool for studying seasonal change in plants and ecosystems, an area of increasing interest for understanding climate change. Time-lapse GigaPan imagery of biological experiments also could be an educational tool, allowing students to make independent observations and develop their own hypotheses.

Google Inc. supported development of GigaPan Time Machine.


Source

Thursday, April 21, 2011

CAPTCHAs With Chaos: Strong Protection for Weak Passwords

Researchers at the Max Planck Institute for the Physics of Complex Systems in Dresden have been inspired by the physics of critical phenomena in their attempts to significantly improve password protection. The researchers split a password into two sections. With the first, easy-to-memorize section they encrypt a CAPTCHA ("completely automated public Turing test to tell computers and humans apart") -- an image that computer programs per se have difficulty in deciphering. The researchers also make it more difficult for computers, whose task it is to automatically crack passwords, to read the passwords without authorization. They use images of a simulated physical system, which they additionally make unrecognizable with a chaotic process. These p-CAPTCHAs enable the Dresden physicists to achieve a high level of password protection, even though the user need only remember a weak password.

Computers sometimes use brute force. Hacking programs use so-called brute-force attacks to try out all possible character combinations to guess passwords. CAPTCHAs are therefore intended as an additional safeguard the input of which originates from a human being and not from a machine. They pose a task for the user which is simple enough for any human, yet very difficult for a program. Users must enter a distorted text which is displayed on the screen, for example. CAPTCHAs are increasingly being bypassed, however. Personal data of members of the"SchülerVZ" social network for school pupils have already been stolen in this way.

Researchers at the Max Planck Institute for the Physics of Complex Systems in Dresden have now developed a new type of password protection that is based on a combination of characters and a CAPTCHA. They also use mathematical methods from the physics of critical phenomena to protect the CAPTCHA from being accessed by computers."We thus make the password protection both more effective and simpler," says Konstantin Kladko, who had the idea for this interdisciplinary approach during his time at the Dresden Max Planck Institute; he is currently a researcher at Axioma Research in Palo Alto/USA.

The Dresden-based researchers initially combine password and CAPTCHA in a completely novel way. The CAPTCHA is no longer generated anew each time in order to distinguish the human user from a computer on a case-by-case basis. Rather, the physicists use the codeword in the image, which can only be deciphered by humans as the real password, which provides access to a social network or an online bank account, for example. The researchers additionally encrypt this password using a combination of characters.

However, that's not all: the CAPTCHA is a snapshot of a dynamic, chaotic Hamiltonian system in two dimensions. For the sake of simplicity, his image can be imagined as a grey-scale pixel matrix, where every pixel represents an oscillator. The oscillators are coupled in a network. Every oscillator oscillates between two states and is affected by the neighbouring oscillators as it does so, thus resulting in the grey scales.

Chaotic development makes password unreadable

The physicists then leave the system to develop chaotically for a period of time. The grey-scale matrix changes the colour of its pixels. The result is an image that no longer contains a recognizable word. The researchers subsequently encrypt this image with the combination of characters and save the result."We therefore talk of a password-protected CAPTCHA or p-CAPTCHA," says Sergej Flach, who teamed up with Tetyana Laptyeva to achieve the decisive research results at the Max Planck Institute for the Physics of Complex Systems. Since the chaotic evolution of the initial image is deterministic, i.e. reversible, the whole procedure can be reversed using the combination of characters, so that the user can again read the password hidden in the CAPTCHA.

"The character combination we use to encrypt the password in the CAPTCHA can be very easy to remember," explains Konstantin Kladko."We thus take account of the fact that most people only want to, or can only, remember simple passwords." The fact that the passwords are correspondingly weak is now no longer important, because the real protection comes from the encrypted password in the CAPTCHA.

On the one hand, the password hidden in the CAPTCHA is too long for computers to be able to guess it using a brute-force attack in a reasonable length of time. On the other, the physicists use a critical system to generate the password image. This system is close to a phase transition: with a phase transition, the system changes from one physical state to another, from the paramagnetic to the ferromagnetic state, for example. Close to the transition, regions repeatedly form which temporarily have already completed the transition."The resulting image is always very grainy. Therefore, a computer cannot distinguish it from the original it is searching for," explains Sergej Flach.

"Although the study has just been submitted to a specialist journal and is only available online in an archive, it has already provoked a large number of responses in the community -- and not only in Hacker News," says Sergej Flach."I was very impressed by the depth of some comments in certain forums -- in Slashdot, for example." The specialists are obviously impressed by the ingenuity of the approach, which means passwords could be very difficult to crack in the future. Moreover, the method is easy and quick to implement in conventional computer systems."An expansion to several p-CAPTCHA levels is obvious," says Sergej Flach. Hoiwever, this requires increased computing power to reverse the chaotic development in a reasonable time:"We therefore want to investigate various Hamiltonian and non-Hamiltonian systems in the future to see whether they provide faster and even more effective protection."


Source

Wednesday, April 20, 2011

Biophysicist Targeting IL-6 to Halt Breast, Prostate Cancer

Chenglong Li, Ph.D., an assistant professor of medicinal chemistry and pharmacognosy at The Ohio State University (OSU), is leveraging a powerful computer cluster at the Ohio Supercomputer Center (OSC) to develop a drug that will block the small protein molecule Interleukin-6 (IL-6). The body normally produces this immune-response messenger to combat infections, burns, traumatic injuries, etc. Scientists have found, however, that in people who have cancer, the body fails to turn off the response and overproduces IL-6.

"There is an inherent connection between inflammation and cancer," explained Li."In the case of breast cancers, a medical review systematically tabulated IL-6 levels in various categories of cancer patients, all showing that IL-6 levels elevated up to 40-fold, especially in later stages, metastatic cases and recurrent cases."

In 2002, Japanese researchers found that a natural, non-toxic molecule created by marine bacteria -- madindoline A (MDL-A) -- could be used to mildly suppress the IL-6 signal. Unfortunately, the researchers also found the molecule wouldn't bind strongly enough to be effective as a cancer drug and would be too difficult and expensive to synthesize commercially. And, most surprisingly, they found the bacteria soon mutated to produce a different, totally ineffectual compound. Around the same time, Stanford scientists were able to construct a static image of the crystal structure of IL-6 and two additional proteins.

Li recognized the potential of these initial insights and partnered last year with an organic chemist and a cancer biologist at OSU's James Cancer Hospital to further investigate, using an OSC supercomputer to construct malleable, three-dimensional color simulations of the protein complex.

"The proximity of two outstanding research organizations -- the James Cancer Hospital and OSC -- provide a potent enticement for top medical investigators, such as Dr. Li, to conduct their vital computational research programs at Ohio State University," said Ashok Krishnamurthy, interim co-executive director of OSC.

"We proposed using computational intelligence to re-engineer a new set of compounds that not only preserve the original properties, but also would be more potent and efficient," Li said."Our initial feasibility study pointed to compounds with a high potential to be developed into a non-toxic, orally available drug."

Li accessed 64 nodes of OSC's Glenn IBM 1350 Opteron cluster to simulate IL-6 and the two additional helper proteins needed to convey the signal: the receptor IL-6R and the common signal-transducing receptor GP130. Two full sets of the three proteins combine to form a six-sided molecular machine, or"hexamer," that transmits the signals that will, in time, cause cellular inflammation and, potentially, cancer.

Li employed the AMBER (Assisted Model Building with Energy Refinement) and AutoDock molecular modeling simulation software packages to help define the interactions between those proteins and the strength of their binding at five"hot spots" found in each half of the IL-6/IL-6R/GP130 hexamer.

By plugging small molecules, like MDL-A, into any of those hot spots, Li could block the hexamer from forming. So, he examined the binding strength of MDL-A at each of the hexamer hotspots, identifying most promising location, which turned out to be between IL-6 and the first segment, or modular domain (D1), of the GP130.

To design a derivative of MDL-A that would dock with D1 at that specific hot spot, Li used the CombiGlide screening program to search through more than 6,000 drug fragments. So far, he has identified two potential solutions by combining the"top" half of the MDL-A molecule with the"bottom" half of a benzyl molecule or a pyrazole molecule. These candidates preserve the important binding features of the MDL-A, while yielding molecules with strong molecular bindings that also are easier to synthesize than the original MDL-A.

"While we didn't promise to have a drug fully developed within the two years of the project, we're making excellent progress," said Li."The current research offers us an exciting new therapeutic paradigm: targeting tumor microenvironment and inhibiting tumor stem cell renewal, leading to a really effective way to overcome breast tumor drug resistance, inhibiting tumor metastasis and stopping tumor recurrence."

While not yet effective enough to be considered a viable drug, laboratory tests on tissue samples have verified the higher potency of the derivatives over the original MDL-A. Team members are preparing for more sophisticated testing in a lengthy and carefully monitored evaluation process.

Li's project is funded by a grant from the Department of Defense (CDMRP grant number BC095473) and supported by the award of an OSC Discovery Account. The largest funding areas of Congressionally Directed Medical Research Programs (CDMRP) are breast cancer, prostate cancer and ovarian cancer. Another Defense CDMRP grant involving Li supports a concurrent OSU investigation of the similar role that IL-6 plays in causing prostate cancer. Those projects are being conducted in collaboration with Li's Medicinal Chemistry colleague, Dr. James Fuchs, as well as Drs. Tushar Patel, Greg Lesinski and Don Benson at OSU's College of Medicine and James Cancer Hospital, and Dr. Jiayuh Lin at Nationwide Children's Hospital in Columbus.

"In addition to leading the center's user group this year, the number and depth of Dr. Li's computational chemistry projects have ranked him one of our most prolific research clients," Krishnamurthy noted.


Source

Tuesday, April 19, 2011

Clumsy Avatars: Perfection Versus Mortality in Games and Simulation

The shop is one of several projects Chang uses to explore humanity in technology. Chang, an electronic artist and recently appointed co-director of the Games and Simulation Arts and Sciences program at Rensselaer, sees the dialogue between perfection and mortality as an important influence in the growing world of games and simulation.

"There's this transcendence that technology promises us. At its extreme is the notion of immortality that -- with artificial intelligence, robotics, and virtual reality -- you could download your consciousness and take yourself out of the limitations of the physical body," said Chang."But at the same time, that's what makes us human: our frailty and our mortality."

In other words, while the"sell" behind technology is often about achieving perfection (with a smart phone all the answers are at hand, with GPS we never lose our way, in Second Life we are beautiful), the risk is a loss of humanity.

That dialogue and tension leads Chang to believe that the nascent world of gaming and simulation could become"a new cultural form" as great as literature, art, music, and theater.

"This is just the beginning; we don't really know what this is going to be, and 'games and simulation' is just the best term we have to describe a much larger form," said Chang."Twenty years ago nobody knew what the Web was going to be. There was this huge form on the horizon that we were sort of fumbling toward with different technological experiments, artistic experiments; I think this is what's going on with games and simulation right now.

"There are many things that are very difficult to do hands-on -- it's very difficult to simulate a disaster, it's very difficult to manipulate atoms and molecules at the atomic level -- and this is where simulation comes in handy," said Chang."That kind of learning experience, that way of gaining knowledge that's intuitive, that comes through experience and involvement, can be expanded to many other realms."

As an electronic artist, Chang's own work is at the intersection of virtual environments, experimental gaming, and contemporary media art.

"I'm interested in what you could call evocative and poetic experiences within technological systems -- creating that powerful experience that you can get from great music, theater, books, and paintings through immersive and interactive simulations as well," Chang said."But I'm also interested in the experiences of being human within technological systems."

Other recent projects include"Becoming," a computer-driven video installation in which the attributes of two animated figures -- each inhabiting their own space -- are interchanged."Over time, this causes each figure to take on the attributes of the other, distorted by the structure of their digital information."

In"Insecurity Camera," an installation shown at art exhibits around the country, a"shy" security camera turns away at the approach of subjects.

"What I'm interested in is getting at those human qualities that are still there," Chang said."Some of this has to do with frailty, with fumbling, weakness, and failure. These are things that can get disguised, they can get swept under the rug when we think about technology."

Chang earned a bachelor of arts in computer science from Amherst College, and a master of fine arts in art and technology studies from the Art Institute of Chicago. His installations, performances, and immersive virtual reality environments have been exhibited in numerous venues and festivals worldwide, including Boston CyberArts, SIGGRAPH, the FILE International Electronic Language Festival in Sao Paulo, the Athens MediaTerra Festival, the Wired NextFest, and the Vancouver New Forms Festival, among others. He has designed interactive exhibits for museums such as the Museum of Contemporary Art in Chicago and the Field Museum of Natural History.

Chang teaches a two-semester game development course that joins students with backgrounds in all aspects of games -- computer programming, computer science, design, art, and writing -- in the process of creating games. The students start with a design, and proceed through all the steps of planning, creating art work, writing code, and refining their game.

"Think of it as a foundation into developing games that you can take into experimental game design and stretch beyond it," Chang said.

As the"new cultural form" evolves, Chang sees ample room for exploration.

For example, said Chang, virtual reality, in which experiences are staged in a wholly digital world, leads to different implications than augmented reality, in which digital elements overlay the physical world. One implication of virtual reality -- in which, as in Second Life, users can experiment with their identity -- lies in research which suggests that personal growth gains made within the virtual world transfer to the real world. One implication of augmented reality -- in which users may add digital elements that only they can access -- is the possibility of several people sharing the same physical world while experiencing divergent realities.

In the near term, the most immediate implications for the emerging form are, as might be expected, in entertainment and education.

"What's already happening is this enrichment of the notion of what entertainment is through games," Chang said."When you talk about games, you often have ideas of simple first-person shooter or action games. But within the realm of entertainment is an immense diversity of possibilities -- from complex emotional dramatic story-based games to casual games on your cell phone. There's this range of ways of playing from competitive, multiplayer, social to creative. This is just within the entertainment realm."


Source

Sunday, April 17, 2011

Hydrocarbons Deep Within Earth: New Computational Study Reveals How

The thermodynamic and kinetic properties of hydrocarbons at high pressures and temperatures are important for understanding carbon reservoirs and fluxes in Earth.

The work provides a basis for understanding experiments that demonstrated polymerization of methane to form high hydrocarbons and earlier methane forming reactions under pressure.

Hydrocarbons (molecules composed of the elements hydrogen and carbon) are the main building block of crude oil and natural gas. Hydrocarbons contribute to the global carbon cycle (one of the most important cycles of Earth that allows for carbon to be recycled and reused throughout the biosphere and all of its organisms).

The team includes colleagues at UC Davis, Lawrence Livermore National Laboratory and Shell Projects& Technology. One of the researchers, UC Davis Professor Giulia Galli, is the co-chair of the Deep Carbon Observatory's Physics and Chemistry of Deep Carbon Directorate and former LLNL researcher.

Geologists and geochemists believe that nearly all (more than 99 percent) of the hydrocarbons in commercially produced crude oil and natural gas are formed by the decomposition of the remains of living organisms, which were buried under layers of sediments in Earth's crust, a region approximately 5-10 miles below Earth's surface.

But hydrocarbons of purely chemical deep crustal or mantle origin (abiogenic) could occur in some geologic settings, such as rifts or subduction zones said Galli, a senior author on the study.

"Our simulation study shows that methane molecules fuse to form larger hydrocarbon molecules when exposed to the very high temperatures and pressures of the Earth's upper mantle," Galli said."We don't say that higher hydrocarbons actually occur under the realistic 'dirty' Earth mantle conditions, but we say that the pressures and temperatures alone are right for it to happen.

Galli and colleagues used the Mako computer cluster in Berkeley and computers at Lawrence Livermore to simulate the behavior of carbon and hydrogen atoms at the enormous pressures and temperatures found 40 to 95 miles deep inside Earth. They used sophisticated techniques based on first principles and the computer software system Qbox, developed at UC Davis.

They found that hydrocarbons with multiple carbon atoms can form from methane, (a molecule with only one carbon and four hydrogen atoms) at temperatures greater than 1,500 K (2,240 degrees Fahrenheit) and pressures 50,000 times those at Earth's surface (conditions found about 70 miles below the surface).

"In the simulation, interactions with metal or carbon surfaces allowed the process to occur faster -- they act as 'catalysts,'" said UC Davis' Leonardo Spanu, the first author of the paper.

The research does not address whether hydrocarbons formed deep in Earth could migrate closer to the surface and contribute to oil or gas deposits. However, the study points to possible microscopic mechanisms of hydrocarbon formation under very high temperatures and pressures.

Galli's co-authors on the paper are Spanu; Davide Donadio at the Max Planck Institute in Meinz, Germany; Detlef Hohl at Shell Global Solutions, Houston; and Eric Schwegler of Lawrence Livermore National Laboratory.


Source

Thursday, April 14, 2011

Privacy Mode Helps Secure Android Smartphones

"There are a lot of concerns about potential leaks of personal information from smartphones," says Dr. Xuxian Jiang, an assistant professor of computer science at NC State and co-author of a paper describing the research."We have developed software that creates a privacy mode for Android systems, giving users flexible control over what personal information is available to various applications." The privacy software is called Taming Information-Stealing Smartphone Applications (TISSA).

TISSA works by creating a privacy setting manager that allows users to customize the level of information each smartphone application can access. Those settings can be adjusted any time that the relevant applications are being run -- not just when the applications are installed.

The TISSA prototype includes four possible privacy settings for each application. These settings are Trusted, Anonymized, Bogus and Empty. If an application is listed as Trusted, TISSA does not impose additional information access restrictions. If the user selects Anonymized, TISSA provides the application with generalized information that allows the application to run, without providing access to detailed personal information. The Bogus setting provides an application with fake results when it requests personal information. The Empty setting responds to information requests by saying the relevant information does not exist or is unavailable.

Jiang says TISSA could be easily modified to incorporate additional settings that would allow more fine-grained control of access to personal information."These settings may be further specialized for different types of information, such as your contact list or your location," Jiang says."The settings can also be specialized for different applications."

For example, a user may install a weather application that requires location data in order to provide the user with the local weather forecast. Rather than telling the application exactly where the user is, TISSA could be programmed to give the application generalized location data -- such as a random location within a 10-mile radius of the user. This would allow the weather application to provide the local weather forecast information, but would ensure that the application couldn't be used to track the user's movements.

The researchers are currently exploring how to make this software available to Android users."The software modification is relatively minor," Jiang says,"and could be incorporated through an over-the-air update."

The paper,"Taming Information-Stealing Smartphone Applications (on Android)," was co-authored by Jiang; Yajin Zhou, a Ph.D. student at NC State; Dr. Vincent Freeh, an associate professor of computer science at NC State; and Dr. Xinwen Zhang of Huawei America Research Center. The paper will be presented in June at the 4th International Conference on Trust and Trustworthy Computing, in Pittsburgh, Pa. The research was supported by the National Science Foundation and NC State's Secure Open Systems Initiative, which receives funding from the U.S. Army Research Office.


Source

Tuesday, April 12, 2011

Mapping the Brain: New Technique Poised to Untangle the Complexity of the Brain

A new area of research is emerging in the neuroscience known as 'connectomics'. With parallels to genomics, which maps the our genetic make-up, connectomics aims to map the brain's connections (known as 'synapses'). By mapping these connections -- and hence how information flows through the circuits of the brain -- scientists hope to understand how perceptions, sensations and thoughts are generated in the brain and how these functions go wrong in diseases such as Alzheimer's disease, schizophrenia and stroke.

Mapping the brain's connections is no trivial task, however: there are estimated to be one hundred billion nerve cells ('neurons') in the brain, each connected to thousands of other nerve cells -- making an estimated 150 trillion synapses. Dr Tom Mrsic-Flogel, a Wellcome Trust Research Career Development Fellow at UCL (University College London), has been leading a team of researchers trying to make sense of this complexity.

"How do we figure out how the brain's neural circuitry works?" he asks."We first need to understand the function of each neuron and find out to which other brain cells it connects. If we can find a way of mapping the connections between nerve cells of certain functions, we will then be in a position to begin developing a computer model to explain how the complex dynamics of neural networks generate thoughts, sensations and movements."

Nerve cells in different areas of the brain perform different functions. Dr Mrsic-Flogel and colleagues focus on the visual cortex, which processes information from the eye. For example, some neurons in this part of the brain specialise in detecting the edges in images; some will activate upon detection of a horizontal edge, others by a vertical edge. Higher up in visual hierarchy, some neurons respond to more complex visual features such as faces: lesions to this area of the brain can prevent people from being able to recognise faces, even though they can recognise individual features such as eyes and the nose, as was famously described in the book The Man Who Mistook Wife for a Hat by Oliver Sachs.

In a study published online April 10 in the journalNature, the team at UCL describe a technique developed in mice which enables them to combine information about the function of neurons together with details of their synaptic connections.

The researchers looked into the visual cortex of the mouse brain, which contains thousands of neurons and millions of different connections. Using high resolution imaging, they were able to detect which of these neurons responded to a particular stimulus, for example a horizontal edge.

Taking a slice of the same tissue, the researchers then applied small currents to a subset of neurons in turn to see which other neurons responded -- and hence which of these were synaptically connected. By repeating this technique many times, the researchers were able to trace the function and connectivity of hundreds of nerve cells in visual cortex.

The study has resolved the debate about whether local connections between neurons are random -- in other words, whether nerve cells connect sporadically, independent of function -- or whether they are ordered, for example constrained by the properties of the neuron in terms of how it responds to particular stimuli. The researchers showed that neurons which responded very similarly to visual stimuli, such as those which respond to edges of the same orientation, tend to connect to each other much more than those that prefer different orientations.

Using this technique, the researchers hope to begin generating a wiring diagram of a brain area with a particular behavioural function, such as the visual cortex. This knowledge is important for understanding the repertoire of computations carried out by neurons embedded in these highly complex circuits. The technique should also help reveal the functional circuit wiring of regions that underpin touch, hearing and movement.

"We are beginning to untangle the complexity of the brain," says Dr Mrsic-Flogel."Once we understand the function and connectivity of nerve cells spanning different layers of the brain, we can begin to develop a computer simulation of how this remarkable organ works. But it will take many years of concerted efforts amongst scientists and massive computer processing power before it can be realised."

The research was supported by the Wellcome Trust, the European Research Council, the European Molecular Biology Organisation, the Medical Research Council, the Overseas Research Students Award Scheme and UCL.

"The brain is an immensely complex organ and understanding its inner workings is one of science's ultimate goals," says Dr John Williams, Head of Neuroscience and Mental Health at the Wellcome Trust."This important study presents neuroscientists with one of the key tools that will help them begin to navigate and survey the landscape of the brain."


Source

Monday, April 11, 2011

Artificial Intelligence for Improving Data Processing

Within this framework, five leading scientists presented the latest advances in their research work on different aspects of AI. The speakers tackled issues ranging from the more theoretical such as algorithms capable of solving combinatorial problems to robots that can reason about emotions, systems that use vision to monitor activities, and automated players that learn how to win in a given situation."Inviting speakers from groups of references allows us to offer a panoramic view of the main problems and the techniques open in the area, including advances in video and multi-sensor systems, task planning, automated learning, games, and artificial consciousness or reasoning," the experts noted.

The participants from the AVIRES (The Artificial Vision and Real Time Systems) research group at the University of Udine gave a seminar on the introduction of data fusion techniques and distributed artificial vision. In particular, they dealt with automated surveillance systems with visual sensor networks, from basic techniques for image processing and object recognition to Bayesian reasoning for understanding activities and automated learning and data fusion to make high performance system. Dr.Simon Lucas, professor at the Essex University and editor in chief of IEEE Transactions on Computational Intelligence and AI in Games and a researcher focusing on the application of AI techniques on games, presented the latest trends in generation algorithms for game strategies. During his presentation, he pointed out the strength of UC3M in this area, citing its victory in two of the competitions held at the international level during the most recent edition of the Conference on Computational Intelligence and Games.

In addition, Enrico Giunchiglia, professor at the University of Genoa and former president of the Council of the International Conference on Automated Planning and Scheduling (ICAPS), described the most recent work in the area of logic satisfaction, which is rapidly growing due to its applications in circuit design and in task planning

Artificial Intelligence (IA) is as old as computer science and has generated ideas, techniques and applications that permit it to solve difficult problems. The field is very active and offers solutions to very diverse sectors. The number of industrial applications that have an AI technique is very high, and from the scientific point of view, there are many specialized journals and congresses. Furthermore, new lines of research are constantly being open and there is a still great room for improvement in knowledge transfer between researchers and industry. These are some of the main ideas gathered at the 4th International Seminar on New Issues on Artificial Intelligence), organized by the SCALAB group in the UC3M Computer Engineering Department at the Leganés campus of this Madrid university.

The future of Artificial Intelligence

This seminar also included a talk on the promising future of AI."The tremendous surge in the number of devices capable of capturing and processing information, together with the growth of the computing capacity and the advances in algorithms enormously boost the possibilities for practical application," the researchers from the SCALAB group pointed out. Among them we can cite the construction of computer programs that make life easier, which take decisions in complex environments or which allow problems to be solved in environments which are difficult to access for people," he noted. From the point of view of these research trends, more and more emphasis is being placed on developing systems capable of learning and demonstrating intelligent behavior without being tied to replicating a human model.

AI will allow advances in the development of systems capable of automatically understanding a situation and its context with the use of sensor data and information systems as well as establishing plans of action, from support applications to decision making within dynamic situations. According to the researchers, this is due to the rapid advances and the availability of sensor technology which provides a continuous flow of data about the environment, information that must be dealt with appropriately in a node of data fusion and information. Likewise, the development of sophisticated techniques for task planning allow plans of action to be composed, executed, checked for correct execution, and rectified in case of some failure, and finally to learn from mistakes made.

This technology has allowed a wide range of applications such as integrated systems for surveillance, monitoring and detecting anomalies, activity recognition, teleassistence systems, transport logistic planning, etc. According to Antonio Chella, Full Professor at the University of Palermo and expert in Artificial Consciousness, the future of AI will imply discovering a new meaning of the word"intelligence." Until now, it has been equated with automated reasoning in software systems, but in the future AI will tackle more daring concepts such as the incarnation of intelligence in robots, as well as emotions, and above all consciousness.


Source

Saturday, April 9, 2011

Control the Cursor With Power of Thought

In a new study, scientists from Washington University demonstrated that humans can control a cursor on a computer screen using words spoken out loud and in their head, holding huge applications for patients who may have lost their speech through brain injury or disabled patients with limited movement.

By directly connecting the patient's brain to a computer, the researchers showed that the computer could be controlled with up to 90% accuracy even when no prior training was given.

The study, published April 7, in IOP Publishing'sJournal of Neural Engineering, involves a technique called electrocortiography (ECoG) -- the placing of electrodes directly onto a patient's brain to record electrical activity -- which has previously been used to identify regions of the brain that cause epilepsy and has led to effective treatments.

More recently, the process of ECoG has been applied to brain-computer interfaces (BCI) which aim to assist or repair brain functions and have already been used to restore the sight of one patient and stimulate limb movement in others.

The study used four patients, between the ages of 36-48, who suffered from epilepsy. Each patient was given a craniotomy -- an invasive procedure used to place an electrode onto the brain of the patient -- and was monitored whilst undergoing trials.

During the trials, the electrodes placed on the patient's brain would emit signals which were acquired, processed, and stored on a computer.

The trials involved the patients sitting in front of a screen and trying to move a cursor toward a target using pre-defined words that were associated with specific directions. For instance, saying or thinking of the word"AH" would move the cursor right.

At some point in the future researchers hope to permanently insert implants into a patient's brain to help restore functionality and, even more impressively, read someone's mind.

Dr. Eric C Leuthardt, the lead author, of Washington University School of Medicine, said:"This is one of the earliest examples, to a very, very small extent, of what is called 'reading minds' -- detecting what people are saying to themselves in their internal dialogue."

This study was the first to demonstrate microscale ECoG recordings meaning that future operations that require this technology may use an implant that is very small and minimally invasive.

Also, the study identified that speech intentions can be acquired through a site that is less than a centimetre wide which would require only a small insertion into the brain. This would greatly reduce the risk of a surgical procedure.

Dr Leuthardt continued,"We want to see if we can not just detect when you're saying dog, tree, tool or some other word, but also learn what the pure idea of that looks like in your mind. It's exciting and a little scary to think of reading minds, but it has incredible potential for people who can't communicate or are suffering from other disabilities."


Source

Friday, April 8, 2011

Mathematical Model Simulating Rat Whiskers Provides Insight Into Sense of Touch

Hundreds of papers are published each year that use the rat whisker system as a model to understand brain development and neural processing. Rats move their whiskers rhythmically against objects to explore the environment by touch. Using only tactile information from its whiskers, a rat can determine all of an object's spatial properties, including size, shape, orientation and texture.

But there is a big missing piece that prevents a full understanding of the neural signals recorded in these studies: no one knows how to represent the"touch" of a whisker in terms of mechanical variables.

"We don't understand touch nearly as well as other senses," says Mitra Hartmann, associate professor of biomedical engineering and mechanical engineering at the McCormick School of Engineering and Applied Science."We know that visual and auditory stimuli can be quantified by the intensity and frequency of light and sound, but we don't fully understand the mechanics that generate our sense of touch."

To create a model that starts to quantify these mechanics, Hartmann's team first studied the structure of the rat whisker array -- the 30 whiskers arranged in a regular pattern on each side of a rat's face. By analyzing them in both two- and three-dimensional scans, they defined the relationship between the size and shape of each whisker and its placement on the face of the rat.

Using this information, the team created a model that quantifies the full shape and structure of the rat head and whisker array. The model now allows the team to simulate the rat"whisking" against different objects and to predict the full pattern of inputs into the whisker system as a rat encounters an object. The simulations can then be compared against real behavior.

The research is published online in the journalPLoS Computational Biology.

Understanding the mechanics of the rat whisker system may provide a step toward understanding the human sense of touch.

"The big question our laboratory is interested in is how do animals, including humans, actively move their sensors through the environment and somehow turn that sensory data into a stable perception of the world," Hartmann says.

To determine how a rat can sense the shape of an object, Hartmann's team previously developed a light sheet to monitor the precise locations of the whiskers as they came in contact with the object. Using high-speed video, the team can also analyze how the rat moves its head to explore different shapes. These behavioral observations can then be paired with the output from the model.

These advances will provide insight into the sense of touch but may also enable new technologies that could make use of the whisker system. For example, Hartmann's lab created arrays of robotic whiskers that can, in several respects, mimic the capabilities of mammalian whiskers. The researchers demonstrated that these arrays can sense information about both object shape and fluid flow.

"We show that the bending moment, or torque, at the whisker base can be used to generate three-dimensional spatial representations of the environment," Hartmann says."We used this principle to make arrays of robotic whiskers that can replicate much of the basic mechanics of rat whiskers." The technology, she said, could be used to extract the three-dimensional features of almost any solid object.

Hartmann envisions that a better understanding of the whisker system may be useful for engineering applications in which the use of cameras is limited. But most importantly, a better understanding of the rat whisker system could translate into a better understanding of ourselves.

"Although whiskers and hands are very different, the basic neural pathways that process tactile information are in many respects similar across mammals," Hartmann says."A better understanding of neural processing in the whisker system may provide insights into how our own brains process information."

In addition to Hartmann, other authors of the paper are Blythe Towal, Brian Quist and Joseph Solomon, all of Northwestern, and Venkatesh Gopal of Elmhurst College.


Source

Thursday, April 7, 2011

Gaming, Simulation Tools Merged to Create Models for Border Security

The Borders High Level Model (HLM) uses a serious gaming platform known as Ground Truth, a force-on-force battle simulation tool called Dante™, and the work of several collaborating organizations.

"There's a lot of debate going on in the government concerning the technology and infrastructure investments that need to be made along the border," explained Jason Reinhardt, who serves as the Borders HLM project manager at Sandia."How much fence do we need? What kind of fence? What is the right mix of border personnel and technology? How can sensors, vehicles and other technical equipment most effectively be used? With Borders HLM, CBP officials can simulate their defensive architectures, accurately measure their performance and start to answer these difficult questions."

Ground Truth, initially funded through internal Sandia investments in 2007, is a gaming platform originally designed to prepare decision makers and first responders for weapons of mass destruction/weapons of mass effect (WMD/WME) attacks in metropolitan areas. Developed by Sandia computer scientist and Borders HLM principal investigator Donna Djordjevich, the software provides a virtual environment where users can play through various scenarios to see the effects of their decisions under the constraints of time and resources.

For the Borders HLM project, the Ground Truth software has been integrated into bottom-projected touch surface table. On this game surface, users can see"people" moving across the border terrain, observe CBP"personnel" respond to incidents and essentially control those movements and"apprehend" suspects. Users can also view a leader board of sorts that shows how many suspects have been apprehended, the dollar amount spent implementing the chosen architecture and other metrics that matter to CBP decision-makers.

Dante™, also part of the Borders HLM platform, is a force-on-force battle simulation tool built on the well-known Umbra simulation framework developed and introduced in 2001 by Sandia researchers.

The work also builds from another Sandia borders project from the mid-2000s (focused on the impact of new detection technology at ports of entry) and capitalizes on a range of existing Sandia capabilities, including the Weapons of Mass Destruction Decision Analysis Center (WMD-DAC), the National Infrastructure Simulation and Analysis Center (NISAC, a joint Sandia and Los Alamos National Laboratory program) and even the lab's expertise in robotics.

According to Reinhardt and Djordjevich, there were a number of technical challenges in integrating a mature modeling technology like Dante with a newer gaming technology like Ground Truth.

"We needed to create real-time control for the user, and our current capabilities weren't built to do that," Reinhardt said."There's also the fact that we're modeling 64 square miles of border, and we need to do so at a pretty high fidelity," added Djordjevich, who pointed out that Ground Truth's terrain was originally developed at a fixed, small scale. To help overcome some of the barriers, Sandia has looked to some important collaborators.

The University of Utah provided a technology, Visualization Streams for Ultimate Scalability (ViSUS), which allows researchers to progressively stream in terrain and imagery data and minimize data processing requirements, an important consideration given that HLM requires many gigabytes of data. For its part, Happynin Games, an iPhone/mobile game development company, developed the 3-dimentional artwork and the characters found in the simulations. Sandia, acting as the systems integrator, then put all the pieces together, presented the Borders HLM product to CBP and demonstrated how it would allow them to go through all the steps of the"engagement analysis cycle."

"We learned that the border patrol agents and CBP decision-makers need a tool that offers a common view of the problems they face," said Reinhardt."With our high level model, they can play through various scenarios and see how people, technology and other elements all interact. Then, later, they can go back and do a baseline analysis and dig into the details of why certain architectures and solutions aren't working as well as they should." CBP personnel can then play the game again with a recommended solution, and the end users can critique and tweak it to their liking.

With additional funding and the right kind of collaborations, Djordjevich said, more robust features could be added to make Borders HLM even more valuable to CBP and other potential customers. The current version, for instance, only deals with individual border crossers, so it doesn't capture crowd behaviors. Other sensor types, such as radiation detectors or even airborne equipment, could also be added.

Reinhardt says the future of the Borders HLM tool will likely depend on the direction in which CPB chooses to go with its border operations."Our high-level models tool will likely change the way CBP conducts its business, and it will probably have a real long-term impact on how large expenditures are justified or reputed on and around the nation's borders."

Sandia National Laboratories is a multiprogram laboratory operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration. With main facilities in Albuquerque, N.M., and Livermore, Calif., Sandia has major R&D responsibilities in national security, energy and environmental technologies, and economic competitiveness.


Source

Wednesday, April 6, 2011

Device Enables Computer to Identify Whether User Is Male or Female

The Spanish Patent and Trademark Office has awarded the Universidad Politécnica de Madrid and the Universidad Rey Juan Carlos Spanish patent ES 2 339 100 B2 for the device.

Thanks to the new algorithm, devices can be built to measure television or advertising video audiences by gathering demographic information about spectators (dynamic marketing). The new device is also useful for conducting market research at shopping centres, stores, banks or any other business using cameras to count people and extract demographic information. Another application is interactive kiosks with a virtual vendor, as the device automatically extracts information about the user, such as the person's gender, to improve interaction.

A step forward in gender recognition from facial images

This research, the results of which were published in IEEE Transactions on Pattern Analysis and Machine Intelligence, demonstrates that linear techniques are just as good as support vector machines (SVM) for the gender recognition problem. The developed technique is applicable in devices that have low computational resources, like telephones or intelligent cameras.

The study concludes that linear methods are useful for training with databases that contain a small number of images, as well as for outputting gender classifiers that are as fast as boosting-based classifiers. However, boosting- or SVM-based methods will require more training images to get good results. Finally, SVM-based classifiers are the slowest option. Additionally, the experimental evidence suggests that there is a dependency among different demographic variables like gender, age or ethnicity.

Device for demographic face classification

The invention is a device equipped with a camera that captures digital images and is connected to an image processing system. The image processing system trims each face detection image to the size of 25x25 pixels. An elliptical mask (designed to eliminate background interference) is then applied to the image, and it is equalized and classified.

The device advances the state of the art by using a classifier based on the most efficient linear classification methods: principal component analysis (PCA), followed by Fisher's linear discriminant analysis (LDA) using a Bayesian classifier in the small dimensional space output by the LDA. For PCA+LDA to be competitive, the crucial step is to select the most discriminant PCA features before performing LDA.

One of the major research areas in informatics is the development of machines that interact with users in the same way as human beings communicate with each other. This research is a step further in this direction.


Source

Monday, April 4, 2011

Self-Cooling Observed in Graphene Elctronics

Led by mechanical science and engineering professor William King and electrical and computer engineering professor Eric Pop, the team will publish its findings in the April 3 advance online edition of the journalNature Nanotechnology.

The speed and size of computer chips are limited by how much heat they dissipate. All electronics dissipate heat as a result of the electrons in the current colliding with the device material, a phenomenon called resistive heating. This heating outweighs other smaller thermoelectric effects that can locally cool a device. Computers with silicon chips use fans or flowing water to cool the transistors, a process that consumes much of the energy required to power a device.

Future computer chips made out of graphene -- carbon sheets 1 atom thick -- could be faster than silicon chips and operate at lower power. However, a thorough understanding of heat generation and distribution in graphene devices has eluded researchers because of the tiny dimensions involved.

The Illinois team used an atomic force microscope tip as a temperature probe to make the first nanometer-scale temperature measurements of a working graphene transistor. The measurements revealed surprising temperature phenomena at the points where the graphene transistor touches the metal connections. They found that thermoelectric cooling effects can be stronger at graphene contacts than resistive heating, actually lowering the temperature of the transistor.

"In silicon and most materials, the electronic heating is much larger than the self-cooling," King said."However, we found that in these graphene transistors, there are regions where the thermoelectric cooling can be larger than the resistive heating, which allows these devices to cool themselves. This self-cooling has not previously been seen for graphene devices."

This self-cooling effect means that graphene-based electronics could require little or no cooling, begetting an even greater energy efficiency and increasing graphene's attractiveness as a silicon replacement.

"Graphene electronics are still in their infancy; however, our measurements and simulations project that thermoelectric effects will become enhanced as graphene transistor technology and contacts improve" said Pop, who is also affiliated with the Beckman Institute for Advanced Science, and the Micro and Nanotechnology Laboratory at the U. of I.

Next, the researchers plan to use the AFM temperature probe to study heating and cooling in carbon nanotubes and other nanomaterials.

King also is affiliated with the department of materials science and engineering, the Frederick Seitz Materials Research Laboratory, the Beckman Institute, and the Micro and Nanotechnology Laboratory.

The Air Force Office of Scientific Research and the Office of Naval Research supported this work. Co-authors of the paper included graduate student Kyle Grosse, undergraduate Feifei Lian and postdoctoral researcher Myung-Ho Bae.


Source

Saturday, April 2, 2011

World First: Calculations With 14 Quantum Bits

The term entanglement was introduced by the Austrian Nobel laureate Erwin Schrödinger in 1935, and it describes a quantum mechanical phenomenon that while it can clearly be demonstrated experimentally, is not understood completely. Entangled particles cannot be defined as single particles with defined states but rather as a whole system. By entangling single quantum bits, a quantum computer will solve problems considerably faster than conventional computers."It becomes even more difficult to understand entanglement when there are more than two particles involved," says Thomas Monz, junior scientist in the research group led by Rainer Blatt at the Institute for Experimental Physics at the University of Innsbruck."And now our experiment with many particles provides us with new insights into this phenomenon," adds Blatt.

World record: 14 quantum bits

Since 2005 the research team of Rainer Blatt has held the record for the number of entangled quantum bits realized experimentally. To date, nobody else has been able to achieve controlled entanglement of eight particles, which represents one quantum byte. Now the Innsbruck scientists have almost doubled this record. They confined 14 calcium atoms in an ion trap, which, similar to a quantum computer, they then manipulated with laser light. The internal states of each atom formed single qubits and a quantum register of 14 qubits was produced. This register represents the core of a future quantum computer. In addition, the physicists of the University of Innsbruck have found out that the decay rate of the atoms is not linear, as usually expected, but is proportional to the square of the number of the qubits. When several particles are entangled, the sensitivity of the system increases significantly."This process is known as superdecoherence and has rarely been observed in quantum processing," explains Thomas Monz. It is not only of importance for building quantum computers but also for the construction of precise atomic clocks or carrying out quantum simulations.

Increasing the number of entangled particles

By now the Innsbruck experimental physicists have succeeded in confining up to 64 particles in an ion trap."We are not able to entangle this high number of ions yet," says Thomas Monz."However, our current findings provide us with a better understanding about the behavior of many entangled particles." And this knowledge may soon enable them to entangle even more atoms. Some weeks ago Rainer Blatt's research group reported on another important finding in this context in the scientific journalNature: They showed that ions might be entangled by electromagnetic coupling. This enables the scientists to link many little quantum registers efficiently on a micro chip. All these findings are important steps to make quantum technologies suitable for practical information processing," Rainer Blatt is convinced.

The results of this work are published in the scientific journalPhysical Review Letters. The Innsbruck researchers are supported by the Austrian Science Fund (FWF), the European Commission and the Federation of Austrian Industries Tyrol.


Source