Browse Articles

A novel deep learning model for visibility correction of environmental factors in autonomous vehicles

Dey et al. | Oct 31, 2022

A novel deep learning model for visibility correction of environmental factors in autonomous vehicles

Intelligent vehicles utilize a combination of video-enabled object detection and radar data to traverse safely through surrounding environments. However, since the most momentary missteps in these systems can cause devastating collisions, the margin of error in the software for these systems is small. In this paper, we hypothesized that a novel object detection system that improves detection accuracy and speed of detection during adverse weather conditions would outperform industry alternatives in an average comparison.

Read More...

Fractals: Exploring Mandelbrot Coordinates and qualitative characteristics of the corresponding Julia Set

Thomas et al. | Jul 07, 2022

Fractals: Exploring Mandelbrot Coordinates and qualitative characteristics of the corresponding Julia Set

Here based on an interest in fractals, the authors used a Julia Set Generator to consider a specific point on the Mandelbrot set with an associated coordinate. In this manner, they found that the complexity of the Mandelbrot and Julia Sets are governed by relatively simple rules, revealing that the intricate patterns of fractals can be defined by defined by simple rules and patterns.

Read More...

Quantitative definition of chemical synthetic pathway complexity of organic compounds

Baranwal et al. | Jun 19, 2023

Quantitative definition of chemical synthetic pathway complexity of organic compounds

Irrespective of the final application of a molecule, synthetic accessibility is the rate-determining step in discovering and developing novel entities. However, synthetic complexity is challenging to quantify as a single metric, since it is a composite of several measurable metrics, some of which include cost, safety, and availability. Moreover, defining a single synthetic accessibility metric for both natural products and non-natural products poses yet another challenge given the structural distinctions between these two classes of compounds. Here, we propose a model for synthetic accessibility of all chemical compounds, inspired by the Central Limit Theorem, and devise a novel synthetic accessibility metric assessing the overall feasibility of making chemical compounds that has been fitted to a Gaussian distribution.

Read More...

Deciphering correlation and causation in risk factors for heart disease with Mendelian randomization

Singh et al. | Feb 08, 2023

Deciphering correlation and causation in risk factors for heart disease with Mendelian randomization
Image credit: Robina Weermeijer

Here, seeking to identify the risk of coronary artery disease (CAD), a major cause of cardiovascular disease, the authors used Mendelian randomization. With this method they identified several traits such as blood pressure readings, LDL cholesterol and BMI as significant risk factors. While other traits were not found to be significant risk factors.

Read More...

A meta-analysis on NIST post-quantum cryptographic primitive finalists

Benny et al. | Sep 21, 2024

A meta-analysis on NIST post-quantum cryptographic primitive finalists
Image credit: Benny et al. 2024

The advent of quantum computing will pose a substantial threat to the security of classical cryptographic methods, which could become vulnerable to quantum-based attacks. In response to this impending challenge, the field of post-quantum cryptography has emerged, aiming to develop algorithms that can withstand the computational power of quantum computers. This study addressed the pressing concern of classical cryptographic methods becoming vulnerable to quantum-based attacks due to the rise of quantum computing. The emergence of post-quantum cryptography has led to the development of new resistant algorithms. Our research focused on four quantum-resistant algorithms endorsed by America’s National Institute of Standards and Technology (NIST) in 2022: CRYSTALS-Kyber, CRYSTALS-Dilithium, FALCON, and SPHINCS+. This study evaluated the security, performance, and comparative attributes of the four algorithms, considering factors such as key size, encryption/decryption speed, and complexity. Comparative analyses against each other and existing quantum-resistant algorithms provided insights into the strengths and weaknesses of each program. This research explored potential applications and future directions in the realm of quantum-resistant cryptography. Our findings concluded that the NIST algorithms were substantially more effective and efficient compared to classical cryptographic algorithms. Ultimately, this work underscored the need to adapt cryptographic techniques in the face of advancing quantum computing capabilities, offering valuable insights for researchers and practitioners in the field. Implementing NIST-endorsed quantum-resistant algorithms substantially reduced the vulnerability of cryptographic systems to quantum-based attacks compared to classical cryptographic methods.

Read More...