Search results for «etw» 3550 results
Perseids 2016: Guide to Watching a Meteor Shower
…n the city - the W-shaped Cassiopea. A little lower than Cassiopea are Perseus's four bright stars, which form a slightly bent line. From this point (it’s called a radiant) - between Cassiopea and Perseus, the Perseids fly, leaving bright thin lines in the sky. To check if the meteor is a Perseid, one should draw a visual line to check its "source". If it does not cr…
11.08.2016
Ready to Move: Young Coders Share their Career Experience
… on social media. This area correlates with my Bachelor’s and Master’s theses. My graduation paper is devoted to studying of individual and group characteristics of social networks’ users. For instance, analyzing photos from Instagram and Twitter’s texts one can determine demographic characteristics such as gender, age, marital status and so forth. This kind of re…
10.08.2016
Scientists Count Microscopic Particles Without Microscope
…ace has to be covered with conductive metal layer, which impairs optical properties of the sample”. The new method already enabled scientists to investigate the transition between two main classes of optical materials: photonic crystals and metasurfaces. In the study, they determined the lattice parameters, which define whether the light perceives the material as …
09.08.2016
Joining Big Science: How PCs Help Large-Scale Projects
…nd people lost interest in the project experts realized that volunteers can assist in solving global tasks. It inspired them to launch BOINC (Berkeley Open Infrastructure for Network Computing), the open platform for involving individuals in computing projects. Everybody can participate by offering facilities of personal computers. It includes the following projects:…
09.08.2016
Russia’s First Multi-Node Quantum Network: the Next Step for Quantum Communications of Tomorrow
…ttack immediately, for if someone tries to intercept the data the photons transform completely. Quantum communication systems will become a foundation for a new generation of network security systems, which will be in great demand among all institutions that need to exchange confidential data – financial, governmental and industrial. In the nearest future, quantum co…
08.08.2016
Drones at Work: Delivering Pizza, Searching for the Lost... and Dismembering Snowmen
…s is possible by using operations control or a multi-agent system. Such systems will allow drones to know each other’s location and maneuver by themselves. What stands between the drones and their market success? There is no proper legislation for regulating unmanned flights in Russia. In the beginning of the year, a regulatory act has been passed that proh…
08.08.2016
5 Things We Loved This Week
…Olympics inspire research. From urban pollution (Beijing 2008), to sprawl of security (London 2012), to relationships between athletes and coaches, Olympics are a catalyst for research in a variety of fields, with social sciences, medicine and engineering taking the pedestal. Nature Quantum computer getting closer. Researchers at the University of Oxford have achi…
06.08.2016
Gennady Korotkevich Wins Google Code Jam for the Third Time
…ts out of 200," said Korotkevich. "Apparently I didn't even have to tackle the hardest task E and still stay in first position. In that tasks you had to find the shortest way between point A and point B with minimum radiation from one or two points along the way." Mr. Korotkevich will receive a $15,000 prize and automatic qualification for the 2017 Code Jam Finals…
06.08.2016
I, Chatterbot: Why Virtual Conversational Partners are on Trend Again
…ity originates in the East. The creators of WeChat, Line and KakaoTalk were the first ones to realize that messengers are "the new Internet". Even those who don't need social networks make use of them: a smart phone is something you carry around, using a familiar program is always easier than registering on a new website, and the possibilities of modern platforms pro…
05.08.2016
Big City Traffic Made Effective: from Paid Parking to Life-Hacks
…t different future variants of the city's development, as well as the routes of public transportation. There is a great amount of useful data that can be acquired from mobile network operators, road cameras and detectors, as well as validation of electronic tickets in public transport. If we know your daily plan, we know what and when do you do. Using specific algori…
05.08.2016